Prepared
Text of Statement:
|
Written Testimony
on behalf of
the Coalition Against Unsolicited Commercial Email
by Ray Everett-Church, Co-Founder and Counsel 1
before the United States Senate Communications Subcommittee
June 17, 1998
Thank you
Mr. Chairman and members of the Committee. I am very grateful to have been
asked to speak to you today on behalf of the Coalition Against Unsolicited
Commercial Email, also known as CAUCE. CAUCE is an all-volunteer, ad hoc group
of owners and operators of Internet-based businesses, service providers, technology
professionals, and consumer activists. We are now the largest Internet advocacy
group in the United States with over 10,000 registered members in nearly every
state. Our coalition was formed to advocate for a legislative solution to
the problem of "junk email," because it has become clear to us that
technical and self-regulatory solutions have proven to be no solution at all.
The Coalition represents a wide range of Internet users and Internet-based
businesses. Our Board of Directors includes long-time Internet Users, owners
and operators of ISPs, a marketing and public relations professional, a lawyer,
a college student, and the author of the best-selling book The Internet for
Dummies. What we all have in common is that we make our livings, to some degree
or another, from the Internet. We all want the Net to thrive, and we want
to do business online. We are willing to pay our own way, but we are not willing
to subsidize the advertising of others.
I should note that I have been authorized to say that my remarks today also
represent the views of our colleagues at the Forum for Responsible and Ethical
Email (FREE). Their founder, Jim Nitchals, passed away quite unexpectedly
a little over a week ago. I know Jim was very much looking forward to these
hearings and I'm sure he is watching from above on this important day for
the Internet.
Unsolicited Commercial Email Threatens the Future of Online Commerce
Let there be no mistake that this is an important day for the Internet; you
are taking up an issue of tremendous importance for the future of online commerce.
As a greater and greater percentage of our gross domestic product revolves
around the explosion of computer-related and Internet-related commerce, I
do not exaggerate when I say that junk email has the potential to harm our
economy in ways that terrorists could only dream about.
The technology news media reports with alarming frequency system crashes and
network outages caused by junk email attacks. Junk email has knocked out systems belonging to major Internet
service providers such as AT&T,2 @Home,3
Pacific Bell,4 Netcom,5 GTE,6
and literally hundreds of smaller ISPs serving rural communities across the
nation. And the volumes of junk email are increasing every day.
If junk email were as innocuous as the mail ads you get through the U.S. Postal
Service, we would probably not be discussing this here today. But the fact
that your committee is holding these hearings today is testament to the fact
that junk email - also called UCE, unsolicited commercial email, and "spam"
- is a very different animal with tremendous costs and consequences for the
future of the Internet. There are some who would have you believe that junk
email is no different from any other type of advertising media, but I urge
you not to believe that. There is no other medium quite like junk email in
its ability to damage Internet systems and impede legitimate Internet commerce.
I know of no more efficient means of consuming the time, money and resources
of millions, against their will.
Unsolicited Commercial Email Shifts Tremendous Costs Onto Recipients
Unlike virtually every other communications medium, the majority of email
costs are paid by the recipients - not the sender. This is, for better or
for worse, the nature of the Internet. It grows out of the cooperative arrangements
upon which the Internet was created, where each participant pays for their
portion of the infrastructure. This means that once an email is sent, whether
it is an advertisement or a letter from a college student to her parents,
the costs for relaying, transmitting, receiving, storing, and downloading
the message borne by any number of people, except the sender. When you are
not paying the freight, as is the case with the sender, it is only natural
to be less concerned with the costs involved. And therein lies the problem.
Even if the problem were limited to just one or two messages a day, forcing
a recipient to pay for receiving advertising would be unacceptable, but we
are not talking about just a few messages. I know this first hand: During
calendar year 1997, the email account I use for my business received over
six thousand pieces of junk email, weighing in at 41 megabytes of data. That
is an average of sixteen (16) pieces of junk email each day. Indeed, the economics
of junk email create a strong incentive to send such mail as frequently and
as broadly as possible. Given that the cost of sending one hundred messages
is the same as one million, a mailer has every incentive to send his message
to as many e-mail addresses as possible. With such a miniscule investment,
even if only one out of every million recipients buys the mailer's miracle
cure or multi-level marketing scheme, not only will he have recovered his
tiny investment, he may well have turned a handsome profit.
The problem with junk email stems from the realization by unscrupulous mass
marketers that they can force unwanted and unwelcome messages on millions
of consumers, with just the touch of a button, at virtually no cost to themselves.
For less than a hundred dollars, you can outfit your computer with all the
necessary hardware and software to generate a million pieces of junk email
each day. You can even buy databases of email addresses on CD-ROM; the going
rate right now is under $10.00 per million addresses. Top it off with an unlimited
Internet account for $19.95, and a junk emailer is born.
While the costs are small for the junk mailers, the same cannot be said for
the people who have to transport, process, store, and retrieve that email.
Millions of Internet users, businesses and consumers alike, pay for their
access to the Internet in increments of time. Many more, particularly those
in rural communities and those who travel extensively, must make toll calls
to obtain a connection. For these individuals, each unsolicited commercial
message they receive is like a telemarketer's call to their cellular phone
- they pay to receive messages they did not ask for and inevitably do not
want. Like many millions of people, I pay for my Internet access by the minute.
I estimate that the Internet connection time alone for those six thousand
unsolicited messages cost me in the hundreds of dollars - and that is before
I even begin to calculate the amount of time wasted in sorting through all
that junk to find my important email.
It also presents a problem for those who do not immediately review their e-mail.
When these individuals do check their electronic mailboxes, they find they
must wade through dozens of unsolicited advertising messages in order to find
their legitimate email. During that time, their company or service provider
has been forced to store that tremendous volume of mail until the user can
retrieve it. Just a few days worth of junk email for a service provider the
size of America Online would easily fill all the disk storage space of all
the computers in all of the offices on Capitol Hill.
Junk email forces Internet users to become a captive audience for whatever
advertising message anyone wishes to send them, at any time, any number of
times. Yet the hard costs are miniscule when compared to the non-monetary
costs of junk email. Unlike direct mail from the post office, junk e-mail
arrives throughout the day at home and at work, and there is no effective
technical means of blocking it.7 Junk email
in the workplace interrupts employees who must wade through pornographic ads
and "get rich quick" schemes to find work-related email. Parents
and their children often have no choice but to accept, pay for and dispose
of these unwanted and sometimes highly offensive messages. Major junk email
campaigns can also knock out Internet systems, resulting in lost data, lost
business, and lost productivity.
The Economics of "Junk Email" Encourages Massive Abuse
When turned into an advertising medium, the skewed economics of email turn
traditional notions of advertising on their head. In virtually no other advertising
medium does the advertiser get to force the recipient to bear more costs than
they do. At least with television, print ads in newspapers, or advertisements
in the U.S. Mail, the sender incurs significant initial costs and is forced
to target their advertising carefully because each additional ad bears in
incremental cost. But in the world of junk email marketing, it costs no more
to send the first email than it does to send the ten millionth email. Thus,
there is every incentive for the marketers to cast their advertisements as
widely and indiscriminately as possible.
Not only is there no incentive to carefully target the mailing lists, there
isn't even an incentive to reduce duplication. So today many people, myself
included, regularly receive multiple copies of the exact same advertisement.8
And why not? When advertisers pay so little of the costs involved,
there is no incentive for them to be careful; indeed, time spent on editing
a mailing list is time wasted.
You will undoubtedly hear from representatives of the marketing industry who
will say that electronic mail represents a low cost method of marketing which
will put mass advertising into the hands of even the smallest businesses.
That is certainly true. But what they never acknowledge is that what makes
junk email so inexpensive is that every recipient is forced to subsidize that
advertising whether they want to or not. I am continually astonished that
the marketing industry defends the need for junk emailers to steal money and
resources from their would-be customers. No other industry would dream of
stealing from potential customers in this fashion, and no other industry would
dare come before Congress and ask that their right to steal from the public
be protected.
For this reason, many people have called junk email a form of "postage
due" marketing. I am not so charitable. Quite simply, I call it theft.
It is stealing the time, money, and resources of others against their will.
And any legislation that sanctions the sending of unsolicited email, however
well-intentioned, does nothing short of legalizing a kind of theft. Therefore
I urge the members of this committee to reject any so-called solution which
would permit the practice of theft by email to continue.
The Threat to Businesses and Service Providers is Enormous, and Growing
I am sure you will hear horror stories from many Internet Service Providers
about the volumes of junk email coursing through their systems, but some larger
companies have publicly estimated that upwards of 30% of their daily email
traffic is junk email. As a former consultant to America Online's email administrators,
I can tell you that they have made major investments in equipment and personnel
to keep their systems running in the face of the onslaught. Companies like
Hotmail, AT&T, Earthlink, UUNet, Netcom, CompuServe, and Erols also invested
millions and hired numerous full time administrative staff to do nothing but
combat the effects of junk email.
But I am not here today to tell you about the problems of large ISPs - they
will tell you that themselves. I am here to tell you that even a fraction
of AOL's daily junk email dose is more than enough to put small businesses
and small Internet Service Providers out of business. With more and more companies
conducting their critical business over the Internet, junk email is costing
those businesses millions. Moreover, junk email threatens to put hundreds
of small ISPs out of business, particularly the kinds of small, local service
providers who provide the only cost-effective Internet access to thousands
of consumers, businesses, and schools in rural areas all across the United
States. Even as I speak, this committee and others in Congress are debating
whether FCC-imposed fees should subsidize Internet access for schools and
libraries. As you wrangle over that issue, let me remind you of this fact:
junk emailers peddling porn sites and miracle potions are already subsidizing
themselves on the backs of schools, libraries, businesses and consumers all
across this nation.
CAUCE has heard from many dozens of small and mid-sized ISP all across this
country, all of whom are crying out for relief from the damaging and costly
practices of unscrupulous advertisers. Technology shows little promise of
solving the problem, and hauling junk mailers into court on cutting-edge theories
in cyberspace law is just not a reasonable or affordable answer. Small ISPs
exist on notoriously tiny profit margins. Seemingly little things, such as
the number of milliseconds it takes for a computer to process a piece of email,
become looming problems when you are facing the demands of Internet services.
For an Internet Service Provider, the processing capacity of their mail servers
is a precious commodity and when their systems are tied up processing junk
email, it creates a drag on all of the services they provide to their customers.9
The problem is also compounded by the fact that ISPs purchase bandwidth -
their connection to the rest of the Internet - based on projected usage by
their prospective user base. For most small and mid-sized ISPs, bandwidth
costs are among one of the greatest portions of their budget and contributes
to the reason why many ISPs have a tiny profit margin. Without junk email,
greater consumption of bandwidth would normally track with increased numbers
of customers. However, when an outside entity (e.g., the junk emailer) begins
to consume an ISP's bandwidth, the ISP has few choices: One, let the paying
customers cope with slower Internet access, occasional crashes, and degraded
services; two, eat the costs of increasing capacity; or three, raise rates.
No matter the choice, the recipients are still forced to bear costs that the
advertiser has avoided.
The Nobel Prize-winning economist Ronald Coase has written eloquently about
the damage done to the economy when these kinds of costs are chronically externalized
onto an ever-widening base. In his writings, Coase has discussed the dangers
to the free market when an inefficient business - one that cannot bear the
costs of its own activities - distributes its costs across a greater and greater
population of victims. What makes this situation so dangerous is that when
millions of people only suffer a small amount of damage, it becomes too costly
for the victims to recover their tiny share of the overall damages. Such a
population will continue to bear those unnecessary and detrimental costs unless
and until their individual damage becomes so great that those costs outweigh
the transaction costs of fighting back.
The classic example is pollution: It is much cheaper, in raw terms, for a
chemical manufacturer to dump its waste into the local river. Such externalities
allow one person to profit at another's - or everyone's - expense. Certainly
those who are harmed might have a cause of action under civil law to recover
their actual damages. But for the vast majority of victims, there are significant
transaction costs involved in bring individual lawsuits. For most, those costs
will prohibit them from ever seeking redress. As a result, the skewed economics
of pollution will give incentive to the polluters while making it prohibitive
for victims to seek a remedy. Much is the same when it comes to junk email.
While some companies have successfully sued junk emailers for the damage they
have caused, very few ISPs can afford to fight these kinds of cutting edge
cyberlaw battles. 10 As a result, the
economics favor the abusers and disfavor those victimized. Indeed the mailers
are counting on the fact that their incremental theft will not be noticed
or that people will just hit the "delete" key and move on. They
hope that if they steal only a tiny bit from millions of people, very few
will bother to fight back.
As Coase pointed out, this is a prescription for disaster. When inefficiencies
are allowed to continue, the free market no longer functions properly. As
we all remember from our college Microeconomics classes, the 'invisible hands'
that would normally balance the market and keep it efficient cannot function
effectively when the market is carrying dead weight and perpetuating chronic
inefficiencies. Unchecked, businesses that are otherwise unprofitable will
indefinitely leech off the indirect subsidies they extract from the public
at large.
In the context of the Internet, the costs of these externalities can be seen
every time you have trouble accessing a web site, whenever your email takes
3 hours to travel from AOL to Prodigy, or when all your email is lost in an
ISP server crash. But the costs do not stop there. With junk email already
the number one complaint of most Internet users, consumers have deserted many
public discussion forums for fear that their email addresses will be "harvested"
and added to junk mail lists. Customers are afraid to give their addresses
out in legitimate commerce for fear of being added to and traded among thousands
of mailing lists. Legitimate businesses are afraid to use email to communicate
with their existing customers for fear of being branded "net abusers."
Congress Has Acted to Stop Cost Shifting Before
In the pollution context and in many other situations where the marketplace
has failed to maintain its own natural equilibrium, governments have appropriately
stepped in to alter the skewed economic balance. By enacting substantial fines
and penalties as a matter of public policy, governments have remedied the
marketplace failure and made responsible behavior more cost effective. A perfect
case in point is the federal statute that outlawed the sending of unsolicited
advertisements via fax machine.
Email is increasingly becoming a critical business tool in much the same way
as the fax machine became an indispensable took during the late 1980s. As
more and more businesses began to use fax machines, marketers decided that
they could fax you their advertisements. For anyone in a busy office in the
late 1980s, you will undoubtedly remember the piles of office supply catalogs
and business printing ads that came pouring out of your fax machine. On far
too many occasions, you had to shut off the fax machine in mid-advertisement
so your business colleagues could try and send their fax before the advertiser
could redial.
The similarities between junk faxes and junk email are many: both forms of
advertising shift the costs onto recipients, both of them tie up expensive
resources without compensation to the victims, and both require federal legislation
to cure. There are also some compelling differences that make email more pernicious
than faxing. Certainly the average email costs a recipient less than a fax,
however you cannot easily send ten million faxes at the touch of a button
the way you can with email. In addition, the fax advertiser must bear some
marginal cost for each fax sent, particularly if a long-distance call is involved.
But with junk email, recipients and ISPs bear most of the cost while the advertiser
bears little - and with a few keystrokes, you can quadruple the amount of
damage done. With greater and greater abuse not merely a possibility, but
an everyday reality, a legislative solution as strong as the junk fax prohibition
becomes a necessity.
When looking for a legislative solution to the problem of junk email, we found
that the fax statute, 47 USC 227, has been tremendously successful at virtually
eliminating the problem of junk faxes and points the way to a real and meaningful
solution to the problem of junk email. Therefore we strongly urge the passage
of Representative Smith's bill, H.R. 1748. The bill is a model of logic and
simplicity. It assures that those who wish to receive such mass mailings can
continue to do so by simply asking, while those who do not want them, will
not get them, or will have a legal remedy if they do.
S. 1618 and H.R. 3888 Portend Disaster for the Internet
Just as we find H.R. 1748 a clear solution, we find S. 1618 and its House
counterpart H.R. 3888 to be a tremendous threat. Although CAUCE endorses the
intent behind Senator Murkowski's and Senator Torricelli's amendment to the
anti-slamming bill, we are deeply concerned that this proposed law will, if
anything, make the burden on businesses and consumers even greater.11
As written, the bill sets basic standards of legality that are easily met,
even by today's current crop of disreputable scammers and brazen porno spammers.
The legislation would allow marketers to indiscriminately send massive volumes
of email with no recourse for the victim other than begging to be taken off
the list. Furthermore, by placing enforcement solely in the hands of government
bureaucracies, we believe it is unreasonable to expect that the Federal Trade
Commission will ever be able to ferret out thousands of violators operating
out of their basements. Finally, the legislation could be seen to preempt
state laws on junk email.12
By setting such a low threshold for legitimacy, we fear it would allow for
increasing volumes of junk email. In fact, CAUCE has already received numerous
reports of junk emailers making slight modifications to their tactics and
proclaiming that their mail is protected by the Murkowski-Torricelli amendment.
It is a very bad sign when the "remedy" for a problem gives cover
to the most egregious abusers.
We should not presume, as S. 1618 and H.R. 3888 appear to do, that people
are willing to incur both direct and indirect costs for advertisements that
they did not ask for and invariably do not want. These bills would force people
to continuously incur out-of-pocket monetary costs, unless and until they
spend more time and money getting themselves removed from thousands of mailing
lists they did not ask to be on in the first place. Because of the almost
limitless potential for continued abuse under S. 1618 and H.R. 3888, CAUCE
believes that this legislation has the consequence of legitimizing massive
abuse, making things worse than the status quo, thereby contributing to the
demise of email.
H.R. 1748 is an Effective, Narrowly Tailored,
and Constitutional Approach
Legislation is desperately needed, as it was in the case of junk faxes, to
stop the cost-shifting problem inherent in junk email. Because the cost shifting
nature of junk email is so similar to junk faxes, CAUCE believes that amending
47 USC 227 is a well-tailored solution to the problem. H.R. 1748 amends the
anti-junk fax statute to prohibit the sending of unsolicited commercial advertisements
by email. Like the fax law, it defines a deceptive and unfair business practice
that is damaging and costly to consumers and sets statutory damanges. In doing
so, it counterbalances the economics of junk email and places enforcement
in the hands of the consumer, not in the hands of any government agency.
Although some have questioned the constitutionality of H.R. 1748's approach,
let me assure you that there is ample precedent for supporting Representative
Smith's legislation. When addressing a similar issue of unsolicited advertisements,
the Supreme Court said it best in the case of Rowan v. U.S. Post Office:13
Nothing
in the Constitution compels us to listen to or to view any unwanted communication.
. . . We categorically reject the notion that a vendor has a right under the
Constitution or otherwise to send any unwanted communication into the home
of another. . . . We repeat, the asserted right of a mailer stops at the outer
boundary of every person's domain.
In another
Supreme Court case, Breard v. Alexandria,14 the
Court upheld the constitutionality of a local ordinance prohibiting door-to-door
solicitation, stating that it is a misuse of the guarantees of free speech
to force anyone to admit solicitors against their will. In Bland v. Fessler,15 the Ninth Circuit upheld California's
ban on the use of automated dial and delivery devices, ruling that advertisers
had no right to turn consumers into a captive audience, forcing them to receive
any message the advertiser wished to send. The Ninth Circuit concluded such
a prohibition was a reasonable time, place and manner restriction and was
reasonably tailored to serve the state's substantial interest in protecting
peoples' right to be left alone.
In addition to these fundamental precepts, every court to look at the constitutionality
of the junk fax law, upon which H.R. 1748 is based, has upheld its constitutionality.
In Destination Ventures v. FCC,16 the
Ninth Circuit, after noting that commercial speech receives less protection
than political or religious speech, concluded that the statute served a substantial
government interest in preventing recipients from having to bear the cost
of third party advertising. It found that the prohibition on junk faxes directly
advanced that interest. That is the very same interest served by H.R. 1748.
In this and other regards, H.R. 1748 is the antithesis of the Communications
Decency Act. The approach in H.R. 1748 comes from the Internet community,
by their request, rather than being enacted over the objections of an unwilling
Internet community. As was argued in the CDA challenge, the government should
not be in the position preventing people from viewing material that they want
to see. Representative Smith's bill would do just the opposite: It protects
people from being forced to view material that they don't want to view while
preserving their right to see it upon request.17 Finally,
any remaining questions about free speech issues can be assuaged by the fact
that H.R. 1748 has received wide-spread praise from staunch supporters of
free speech and has been endorsed in editorials by USA Today, The Seattle
Times, The Philadelphia Enquirer, and The Sacramento Bee, among others.
Congress is Justified in Acting to Protect the Email Infrastructure
Like the fax machine before it, electronic mail is a marvelous tool of business
and personal communication. It is simple, it is accessible, and it is becoming
more and more an indispensable part of our professional lives. But there are
even more far-reaching potentials of email that may be lost if its functionality
and utility are destroyed by the proliferation of junk email.
The Internet is an incredible tool for spreading information critical to the
development of freedom and democracy around the world. Indeed, email is often
cited as a critical tool for communicating with and between Chinese democracy
activists. Recent media stories have also credited email as a critical tool
in the overthrow of the Suharto regime in Indonesia.18
If Congress does not take immediate steps to rescue email from
the grips of snake-oil salesmen, there are real implications for the growth
of free speech and democracy both at home and abroad.
Electronic mail is a marvel of accessibilty and ease of use for tens of millions
of Americans, and is a critical growth component of America's young Internet
economy. Yet in just a few short years, unsolicited advertisements by email
have already begun to strangle Internet commerce in its crib. Unless Congress
acts to preserve the viability of the medium, today's crop of scammers and
thieves will soon give way to more legitimate marketers who will replace the
flood of offensive and fraudulent messages with even greater quantities of
ads for snack chips and laundry powder. When that terrible day comes, our
electronic mailboxes will cease to be a useful tool for business and personal
communications and we will have squandered one of the most powerful tools
of communication this planet has ever known. On behalf of the Coalition Against
Unsolicited Commercial Email, I urges you to protect Internet commerce against
the damaging and costly effects of junk email. No less than the future of
electronic commerce and our information economy may be at stake.
Thank you, Mr. Chairman. I would be happy to answer any questions the committee
might have.
Footnotes:
1
This testimony was prepared with the advice and assistance of the CAUCE Board
of Directors: Scott Hazen Mueller, Chairman, John Mozena, John Levine, Doug
Muth, J.D. Falk, Edward Cherlin, Corey Snow, George Nemeyer, and Ray Everett-Church.
Some portions have been excerpted from the testimony of David H. Kramer, Esq.,
before the Washington State Legislature. Mr. Kramer may be contacted at Wilson
Sonsini Goodrich & Rosati, Palo Alto, CA 94304, (650) 493-9300.
[Return to where you were.]
2
"Spam Slows WorldNet Mail" - C|Net News (7/16/97) http://www.news.com/News/Item/0,4,12512,00.html
[Return to where you were.]
3
"Spam Snags @Home Mail System" - C|Net News (2/25/98) http://www.news.com/News/Item/0,4,19487,00.html
[Return to where you were.]
4
"Pacific Bell Suffers Slowdown" - C|Net News (3/13/98) http://www.news.com/News/Item/0,4,20046,00.html;
"PacBell Fights Spam Explosion" - ZDNet (3/13/98) http://www.zdnet.com/zdnn/content/zdnn/0313/294405.html
[Return to where you were.]
5
"Spam Clogs Netcom Lines" - C|Net News (4/29/97) http://www.news.com/News/Item/0,4,10204,00.html
[Return to where you were.]
6
"Sprint Down for 5-hour Count" - C|Net News (9/3/96) http://www.news.com/News/Item/0,4,3039,00.html
(discussing problems at both Sprint and GTE).
[Return to where you were.]
7
Blocking and filtering of junk email has proven extremely ineffective in combating
junk email. In order to block or filter email, you must first know where it
is coming from. Then once you implement a block for that location, a junk
mailer can rapidly change their location. For example, they may send mail
via an America Online connection, then once that route is blocked, they will
reconnect via CompuServe, then via Netcom, and so on. In Internet parlance,
these kinds of mailers are called "whack-a-moles," a reference to
the popular carnival arcade game where you strike the mole with a mallet only
to have it reappear somewhere else. Junk mailers obtain throw-away Internet
accounts for one-time usage, bouncing from one ISP to the next, making up
an address and launching their messages. While a receiving site can add that
address to its filters, the spammer will seldom use that address again. Senator
Murkowski's original bill, S. 771, proposed a mandatory "tag" on
commercial email. However, filtering based upon advertising tags would not
relieve the burden on Internet services providers or businesses whose facilities
are already overwhelmed with massive quantities of junk email.
[Return to where you were.]
8
One particular junk mailer has permutations of my email address on his list
no less than five times. Whenever they take on a new client, I always get
five copies of each and every ad. From the complaints received from CAUCE
members, such situations are not at all uncommon.
[Return to where you were.]
9
Small ISPs are often unable to afford the massive redundant systems that larger
companies can afford. Thus, processing junk email can slow down all of the
functions on servers that might be filling multiple critical functions such
as a mail server, a web server, and a domain name server. Constraints on server
capacity are also one of the reasons "filtering" schemes are not
viable solutions for many ISPs; filtering email consumes vast amounts of processing
capacity and is the primary reason most ISPs cannot implement it as even a
partial strategy for eliminating junk email.
[Return to where you were.]
10
In fact, in nearly every lawsuit on junk email-related issues, the actions
of junk emailers have been found unlawful in one form or another. See, e.g.,
Cyber Promotions, Inc. v. America Online, Inc., C.A. No. 96-2486, 1996 WL
565818 (E.D. Pa. Sept. 5, 1996) (temporary restraining order), rev'd (3d Cir.
Sept. 20, 1996), partial summary judgment granted, 948 F. Supp. 436 (E.D.
Pa. Nov. 4, 1996) (on First Amendment issues), reconsideration denied, 948
F. Supp. 436, 447 (Dec. 20, 1996), temporary restraining order denied, 948
F. Supp. 456 (E.D. Pa. Nov. 26, 1996) (on antitrust claim), settlement entered
(E.D. Pa. Feb. 4, 1997); America Online, Inc. v. Over the Air Equipment, Inc.
(E.D. Va. complaint filed Oct. 2, 1997), preliminary injunction entered (Oct.
31, 1997), settlement order entered (Dec. 18, 1997); Bigfoot Partners, L.P.
v. Cyber Promotions, Inc. (S.D.N.Y. complaint filed Oct. 6, 1997); In re Canter,
No. 95-831-O-H (Tenn. Bd. Prof. Resp. Feb. 25, 1997), disbarment order entered
(Tenn. June 5, 1997); CompuServe Inc. v. Cyber Promotions, Inc., No. C2-96-1070
(S.D. Ohio Oct. 24, 1996) (temporary restraining order), preliminary injunction
entered, 962 F. Supp. 1015 (S.D. Ohio Feb. 3, 1997), final consent order filed
(E.D. Pa. May 9, 1997); Concentric Network Corp. v. Wallace, No. C-96 20829-RMW
(EAI) (N.D. Cal. complaint filed Oct. 2, 1996), stipulated judgment entered
(Nov. 5, 1996); Earthlink Network Inc. v. Cyber Promotions, Inc., No. BC 167502
(Cal. Super. Ct. L.A. County May 7, 1997) (preliminary injunction), consent
judgment entered (Mar. 30, 1998); Expert Pages v. Universal Networks, Inc.,
No. 97-1542 SI ENE (N.D. Cal. May 2, 1997) (temporary restraining order);
Parker v. C.N. Enterprises, No. 97-06273 (Tex. Travis County Dist. Ct. complaint
filed May 26, 1997), temporary injunction entered (Sept. 17, 1997), permanent
injunction entered and damages awarded (Nov. 10, 1997); People v. Lipsitz,
663 N.Y.S.2d 468 (N.Y. Sup. Ct. 1997); Prodigy Services Corp. v. Cyber Promotions,
Inc. (S.D.N.Y. filed Oct. 18, 1996), settlement entered (Dec. 13, 1996); SimpleNet
v. VNZ Information & Entertainment Services (S.D. Cal. complaint filed
Nov. 13, 1997), default judgment entered (Apr. 15, 1998); Web Systems Corp.
v. Cyber Promotions, Inc., No. 97-30156 (Tex. Harris County Dist. Ct. complaint
filed June 1997), temporary restraining order entered (June 6, 1997).
[Return to where you were.]
11
CAUCE expressed our concerns with that language directly to Senator Murkowski
prior to the amendment's introduction. A copy of our letter to Senator Murkowski
is attached and I wish to incorporate that letter
into my testimony by this reference.
[Return to where you were.]
12
Washington and Nevada already have measures on the books dealing with problems
created by junk email. And numerous other states are considering legislation
to address the harm done to businesses. Bills are pending in California, Colorado,
Connecticut, Kentucky, Maryland, Massachusetts, New Hampshire, New Jersey,
New York, Rhode Island, Virginia, and Wisconsin. Professor David Sorkin from
the John Marshall Law School in Chicago maintains a web site tracking current
legislation at: http://www.jmls.edu/cyber/statutes/email.
[Return to where you were.]
13
397 U.S. 728 (1970)
[Return to where you were.]
14
341 U.S. 622 (1950)
[Return to where you were.]
15
88 F.3d 729 (9th Cir. 1996)
[Return to where you were.]
16
46 F.3d 54 (9th Cir. 1995)
[Return to where you were.]
17
The bill also allows for businesses any number of ways to utilize the Internet
to reach a prospective customer. For example, businesses can utilize banner
advertising on popular web sites, create their own web site and register them
with search engines, provide mechanisms for opting-in to email mailing lists,
enter into linking arrangements with companies sharing common markets, and
make targeted and topical postings to appropriate Internet bulletin boards.
[Return to where you were.]
18
"Indonesia Revolt was Net Driven" - Boston Globe (5/23/97) http://www.boston.com/dailyglobe/globehtml/143/
Indonesia_revolt_was_Net_driven.htm
[Return to where you were.]
Last update:
04/29/03
|
|