The Telephone Consumer Protection Act of 1991: Adapting Consumer Protection to Changing Technology
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Address Munging: the Practice of Disguising, Or Munging, an E-Mail Address to Prevent It Being Automatically Collected and Used
Address Munging: the practice of disguising, or munging, an e-mail address to prevent it being automatically collected and used as a target for people and organizations that send unsolicited bulk e-mail address. Adware: or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software. Adware is software designed to force pre-chosen ads to display on your system. Some adware is designed to be malicious and will pop up ads with such speed and frequency that they seem to be taking over everything, slowing down your system and tying up all of your system resources. When adware is coupled with spyware, it can be a frustrating ride, to say the least. Backdoor: in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device. A back door is a point of entry that circumvents normal security and can be used by a cracker to access a network or computer system. Usually back doors are created by system developers as shortcuts to speed access through security during the development stage and then are overlooked and never properly removed during final implementation. -
The History of Digital Spam
The History of Digital Spam Emilio Ferrara University of Southern California Information Sciences Institute Marina Del Rey, CA [email protected] ACM Reference Format: This broad definition will allow me to track, in an inclusive Emilio Ferrara. 2019. The History of Digital Spam. In Communications of manner, the evolution of digital spam across its most popular appli- the ACM, August 2019, Vol. 62 No. 8, Pages 82-91. ACM, New York, NY, USA, cations, starting from spam emails to modern-days spam. For each 9 pages. https://doi.org/10.1145/3299768 highlighted application domain, I will dive deep to understand the nuances of different digital spam strategies, including their intents Spam!: that’s what Lorrie Faith Cranor and Brian LaMacchia ex- and catalysts and, from a technical standpoint, how they are carried claimed in the title of a popular call-to-action article that appeared out and how they can be detected. twenty years ago on Communications of the ACM [10]. And yet, Wikipedia provides an extensive list of domains of application: despite the tremendous efforts of the research community over the last two decades to mitigate this problem, the sense of urgency ``While the most widely recognized form of spam is email spam, the term is applied to similar abuses in other media: instant remains unchanged, as emerging technologies have brought new messaging spam, Usenet newsgroup spam, Web search engine spam, dangerous forms of digital spam under the spotlight. Furthermore, spam in blogs, wiki spam, online classified ads spam, mobile when spam is carried out with the intent to deceive or influence phone messaging spam, Internet forum spam, junk fax at scale, it can alter the very fabric of society and our behavior. -
The Telephone Consumer Protection Act of 1991: Adapting Consumer Protection to Changing Technology, 26 Loy
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Loyola University Chicago, School of Law: LAW eCommons Loyola Consumer Law Review Volume 26 | Issue 3 Article 2 2014 The elephoneT Consumer Protection Act of 1991: Adapting Consumer Protection to Changing Technology Spencer Weber Waller Prof. & Dir. Inst. for Consumer Antitrust Studies, Loyola Univ. Chicago, Chicago, IL, [email protected] Daniel B. Heidtke Attorney, Hafterlaw LLC, Las Vegas, NV. Jessica Stewart Follow this and additional works at: http://lawecommons.luc.edu/lclr Part of the Consumer Protection Law Commons Recommended Citation Spencer W. Waller , Daniel B. Heidtke & Jessica Stewart The Telephone Consumer Protection Act of 1991: Adapting Consumer Protection to Changing Technology, 26 Loy. Consumer L. Rev. 343 (2014). Available at: http://lawecommons.luc.edu/lclr/vol26/iss3/2 This Feature Article is brought to you for free and open access by LAW eCommons. It has been accepted for inclusion in Loyola Consumer Law Review by an authorized administrator of LAW eCommons. For more information, please contact [email protected]. 35126-lcr_26-3 Sheet No. 5 Side A 06/02/2014 15:10:17 Waller Article4.docx (Do Not Delete) 5/21/2014 2:30 PM THE TELEPHONE CONSUMER PROTECTION ACT OF 1991: ADAPTING CONSUMER PROTECTION TO CHANGING TECHNOLOGY Spencer Weber Waller Daniel B. Heidtke & Jessica Stewart FOREWORD his study of the Telephone Consumer Protection Act T (“TCPA”) was made possible through a cy pres distribution from a class action in the United States District Court for the Northern District of Illinois under the supervision of Senior Judge William Hart and Magistrate Judge Morton Denlow which involved claims under the TCPA. -
Opting out of Spam: a Domain Level Do-Not-Spam Registry
Opting Out of Spam: A Domain Level Do-Not-Spam Registry Rebecca Bolint INTRODUCTION Spain, or unsolicited commercial email,' drastically lowers the costs of advertising directly to prospective consumers by exploiting open electronic mail protocols. And it has become an obnoxious big business. Markets, norms, and technological measures 2 have all failed to change sufficiently the economics of the spain business model. Spare is clogging businesses' servers and users' inboxes, and costing too much money and time in return for too little benefit. This Note argues that despite widespread criticism, current federal spain law has in fact effectively targeted the most egregious senders. But it has also created an entitlement to send spam--one free message-before a recipient's wish to avoid spain must be honored. This reverses the entitlement set in other media and ignores consumer demand for privacy and a Do-Not-Call Registry for email. Part I of this Note describes spain, its scale, and its costs and benefits. Part II analyzes attempts to use the market and state legislation to fix the problem. It explains why these efforts failed, and why federal legislation was required. Part III outlines the successes of CAN-SPAM, the groundbreaking federal spain law, as well as the interlocking set of state laws used to combat spainmers. Part IV compares spain law to policies addressing unsolicited commercial speech in other media and proposes a policy suggested in CAN-SPAM, but ultimately overlooked: a Do-Not-Call Registry for email. This Note concludes that a Do- Not-Spain Registry balances the easy detection of a strict liability rule with the t Yale Law School, J.D. -
Good Laws for Junk Fax? Government Regulation of Unsolicited Solicitations
Fordham Law Review Volume 72 Issue 6 Article 13 2004 Good Laws for Junk Fax? Government Regulation of Unsolicited Solicitations Adam Zitter Follow this and additional works at: https://ir.lawnet.fordham.edu/flr Part of the Law Commons Recommended Citation Adam Zitter, Good Laws for Junk Fax? Government Regulation of Unsolicited Solicitations, 72 Fordham L. Rev. 2767 (2004). Available at: https://ir.lawnet.fordham.edu/flr/vol72/iss6/13 This Article is brought to you for free and open access by FLASH: The Fordham Law Archive of Scholarship and History. It has been accepted for inclusion in Fordham Law Review by an authorized editor of FLASH: The Fordham Law Archive of Scholarship and History. For more information, please contact [email protected]. GOOD LAWS FOR JUNK FAX? GOVERNMENT REGULATION OF UNSOLICITED SOLICITATIONS Adam Zitter* INTRODUCTION Financial crisis. War. Telemarketing.' Seeing this threesome, William Shakespeare might muse that "[m]isery acquaints a man with strange bedfellows."2 Barely twenty-four hours after a federal district court ruled on September 23, 2003 that the Federal Trade Commission ("FTC") lacked explicit congressional authority to implement the national do-not-call registry,3 Congress overwhelmingly passed legislation aimed specifically at countering that conclusion.' In a reference to the fifty million phone lines that * J.D. Candidate, 2005, Fordham University School of Law. B.A., 2001, University of Pennsylvania. I want to thank Professor Abner Greene for providing me with a background in Supreme Court commercial speech jurisprudence, and for helping me to frame the issues in this Note. I am grateful to my family, Hillary and Bob Zitter, Sarah, Stuart, and Joshua Milstein, and to Elana Koss for all their love and support. -
The Telephone Consumer Protection Act of 1991: Adapting Consumer Protection to Changing Technology, 26 Loy
Loyola Consumer Law Review Volume 26 | Issue 3 Article 2 2014 The elephoneT Consumer Protection Act of 1991: Adapting Consumer Protection to Changing Technology Spencer Weber Waller Prof. & Dir. Inst. for Consumer Antitrust Studies, Loyola Univ. Chicago, Chicago, IL, [email protected] Daniel B. Heidtke Attorney, Hafterlaw LLC, Las Vegas, NV. Jessica Stewart Follow this and additional works at: http://lawecommons.luc.edu/lclr Part of the Consumer Protection Law Commons Recommended Citation Spencer W. Waller , Daniel B. Heidtke & Jessica Stewart The Telephone Consumer Protection Act of 1991: Adapting Consumer Protection to Changing Technology, 26 Loy. Consumer L. Rev. 343 (2014). Available at: http://lawecommons.luc.edu/lclr/vol26/iss3/2 This Feature Article is brought to you for free and open access by LAW eCommons. It has been accepted for inclusion in Loyola Consumer Law Review by an authorized administrator of LAW eCommons. For more information, please contact [email protected]. 35126-lcr_26-3 Sheet No. 5 Side A 06/02/2014 15:10:17 Waller Article4.docx (Do Not Delete) 5/21/2014 2:30 PM THE TELEPHONE CONSUMER PROTECTION ACT OF 1991: ADAPTING CONSUMER PROTECTION TO CHANGING TECHNOLOGY Spencer Weber Waller Daniel B. Heidtke & Jessica Stewart FOREWORD his study of the Telephone Consumer Protection Act T (“TCPA”) was made possible through a cy pres distribution from a class action in the United States District Court for the Northern District of Illinois under the supervision of Senior Judge William Hart and Magistrate Judge Morton Denlow which involved claims under the TCPA. Following the settlement of the litigation, Judge Hart sought proposals for cy pres distributions that meet existing legal standards. -
“Spam”: an Overview of Issues Concerning Commercial Electronic Mail
Order Code RL31953 “Spam”: An Overview of Issues Concerning Commercial Electronic Mail Updated January 3, 2007 Patricia Moloney Figliola Specialist in Telecommunications and Internet Policy Resources, Science, and Industry Division “Spam”: An Overview of Issues Concerning Commercial Electronic Mail Summary Spam, also called unsolicited commercial email (UCE) or “junk email,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing technique that is protected by the First Amendment, and that some consumers want to receive such solicitations. On December 16, 2003, President Bush signed into law the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act, P.L. 108- 187. It went into effect on January 1, 2004. The CAN-SPAM Act does not ban UCE. Rather, it allows marketers to send commercial email as long as it conforms with the law, such as including a legitimate opportunity for consumers to “opt-out” of receiving future commercial emails from that sender. It preempts state laws that specifically address spam, but not state laws that are not specific to email, such as trespass, contract, or tort law, or other state laws to the extent they relate to fraud or computer crime. It does not require a centralized “Do Not Email” registry to be created by the Federal Trade Commission (FTC), similar to the National Do Not Call registry for telemarketing. -
Telemarketing, Technology, and the Regulation of Private Speech: First Amendment Lessons from the FCC’S TCPA Rules Justin (Gus) Hurwitz
Brooklyn Law Review Volume 84 | Issue 1 Article 17 Fall 10-1-2018 Telemarketing, Technology, and the Regulation of Private Speech: First Amendment Lessons from the FCC’s TCPA Rules Justin (Gus) Hurwitz Follow this and additional works at: https://brooklynworks.brooklaw.edu/blr Part of the Constitutional Law Commons, First Amendment Commons, Marketing Law Commons, and the Privacy Law Commons Recommended Citation Justin (Gus) Hurwitz, Telemarketing, Technology, and the Regulation of Private Speech: First Amendment Lessons from the FCC’s TCPA Rules, 84 Brook. L. Rev. (2018). Available at: https://brooklynworks.brooklaw.edu/blr/vol84/iss1/17 This Article is brought to you for free and open access by the Law Journals at BrooklynWorks. It has been accepted for inclusion in Brooklyn Law Review by an authorized editor of BrooklynWorks. Telemarketing, Technology, and the Regulation of Private Speech FIRST AMENDMENT LESSONS FROM THE FCC’S TCPA RULES Justin (Gus) Hurwitz† INTRODUCTION The late 1980s brought a new terror into the world, “the scourge of civilization,”1 one that is with us to this day: the unsolicited commercial phone call. Increasingly sophisticated digital technologies and rapidly falling costs enabled unsavory marketers to reach out and touch hundreds, thousands, or even more potential customers per hour. They did this through a combination of automated telephone dialers—simple computers that would dial phone numbers sequentially2—and prerecorded or artificial voice messages.3 Unfortunately for this new breed of telemarketers, their business was problematic for both consumers and the architecture of the telephone industry. The calls often came in the evening as families were sitting down to dinner or watching prime-time television—it was a different era, remember—and † Associate Professor of Law and Co-Director, Space, Cyber, and Telecom Law Program, University of Nebraska College of Law. -
Striking the Right Balance in the Private Enforcement of the Anti “Junk Fax” Provisions of the Telephone Consumer Protection Act
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by UNL | Libraries Nebraska Law Review Volume 90 Issue 1 Article 4 2011 Protection of “Innocent Lawbreakers”: Striking the Right Balance in the Private Enforcement of the Anti “Junk Fax” Provisions of the Telephone Consumer Protection Act Yuri R. Linetsky Case Western Reserve University School of Law, [email protected] Follow this and additional works at: https://digitalcommons.unl.edu/nlr Recommended Citation Yuri R. Linetsky, Protection of “Innocent Lawbreakers”: Striking the Right Balance in the Private Enforcement of the Anti “Junk Fax” Provisions of the Telephone Consumer Protection Act, 90 Neb. L. Rev. (2013) Available at: https://digitalcommons.unl.edu/nlr/vol90/iss1/4 This Article is brought to you for free and open access by the Law, College of at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in Nebraska Law Review by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. \\jciprod01\productn\N\NEB\90-1\NEB104.txt unknown Seq: 1 30-AUG-11 12:49 Yuri R. Linetsky* Protection of “Innocent Lawbreakers”: Striking the Right Balance in the Private Enforcement of the Anti “Junk Fax” Provisions of the Telephone Consumer Protection Act TABLE OF CONTENTS I. Introduction .......................................... 72 R II. Facsimile Machines, Advertising, and the TCPA ....... 74 R A. Development and Design of Telephone Facsimile Machines ......................................... 75 R B. Development of the Junk Fax Industry ............ 76 R C. Congress’s Solution to the Perceived Problem of Junk Faxes—Passage of the TCPA ................ 77 R 1. -
Spam”: an Overview of Issues Concerning Commercial Electronic Mail
Order Code RL31953 CRS Report for Congress Received through the CRS Web “Spam”: An Overview of Issues Concerning Commercial Electronic Mail Updated September 16, 2004 Marcia S. Smith Specialist in Aerospace and Telecommunications Policy Resources, Science, and Industry Division Congressional Research Service ˜ The Library of Congress “Spam”: An Overview of Issues Concerning Commercial Electronic Mail Summary Spam, also called unsolicited commercial email (UCE) or “junk email,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing technique that is protected by the First Amendment, and that some consumers want to receive such solicitations. On December 16, 2003, President Bush signed into law the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act, P.L. 108- 187. It went into effect on January 1, 2004. The CAN-SPAM Act does not ban UCE. Rather, it allows marketers to send commercial email as long as it conforms with the law, such as including a legitimate opportunity for consumers to “opt-out” of receiving future commercial emails from that sender. It preempts state laws that specifically address spam, but not state laws that are not specific to email, such as trespass, contract, or tort law, or other state laws to the extent they relate to fraud or computer crime. -
Faxing It In: How Congress Failed Consumers with the Junk Fax Prevention Act of 2005 Jennifer A
Brooklyn Law Review Volume 72 Issue 1 SYMPOSIUM: Article 12 Justice Blackmun and Judicial Biography: A Conversation With Linda Greenhouse 2006 Faxing It In: How Congress Failed Consumers with the Junk Fax Prevention Act of 2005 Jennifer A. Williams Follow this and additional works at: https://brooklynworks.brooklaw.edu/blr Recommended Citation Jennifer A. Williams, Faxing It In: How Congress Failed Consumers with the Junk Fax Prevention Act of 2005, 72 Brook. L. Rev. (2006). Available at: https://brooklynworks.brooklaw.edu/blr/vol72/iss1/12 This Note is brought to you for free and open access by the Law Journals at BrooklynWorks. It has been accepted for inclusion in Brooklyn Law Review by an authorized editor of BrooklynWorks. Faxing It In HOW CONGRESS FAILED CONSUMERS WITH THE JUNK FAX PREVENTION ACT OF 2005 I. INTRODUCTION During the past few years, the federal government’s regulation of telemarketing practices has enjoyed a front-and- center position in the political spotlight.1 In 2003, consumers eagerly embraced the establishment of a national do-not-call registry,2 and in the same year, Congress enacted legislation to curb abusive email marketing practices.3 Both events exemplified an admirable4 commitment to furthering consumer 1 See, e.g., Consumers Served by Blocking Ads, CONN. L. TRIB., Aug. 25, 2003, at 19 (“Responding to overwhelming public demand, our federal and state governments have recently enacted laudable new consumer protections against the frequent onslaught of unwanted direct marketing solicitations.”). Such an increase in federal telemarketing regulation has even inspired new compliance technology. William C. Smith, Ensuring a Peaceful Dinner, NAT’L L.J., Nov. -
The Postman Always Rings 4000 Times: New Approaches to Curb Spam, 18 J. Marshall J. Computer & Info. L
The John Marshall Journal of Information Technology & Privacy Law Volume 18 Issue 4 Journal of Computer & Information Law Article 2 - Summer 2000 Summer 2000 The Postman Always Rings 4,000 Times: New Approaches to Curb Spam, 18 J. Marshall J. Computer & Info. L. 915 (2000) Credence E. Fogo Follow this and additional works at: https://repository.law.uic.edu/jitpl Part of the Computer Law Commons, Internet Law Commons, Privacy Law Commons, and the Science and Technology Law Commons Recommended Citation Credence E. Fogo, The Postman Always Rings 4,000 Times: New Approaches to Curb Spam, 18 J. Marshall J. Computer & Info. L. 915 (2000) https://repository.law.uic.edu/jitpl/vol18/iss4/2 This Article is brought to you for free and open access by UIC Law Open Access Repository. It has been accepted for inclusion in The John Marshall Journal of Information Technology & Privacy Law by an authorized administrator of UIC Law Open Access Repository. For more information, please contact [email protected]. THE POSTMAN ALWAYS RINGS 4,000 TIMES: NEW APPROACHES TO CURB SPAM by CREDENCE E. FoGot I. INTRODUCTION Before 1994, the average Internet user received little unsolicited commercial email ("UCE"), or "spain." Before large Internet Service Providers ("ISPs") offered flat-rate pricing and the World-Wide Web ex- perienced phenomenal growth, the Internet was still mostly the province of university students and the computer literati: it was not a mass me- dium particularly attractive to advertisers. But that all changed in April 1994, when enterprising Arizona lawyers Laurence Canter and Martha Siegel sent UCE advertising their immigration law "services"' to approx- imately 8,000 Usenet newsgroups.