SlideShare una empresa de Scribd logo
1 de 23
Descargar para leer sin conexión
Privacy Concerns in Marketing
and Commercial Communications



       Bennet Kelley   Liisa M. Thomas




                                  June 2, 2009
In the Beginning . . .




Pyramids of Giza, Egypt.
© Digital Vision/Getty Images
There was California . . .



   “We are saying that unsolicited e-mail cannot be sent
   and there are no loopholes . . . We don't differentiate
   between Disney and Viagra.
   If you go out and rent a list of e-mail addresses, by
   definition you are not a legitimate business. You are
   the person we are trying to stop.”
                         Former California State Senator Kevin Murray
                                                      Author of SB 186
84 days later . . .




President George W. Bush signing the CAN-SPAM Act (Dec. 16, 2003).



               Controlling the Assault of Non-Solicited Pornography And Marketing Act
                                           on-
CAN-SPAM Act of 2003
CAN-SPAM IS . . .                     CAN-SPAM DOES NOT . . .

•       anti-
    An anti-fraud and disclosure      •   “Can Spam” – except for wireless spam
    statute
                                      •   Include a “Do Not Email Registry”
•   Applies to an email where the
    “primary purpose” is commercial
    advertisement or promotion of a   •   Impose an “ADV” labeling requirement
    product or service
                                      •   Create a general private right of action
•   Applicable to bulk and single
    emails                            •   Generate stimulating cocktail party
                                          conversations
Regulatory Timeline
2004: FTC Final Rule on Adult Labeling
           FCC CAN-SPAM Rules

2005: FTC (1) Final Rule on Primary Purpose of Email; and
        (2) Proposed Discretionary Rules


2006:
2006

2007:

2008: FTC Final Discretionary Rules
Determining When
CAN-SPAM Applies
CAN-
CAN-SPAMENCLATURE
    SENDER    -- means a person who initiates a
    commercial e-mail and whose product, service,
    or Internet web site is advertised or promoted
    by the message.

    INITIATE -- means to originate or transmit, or
    procure the origination or transmission of, such
    an e-mail message.

    PROCURE -- means intentionally to pay or
    induce another person to initiate the message
    on one's behalf, while knowingly or consciously
    avoiding knowing the extent to which that
    person intends to comply with this Act.
CAN-SPAM Principal Requirements
From Line
 FTC: must give the recipient enough
  information to know who is sending the
  message

 Not deceptive to use multiple domains
  Kleffman v. Vonage Holding Corp. (C.D. Cal. 2007).



 Not misleading to use non-corporate address
  where domain may be checked using “Who
  Is” Gordon v. Virtumundo, Inc. (W.D. Wash. 2007)
 Fake address can get you in the dog house.
Designated Sender Rule
                                               Must Be a Sender
• Name must be in the “From” Line                    CAN-
                                               Under CAN-SPAM

• Must be Responsible for CAN-SPAM             Cannot designate
  compliance                                   Non-
                                               Non-Sender


• Dropped requirement that Designated
  Sender be in control of the content or the
  mailing list used
12
Subject Lines
   • Senate Report
      – test is whether the person initiating the message knows
        that the subject heading would be likely to mislead a
        reasonable recipient about a material fact regarding the
        content or subject matter of the message

   • “New MySpace Phone” subject line misleads consumers
     by creating false sense of sponsorship by MySpace.
      –   MySpace, Inc. v. The Globe.com, Inc. (C.D. Cal. Feb. 27, 2007)




   • “Free Gift” subject lines violate CAN-SPAM
      –          Adteractive,      (C.D.
          FTC v. Adteractive, Inc. (C.D. Cal. 2007)
Opt-Out Mechanism

• Opt-Out Basics
  – May offer options, but total opt-out must be
              options,           opt-
    one of them

  – 10 days to remove

  – No further use of email address after opt-out
                                          opt-

  – Separate Business Units:
    Opt-                 opt-
    Opt-out for Saab not opt-out for all of GM

• Discretionary Regs
  – Cannot impose any conditions on opt-out
                                        opt-
             (e.g
              e.g,                information)
    requests (e.g, fee or provide information)
CAN-SPAM Plaintiffs
                No Consumer Private Right of Action

                FTC & State AGs

                Internet Access Service Provider (IASP)
                     Adversely Effected by Violation
                     Must demonstrate substantial harm

                Civil Penalties
                     $25 – $250 per email
                     $2 million maximum

                Damage Adjustments
                     Treble damages if willful
                     Reduction if violation occurred despite
                      commercially reasonable efforts to maintain
                      compliance”




                                                               15
CAN-SPAMIGATORS
            Faux ISPs
     Established to Prosecute
      CAN-SPAM Actions

 Small, free service can qualify
 Hypertouch v. Kennedy-Western University, 2006 WL 648688 (N.D. Cal. 2006)




 But must demonstrate substantial harm
 - e.g., bandwidth, hardware, connectivity,
 overhead, staffing or equipment costs
 Asis Internet Services, v. Optin Global, Inc., 2008 WL 1902217 (N.D. Cal. March 27, 2008 )
Sender Liability
 FTC unsuccessful in seeking strict
  liability

 Advertiser liable if “actual knowledge,
  or by consciously avoiding knowing”
  about affiliate violations
    Strict anti-spam policies and policing of affiliates
     defeated allegation of intent.
     Hypertouch v. Kennedy-Western University, 2006 WL 648688 (N.D. Cal. 2006)



   – No duty to investigate
      Asis Internet Services, v. Optin Global, Inc., 2008 WL 1902217 (N.D. Cal. March 27, 2008 )
CAN-SPAM PREEMPTS ALL
   STATE REGULATION OF
   EMAIL EXCEPT STATE LAWS

• Regulating falsity or deception in
  email

• Not specific to email, including
  State trespass, contract, or tort law;
  or

• Other State laws to the extent that
  those laws relate to acts of fraud or
  computer crime
Rulings On State Spam
       Regulation
• Misrepresentation must be
  material
  Omega World Travel, Inc. v. Mummagraphics, Inc. (4th Cir. 2006).



• States cannot dictate form of
  from line
  Kleffman v. Vonage Holding Corp. (C.D. Cal. 2007); Gordon v.
  Virtumundo, Inc.(W.D. Wash. 2007).



• Courts split on whether state
  regulation must be based on
  traditional notions of fraud
    •      Yes. ASIS Internet Service v. Optin Global, Inc. (N.D. Cal.
           2008); Hypertouch v. ValueClick, (LA Super. Ct. May 4, 2009).

    •      No. ASIS Internet Service v. Vista Print (N.D.Cal. 2009).



• First Amendment requires
  that it not impinge non-
  commercial email
   Virginia v. Jaynes (Va. 2008).
Preemption’s Back Door?
• Utah/Michigan
  Child Registry Laws
   – Makes sending prohibited email a “computer
     crime”
   – Free Speech Coalition, Inc. v. Shurtleff,
     Utah Federal Court refused to enjoin law finding it
     fell within exception for computer crime
       • DOJ filed brief supporting this position


• New Colorado Spam Law
   – Makes violation of CAN-SPAM a violation of
     state deceptive practices and computer fraud laws
   – Higher Penalties
   – Is this a backdoor to creating private right of
     action under CAN-SPAM?
Selected Cases: CAN-SPAM Act
                CAN-
             Advertiser Liability

                 ASIS Internet Services, v. Optin Global, Inc., 2008 WL
                                                           Inc.,
                  1902217 (N.D. Cal. March 27, 2008 )
                 Hypertouch v. Kennedy-Western University, 2006 WL
                                 Kennedy-           University,
                  648688 (N.D. Cal. 2006)
                 US v. Cyberheat, 2007 U.S. Dist. LEXIS 15448 (N.D. Ariz.
                        Cyberheat,
                  2007)
                 US v. Implulse Marketing, No. CV05-1285RSL (W.D.
                                 Marketing,      CV05-
                  Wash. June 8, 2007)

             From and Subject Lines

                 FTC v. Adteractive, Inc., No. Case No. CV-07-5940 SI
                          Adteractive, Inc.,             CV-07-
                  (C.D. Cal. 2007)
                 Gordon v. Virtumundo, Inc., Case No. 06-0204-JCC (W.D.
                             Virtumundo, Inc.,          06-0204-
                  Wash. May 15, 2007)
                 Kleffman v. Vonage Holding Corp., Case No. CV 07-
                                                Corp.,              07-
                  2406GAFJWJX (C.D. Cal. May 23, 2007)
                 MySpace, Inc. v. The Globe.com, Inc. No. CV 06-3391-
                                                                06-3391-
                  RGK (JCx) (C.D. Cal. Feb. 27, 2007)
                        (JCx)
CAN-
CAN-SPAM Cases Pt 2
      Preemption

          Asis Internet Services, v. Optin Global, Inc., 2008 WL 1902217 (N.D. Cal.
           March 27, 2008 )

          Asis Internet Services v. VistaPrint USA, Inc., No. C 08-5261-SBA (N.D.
           Cal. May 5, 2009)

          Free Speech Coalition, Inc. v. Shurtleff, No. 2:05CV949DAK, 2007 U.S.
           Dist LEXIS 21556 (D. Utah Mar. 23, 2007)

          Gordon v. Virtumundo, Inc., Case No. 06-0204-JCC (W.D. Wash. May
           15, 2007)

          Hypertouch, Inc. v. ValueClick, Inc., L.A. Super. Ct. No. C081000 (May
           4, 2009).

          Kleffman v. Vonage Holding Corp., Case No. CV 07-2406GAFJWJX
           (C.D. Cal. May 23, 2007)

          Omega World Travel, Inc. v. Mummagraphics, Inc., 469 F.3d 348 (4th
           Cir. 2006)

          Virginia v. Jaynes, 666 S.E.2d 303 (Va. 2008).
Bennet Kelley

                                Bennet Kelley founded the Internet Law Center in 2007 after a
                                decade of activity in many of the hottest internet issues including
                                behavioral targeting, cyber squatting, internet marketing and
                                promotions, net neutrality, privacy, spam and spyware. Prior to
                                launching the Internet Law Center, Bennet worked in-house with
                                companies such as ETM Entertainment Network,
                                SpeedyClick.com, Hi-Speed Media and ValueClick.

                                Bennet is Co-Vice Chair of the California Bar's Cyberspace
bkelley@internetlawcenter.net   Committee and has been a regular contributor to the Journal of
                                Internet Law.

                                The Internet Law Center’s is based in Santa Monica but also has a
                                presence in Washington, D.C. and Columbia, S.C. The firm’s e-
                                newsletter, Monday Memo, was named one of the top 100 Internet
                                Law resources and has been nominated for the Los Angeles Press
                                Club’s Southern California Journalism Award for best in-house or
                                corporate publication.

Más contenido relacionado

La actualidad más candente

Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinInternet Law Center
 
What Net Neutrality Opponents Are Saying Now — And Why It’s A Lot Of Hot Air
What Net Neutrality Opponents Are Saying Now — And Why It’s A Lot Of Hot AirWhat Net Neutrality Opponents Are Saying Now — And Why It’s A Lot Of Hot Air
What Net Neutrality Opponents Are Saying Now — And Why It’s A Lot Of Hot Airhandsomelykeepe65
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law Center
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementInternet Law Center
 
Legal 2.0: Hot Topics in Affiliate Marketing
Legal 2.0: Hot Topics in Affiliate MarketingLegal 2.0: Hot Topics in Affiliate Marketing
Legal 2.0: Hot Topics in Affiliate MarketingAffiliate Summit
 
Final presentation New Media Ethics
Final presentation New Media EthicsFinal presentation New Media Ethics
Final presentation New Media EthicsTeichka Muñoz
 
CPI Comcast article April 2014
CPI Comcast article April 2014CPI Comcast article April 2014
CPI Comcast article April 2014Anant Raut
 
Trademark/Copyright Law Update 2008
Trademark/Copyright Law Update 2008Trademark/Copyright Law Update 2008
Trademark/Copyright Law Update 2008Jim Francis
 
CASL vs CAN-SPAM - Canada’s Anti‐Spam Law
CASL vs CAN-SPAM - Canada’s Anti‐Spam LawCASL vs CAN-SPAM - Canada’s Anti‐Spam Law
CASL vs CAN-SPAM - Canada’s Anti‐Spam LawNow Dentons
 
What Freud Can Teach Us About box tv
What Freud Can Teach Us About box tvWhat Freud Can Teach Us About box tv
What Freud Can Teach Us About box tvj4sxwvx485
 
Legal 2.0 affiliate summit slides
Legal 2.0 affiliate summit slidesLegal 2.0 affiliate summit slides
Legal 2.0 affiliate summit slidesInternet Law Center
 
Ecommerce legal exchange beijing
Ecommerce legal exchange beijingEcommerce legal exchange beijing
Ecommerce legal exchange beijingInternet Law Center
 

La actualidad más candente (20)

CAN-SPAM at 5
CAN-SPAM at 5CAN-SPAM at 5
CAN-SPAM at 5
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletin
 
Washington's Privacy Tango
Washington's Privacy TangoWashington's Privacy Tango
Washington's Privacy Tango
 
What Net Neutrality Opponents Are Saying Now — And Why It’s A Lot Of Hot Air
What Net Neutrality Opponents Are Saying Now — And Why It’s A Lot Of Hot AirWhat Net Neutrality Opponents Are Saying Now — And Why It’s A Lot Of Hot Air
What Net Neutrality Opponents Are Saying Now — And Why It’s A Lot Of Hot Air
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP Institute
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
 
ILC Cyber Report - June 2018
ILC Cyber Report - June 2018ILC Cyber Report - June 2018
ILC Cyber Report - June 2018
 
CED013014
CED013014CED013014
CED013014
 
Legal 2.0: Hot Topics in Affiliate Marketing
Legal 2.0: Hot Topics in Affiliate MarketingLegal 2.0: Hot Topics in Affiliate Marketing
Legal 2.0: Hot Topics in Affiliate Marketing
 
Final presentation New Media Ethics
Final presentation New Media EthicsFinal presentation New Media Ethics
Final presentation New Media Ethics
 
CPI Comcast article April 2014
CPI Comcast article April 2014CPI Comcast article April 2014
CPI Comcast article April 2014
 
Trademark/Copyright Law Update 2008
Trademark/Copyright Law Update 2008Trademark/Copyright Law Update 2008
Trademark/Copyright Law Update 2008
 
Net Neutrality
Net NeutralityNet Neutrality
Net Neutrality
 
Polinter10
Polinter10Polinter10
Polinter10
 
CASL vs CAN-SPAM - Canada’s Anti‐Spam Law
CASL vs CAN-SPAM - Canada’s Anti‐Spam LawCASL vs CAN-SPAM - Canada’s Anti‐Spam Law
CASL vs CAN-SPAM - Canada’s Anti‐Spam Law
 
What Freud Can Teach Us About box tv
What Freud Can Teach Us About box tvWhat Freud Can Teach Us About box tv
What Freud Can Teach Us About box tv
 
Legal 2.0 affiliate summit slides
Legal 2.0 affiliate summit slidesLegal 2.0 affiliate summit slides
Legal 2.0 affiliate summit slides
 
Ecommerce legal exchange beijing
Ecommerce legal exchange beijingEcommerce legal exchange beijing
Ecommerce legal exchange beijing
 
CED092812
CED092812CED092812
CED092812
 

Similar a Privacy Concerns in Marketing and Commercial Communications

5 rules of reputation management for startups
5 rules of reputation management for startups5 rules of reputation management for startups
5 rules of reputation management for startupsInternet Law Center
 
1Austin ButlerDr. William Matter Subject Name05 March 20.docx
1Austin ButlerDr. William Matter Subject Name05 March 20.docx1Austin ButlerDr. William Matter Subject Name05 March 20.docx
1Austin ButlerDr. William Matter Subject Name05 March 20.docxfelicidaddinwoodie
 
Cybersecurity & Computer Fraud - The Convergence
Cybersecurity & Computer Fraud - The ConvergenceCybersecurity & Computer Fraud - The Convergence
Cybersecurity & Computer Fraud - The ConvergenceShawn Tuma
 
Social Media Marketing Do’s and Don’ts and Managing Your Online Reputation
Social Media Marketing Do’s and Don’ts and Managing Your Online ReputationSocial Media Marketing Do’s and Don’ts and Managing Your Online Reputation
Social Media Marketing Do’s and Don’ts and Managing Your Online ReputationInternet Law Center
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
 
The Hidden Exposures of Technology
The Hidden Exposures of TechnologyThe Hidden Exposures of Technology
The Hidden Exposures of Technologysmithad612
 
Essentials Of Cyberspace Law Cal Bar Cyberspace Commt
Essentials Of Cyberspace Law  Cal Bar Cyberspace CommtEssentials Of Cyberspace Law  Cal Bar Cyberspace Commt
Essentials Of Cyberspace Law Cal Bar Cyberspace CommtInternet Law Center
 
Withstanding FTC and State Scrutiny of Emerging e-Marketing Practices,
Withstanding FTC and State Scrutiny of Emerging e-Marketing Practices,Withstanding FTC and State Scrutiny of Emerging e-Marketing Practices,
Withstanding FTC and State Scrutiny of Emerging e-Marketing Practices,Internet Law Center
 
Managing Legal Risks In Affiliate Marketing
Managing Legal Risks In Affiliate MarketingManaging Legal Risks In Affiliate Marketing
Managing Legal Risks In Affiliate MarketingAffiliate Summit
 
Cyber Claims Insight
Cyber Claims InsightCyber Claims Insight
Cyber Claims InsightGraeme Cross
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsShawn Tuma
 
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary KibelManaging Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary KibelAffiliate Summit
 
Sookman montreal bar_casl_talk
Sookman montreal bar_casl_talkSookman montreal bar_casl_talk
Sookman montreal bar_casl_talkbsookman
 
Reputation Management in the Social Commerce Era
Reputation Management in the Social Commerce EraReputation Management in the Social Commerce Era
Reputation Management in the Social Commerce EraInternet Law Center
 
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...Shawn Tuma
 

Similar a Privacy Concerns in Marketing and Commercial Communications (20)

Hot Topics in Data Breach Litigation
Hot Topics in Data Breach LitigationHot Topics in Data Breach Litigation
Hot Topics in Data Breach Litigation
 
CAN-SPAM at 4
CAN-SPAM at 4CAN-SPAM at 4
CAN-SPAM at 4
 
5 rules of reputation management for startups
5 rules of reputation management for startups5 rules of reputation management for startups
5 rules of reputation management for startups
 
1Austin ButlerDr. William Matter Subject Name05 March 20.docx
1Austin ButlerDr. William Matter Subject Name05 March 20.docx1Austin ButlerDr. William Matter Subject Name05 March 20.docx
1Austin ButlerDr. William Matter Subject Name05 March 20.docx
 
Cybersecurity & Computer Fraud - The Convergence
Cybersecurity & Computer Fraud - The ConvergenceCybersecurity & Computer Fraud - The Convergence
Cybersecurity & Computer Fraud - The Convergence
 
Social Media Marketing Do’s and Don’ts and Managing Your Online Reputation
Social Media Marketing Do’s and Don’ts and Managing Your Online ReputationSocial Media Marketing Do’s and Don’ts and Managing Your Online Reputation
Social Media Marketing Do’s and Don’ts and Managing Your Online Reputation
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
Legal Implications of a Cyber Attack
Legal Implications of a Cyber AttackLegal Implications of a Cyber Attack
Legal Implications of a Cyber Attack
 
The Hidden Exposures of Technology
The Hidden Exposures of TechnologyThe Hidden Exposures of Technology
The Hidden Exposures of Technology
 
Essentials Of Cyberspace Law Cal Bar Cyberspace Commt
Essentials Of Cyberspace Law  Cal Bar Cyberspace CommtEssentials Of Cyberspace Law  Cal Bar Cyberspace Commt
Essentials Of Cyberspace Law Cal Bar Cyberspace Commt
 
Withstanding FTC and State Scrutiny of Emerging e-Marketing Practices,
Withstanding FTC and State Scrutiny of Emerging e-Marketing Practices,Withstanding FTC and State Scrutiny of Emerging e-Marketing Practices,
Withstanding FTC and State Scrutiny of Emerging e-Marketing Practices,
 
Spam Law - USC 2005
Spam Law - USC 2005Spam Law - USC 2005
Spam Law - USC 2005
 
Managing Legal Risks In Affiliate Marketing
Managing Legal Risks In Affiliate MarketingManaging Legal Risks In Affiliate Marketing
Managing Legal Risks In Affiliate Marketing
 
Cyber Claims Insight
Cyber Claims InsightCyber Claims Insight
Cyber Claims Insight
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
 
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary KibelManaging Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
 
Sookman montreal bar_casl_talk
Sookman montreal bar_casl_talkSookman montreal bar_casl_talk
Sookman montreal bar_casl_talk
 
Reputation Management in the Social Commerce Era
Reputation Management in the Social Commerce EraReputation Management in the Social Commerce Era
Reputation Management in the Social Commerce Era
 
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
 

Más de Internet Law Center

Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfBlueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfInternet Law Center
 
Blueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfBlueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfInternet Law Center
 
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...Internet Law Center
 
Oregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfOregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfInternet Law Center
 
Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Internet Law Center
 
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfBipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfInternet Law Center
 
ECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionInternet Law Center
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyInternet Law Center
 
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareData Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareInternet Law Center
 
Cyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsCyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsInternet Law Center
 
Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Internet Law Center
 

Más de Internet Law Center (20)

Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfBlueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
 
Blueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfBlueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdf
 
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
 
SEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdfSEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdf
 
Oregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfOregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdf
 
Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer
 
CCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdfCCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdf
 
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfBipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
 
20200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc3111820200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc31118
 
ECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II Decision
 
The Road to Schrems II
The Road to Schrems IIThe Road to Schrems II
The Road to Schrems II
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH Economy
 
FIFA Indictment
FIFA IndictmentFIFA Indictment
FIFA Indictment
 
Data Privacy Day 2020
Data Privacy Day 2020Data Privacy Day 2020
Data Privacy Day 2020
 
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareData Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
 
Cyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsCyber Report: A New Year with New Laws
Cyber Report: A New Year with New Laws
 
Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296
 
FTC's Influencer Guide
FTC's Influencer GuideFTC's Influencer Guide
FTC's Influencer Guide
 
Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)
 
Good jobs first backgrounder
Good jobs first backgrounderGood jobs first backgrounder
Good jobs first backgrounder
 

Último

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Último (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

Privacy Concerns in Marketing and Commercial Communications

  • 1. Privacy Concerns in Marketing and Commercial Communications Bennet Kelley Liisa M. Thomas June 2, 2009
  • 2. In the Beginning . . . Pyramids of Giza, Egypt. © Digital Vision/Getty Images
  • 3. There was California . . . “We are saying that unsolicited e-mail cannot be sent and there are no loopholes . . . We don't differentiate between Disney and Viagra. If you go out and rent a list of e-mail addresses, by definition you are not a legitimate business. You are the person we are trying to stop.” Former California State Senator Kevin Murray Author of SB 186
  • 4. 84 days later . . . President George W. Bush signing the CAN-SPAM Act (Dec. 16, 2003). Controlling the Assault of Non-Solicited Pornography And Marketing Act on-
  • 5. CAN-SPAM Act of 2003 CAN-SPAM IS . . . CAN-SPAM DOES NOT . . . • anti- An anti-fraud and disclosure • “Can Spam” – except for wireless spam statute • Include a “Do Not Email Registry” • Applies to an email where the “primary purpose” is commercial advertisement or promotion of a • Impose an “ADV” labeling requirement product or service • Create a general private right of action • Applicable to bulk and single emails • Generate stimulating cocktail party conversations
  • 6. Regulatory Timeline 2004: FTC Final Rule on Adult Labeling FCC CAN-SPAM Rules 2005: FTC (1) Final Rule on Primary Purpose of Email; and (2) Proposed Discretionary Rules 2006: 2006 2007: 2008: FTC Final Discretionary Rules
  • 8. CAN- CAN-SPAMENCLATURE SENDER -- means a person who initiates a commercial e-mail and whose product, service, or Internet web site is advertised or promoted by the message. INITIATE -- means to originate or transmit, or procure the origination or transmission of, such an e-mail message. PROCURE -- means intentionally to pay or induce another person to initiate the message on one's behalf, while knowingly or consciously avoiding knowing the extent to which that person intends to comply with this Act.
  • 10. From Line  FTC: must give the recipient enough information to know who is sending the message  Not deceptive to use multiple domains Kleffman v. Vonage Holding Corp. (C.D. Cal. 2007).  Not misleading to use non-corporate address where domain may be checked using “Who Is” Gordon v. Virtumundo, Inc. (W.D. Wash. 2007)  Fake address can get you in the dog house.
  • 11. Designated Sender Rule Must Be a Sender • Name must be in the “From” Line CAN- Under CAN-SPAM • Must be Responsible for CAN-SPAM Cannot designate compliance Non- Non-Sender • Dropped requirement that Designated Sender be in control of the content or the mailing list used
  • 12. 12
  • 13. Subject Lines • Senate Report – test is whether the person initiating the message knows that the subject heading would be likely to mislead a reasonable recipient about a material fact regarding the content or subject matter of the message • “New MySpace Phone” subject line misleads consumers by creating false sense of sponsorship by MySpace. – MySpace, Inc. v. The Globe.com, Inc. (C.D. Cal. Feb. 27, 2007) • “Free Gift” subject lines violate CAN-SPAM – Adteractive, (C.D. FTC v. Adteractive, Inc. (C.D. Cal. 2007)
  • 14. Opt-Out Mechanism • Opt-Out Basics – May offer options, but total opt-out must be options, opt- one of them – 10 days to remove – No further use of email address after opt-out opt- – Separate Business Units: Opt- opt- Opt-out for Saab not opt-out for all of GM • Discretionary Regs – Cannot impose any conditions on opt-out opt- (e.g e.g, information) requests (e.g, fee or provide information)
  • 15. CAN-SPAM Plaintiffs  No Consumer Private Right of Action  FTC & State AGs  Internet Access Service Provider (IASP)  Adversely Effected by Violation  Must demonstrate substantial harm  Civil Penalties  $25 – $250 per email  $2 million maximum  Damage Adjustments  Treble damages if willful  Reduction if violation occurred despite commercially reasonable efforts to maintain compliance” 15
  • 16. CAN-SPAMIGATORS Faux ISPs Established to Prosecute CAN-SPAM Actions  Small, free service can qualify Hypertouch v. Kennedy-Western University, 2006 WL 648688 (N.D. Cal. 2006)  But must demonstrate substantial harm - e.g., bandwidth, hardware, connectivity, overhead, staffing or equipment costs Asis Internet Services, v. Optin Global, Inc., 2008 WL 1902217 (N.D. Cal. March 27, 2008 )
  • 17. Sender Liability  FTC unsuccessful in seeking strict liability  Advertiser liable if “actual knowledge, or by consciously avoiding knowing” about affiliate violations  Strict anti-spam policies and policing of affiliates defeated allegation of intent. Hypertouch v. Kennedy-Western University, 2006 WL 648688 (N.D. Cal. 2006) – No duty to investigate Asis Internet Services, v. Optin Global, Inc., 2008 WL 1902217 (N.D. Cal. March 27, 2008 )
  • 18. CAN-SPAM PREEMPTS ALL STATE REGULATION OF EMAIL EXCEPT STATE LAWS • Regulating falsity or deception in email • Not specific to email, including State trespass, contract, or tort law; or • Other State laws to the extent that those laws relate to acts of fraud or computer crime
  • 19. Rulings On State Spam Regulation • Misrepresentation must be material Omega World Travel, Inc. v. Mummagraphics, Inc. (4th Cir. 2006). • States cannot dictate form of from line Kleffman v. Vonage Holding Corp. (C.D. Cal. 2007); Gordon v. Virtumundo, Inc.(W.D. Wash. 2007). • Courts split on whether state regulation must be based on traditional notions of fraud • Yes. ASIS Internet Service v. Optin Global, Inc. (N.D. Cal. 2008); Hypertouch v. ValueClick, (LA Super. Ct. May 4, 2009). • No. ASIS Internet Service v. Vista Print (N.D.Cal. 2009). • First Amendment requires that it not impinge non- commercial email Virginia v. Jaynes (Va. 2008).
  • 20. Preemption’s Back Door? • Utah/Michigan Child Registry Laws – Makes sending prohibited email a “computer crime” – Free Speech Coalition, Inc. v. Shurtleff, Utah Federal Court refused to enjoin law finding it fell within exception for computer crime • DOJ filed brief supporting this position • New Colorado Spam Law – Makes violation of CAN-SPAM a violation of state deceptive practices and computer fraud laws – Higher Penalties – Is this a backdoor to creating private right of action under CAN-SPAM?
  • 21. Selected Cases: CAN-SPAM Act CAN- Advertiser Liability  ASIS Internet Services, v. Optin Global, Inc., 2008 WL Inc., 1902217 (N.D. Cal. March 27, 2008 )  Hypertouch v. Kennedy-Western University, 2006 WL Kennedy- University, 648688 (N.D. Cal. 2006)  US v. Cyberheat, 2007 U.S. Dist. LEXIS 15448 (N.D. Ariz. Cyberheat, 2007)  US v. Implulse Marketing, No. CV05-1285RSL (W.D. Marketing, CV05- Wash. June 8, 2007) From and Subject Lines  FTC v. Adteractive, Inc., No. Case No. CV-07-5940 SI Adteractive, Inc., CV-07- (C.D. Cal. 2007)  Gordon v. Virtumundo, Inc., Case No. 06-0204-JCC (W.D. Virtumundo, Inc., 06-0204- Wash. May 15, 2007)  Kleffman v. Vonage Holding Corp., Case No. CV 07- Corp., 07- 2406GAFJWJX (C.D. Cal. May 23, 2007)  MySpace, Inc. v. The Globe.com, Inc. No. CV 06-3391- 06-3391- RGK (JCx) (C.D. Cal. Feb. 27, 2007) (JCx)
  • 22. CAN- CAN-SPAM Cases Pt 2 Preemption  Asis Internet Services, v. Optin Global, Inc., 2008 WL 1902217 (N.D. Cal. March 27, 2008 )  Asis Internet Services v. VistaPrint USA, Inc., No. C 08-5261-SBA (N.D. Cal. May 5, 2009)  Free Speech Coalition, Inc. v. Shurtleff, No. 2:05CV949DAK, 2007 U.S. Dist LEXIS 21556 (D. Utah Mar. 23, 2007)  Gordon v. Virtumundo, Inc., Case No. 06-0204-JCC (W.D. Wash. May 15, 2007)  Hypertouch, Inc. v. ValueClick, Inc., L.A. Super. Ct. No. C081000 (May 4, 2009).  Kleffman v. Vonage Holding Corp., Case No. CV 07-2406GAFJWJX (C.D. Cal. May 23, 2007)  Omega World Travel, Inc. v. Mummagraphics, Inc., 469 F.3d 348 (4th Cir. 2006)  Virginia v. Jaynes, 666 S.E.2d 303 (Va. 2008).
  • 23. Bennet Kelley Bennet Kelley founded the Internet Law Center in 2007 after a decade of activity in many of the hottest internet issues including behavioral targeting, cyber squatting, internet marketing and promotions, net neutrality, privacy, spam and spyware. Prior to launching the Internet Law Center, Bennet worked in-house with companies such as ETM Entertainment Network, SpeedyClick.com, Hi-Speed Media and ValueClick. Bennet is Co-Vice Chair of the California Bar's Cyberspace bkelley@internetlawcenter.net Committee and has been a regular contributor to the Journal of Internet Law. The Internet Law Center’s is based in Santa Monica but also has a presence in Washington, D.C. and Columbia, S.C. The firm’s e- newsletter, Monday Memo, was named one of the top 100 Internet Law resources and has been nominated for the Los Angeles Press Club’s Southern California Journalism Award for best in-house or corporate publication.