The DMA s Analysis of Can Spam Act of 2003
|
|
|
- Claude Johnson
- 10 years ago
- Views:
Transcription
1 The DMA s Analysis of Can Spam Act of 2003 December 11, 2003 The following is a Direct Marketing Association analysis of the Can Spam Act of 2003 (S. 877), which Congress sent to the President for signing on December 8, President Bush is expected to sign the measure, which would take effect on January 1, The following analysis was prepared by The DMA with consultation from its outside legal counsel, Piper Rudnick, a Washington, DC law firm. * * * Congress has passed legislation governing the sending of commercial electronic mail advertisements and promotions. President Bush is expected to quickly signature for final enactment, which is expected shortly. The measure will cover all commercial solicitations i.e., not just those messages sent that are unsolicited (where there is no established customer relationship and a marketer is looking for new business). It is of major significance that this new federal anti-spam law will pre-empt all of the numerous state laws that have been passed in recent years regulating commercial . The effective date of S. 877 (The Can Spam Act) is January 1, 2004, which means it will also pre-empt the California opt-in law that otherwise would have taken effect on that date. The new federal law will preserve state laws to the extent that they prohibit falsity or deception in commercial , as well as state common law rules. Requirements for Transmission of Messages The new law will require that all including business-to-consumer and businessto-business for which the primary purpose is the commercial advertisement or promotion of a commercial product or service must include: Clear and conspicuous notice of the opportunity to decline to receive further commercial messages from the sender. A functioning return address or other Internet-based mechanism that is clearly and conspicuously displayed that recipients can use to request not to receive future advertisements or promotions. This return address or other mechanism must be capable of receiving such messages for at least 30 days after the transmission of the original message. The sender of the message may not send subsequent advertisements or promotions more than 10 business days after the request from any recipient to be removed from future commercial communications. If the recipient has requested not to receive further advertisements or promotions, the
2 sender may not request, sell, lease, exchange, or otherwise transfer or release the e- mail address of the recipient. Clear and conspicuous identification that the is an advertisement or solicitation. The sender of the is responsible for determining how to indicate that the message is a solicitation (i.e., there is no requirement to include any specific language, such as, this is an advertisement, or any labeling, such as ADV in the subject line). However, if the recipient has provided affirmative consent to receive the message, then this identification is not required. A valid physical postal address of the sender. A post-office box (PO Box) or maildrop does not suffice. The physical address must be somewhere that a consumer can physically find you and/or your employees. These requirements on commercial will not apply to transactional or relationship messages, such as about account balances, memberships, subscriptions, or other ongoing commercial relationships that are not primarily solicitations. Sexually Oriented Warning Labels The new law will require senders of commercial that includes sexually oriented material to: Include in the subject heading initially viewable specific marks or notices to ensure that when the message is opened, it includes only the mark or notice indicating that the message is sexually oriented (i.e., s must never open immediately to sexually explicit material); The other required opt-out and standard inclusions as outlined previously; and Instructions on how to access the sexually oriented material. The marks or notices will be determined by the Federal Trade Commission (FTC) in the coming months. New Civil Provisions The federal anti-spam legislation contains civil prohibitions against: The sending of false or misleading header or transmission information in a commercial message; Using deceptive subject headings;
3 Using another computer to relay or retransmit commercial for the purpose of disguising the commercial s origin; Sending commercial that includes an originating address, domain name, or Internet protocol address that was obtained by means of false pretenses or representations. The law will provide additional remedies against those who violate the falsification and deception provisions ( aggravated violations ) by harvesting addresses or engaging in dictionary attacks. Harvesting is the practice of collecting, through an automated means, addresses that are posted on websites or online services. Dictionary attacks occur when addresses are generated by combining names, letters, or numbers into numerous permutations in the hope of generating functioning e- mail addresses. Aggravated violations also exist for the automated creation of multiple accounts to transmit otherwise unlawful messages and the relay or retransmission of commercial e- mail from computers that have been accessed without authorization. Businesses Knowingly Promoted by Electronic Mail with False or Misleading Transmission Information The law also will make it unlawful for a business to promote goods and services in a commercial message sent by others that the business knows violate provisions of the law. Strong New Criminal Enforcement Tools The law will criminalize egregious spammer tactics. These include: New prohibitions against commercial involving hacking into someone else s computer to send bulk spam; Using open relays to send multiple spam with the intent to deceive ISPs or recipients as to the origin of the messages; Falsifying header information in commercial ; Registering for five or more accounts or two or more domain names using false information and then sending multiple spam from those accounts; Falsely representing oneself to be the holder of five or more Internet protocol addresses and sending multiple commercial messages from such addresses.
4 Ordinary violations will be misdemeanors. Violations involving hacking, larger numbers of commercial messages or falsified registration, or loss or gain aggregating more than $5,000 in a year, or a criminal spam organization are punishable by a three-year felony. Five-year felony penalties are available for violations undertaken in furtherance of another felony and violations by someone with a prior offense involving hacking or criminal spam under federal or state law. Do-Not- Registry The FTC is required to set forth a plan and timetable for establishing a nationwide marketing do-not- registry that includes an explanation of any practical, technical, security, privacy, enforceability, or other concerns that the FTC has regarding such a registry. The FTC has the authority, but is not required, to implement a registry; it will determine over the next six months whether to adopt one. Wireless The law will require the Federal Communications Commission (FCC) to issue rules to protect consumers from unwanted mobile service communications, including textmessages. Mobile commercial messages are messages that are transmitted directly to a wireless device. The law will require the FCC to define rules that will enable subscribers to commercial mobile services to avoid receiving mobile service commercial messages. The law will require that the FCC consider whether to require providers of commercial mobile services to allow subscribers to indicate a desire not to receive future mobile service commercial messages at the time of subscribing to such service. The DMA s Anti-Spam Working Strategy In order to protect your business and ensure that it grows in the ever-evolving marketplace, The DMA also recommends that you continue to abide by the tenets of the anti-spam working strategy which in some cases goes above and beyond the legal requirements set forth in the Can Spam Act and will help distinguish your business as a profitable and ethical marketer. Direct Marketing Association Anti-Spam Working Strategy *
5 The DMA is committed to upholding the principles outlined in this working document in its continuing efforts to combat spam while protecting legitimate marketing as an emerging and promising marketing channel. 1. ADHERENCE TO THE FOUR PILLARS OF RESPONSIBLE MARKETING A. An honest subject line. B. No forging of headers or technological deceptions. C. Identity of the sender, which includes a physical address. D. An opt-out that works and is easy to find and easy to use. 2. NO HARVESTING No surreptitious acquisition of addresses via automated mechanisms (such as robots or spiders) without the consumer/customer s informed consent. This includes a prohibition on dictionary attacks or other mechanisms for fabricating addresses without the awareness and prior approval of the addressee. 3. UNIVERSAL OPT-OUT All commercial ed communications (except for billing messages) must include a clear and conspicuous opt-out. A clear, conspicuous and ubiquitous symbol would increase awareness of the consumer s right to opt-out. The user would be encouraged to print out a copy of the screen including this information and save it for possible prosecution if additional s are received after a legislatively mandated grace period. 4. THE GOLD LIST Companies agreeing to adhere to principles 1 3 would sign an affidavit to that effect and post a bond of, at minimum, $500 per corporate entity. A violation of the principles would result in forfeiture of the bond. In addition, a $100 annual fee would be paid for participating in the Gold List program. These monies would be used for enforcement as indicated below. [See point 6 below.] The Gold List would be provided on a weekly basis to all participating ISP s. 5. FEDERAL LEGISLATION The DMA supports Federal legislation that provides appropriate penalties for violation of the principles 1 3. In addition, legislation should preempt state anti-spam laws and provide for both civil and criminal penalties. 6. ENFORCEMENT Significant energy must be focused on enforcing existing fraud laws as well as the Federal law described above. [See point 5 above.] Law enforcement agencies in the U.S. (at the Federal and state level) in other countries and global law enforcement organizations would be encouraged to focus additional resources in this area. In addition, an industry-financed group would be formed to provide professional investigation and prosecutorial resources entirely focused on the spam problem. This so-called Silver Platter Program would provide federal law enforcement agencies with adequate information to carry forward appropriate prosecutions. The effort would be funded by The DMA, company donations, and the Gold List fees.
6 # # # * As of August 6, 2003
Privacy, Data Collection and Information Management Practice Team November 13, 2003
Overview of Current Anti-Spam Regulations Privacy, Data Collection and Information Management Practice Team The proliferation of unsolicited commercial e-mail, more commonly known as spam, has prompted
SUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003
SUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003 On December 16, 2003, President Bush signed into law the CAN-SPAM Act of 2003. CAN-SPAM stands for "Controlling the Assault of Non-Solicited Pornography
E-mail Marketing: CAN- SPAM Act Compliance David J. Ervin and Christopher M. Loeffler, Kelley Drye and Warren LLP
E-mail Marketing: CAN- SPAM Act Compliance David J. Ervin and Christopher M. Loeffler, Kelley Drye and Warren LLP This Practice Note is published by Practical Law Company on its PLC Law Department web
Public Law 108 187 108th Congress An Act
117 STAT. 2699 Public Law 108 187 108th Congress An Act To regulate interstate commerce by imposing limitations and penalties on the transmission of unsolicited commercial electronic mail via the Internet.
How To Comply With The Can-Spam Act
FTC FACTS for Business ftc.gov FEDERAL TRADE COMMISSION FOR THE CONSUMER 1-877-FTC-HELP The CAN-SPAM Act: A Compliance Guide for Business D o you use email in your business? The CAN-SPAM Act, a law that
Anti-SPAM Policy v.3 06-01-2011
Anti-SPAM Policy v.3 06-01-2011 Each user must agree to this policy. comf5 has a no tolerance policy for the sending of spam and unsolicited email, and we prohibit the use of third-party, purchased, rented,
ANTI-SPAM LAWS IN WESTERN COUNTRIES: A COMPARISON
PRB 09-24E ANTI-SPAM LAWS IN WESTERN COUNTRIES: A COMPARISON Alysia Davies Legal and Legislative Affairs Division 18 January 2010 PARLIAMENTARY INFORMATION AND RESEARCH SERVICE SERVICE D INFORMATION ET
whitepaper Email Marketing CAN-SPAM Compliance Overview www.exacttarget.com
Design Email Marketing Tips for Outlook CAN-SPAM 2007Compliance whitepaper Email Marketing CAN-SPAM Compliance Overview The CAN-SPAM Act (the Act ) passed with a nearly unanimous vote in both the House
FKCC AUP/LOCAL AUTHORITY
FKCC AUP/LOCAL AUTHORITY The information contained in this section has its basis in Public Law 93.380. It is further enhanced however, by Florida State Board of Education Administrative Rule 6A-14.51 and
PARTNER EMAIL GUIDELINES
PARTNER EMAIL GUIDELINES The guidelines listed below are required pursuant to the Agreement entered into between Criteo and the Partner. Any breach of these guidelines except the last section related to
THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA
Communications and Information Technology Commission THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA Final Version 23/02/2008 Submitted to: Submitted By: Acceptance of Deliverable
CAN-SPAM Policy & Data Verification Guide
BIZ SERVICE PROVIDER CAN-SPAM Compliance & Data Verification Policy Document BSP CAN-SPAM Policy & Data Verification Guide BSP Page 1 of 5 Version 8.1 Effective Date; May 2015 BIZ SERVICE PROVIDER I. Summary
Best Practice Standards for Email Marketing
Best Practice Standards for Email Marketing Updated January 2008 Scope The Marketing Association s emarketing Network (emn) champions the adoption of industrywide standards of best practice and ethical
E-mail Marketing: CAN- SPAM Act Compliance
PRACTICE NOTES E-mail Marketing: CAN- SPAM Act Compliance The following is an excerpt from a Practice Note on our website that examines the federal Controlling the Assault of Non-Solicited Pornography
Cablelynx Acceptable Use Policy
Cablelynx provides a variety of Internet Services (the Services) to both residential and business customers (the Customer). Below, you will find the terms and conditions that you agree to by subscribing
Spam Act 2003: A practical guide for business
Spam Act 2003: A practical guide for business This guide provides practical information to businesses that send electronic messages. It explains the main requirements of the Spam Act 2003 (the Spam Act),
An Anti-Spam Action Plan for Canada. Industry Canada
An Anti-Spam Action Plan for Canada Industry Canada May 2004 The Problem An Anti-Spam Action Plan for Canada In just a few years, unsolicited commercial e-mail -- now generally known as spam 1 -- has gone
Frequently Asked Questions (FAQ) on Anti-Spam Legislation. What is the definition of a commercial electronic mail message?
Frequently Asked Questions (FAQ) on Anti-Spam Legislation On December 16, 2003, the President signed the CAN-SPAM Act of 2003 (S.877) into law, which went into effect January 1, 2004. Though the legislation
Acceptable Use Policy
Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND
A SIMPLIFIED EXPLANATION OF CANADA S NEW LAW ON SPAM
A SIMPLIFIED EXPLANATION OF CANADA S NEW LAW ON SPAM IED WEB MARKETING DEVRY SMITH FRANK LLP CANADA S NEW LAW ON SPAM Businesses and governments have been making significant strides in their never-ending
Federal Regulations on Advertising:
Federal Regulations on Advertising: Phone, Fax, or E-mail By Jordan B. Hansell 700 Walnut, Suite 1600 Des Moines, Iowa 50309 Telephone: 515-283-8166 Facsimile: 515-283-8018 [email protected] Disclaimer
Unsolicited Electronic Messages Act 2007
Unsolicited Electronic Messages Act 2007 Prohibiting Spam and promoting good business practice This guide provides practical information so businesses can ensure they meet the requirements of the Unsolicited
Crawford Chondon &Partners LLP. Is your Business Ready for Canada s Anti Spam Law?
Crawford Chondon &Partners LLP Present Is your Business Ready for Canada s Anti Spam Law? By: Michael MacLellan Overview 1. What is Canada s Anti-Spam Legislation, and how will it apply? 2. What does CASL
By writing to: Cougar Wireless, Attention: Customer Service, 4526 S. Regal St., Suite A, Spokane, WA., 99224
COUGAR WIRELESS ACCEPTABLE USE POLICY I. INTRODUCTION Cougar Wireless and its various affiliates and subsidiaries (collectively we, us, our ) are committed to being responsible network citizens. To assist
Email and Text Message Campaigns. Justine Young Gottshall Partner, InfoLawGroup
2012 Email and Text Message Campaigns Justine Young Gottshall Partner, InfoLawGroup What s the Risk? Effective and active marketing area This makes it a target for litigation and enforcement action Consumer
Commonwealth Office of Technology
Commonwealth Office of Technology ENTERPRISE POLICY Policy Number: CIO-060 Effective Date: 05/15/96 Revision Date: 03/19/08 Policy Statement: The purpose of this enterprise policy is to define and outline
Case3:08-cv-03186-EDL Document72 Filed04/02/10 Page1 of 11
Case:0-cv-0-EDL Document Filed0/0/0 Page of 0 Jason K. Singleton, State Bar #0 [email protected] Richard E. Grabowski, State Bar # [email protected] SINGLETON LAW GROUP L Street, Suite
Top 40 Email Marketing Terms You Should Know
1601 Trapelo Road Phone 781-472-8100 Suite 246 Fax 781-472-8101 Waltham, MA 02451 www.constantcontact.com Top 40 Email Marketing Terms You Should Know If you have ever felt out of your depth in a discussion
Emails and anti-spam Page 1
Emails and anti-spam Page 1 As the spammers become increasing aggressive more and more legit emails get banned as spam. When you send emails from your webcrm system, we use the webcrm servers to send emails
Overview of Mexico s Legislation to Combating Spam
Overview of Mexico s Legislation to Combating Spam By Cristos Velasco, NACPEC *, Mexico January 2005 Unlike the Unites States 1, Mexico does not have an independent anti-spam legislation to control and
IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA UNITED STATES OF AMERICA : CRIMINAL NO. 11-
IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA UNITED STATES OF AMERICA : CRIMINAL NO. 11- v. : DATE FILED: March 17, 2011 BRIAN McDAID, : VIOLATION: a/k/a Doc 18 U.S.C. 1037(a)(3)
How To Stop Spam From Being A Problem
Solutions to Spam simple analysis of solutions to spam Thesis Submitted to Prof. Dr. Eduard Heindl on E-business technology in partial fulfilment for the degree of Master of Science in Business Consulting
Cass Cable TV, Inc. and Greene County Partners, Inc. CASSCOMM ACCEPTABLE USE POLICY
Cass Cable TV, Inc. and Greene County Partners, Inc. CASSCOMM ACCEPTABLE USE POLICY CONTENTS I. Introduction II. Violation of this Acceptable Use Policy III. Prohibited Uses and Activities IV. Customer
Web Server & Systems Usage Policy. The WGG Associates Limited Usage Policy has been developed with the following objectives:
Web Server & Systems Usage Policy The WGG Associates Limited Usage Policy has been developed with the following objectives: Ensure security, reliability and privacy of WGG Associates Limited' systems and
JPMA - Terms and Conditions
Agreement to Terms By accessing the JPMA Website and Online Training System, you signify that you agree to these Terms and Conditions. In addition, you will be subject to any posted guidelines, rules,
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
Acceptable Use Policy of UNWIRED Ltd.
Acceptable Use Policy of UNWIRED Ltd. Acceptance of Terms Through Use This site provides you the ability to learn about UNWIRED and its products and services as well as the ability to access our network
BULK MAIL CAMPAIGN RULES
BULK MAIL CAMPAIGN RULES No matter what you do, or how closely you follow the guidelines we provide, the issue of spam is an ever changing and always evolving problem it is estimated that more than 70%
Email Marketing Workshop
Email Marketing Workshop Part V Deliverability, Compliance & Trust Agenda Getting To The Inbox Protecting Your Brand Email Laws & Regulations 1 Laurence Rothman Nationwide Senior Consultant, Brand Reputation
Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
EMAIL SERVICES ADDENDUM TO EULA
Page 1 of 6 EMAIL SERVICES ADDENDUM TO EULA This Email Services Addendum to EULA (this Addendum ) applies to licenses of XMPie Software ( Users ) who have contracted with XMPie for services. This Addendum
Being labeled as a spammer will drive your customers way, ruin your business, and can even get you a big fine or a jail sentence!
Getting Your Email Delivered Beware: If you send out spam mail (unsolicited emails), whether it be knowingly or not, you will put your business and your reputation at risk. Consequences for spamming have
ANTI-SPAM POLICY JANUARY 2014
ANTI-SPAM POLICY JANUARY 2014 CONTENTS Introduction... 3 What happens if the anti-spam policy is not followed?... 3 Legal responsibilities and requirements... 3 Spam Definition... 4 Multinational campaigns...
Acceptable Use and Publishing Policy
1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy
region16.net Acceptable Use Policy ( AUP )
region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply
How To Get A Phone Call From A Telemarketing Company
CLIENT MEMORANDUM From: West Corporation Re: New Federal Communication Commission Rule for Autodialed and Prerecorded Message Telemarketing Calls and Abandoned Call Provisions Date: February 17, 2012 Federal
Acceptable Use Policy
Acceptable Use Policy Acceptable Use Policy (AUP) ionfish Group, LLC s network and services have been designed to serve its clients, partners, and employees (each individually a User ), and to enhance
LETABA WIRELESS INTERNET CC ACCEPTABLE USE POLICY
LETABA WIRELESS INTERNET CC ACCEPTABLE USE POLICY 1. Introduction LETABA WIRELESS INTERNET CC is committed to complying with legislation and ensuring that all its customers have the ability to use its
Do-Not-Call Q&A Pennsylvania Law/Federal Rules
Do-Not-Call Q&A Pennsylvania Law/Federal Rules The Pennsylvania Telemarketer Registration Act, ( Pennsylvania Act ), as amended, applies to telephone solicitation and marketing activities performed by
Telemarketing, E-mail, and Text Message Marketing: Tips to Avoid Lawsuits
Telemarketing, E-mail, and Text Message Marketing: Tips to Avoid Lawsuits LeadsCouncil December 11, 2012 2 pm 3 pm ET Webinar Ari N. Rothman, Esq., Co-Presenter Molly T. Cusson, Esq., Co-Presenter Jonathan
(1) The term automatic telephone dialing system means equipment which has the capacity
Telephone Consumer Protection Act 47 U.S.C. 227 SEC. 227. [47 U.S.C. 227] RESTRICTIONS ON THE USE OF TELEPHONE EQUIPMENT (a) DEFINITIONS. As used in this section (1) The term automatic telephone dialing
CT Communications Internet Handbook
CT Communications Internet Handbook CT Communications Network Acceptable Use Policy Introduction: Protection of our Customers and our resources, the ability to provide quality service to our Customers,
WASHINGTON IDENTITY THEFT RANKING BY STATE: Rank 13, 76.4 Complaints Per 100,000 Population, 4942 Complaints (2007) Updated January 11, 2009
WASHINGTON IDENTITY THEFT RANKING BY STATE: Rank 13, 76.4 Complaints Per 100,000 Population, 4942 Complaints (2007) Updated January 11, 2009 Current Laws: Washington s identity theft law states that no
Descriptor Code: EFE-P
ADMINISTRATIVE PROCEDURE Descriptor Term: ACCEPTABLE USE OF ELECTRONIC TRANSMISSION CAPABILITIES Descriptor Code: EFE-P Date Issued: October 30, 2003 Date Changed June 26, 2008 September 30, 2009 1. Network
GETTING YOUR BUSINESS STARTED ON THE INTERNET
GETTING YOUR BUSINESS STARTED ON THE INTERNET The Internet presents a new frontier with unlimited potential. The purpose of this Guide is to ensure that legal issues are properly considered to provide
13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
