David E. Sorkin, Technical and Legal Approaches to Unsolicited Electronic Mail, 35 U.S.F. L. Rev. 325 (2001).


Abstract

      Unsolicited electronic mail, also called "spam," is both a nuisance to Internet users and a threat to network security. Spam imposes substantial costs on Internet users and providers, who have undertaken a variety of actions in response--many of which have been counterproductive. Informal responses such as social pressure and industry self-regulation have been almost entirely ineffectual in battling spam. Technical responses have fared somewhat better, but often at a high cost. Efforts to filter or block spam, for example, frequently prevent legitimate messages from getting through. Other technical responses have done little to stem the tide of spam, and in some instances have led to expensive legal disputes.

      Lawsuits have been somewhat successful in addressing the most extreme instances of spamming, and a number of jurisdictions have enacted specific laws in an attempt to regulate spam. But legal approaches in general seem to have been no more successful than technical responses to the spam problem, and the primary result to date is a great deal of uncertainty surrounding spam. Ultimately, a consensus approach that coordinates legal and technical responses is likely to provide the only effective solution.


Go to the full text of this article (PDF)

This article is also available on Lexis and Westlaw.

(0 Comments)
Log in or sign up to comment.

Post a comment

Log in or sign up to comment.

With the advent of wireless Internet, more and more computer users are entering the world of cyber space.

Yet, while these users are well aware of the importance of the protection of their computer when hooked up to regular internet providers, they are often oblivious to the fact that the same cyber dangers, and in fact even more, exist in the world of WiFi.

What you may not know is that same Internet connection that makes it possible to check your email from the comfort of your bed also makes it easier for hackers to access your personal information.

It is for this reason, the sharing of the wireless Internet connection, that protecting your computer when wireless is even more important than ever before.