E-Commerce Spam
E-Commerce Spam
/dtp22/juta/juta/SALJ−2008−part1/05article
INTRODUCTION
The success of a company depends on the way they advertise their products
or services. Traditionally, consumers were individually informed of products
and services by companies with which they had a prior relationship, or
because they had requested information from new companies. Alternatively,
the products and services were marketed via media such as television, radio,
newspapers, magazines and catalogues. Expenses for advertisements, like
postage or the airing of advertisements, were incurred by the companies
themselves.
The advent of e-commerce has brought with it new electronic delivery
systems that offer a wider scope of business for marketing companies — with
minimum costs. These marketing strategies utilize the Internet, which is a
very effective way of disseminating information, enabling marketing
companies to advertise products and services to people all over the world via
e-mail and other forms of online advertisements. This method of communi-
cation is easy, quick and cost effective.1 With just a click of a mouse one can
buy and sell products or services from different jurisdictions within seconds.
However, it also brings with it problems — in particular, that of ‘spam’, ie
unsolicited junk mail.
Although spam is now primarily related to the internet, it is not limited to
this medium. One can also receive spam on a mobile telephone via short
message services (SMS) or through the post. This contribution is, however,
limited to spam in an online environment. The nature of spam will be
discussed, as will the methods used to send it and the problems caused by it.
At the core of this article is the question whether the use of the ‘opt-out’
mechanism is effective in limiting spam.
178
JOBNAME: SALJ 08 Part 1 PAGE: 2 SESS: 9 OUTPUT: Thu Jun 19 09:45:10 2008
/dtp22/juta/juta/SALJ−2008−part1/05article
2
See http://www.hormel.com/templates/knowledge/knowledge.asp?catitemid=16&id=
132 (last accessed on 11 April 2006). For a brief history of spam see Adam Mossoff
‘Spam-Oy, what a nuisance!’ (2004) 19 Berkeley Technology LJ
625 at 631–2.
3
Jon Postel helped launch ARPnet in 1969. He is regarded as one of the internet’s
pioneers. See http://www.isoc.org/postel/ (last accessed on 7 September 2006).
4
Jon Postel ‘On the junk mail problem’ Request for Comment (RFC 706) pub-
lished for ARPnet in 1975, available at http://www.rfc-archive.org/getrfc.php?rfc=706
(last accessed on 7 September 2006).
5
J A Hitchcock Net Crimes and Misdemeanors: Outmaneuvering the Spammers, Swin-
dlers, and Stalkers Who Are Targeting You Online (2002) 30; see also http://www.
templetons.com/brad/spamterm.html (last accessed on 11 April 2006).
6
See http://lcs.www.media.mit.edu/people/foner/Essays/Civil-Liberties/Project/green-
card-lawyers.html (last accessed on 17 April 2006).
7
Usenet is the world’s largest online conferencing system.
8
See website supra note 6.
9
See http://www.webopedia.com/TERM/s/spam.html (last accessed on 1 June 2006).
10
See s 3(2) of the United States Controlling the Assault of Non-Solicited Por-
nography and Marketing Act of 2003 (henceforth referred to as the CAN-SPAM Act)
and s 6 of the Australian Spam Act 129 of 2003.
JOBNAME: SALJ 08 Part 1 PAGE: 3 SESS: 9 OUTPUT: Thu Jun 19 09:45:10 2008
/dtp22/juta/juta/SALJ−2008−part1/05article
11
See http://www.ajpark.co.nz/library/2005/03/war_spam.php (last accessed on
7 September 2006).
12
See http://www.euro.cauce.org/en/manifesto.html (last accessed on 28 August
2006).
13
Act 25 of 2002, s 45(1).
14
See Reinhardt Buys Cyberlaw@SA II: The Law of the Internet in South Africa 2 ed
(2004) at 160.
15
See http://www.cauce.org.au/whatis.htm (last accessed on 5 September 2006).
16
See Buys op cit note 14 at 161.
17
With UCE the senders usually hope that consumers/recipients of such e-mails
will spend money with them. Products or services that are commonly advertised
through UCE include wellness medicines, such as viagra pills, while businesses adver-
tised include gambling sites, lotto draws and ‘make money fast’ schemes. See Gerrie
Ebersöhn ‘The unfair business practices of spamming and spoofing’ 2003 De Rebus
(no 424) 25; Shumani Gerada ‘The truth about spam’ 2003 De Rebus (no 426) 51 and
Michelle Lara Geissler Bulk Unsolicited Electronic Messages (SPAM): A South African
Perspective (unpublished LLD thesis, University of South Africa, 2004) 172–3, avail-
able at http://etd.unisa.ac.za/ETD-db/ETD-desc/describe?urn=etd–03312005–104653
(last accessed on 06 February 2008).
18
A scam is an attempt to intentionally mislead a person or persons (known as the
‘mark’), usually with the goal of financial gain. The Nigerian ‘419’ scams and pyramid
schemes are included here. (See http://en.wikipedia.org/wiki/Scam (last accessed on 15
September 2006)). A virus is a program written to cause mischief or damage to a
computer system (see http://www.ontrack.com/glossary/ (last accessed on 15 September
2006)). A chain letter is a message that attempts to induce the recipient to make a
number of copies of this letter and then to pass them on to two or more new recipi-
ents (see http://en.wikipedia.org/wiki/Chain_letters (last accessed on 15 September
2006)). A hoax is an attempt to trick an audience into believing that something false is
real (see http://en.wikipedia.org/wiki/Hoax (last accessed on 15 September 2006)). An
urban legend is ‘a story that appears mysteriously and spreads spontaneously in various
JOBNAME: SALJ 08 Part 1 PAGE: 4 SESS: 9 OUTPUT: Thu Jun 19 09:45:10 2008
/dtp22/juta/juta/SALJ−2008−part1/05article
Spyware
Spyware is computer software that collects information about an individual
without their knowledge. It can be installed automatically in several ways, eg
by viewing an unsolicited e-mail message containing a virus or worm as an
attachment, or as a result of visiting certain websites.21
Dictionary Attacks
A dictionary attack is ‘a program that bombards a mail server with millions of
alphabetically generated email addresses in the hope that some addresses will
be guessed correctly.’22 For example, attempting to send a large number of
test messages to e-mail addresses within a domain such as @yahoo.com.23
This is used to compile a list of deliverable e-mail addresses for future spam
forms and is usually false; contains elements of humor or horror and is popularly
believed to be true’ (Definition per WordNet Search http://wordnet.princeton.edu/perl/
webwn (last accessed on 15 September 2006)). An example of an urban legend would
be a story I was sent recently, which has apparently been circulating since 1993: In it,
‘blood gang members’ drive at night without their headlights on, and people are
warned against flashing their own headlights at such a car, as they would then become
a target and be killed by the gang members as part of their ‘initiation’. No supporting
evidence for this story has been found by police.
19
See Buys op cit note 14 at 160. See also Geissler op cit note 17 at 88–111 where
the author discusses these types of spam.
20
At the very least, it is not considered good netiquette to send spam. The term
‘netiquette’ means ‘network etiquette’. Netiquette constitutes an informal code of
good manners governing online conduct. It can be as simple as not typing a message
in all upper-case letters (This is commonly interpreted as representing SHOUTING).
For the core rules of netiquette see http://albion.com/netiquette (last accessed on 3
August 2006).
21
See Brad Slutsky & Sheila Baran ‘Spyware and the internet: A cyberspace odys-
sey’ (2005) 10 Georgia Bar Journal 22 at 23, where the authors elaborate on the origins
of spyware.
22
See http://www.sophos.com/security/spam-glossary.html (last accessed on 6 Febru-
ary 2008).
23
The target e-mail addresses are generated based on words from a dictionary of
possible or likely words, combined with the name of the domain being attacked.
JOBNAME: SALJ 08 Part 1 PAGE: 5 SESS: 9 OUTPUT: Thu Jun 19 09:45:10 2008
/dtp22/juta/juta/SALJ−2008−part1/05article
24
See Shirley Quo ‘Spam: Private and legislative responses to unsolicited elec-
tronic mail in Australia and the United States’ (2004) 1 Murdoch University Electronic
Journal of Law. Article available at http://www.murdoch.edu.au/elaw/issues/v11n1/
quo111.html (last accessed 12 April 2005).
25
See Ian King ‘On-line privacy in Europe — New regulation for cookies’ (2003)
12 Information and Communications Technology Law 225 at 229.
26
See the sources quoted in the previous note.
27
See http://sharepoint.agriculture.purdue.edu/agit/webtrends_glossary.aspx (last accessed
on 3 August 2006). See also Philippe Suchet ‘Real time online profiling’(2004), available
at http://www.clickz.com/experts/crm/actionable_analysis/article.php/3359121 (last accessed
on 20 September 2006), where the author gives a list of elements which help to build a
good profile of the consumer online. These include knowing the referral sources (how
the consumer arrived at a website), tracking their behaviour on the site and frequency of
online visits, maintaining a full online purchase history, etc. See further Henry H Perritt,
Jr Law and the Information Superhighway 2 ed (2001) 186.
28
King op cit note 25 at 228–9; See also Gerrie Ebersöhn ‘Internet law: Cookies,
traffic data, and direct advertising practices’ (2004) 16 SA Merc LJ 741 at 742–6.
29
‘A header is a part of the e-mail message that precedes the message. It contains
information such as the originator (‘from’), recipients (‘to’) and the subject of the
message.’ See http://www.eudora.com/techsupport/kb/2148hq.html (last accessed on 19
September 2006). See also s 3(8) of the CAN-SPAM Act.
30
See http://imms.com/cyberglos/ (last accessed on 19 May 2006, but was no longer
available at the time of going to press). This also includes instances where spam is sent
via the ISP’s website without the ISP’s knowledge or consent. See also http://
www.sophos.com/security/spam-glossary.html#spoofing (last accessed on 26 January
2008), where spoofing is defined as follows: ‘When spammers forge an email address
to hide the origin of a spam message. Email scammers and virus writers also use this
trick. Scammers spoof address lines to fool people into thinking an email has arrived
from a legitimate source, such as an online bank. Similarly, virus writers have passed
JOBNAME: SALJ 08 Part 1 PAGE: 6 SESS: 9 OUTPUT: Thu Jun 19 09:45:10 2008
/dtp22/juta/juta/SALJ−2008−part1/05article
off viruses as security patches by spoofing their origin as being, for example, from
Microsoft technical support.’
31
See http://en.wikipedia.org/wiki/Email_harvesting (last accessed on 26 May 2006).
See also Uri Raz ‘How do spammers harvest email addresses?’ available at http://
www.private.org.il/harvest.html (last accessed on 06 February 2008).
32
The Spam Summit was held in October 2003. See also Geissler op cit note 17 at
39–46, where the author discusses the issue of cost shifting; Jörg Walter Haase, Nico-
las Grimm & Eva Versfeld International Commercial Law from a South African Perspective
(2003) at 134–6; and Elizabeth A Alongi ‘Has the US canned the spam?’ (2004) 46
Arizona LR 263 at 263–5.
33
Eric Goldman ‘Where’s the beef? Dissecting spam’s purported harms’ (2003) 22
John Marshall Journal of Computer and Information Law 13 at 20–2; also see Haase et al op
cit note 32 at 134–6.
34
See Simmons & Simmons Communication Practice E-Commerce Law: Doing
Business Online (2001) at 131; and also Stephen D York & Ken Chia e-Commerce: A
Guide to the Law of Electronic Business (1999) at 24, where the authors list problems that
are caused by spamming. See further s 2(2)-(6) of the CAN-SPAM Act where the
findings of the US Congress on attempting to regulate spam are stated.
35
See York & Chia op cit note 34 at 24.
36
Loss of business opportunities occurs when the consumer moves to a different
ISP, to avoid the inconvenience. Damage to computer equipment results from the
overload of messages coming into the ISP’s server.
JOBNAME: SALJ 08 Part 1 PAGE: 7 SESS: 9 OUTPUT: Thu Jun 19 09:45:10 2008
/dtp22/juta/juta/SALJ−2008−part1/05article
37
See Gerrie Ebersöhn ‘Is your e-mail being rejected?’ (2004) 14 Computers and
Law at 21 where the author discusses the pros and cons of filtering software. and
Geissler op cit note 17 at 349–56.
38
See Ebersöhn op cit note 37, Haase op cit note 32 at 151–3, and also Mossoff op
cit note 2 at 632–4, where the author discusses the folly of filters.
39
CAUCE has branches in the following countries: India, Canada, Australia and
Europe. See, for instance http://www.caube.org.au (last accessed on 5 September 2006))
and http://www.euro.cauce.org/en/index.html (last accessed on 8 September 2006).
40
See http://peterman.co.za/spam/html (last accessed on 25 May 2005, but at the
time of going to press the site was no longer available; and www.e-technik.com (last
accessed on 8 September 2006). E-Technik offers anti-spam tools for Outlook. This
tool is downloaded free of charge from their website.
JOBNAME: SALJ 08 Part 1 PAGE: 8 SESS: 9 OUTPUT: Thu Jun 19 09:45:10 2008
/dtp22/juta/juta/SALJ−2008−part1/05article
41
See below the discussion on the opt-out mechanisms under the ECT Act and
CAN-SPAM Act.
42
These countries include, among others, the EU and Australia.
43
See note 13 above.
44
See note 10 above.
45
See s 2(j) of the ECT Act.
JOBNAME: SALJ 08 Part 1 PAGE: 9 SESS: 9 OUTPUT: Thu Jun 19 09:45:10 2008
/dtp22/juta/juta/SALJ−2008−part1/05article
46
Section 45(2) of the ECT Act.
47
Section 45(1)(b) of the ECT Act. Section 1 of the ECT Act defines personal
information as meaning ‘information about an identifiable individual, including, but
not limited to: information relating to race, gender, sex, . . . the address, fingerprints;
the name of the individual where it appears with other personal information relating
to the individual or where the disclosure of the name itself would reveal information
about that individual’.
48
Section 45(1)(a) of the ECT Act.
49
Section 45(4) of the ECT Act.
50
Ibid.
51
International Telecommunication Union (ITU) WSIS Thematic Meeting on
Cybersecurity A Comparative Analysis of Spam Laws: The Quest for a Model Law (10
June 2005) Document CYB/03 at 22.
52
See Buys op cit note 14.
JOBNAME: SALJ 08 Part 1 PAGE: 10 SESS: 9 OUTPUT: Thu Jun 19 09:45:10 2008
/dtp22/juta/juta/SALJ−2008−part1/05article
53
Ibid and Ebersöhn op cit note 17 at 26.
54
See Gerada op cit note 17 at 52.
55
The term data controller means any person who electronically requests, collects,
collates, processes or stores personal information from or in respect of a data subject.
The principles on the protection of personal information are dealt with under s 50–51
of the ECT Act. The list comprises nine items that are not compulsory.
JOBNAME: SALJ 08 Part 1 PAGE: 11 SESS: 9 OUTPUT: Thu Jun 19 09:45:10 2008
/dtp22/juta/juta/SALJ−2008−part1/05article
56
The Spam Summit op cit note 32; see also Buys op cit note 14 at 160–1.
57
See Buys supra note 14 at 160.
58
Section 16 of the CAN-SPAM Act.
59
States that had not enacted legislation relating to unsolicited bulk or commercial
e-mail included: Alabama, Hawaii, Kentucky, Massachusetts, Mississippi, Montana,
Nebraska, New Hampshire, New Jersey, New York, South Carolina and Vermont.
60
Of the states that have anti-spam legislations or provisions towards eliminating
spam, only two states adopted the opt-in mechanism, namely California and Dela-
ware. See http://www.spamlaws.com (last accessed on 18 September 2006) and also
David E Sorkin ‘Spam legislation in the United States’ (2003) 22 John Marshall Journal
of Computer and Information Law 3 at 6. (The favouring of the opt-out mechanism by
most states is in all probability the reason why the CAN-SPAM Act adopted this
mechanism.)
61
These include the following state legislation: Arizona Revised Statutes Title 44
(Trade and Commerce) 1372–01; Florida Statutes Title 39 (Commercial Relations)
668.603; State of Colorado, Sixty Second General Assembly, House Bill 1309 Title
6–2.5–103; and Illinois Compiled Statutes Chapter 815 (Business Transactions
Deceptive Practices) 815 ILCS 511/10. These statutes are available at http://
www.spamlaws.com (last accessed on 22 September 2006).
62
Ibid.
JOBNAME: SALJ 08 Part 1 PAGE: 12 SESS: 9 OUTPUT: Thu Jun 19 09:45:10 2008
/dtp22/juta/juta/SALJ−2008−part1/05article
63
These include the following states: Arkansas Code Title 4 Chapter 88 (Decep-
tive Trade Practices) 4–88–602; Kansas Statutes Chapter 50 (Unfair Trade and Con-
sumer Protection) Article 6 (Consumer Protection) 50–6,107; Louisiana Revised
Statutes Title 14 (Criminal Law) Section 106; Pennsylvania Consolidated Statutes,
Title 18 (Crimes and Offences Chapter 59) Public Indecency 5903; Utah Code Title
13 (Commerce and Trade Chapter 36) Unsolicited Commercial and Sexually
Explicit Email Act 13–36–103; and Wisconsin Statutes Criminal Code Chapter 944
(Crimes Against Sexual Morality) 944.25.
64
See s 8(b) of the CAN-SPAM Act.
65
Sections 4–6 of the CAN-SPAM Act.
66
Section 5(5) of the CAN-SPAM Act.
67
Section 3(2)(A) of the CAN-SPAM Act.
68
Section 5(a)(1) of the CAN-SPAM Act.
69
Section 5(a)(1)(C) of the CAN-SPAM Act.
70
Section 5(a)(2) of the CAN-SPAM Act. The Act provides that the subject line
may not mislead the recipient about the contents or subject of the message.
71
Section 5(a)(3)(A) of the CAN-SPAM Act.
JOBNAME: SALJ 08 Part 1 PAGE: 13 SESS: 9 OUTPUT: Thu Jun 19 09:45:10 2008
/dtp22/juta/juta/SALJ−2008−part1/05article
future mailings from the sender.72 The sender can also create a menu of
choices to allow the recipient to opt-out of certain types of messages, but one
must include the option to end any commercial message from the sender.73
According to the Act any opt-out mechanism that is offered must be able to
process opt-out requests for at least thirty days after the sender has sent
commercial e-mail.74 When the sender receives an opt-out request, the Act
gives the sender ten business days to stop sending e-mail to the consumer’s
e-mail address. Furthermore, the transfer of e-mail addresses to other entities
may only be done in such a way that those entities are able to comply with
the law.75
Fourthly, the Act prohibits the transmission of commercial e-mail after
objection. Address harvesting and dictionary attacks from public sites such as
Usenet and chat forums are considered as aggravated violations relating to
commercial e-mail and are thus prohibited by the CAN-SPAM Act.76 The
Act also requires e-mails containing sexually-oriented material to place
warning labels on those e-mails.77
The CAN-SPAM Act has created penalties for different unlawful
acts committed while spamming. The Act establishes the Commis-
sion whose duty it is to prevent any person from violating the
provisions of the Act.78 Additional fines are provided for commercial
e-mail senders who not only violate the rules described above, but also the
harvesting of e-mail addresses from websites or web services that have
published a notice prohibiting the transfer of e-mail addresses for the purpose
of sending e-mail. State officials may also institute civil actions against the
perpetrator(s) on behalf of the recipients, and claim damages from them of up
to $2 million for any violation of s 5.79
It would seem that the CAN-SPAM Act protects consumers against spam
more effectively than the ECT Act. However, although the CAN-SPAM
Act will serve to deter spammers to some extent,80 there are also criticisms
levelled against it. First, it is said that the CAN-SPAM Act limits the role of
the individual states in combating spam, and that enforcement actions lie
primarily in the hands of the Federal Trade Commission (FTC).81 Secondly,
72
Section 5(a)(3) of the CAN-SPAM Act.
73
Section 5(a)(3)(A)(i) of the CAN-SPAM Act.
74
Section 5(a)(3)(A)(ii) of the CAN-SPAM Act.
75
Section 5(a)(4) of the CAN-SPAM Act.
76
Section 5(b)(1) of the CAN-SPAM Act.
77
Section 5(d) of the CAN-SPAM Act.
78
Section 7(a) & (d) of the CAN-SPAM Act.
79
Section 7(f)(1)–(3). Section 5 deals with protections for users of commercial
e-mail.
80
Erin Elizabeth Marks ‘Spammers clog in-boxes everywhere: Will the CAN-
SPAM Act of 2003 halt the invasion?’ (2004) 54 Case Western Reserve LR 943 at 952,
where the author discusses the strengths and weaknesses of the CAN-SPAM Act.
81
Marks op cit note 80; See also s 8(b) of the CAN-SPAM Act, which states that
the Act has the effect of pre-empting other state laws.
JOBNAME: SALJ 08 Part 1 PAGE: 14 SESS: 9 OUTPUT: Thu Jun 19 09:45:10 2008
/dtp22/juta/juta/SALJ−2008−part1/05article
CONCLUSION
Spam is threatening the way we communicate. It is a booming business
negatively affecting consumers. The fact that many countries have legislation
in place shows that the world is serious about eliminating, or at least limiting,
spam. However, measures such as the opt-out mechanism under s 45 of the
ECT Act have proven to be ineffective, especially in light of the absence of a
procedure on how the opt-out mechanism has to be administered and the
lack of a proper definition of what constitutes unsolicited commercial
communications.
Perhaps some of the steps that are laid out in the CAN-SPAM Act may
shed light on how to limit spam. For instance, note should be taken of its
measures in respect of the falsification or disguising of headers, address
harvesting, as well as its procedure on how to administer opt-out
mechanisms. Some authors are of the opinion that South Africa should rather
make use of the opt-in mechanism like the EU and Australia, thus making it
illegal to send spam.86 This would be a good starting point, but legislation on
its own will not eliminate spam, since spammers will continue to develop
new technologies to evade the law.87
Considering that spam is a global problem, global measures need to be put
in place. All stakeholders must combine to conduct more research and
82
Mossoff op cit note 2 at 637
83
Marks op cit note 80 at 953; See also Daniel L Mayer ‘Attacking a windmill:
Why the CAN-SPAM Act is a futile waste of time and money’ (2004) 31 Journal of
Legislation 177 at 189; and Sorkin op cit note 60 at 11.
84
See Alongi op cit note 32 at 287.
85
Marks op cit note 80 at 953 and Alongi op cit note 32 at 288.
86
See Geissler op cit note 17 at 303; Haase op cit note 32 at 157; and Marks op cit
note 80 at 953–4.
87
Mayer op cit 83 at 189–90 and Goldman op cit note 33 at 27.
JOBNAME: SALJ 08 Part 1 PAGE: 15 SESS: 9 OUTPUT: Thu Jun 19 09:45:10 2008
/dtp22/juta/juta/SALJ−2008−part1/05article
88
Marks op cit note 80 at 963 and Haase op cit 32 at 163.