Hyperlink in Email Can Create Binding Terms
In Online Terms can be Binding, even if You don’t have to Click!, I discussed enforceability of a website’s “browsewrap” terms of service. This post discusses how an email hyperlink can create binding contractual terms.
Lawsuit Brought in New York
Elizabeth Starkey filed suit in the U.S. District Court for the Southern District of New York against travel company G Adventures, Inc. The suit alleged that a G Adventures employee sexually assaulted Starkey during a vacation trip. (more…)
Email Harvesting Violates CAN-SPAM
This post about email harvesting being a violation of CAN-SPAM is based on an answer to a Quora question that I provided. (Please see Is email harvesting illegal? )
Definitions: Email Harvesting and CAN-SPAM
Email harvesting is the process by which lists of email addresses are gathered for use in bulk emailing (spam). (more…)
Fraudulent Email Prohibitions Supplement CAN-SPAM
In Commercial E-mail and CAN-SPAM: What You Need to Know, I discussed how the federal CAN-SPAM Act makes commercial email more truthful, more transparent and more avoidable. This post addresses how California law concerning fraudulent email supplements CAN-SPAM.
In particular, this post discusses preemption, by which, under certain circumstances, U.S. federal laws can invalidate state laws that address a given subject matter. (more…)
What You Need to Know about CAN-SPAM and Third-party E-mail Lists
Earlier this month I posted “Commercial E-mail and CAN-SPAM: What You Need to Know“, which explains CAN-SPAM (15 U.S.C. Sections 7701-7713), the federal law that aims to make commercial e-mail more truthful, more transparent and more avoidable.
This post discusses an interesting variation on the CAN-SPAM theme: Whether and how CAN-SPAM applies when a company uses third-party mailing lists.
Limiting Non-business E-mail: Define Precisely and Enforce Consistently
Last month, my post Court Curbs Inspection of Employee Text Messages discussed an employer that was held to have unreasonably searched employee text messages because, despite a policy stating that employer-supplied technology must be used only for the employer’s business activities, that policy was undercut when it was only selectively enforced.
Continuing this theme, in a more recent case, Guard Publishing v. NLRB, the D.C. Circuit held that selective enforcement of a policy limiting employee e-mails constituted a violation of federal labor law.
In my opinion, Guard Publishing actually made two mistakes. First, the e-mail policy prohibited “non-job-related solicitations” (emphasis added) but did not prohibit other other non-job-related communications. So the employer gave itself the ability to limit only a fraction of all possible non-business communications.
Mass E-mails and Urban Legends: Don’t Believe Everything You Read
A well-intentioned friend recently distributed – to many dozens of people – an e-mail claiming that next month all mobile phone numbers will be released to telemarketers, so it is essential to call the Federal Trade Commission’s toll-free number to opt out of receiving unwanted calls. The e-mail finished by telling recipients to forward it to all of their friends.
This e-mail is false and perpetuates an urban legend that has been circulating for years, wasting bandwidth, processing cycles and disk space!
The truth is that mobile phones are protected from telemarketing; the toll-free opt-out number should be used for landline phones.
For more details, check out Snopes.com and the FTC website.
This blog does not provide legal advice and does not create an attorney-client relationship. If you need legal advice, please contact an attorney directly.
Spam Arrest: I Think I’ll Stay as Far Away as Possible
Today a client received an e-mail bounce-back from Spam Arrest, which provides a challenge-response system to stop automated junk mail. The first time a sender sends e-mail to a protected recipient, the sender must follow a link in the bounce-back message to a web page where, following user entry of a one-time verification code, the sender is identified as a legitimate e-mail sender.
During the past several years I have gone through the Spam Arrest verification process a few times and never thought much of it. But when I followed the link in the client’s e-mail, I saw something that, to the best of my knowledge, I had never seen before: the Sender Agreement reproduced toward the end of this post.