Email Harvesting Violates CAN-SPAM
This post about email harvesting being a violation of CAN-SPAM is based on an answer to a Quora question that I provided. (Please see Is email harvesting illegal? )
Definitions: Email Harvesting and CAN-SPAM
Email harvesting is the process by which lists of email addresses are gathered for use in bulk emailing (spam). (more…)
Fraudulent Email Prohibitions Supplement CAN-SPAM
In Commercial E-mail and CAN-SPAM: What You Need to Know, I discussed how the federal CAN-SPAM Act makes commercial email more truthful, more transparent and more avoidable. This post addresses how California law concerning fraudulent email supplements CAN-SPAM.
In particular, this post discusses preemption, by which, under certain circumstances, U.S. federal laws can invalidate state laws that address a given subject matter. (more…)
Facebook Ads can be Electronic Mail for CAN-SPAM Purposes
When I wrote about the CAN-SPAM Act of 2003 and the effort to limit unsolicited commercial e-mail (Commercial E-mail and CAN-SPAM: What You Need to Know), I noted that “One of the greatest challenges in complying with CAN-SPAM is figuring out exactly which communications are covered.” Much to my surprise, the U.S. District Court for the Northern District of California recently held that that certain Facebook ads were electronic mail for the purposes of CAN-SPAM!
What You Need to Know about CAN-SPAM and Third-party E-mail Lists
Earlier this month I posted “Commercial E-mail and CAN-SPAM: What You Need to Know“, which explains CAN-SPAM (15 U.S.C. Sections 7701-7713), the federal law that aims to make commercial e-mail more truthful, more transparent and more avoidable.
This post discusses an interesting variation on the CAN-SPAM theme: Whether and how CAN-SPAM applies when a company uses third-party mailing lists.
Spam Arrest: I Think I’ll Stay as Far Away as Possible
Today a client received an e-mail bounce-back from Spam Arrest, which provides a challenge-response system to stop automated junk mail. The first time a sender sends e-mail to a protected recipient, the sender must follow a link in the bounce-back message to a web page where, following user entry of a one-time verification code, the sender is identified as a legitimate e-mail sender.
During the past several years I have gone through the Spam Arrest verification process a few times and never thought much of it. But when I followed the link in the client’s e-mail, I saw something that, to the best of my knowledge, I had never seen before: the Sender Agreement reproduced toward the end of this post.