Brian A. Tufteea1
Cyberspace Law Seminar
Spring 2002 Semester
II. Junk E-mail in our lives
The internet is a worldwide phenomenon that touches the
lives of nearly everyone in the United States. Over 50% of Americans1
had direct access to the World Wide Web ("WWW") or the internet in some
capacity in 2001.2 In addition to this, it is estimated that over
42% of Americans used e-mail services on the internet.3
As anyone with an e-mail address knows, it is more often
than not that the message waiting for you in your inbox is not a note from
a friend, but instead is an unwanted advertisement. Junk e-mail,
or spam as it is more colloquially called, is an ever present part of life
on the internet. Like the junk mail that we still continue to receive
in our old-fashioned mailboxes daily, spam is the creation of clever marketers
who recognized the near-zero cost of sending e-mail over the internet,
and took advantage of it to the extreme. On any given day, between
10% and 30% of all of the e-mail messages delivered in the United States
are some form of unsolicited junk e-mail.4 Even with a conservative
estimate, this translates into some 80 trillion unwanted pieces of junk
e-mail each year.5 By contrast, the entire United States Post Office
handles a paltry 207 billion pieces of mail per year, just 0.25% of the
annual volume of junk e-mail.6
Regulating Junk E-mail
The problems presented by junk e-mail are different than
those presented by conventional junk mail or telemarketing. First,
and foremost, junk e-mail is largely untraceable, since it is relatively
easy for a sender to modify the "From:" header on the junk e-mail message
and forge a false return address.7 Still, there are ways to trace
e-mail to its sender, which is important for the enforcement of any law
that would attempt to regulate junk e-mail. Second, as noted before,
junk e-mail is incredibly inexpensive for the sender, enabling the creative
marketer to send hundreds of thousands or even millions of e-mails per
day. This low cost of sending bulk junk e-mail messages gives senders
no incentive to use resources in an efficient manner.8 Third, the
content of junk e-mail is often times either inappropriately obscene, or
it advertises fraudulent or illegal products and services. A random
sample of 200,000 junk e-mail messages by the FTC revealed that 30% of
the messages were pornographic in nature, and another 30% were get rich
quick schemes.9 This is in contrast with much of telemarketing and
mass mailing, which generally offer legitimate, if unwanted, solicitations
to the consumer. Fourth, junk e-mail can contain viruses or worms
that can infect and damage a recipient's computer.10
The final and most obvious difference between junk e-mail
and conventional mass mailing or telemarketing is that there is at least
some regulatory framework in place which is designed to protect consumers
and regulate the business activities of advertisers. The Federal
Trade Commission ("FTC") is charged with the regulation of telemarketers
and mass mailers, and offers a variety of services to protect the consumer.11
Unfortunately, the FTC has little to offer in the way
of protection for recipients of unwanted junk e-mail messages. Consumers
are able to file complaints with the FTC, and are encouraged to send in
copies of junk e-mails as well.12 There is, however, no easy way
for the FTC to pursue mass marketers of junk e-mail, largely for the reason
that junk e-mail messages are hard to track. Spam e-mails generally
do not contain much in the way of information identifying the sender, often
omitting a reply e-mail address, phone number, or business address.13
This seriously limits the ability of the FTC to regulate junk e-mailers
in the same way that it can regulate telemarketers or mass-mailers.
The Current Statutory Framework
One of the most glaring gaps in consumer protection is
that Congress has created no federal legislation which directly speaks
to the problems associated with junk e-mail. While the FTC does have
broad powers to ban unfair or deceptive trade practices, and has the power
to define specific trade practice rules for particular industries,14 it
does not have the power to create a uniform, national system for the regulation
of junk e-mail. Since 1999, the 106th15 and 107th16 sessions of Congress
have proposed numerous bills attempting to deal with the problem of unsolicited
junk e-mail. Of these bills only the Unsolicited Electronic Mail
Act of 200017 made it through one house of Congress. As of yet, no
bill has successfully passed both houses and become law, leaving a gap
at the national level.
The states have decided to take the initiative that Congress
has been unable to, and have passed anti-spam legislation of their own.
Currently, twenty states have some form of restriction or regulation placed
on the sending of junk e-mail.18 Delaware's anti-spam law is probably
the most restrictive of all states, prohibiting the sending of unsolicited
bulk commercial e-mail,19 the sending of bulk e-mail with falsified routing
information,20 or the distribution of software designed to falsify routing
information.21 Other states have taken less restrictive steps, generally
requiring the sender to provide contact information and a method for opting
out of future unsolicited e-mails, akin to a no-call list that a telemarketer
would maintain.22
These laws attempt to do what Congress seems incapable
of doing, and the end result is a patchwork of state laws which are inconsistent
and potentially unconstitutional. When applied to the internet, which
is rapidly becoming a national market for goods and services, this patchwork
of state legislation is susceptible to a serious challenge under the Dormant
Commerce Clause.
III. The Dormant Commerce Clause Generally
The Dormant Commerce Clause ("DCC") is a judicially created
doctrine that arises from the negative implication of Congress' commerce
clause power to regulate commerce between the states. 23 The development
of this doctrine can be traced back to early cases dealing with protectionist
state legislation, in which the courts sought to remove discriminatory
state laws which hampered interstate trade.24
There are two main rationales behind the existence of
the DCC. First, at the time of the adoption of the Constitution,
the commerce power was seen as one of the most critical powers the newly
created Congress would have.25 Previously, under the Articles of
Confederation, there was no explicit power to regulate trade among the
states. As a result, there existed a patchwork of uneven tariffs,
regulations, and restrictions that generally hampered the ability of the
states to engage in commerce with each other.26 The existence of
the commerce clause was a result of the recognition that national control
and management is the optimum way to deal with the problems presented by
interstate trade.27 As a result, courts have interpreted this power
as providing a bar to state actions which would also have the effect of
regulating commerce. Congress alone should have the power to control
trade between the states.
The second rationale for the DCC is that when Congress
has failed to act in a particular area, there may be reasons why.
Congress may have decided, through silence, that a particular aspect of
interstate commerce should be left alone. Courts are then reluctant
to let states enter the fray, when Congress itself has not chosen to do
so.
The Legal Test for the DCC
Violations of the Dormant Commerce Clause generally
fall into three broad categories. First, there are state laws which
plainly and facially discriminate against out-of-state interests, to benefit
local ones. These laws have included an exemption from liquor taxes
for a locally produced liqueur,28 and a law requiring milk sold within
the state to be processed at a central location within the state.29
These laws are practically always struck down as a violation of the DCC,
and the strictest scrutiny is applied in such cases.30
Second, there are state laws which are facially neutral,
but have a discriminatory effect when applied. These laws have included
a requirement that apples sold in a particular state not be marked with
state-defined grades, but only the U.S.D.A. grades,31 and a limit on the
price that could be charged for milk within the state, even if it had been
purchased out-of-state at a lower price.32 In cases such as these,
the courts are especially careful to look for a protectionist purpose behind
the statute. Evidence of a protectionist motive, even if the law
itself is facially neutral, will typically invalidate these types of laws.
Finally, there are those laws which treat local and out-of-state
interests equally, yet still impose a burden on the flow of interstate
commerce. For these types of laws, the courts employ a balancing
test, which comes from Pike v. Bruce Church, Inc.33 The Pike balancing
approach looks to the impact of the law or regulation on interstate commerce,
and weighs it against the local state interest that is being served by
the statute. The test is generally expressed as follows: "Where the
statute regulates even-handedly to effectuate a legitimate local public
interest, and its effects on interstate commerce are only incidental, it
will be upheld unless the burden imposed on such commerce is clearly excessive
in relation to the putative local benefits."34
Since the types of laws which currently exist to regulate
junk e-mail will all most likely fall into the third category, further
exploration of this subset is warranted. As noted above, there must
be a balance between the state interest and the burden on interstate commerce.
This presupposes that there is in fact a legitimate state interest present.
Legitimate state interests generally include any regulations or laws which
deal with the health,35 safety,36 or welfare37 of the state. The
state cannot, however, have a legitimate interest in promoting the interests
of its own citizens to the detriment of those from other states, as this
goes to the heart of what the DCC was designed to avoid.
On the other side, the court must weight the burden to
be placed on interstate commerce. This includes an examination of
the market effect of the law or regulation, which includes things such
as increased costs of doing business,38 limitations on activities in markets
other than the state in question,39 barriers to entering a new market within
the state,40 and the level of inefficiency that results from complying
with a patchwork of conflicting state laws.41
The inherent nature of a balancing test is that there
will be no bright line for distinguishing one case from another.
Generally, the state interest must be important, and the burden on interstate
commerce must be small in comparison to the state interest. Thus,
a critical state interest, such as protecting the health of citizens, will
be able to place a greater burden on interstate commerce than a less important
state interest, such as saving money.
Additionally, there is a category of DCC analysis which
does not fit easily into the categories described above. This is
the extraterritoriality principle, and it operates to invalidate state
laws which have the effect of regulating conduct occurring wholly outside
the state.42 This amounts to an exportation of commercial policies
by one state into another, and is per se invalid under the DCC. An
extraterritoriality argument can be made for practically any of the three
categories of state legislation described above, and will require a specific
factual inquire to determine if there are any direct or incidental effects
of the challenged state law which operate entirely outside of the bounds
of the state.
IV. The History of DCC Challenges to State Regulation
of the Internet
ACLU v. Pataki
The landmark case dealing with state regulation
of the internet is ACLU v. Pataki.43 Pataki was decided in the relative
infancy of the internet, when states were just beginning to recognize the
magnitude of impact that the internet would have on society. Pataki
involved a law which made it a crime to engage in communications with a
minor which depicts or describes obscene conduct.44 The law was challenged
on several grounds, including the First Amendment and the DCC. The
court devoted essentially its entire opinion to the DCC argument, and thus
Pataki became the first major court decision anywhere applying the DCC
to a state law regulating the internet.
The Extraterritoriality Analysis
The defendants in Pataki argued unsuccessfully
that the law in question regulated intrastate conduct alone.45 This
argument carried little weight when one looked to the literal text of the
statute, which placed no limits on the location of the communications in
question, simply provided that New York can exercise criminal jurisdiction
over the putative defendant. The nature of the internet, which is
basically insensitive to geographical boundaries, guarantees that the statute
as worded would be applied to communications which occurred outside of
New York. Web pages which are placed on a server in California can
be viewed by individuals from practically every country in the world, including
minors located in New York. The statute therefore subjected an individual
webmaster, who had never set foot out of the state of California, to the
risk of being charged in New York, simply because a minor had accessed
the webmaster's site which included adult-oriented themes. In this
regard, the law clearly reached beyond the state of New York and made potential
criminals of individuals located all over the country.
As a backup, the defendants in Pataki argued that
internet communications are not "commerce" within the meaning of the Constitution,
and therefore the DCC should not apply to their regulation.46 This
argument carries no weight either, since the U.S. Supreme Court has given
"commerce" an exceedingly broad definition. Activities which are
conducted without a profit motive, which includes much of the communication
on the internet, can still be considered "commerce" for DCC purposes.47
Additionally, the level of commerce which takes place over the internet
was substantial even in 1997, let alone today. For these reasons,
the argument that the internet does not involve "commerce" is a futile
one.
As noted earlier, extraterritorial regulation of
commerce is generally per se invalid under the DCC. The court
in Pataki cited several U.S. Supreme Court decisions, including Baldwin
v. G.A.F. Seelig, Inc., Edgar v. MITE, and Healy v. Beer Institute, all
for the proposition that extraterritorial regulation of commerce is per
se invalid.48 The critical inquiry is whether or not the practical
effect of the challenged law or regulation is to control commerce occurring
wholly outside the bounds of the states. Laws which do so are invalid,
as they exceed the inherent power of the state to regulate within its own
borders alone. The law in Pataki has this effect as well. A
person in California will be prohibited or discouraged (at least theoretically)
from putting up an adult-oriented website on a California server, fearful
that a New York minor may gain access to that website. Thus, conduct
which occurs wholly within the geographical confines of California may
be regulated by the New York law. For this reason, the law in Pataki
cannot stand.
The Pike Balancing Test
Pataki did not just rest on the extraterritorial
regulation of commerce to invalidate the law in question. An alternative
examined by the court was the Pike balancing test, discussed above.49
For this analysis, the court first determined the local interest that New
York was seeking to protect. Then, the court determined the burden
that the law would have on interstate commerce. Finally, the court
weighed these two facts under Pike.
The local interest that New York was seeking to
serve was the protection of minors from obscene communications. The
defendants supplied the court with a great deal of evidence concerning
the proliferation of adult content on the internet, and most disturbingly,
the increasing presence of pedophiles and sex offenders online, who use
the internet to converse with and seek out potential victims. This
is clearly an important state interest, yet the court notes that the actual
benefit to New York is fleeting at best.
First, the law would only target communications
which originate in the U.S., thereby exempting any obscene or harmful contact
originating from foreign jurisdictions. Second, there are real questions
about New York's ability to exert criminal jurisdiction over potential
defendants who have no contact with New York, other than the fact that
a minor in New York received obscene communications from the potential
defendant. The court notes the improbability that bounty hunters
from New York will travel across the other 49 states, dragging pedophiles
into New York for trial.50 The practical reality is that the challenged
statute will have little effect on the protection of minors in New York.51
The court further notes the existence of laws which already criminalize
obscenity and child pornography, and finds that the challenged law in Pataki
will have little if any real impact on local interests.
Weighed against the local impact is the burden
placed on interstate commerce by the challenged act or regulation.
In this case, there was a marginal local benefit, balanced against a nationwide
burden on content providers. It was clear which way the scales would
tip in such a situation, and therefore the statute in Pataki failed the
Pike balancing test.
ACLU v. Johnson
The state of New Mexico attempted to pass essentially
the same statute that was at issue in Pataki, prohibiting indecent communications
with a minor over the internet. Not surprisingly, the ACLU mounted
a challenge to this statute as well.52 Since the Tenth Circuit agreed
substantially with the court in Pataki, this case only serves to reinforce
the problems with state regulation of the internet. As with Pataki,
the extraterritorial nature of the New Mexico statute was the overriding
factor in the court's decision, although the Pike balancing test was used
to arrive at substantially the same outcome.
Hatch v. Superior Court
Another crucial case interpreting state laws in
relation to the internet was Hatch v. California.53 In Hatch, the
state of California was using a law that made it a crime to send specifically
defined (hardcore, obscene) material over the internet to a minor for the
purposes of seduction.54 Hatch was nabbed in a sting operation conducted
by a television network which sought to expose the seedy underside of the
internet. The network hired young women to pose as teenagers on the
internet, acting as bait for pedophiles and sex offenders. Hatch
took the bait, and engaged in a wide variety of sexually related conversations,
sending images, and proposing and hinting at wanting to have sex with the
women he believed to be minors. After collecting a good deal of evidence,
the police were notified, and Hatch was arrested, charged, and convicted.
In his challenge to his conviction, Hatch argued
that the California law was unconstitutional because it violated the DCC.
Specifically, he turned to Pataki and argued for its broad application
to the California statute. There are several reasons for why Pataki
was inapplicable here. The most important element of the California
statute that was missing in the statute in Pataki was the explicit intent
requirement. Unlike Pataki, in order to run afoul of the statute
in Hatch one was required to have a specific intent to communicate with
a specific minor, with the purpose of seduction. This distinction
is critical, because it goes straight to the heart of DCC analysis.
Because the statute in Hatch required this specific,
intentional communication, the extraterritorial reasoning of Pataki was
inapplicable. Hatch could not argue that the California law was regulating
commerce occurring wholly outside the bounds of California, since the law
required that the communication be taking place intentionally between the
defendant and the minor.55 This is clearly distinguishable from Pataki,
since it would be possible for a person to be prosecuted under the New
York statute simply by placing content on a website, with no knowledge
of who was accessing it. Since the California law had no extraterritorial
effects, the first line of reasoning from Pataki fails.
There still remained the Pike balancing test, since
the California statute in question did have some effect on interstate commerce.56
In weighing the state interest and the burden to interstate commerce, the
court in Hatch found no question about the propriety of the statute under
the DCC. The state interest in question was the highly compelling
one that also existed in Pataki, namely the protection of minors.
However, the California law was more narrowly tailored, to reach specific
acts of obscene communication that were made with the intention of seducing
minors. Therefore, in order for one to fall within the purview of
the California statute, one must be engaging in some very reprehensible
behavior.
The burden to interstate commerce is exceedingly
light, if one considers what the California statute was banning.
It was prohibiting communications with a minor, intentionally conducted
for the purpose of seducing the minor. There is quite clearly no
value to be placed upon such forms of communication, and therefore a law
which interfered with the ability of persons to make such communications
would have no legitimate impact on interstate commerce at all.57
The court noted that just because Hatch used the internet to communicate
with his intended victims should not serve to provide him with a shield
against criminal liability. The court finds it incredible to suggest
that pedophiles can be protected from state prosecution by virtue of using
a more advanced form of technology to select their victims.
In all actuality, there was no burden placed on
interstate commerce at all by the California act. The types of communications
which were prohibited by the act were clearly not a legitimate form of
commerce at all, and deserved no protection under the DCC. With no
burden to balance against, the state interest need only be insignificantly
slight in order to survive under the Pike balancing test.58
The common thread to note throughout all three of these cases is the fact that if a statute is to survive a DCC challenge, it must be worded carefully to avoid two things: regulation of wholly out-of-state commerce (the extraterritoriality problem), and an excessive burden on interstate commerce (the Pike test). This is the heart of the DCC challenge, and as will be seen below, the key to saving a junk e-mail statute from the axe of the DCC.
V. State Junk E-mail Statutes Challenged Under the DCC
To date there have been just two decisions which
challenged state anti-spam laws under the DCC, in California and Washington
state. Both of these decisions were made by state supreme courts,
and both decisions upheld the challenged law. The laws had somewhat
different effects on junk e-mail, and can form the basis for a model act
dealing with the problems of junk e-mail.
Washington v. Heckel
Heckel was the first final decision in the nation
(June, 2001) which challenged a state law dealing with junk e-mail.59
The Washington statute60 applied to all commercial e-mails sent from a
computer in Washington to an e-mail address held by a Washington resident,
and prohibited three things: First, it made it illegal to use another's
domain name in the message without their permission.61 Second, it
made it illegal to misrepresent or obscure any information identifying
the point of origin or transmission path of the message. Third, it
prohibited false or misleading information in the subject line of the message.
Additionally, it stated that for the purposes of the statute, an e-mail
sender has knowledge that his intended recipient is a Washington resident
if that information is available from the internet domain which is providing
the e-mail address for the recipient.62
When Heckel was charged with three violations of
the statute, in that he used misleading subject lines, misrepresented the
transmission paths of his messages, and effectively did not provide a valid
return e-mail address for his messages.63 The trial court found that
the statute violated the DCC, and the state sought an appeal.
The issues in Heckel are substantially the same
three arguments that were found in Pataki and Hatch. First, the act
unfairly burdens interstate commerce, under the Pike balancing test.
Second, the act regulates extraterritorial commerce, which is per se a
violation of the DCC. Finally, the act subjects the internet to inconsistent
regulations, which is unacceptable for a nationally vital system such as
the internet. The court addressed and dismissed each of these arguments
in turn.
Starting from the third argument and working back,
the court held that the act does not subject the internet to inconsistent
regulation. The act essentially requires one thing, truthfulness,
and there is no other state that compels untruthfulness as a matter of
law, for obvious reasons. Since there is no danger that e-mail senders
will have to comply with a patchwork of state laws, but instead must only
adhere to the general standard of truthfulness, the act does not create
a patchwork regulation system.64
With regards to the extraterritoriality argument,
it seems clear that there is no attempt by the statute to regulate out-of-state
commerce, nor does the statute have any incidental effects which could
influence wholly extraterritorial commerce.65 The statute only applies
when a message is sent from a computer in Washington to a Washington resident,
with at least constructive knowledge that the recipient is a Washington
resident. Messages which are sent from an Iowa computer to a Washington
resident, or messages sent from a Washington computer to an Iowa resident
are not included within the purview of the statute. Most importantly,
messages exchanged between wholly out-of-state individuals are not brought
within the scope of the statute.
The extraterritoriality analysis is not quite as
simple as that, for even if the statute does not directly apply to extraterritorial
conduct, it may nevertheless have an indirect effect on commerce occurring
wholly within other states. In this case, however, there is no incidental
effect on extraterritorial commerce, as there was in Pataki. The
crucial distinction here is that Pataki applied to any form of internet
activity, including websites which could be seen by internet users everywhere,
thereby exposing an out-of-state resident to criminal liability when viewed
by any New York minor. In Heckel, the Washington statute only applies
if the recipient (an not anyone who just might happen to view the message)
is a Washington resident. This crucial distinction forecloses any
extraterritorial issues that were present in Pataki.
Finally, the Pike balancing test shows that the
burden on interstate commerce is exceedingly light, if present at all,
and the state interest is strong. There are three groups of people
that are protected by the Washington statute: the actual recipients of
the e-mails, internet domains which are used without permission in the
message, and the ISPs who must bear the extra costs of dealing with the
volume of spam e-mail sent to their users.66 Of course it is not
simply enough to look at the potential state interests in the abstract;
the actual or probable benefits of the statute must be examined to determine
the true local benefit.
The court believed that the truthfulness requirement
of the act would in fact have real benefits.67 E-mail recipients
could immediately delete e-mails just based on the subject heading if the
messages were truly and accurately identified as commercial solicitations.
Those spammers who engage in fraudulent offerings would be essentially
put out of business if they complied with the act. Also, the requirement
of accurate headers and transmission paths would give recipients an easy
way to track down return e-mail addresses of those sending the e-mail.
Weighed against these local benefits is the potential
burden to interstate commerce. However, the court notes that the
only burden here is the requirement of truthfulness, which is in fact not
a burden at all.68 In fact, the burden comes when would-be spammers
decide to violate the law, by selectively omitting Washington residents
from their junk mailings. The cost of truth in advertising is negligible,
and in fact should not properly be a factor in the analysis. Spammers
can hardly complain that their costs have gone up because they must now
be truthful in sending their messages, and that they can no longer send
out fraudulent offers. It is certainly hoped that no court in the
nation would consider it a burden for advertisers to be truthful.
Since there is no real burden on interstate commerce, and because the local
benefits are real and important, the Pike balancing test will not find
a violation of the DCC.
Ferguson v. Friendfinders, Inc.
California has a much more detailed law dealing
with the regulation of junk e-mail, which was invoked by an individual
besieged by junk e-mail in this case.69 The California law, like
the Washington law, only applies to e-mail from between California individuals
or businesses to California residents. The law70 requires several
affirmative acts on the part of the sender. First, the sender must
include either a toll-free phone number or a valid return e-mail address
to enable the recipient to opt out of future advertisements, and indicate
that option within the message. Second, senders must include, as
the first characters of the subject line, either "ADV:" or "ADV:ADLT" to
notify the recipient that the message is an advertisement. Third,
the sender cannot send future advertisements to any individual who has
decided to opt out of such advertisements.
The line of attack in Friendfinders begins customarily
with an extraterritorial analysis. This analysis leads to the same
result in Heckel, because the statute is narrowly worded to apply to conduct
only occurring within the state of California. The mere fact that
it may be difficult to ascertain which recipients are located within the
state of California does not suddenly change the focus of the law from
intrastate conduct to out-of-state conduct.71 An aspect of the extraterritoriality
analysis seems to be missing from the court's opinion in Friendfinders,
however, since the court does not address the potential for incidental
effects on wholly out-of-state commerce. This will be addressed fully
at a later point in this paper.
Also, the court does not find that the California
law violates the DCC under the Pike balancing test. The local benefits
that are realized under the statute are similar to those outline above
in Heckel, namely the protection of e-mail recipients and ISPs.72
The California law also has the benefit of allowing recipients to opt out
of future e-mails, something not permitted by the Washington statute.
Against these local benefits the court quickly
dismisses any real burden to interstate commerce. First, truthfulness
is not a burden, in fact it is a highly desirable benefit to "impose" on
commerce, since it helps to eliminate fraud and confusion among the recipients
of junk e-mail.73 Second, the costs of including extra characters
in the subject line to identify the message as an advertisement is miniscule.
Finally, the court, in a rather conclusory fashion, dismisses any burden
imposed by providing opt-out mechanisms.74
VI. Analysis for a Model State Act
A model state act which proposes to deal with the
problems associated with junk e-mail must first analyze the problems presented
by junk e-mail, and how they implicate legitimate state interests.
The first problem with junk e-mail is that it can expose the residents
of the state to fraudulent and misleading advertising. This is not,
however, the biggest problem with junk e-mail, since all states have laws
dealing with unfair or deceptive trade practices (in addition to the powers
possessed by the FTC). Instead, the greatest problem with junk e-mail
is the sheer number of messages being transmitted, and the lack of any
uniform system for opting out of future messages. While it would
be unconstitutional to ban all junk e-mail (despite the fact that most
internet users would applaud!), it is possible to place restrictions on
junk e-mail similar to those placed on conventional mailings and telemarketing
practices.
Since the goal of this paper is to propose a model state
act for dealing with junk e-mail, it would be wise to analyze each specific
provision of the California and Washington laws and look at their constitutionality
under the DCC.
Truthfulness
This component of anti-spam laws will have the
least impact on interstate commerce. Truthfulness includes not only
the content of the message itself, but also restricts the falsification
of message headers or return e-mail addresses. As indicated above,
it is a futile argument to claim that requiring truthfulness will place
any legitimate burden on interstate commerce. Any law which attempts
to deal with junk e-mail can and should include this provision, as did
both the California and Washington laws.
Opt out provisions
While the Washington law does not contain this
provision, the California law does. Any statute which attempts to
deal with spam must provide some method of enabling the recipient to affirmatively
decline future messages. While it would be nice to have a statewide
or even nationwide database containing a list of e-mail addresses that
could not be contacted, such a database would be an expensive undertaking.
Placing the burden on individual spammers to maintain their own no-contact
lists is an attractive solution to the problem. Since spammers essentially
get free postage, unlike those advertisers who use the regular mail, it
seems more than reasonable to force spammers to share some of the burden
in maintaining a no-contact list.
This provision is still the most troubling for
a state law, since it does place a real and meaningful burden on those
who would send e-mail in interstate commerce. It should be remembered
that the Pike balancing test is generally unconcerned with whether not
the law is regulating wholly intrastate conduct, but instead is concerned
with whether or not the law has any effect on interstate commerce as a
whole. Since one cannot reasonably argue that sending e-mail on the
internet does not affect interstate commerce, tailoring the jurisdiction
of the statute to reach only intrastate conduct will not save the statute
under a Pike analysis.
In this case, it may be a close balance between
burdening interstate commerce, and benefiting local interests. Still,
the one state court which has done the analysis has found that the scales
tip in favor of sustaining the statute. Because of the great value
in allowing individuals to opt out of future junk e-mail, this provision
should be made a part of the model act. Should a state or federal
court later decide that this provision creates an excessive burden on interstate
commerce, its removal can be made at a later date without too much damage
to the statute.
Subject Line Requirements
While the Washington law only requires that the
subject line not be misleading or false, the California law requires that
the subject line specifically indicate that the message is an advertisement.
The burden in imposing such a requirement is vanishingly small, since there
are no pre-printed advertising materials for the spammer to throw away
and reprint. Since spammers send identical messages to their recipients,
it is no real burden (both time and money) to require a slight modification
to a small part of the message. The software programs that spammers
use are highly automated, and could easily accommodate this change.
The benefits by adding such a requirement are immense.
By explicitly identifying each message as an unsolicited advertisement,
the recipient can quickly go through and delete any unwanted messages without
opening them. Also, mail filtering software can be used to prevent
any such messages from ever being received by the addressee. Many
e-mail providers attempt to do some degree of junk e-mail screening, but
the effectiveness of this approach is severely constrained by the sheer
variability in junk e-mail content. A subject line requirement will
go a great distance towards lessening the junk e-mail problem.75
The subject line requirement can also be used to
identify the message as being adult in nature. This provides a further
benefit to society, since adult-oriented e-mails can be screened by filtering
software. Furthermore, it provides a degree of differentiation, so
that users can perhaps opt to delete every adult oriented e-mail, but may
choose to read some of the non-adult messages.76 Anything more specific
regarding the subject line is left up to the sender, provided that it comports
with general truthfulness requirements.
The biggest problem with subject line requirements
is that they have the potential for creating a patchwork of inconsistent
state regulations. This is one of the evils that the DCC exists to
prevent, and this is why a model state act is so desperately needed.
For example, the California law requires an adult-oriented advertisement
to contain "ADV:ADLT" as the start of the subject line. In Pennsylvania,
the requirement instead is for "ADV:ADULT".77 It would be impossible
to comply with both of these requirements at once. When one considers
that spammers send their messages to randomly compiled lists of e-mail
addresses, and that when sending thousands of messages out at once, it
is likely that the same message will be sent to a California resident and
a Pennsylvania resident, thereby creating noncompliance in at least one
jurisdiction.
The only potential to save this system is to have
the statutes apply only to wholly intrastate conduct, as with the California
statute. Then, one could basically ignore the laws of any other jurisdictions,
and only work on satisfying the laws of the jurisdiction from which the
spam is being sent. This shows the great importance of confining
the statute to intrastate conduct alone, and shows why a statute without
such a provision would most likely be invalid under the DCC. Since
it is believed that such a jurisdictional limitation makes subject line
requirements permissible, they will be included in the model act.
Protection of Third Party Internet Domains
This is something that the Washington statute includes,
but the California one lacks. It prevents a spammer from using a
third party domain name without the permission of the domain owner.
This statute is of somewhat dubious legitimacy, since federal trademark
and unfair competition law already exist to serve this purpose. A
state law which purported to extend this protection beyond federal limits
may find itself preempted. The Washington statute makes it illegal
to use a domain name without permission, regardless of the context that
it is used in, and without regard for the presence or lack of a fraudulent
intent. Since federal trademark law is not so restrictive as this,
and could in many cases allow a domain name to be included in a message
for perfectly legitimate reasons, the Washington law is probably overreaching.
Since this part of the Washington law will in fact be
of little benefit (since there is already a general truthfulness requirement
and states have other laws dealing with fraud), and since it is possibly
ripe for a legal challenge under the Supremacy Clause, it is not an essential
part of a model state act dealing with junk e-mail, and will be omitted
from the proposed act.
Intrastate jurisdiction
This is, without a doubt, the most crucial provision
of any state law that would ever attempt to regulate the internet.
A carefully drafted jurisdictional clause will protect the statute from
an extraterritoriality attack under the DCC; a poorly drafted one will
invalidate the statute. The DCC is especially sensitive of a state
law which looks like it is affecting wholly out-of-state conduct, and employs
a per se rule of invalidity for such cases. The jurisdiction of the
model act should be tailored to apply only to intrastate conduct.
As such, it should only apply when the sender uses a computer within the
state to send the e-mail to a recipient who lives in the state.
This drafting removes any realistic extraterritorial
effects, whether directly imposed by the statute or resulting incidentally
from it. The only spammers who will even worry about the law are
those who already live in the state that passes this model act; an out-of-state
spammer can send messages into the state without fear of liability.
Therefore, there is no effect on conduct which occurs outside of the state.
On an additional note, the intrastate restriction
contained in the model act serves a useful purpose as well, by avoiding
tricky questions of personal jurisdiction. If a resident of Maine
were to send an junk e-mail to a resident of California, and assuming that
the only contact that the sender has with California is sending e-mail,
are there sufficient minimum contacts to justify personal jurisdiction
in the California courts? The answer to that question is probably
no.78 Also, would there be a state long-arm statute which covered
the situation? By confining jurisdiction of this model act to wholly
intrastate conduct, these questions are avoided, and administration of
the act is simplified.
Affirmative defense
Additionally, I propose the creation of a new provision
in the model act, namely an affirmative defense. The biggest complaint
that can be had of an anti-spam statute such as this is that it is difficult,
if not impossible, to know the state of residence of each and every message
recipient. As a practical reality, therefore, anyone sending spam
from a state with the model act in place will tailor his messages to comply
with the relevant state statute, even if some or most of the recipients
are in fact not residents of his same state.
While it is likely that any state law which attempted
to regulate spam sent from an out-of-state computer to a resident in the
state would be invalid under the DCC, such laws do in fact exist.79
In order to protect those who send junk e-mail with a good faith effort
to comply with the laws of the recipient's state, I believe that an affirmative
defense should be available. The defense would permit a spammer to
escape liability under the act, if the spammer could prove with clear and
convincing evidence that the spammer had a good faith belief that the recipient
was located in a certain state, and that the e-mail which was sent to that
recipient complied with the laws of that state. In the event that
the spammer could show such evidence, the purposes of the act would generally
not be served by imposing liability on a spammer who went to such great
lengths to ensure compliance with the law.80
Enforcement
No law would be complete without a mechanism for
enforcement. The model act contains enforcement provisions which
are similar to those employed in state anti-spam statutes. The model
act does not contain a provision for criminal penalties; the only sanctions
in the model act are civil fines. This was done for several reasons.
First, by providing civil penalties, parties other than the state can sue
spammers in court. The model act makes it possible for either individual
recipients or their ISPs to sue spammers, not just the state attorney general.
Also, while spam may be annoying, it does not generally rise to the level
at which criminal sanctions are appropriate. States already have
laws which deal with fraudulent offers and scams, and those junk e-mails
which cross the line into outright fraud can be dealt with other states
laws which may criminalize such conduct.
It is predicted that individual e-mail recipients
will rarely receive enough e-mails from a single spammer to make a lawsuit
worthwhile. This is where ISPs can step in and take over. With
the consent of the e-mail recipient, the ISP that provided the mail hosting
services for the spam victim can sue the spammer directly. Since
ISPs handle gigantic amounts of e-mail daily, there will be ample reasons
for ISPs to sue spammers that clog their systems. Additionally, the
model act expressly makes it possible for ISPs to contractually obligate
their customers to provide consent to sue spammers. By providing
consent beforehand, ISPs will find it much easier to coordinate lawsuits
against flagrant spammers in an effort to force compliance with the act.
Penalties
This section of the model act is generally left
open for the state to decide what it believes the proper penalties should
be. The model act provides for a set fine per e-mail sent, with a
maximum cap of $10,000. States may choose to increase or decrease
the fine amounts, or to provide more graduated levels of increasing fines.
A possible alternative method would be to impose a fine of $100 per message
for the first 100 messages, then $50 per message for the next 100 and so
on. This would still give the model act the power it needs to force
spammers to comply, and would base the fine on the number of messages sent,
yet it would not impose a draconian fine overall.
First Amendment Issues
Since this is a paper dealing with the problems
posed by the DCC, an in-depth treatment of First Amendment issues is not
appropriate. Still, since it is hoped that the model act proposed
by this paper will be fully constitutional, a brief discussion of First
Amendment law on the issue of commercial speech is appropriate.
Under First Amendment principles, content-based
restrictions on speech are expressly forbidden, however, reasonable time,
place, and manner restrictions are appropriate if they are content-neutral,
and serve important government interests. The laws which currently
regulate telemarketing and mass mailing can be analogized to the proposed
model act, and it is believed that the restrictions imposed by the model
act are constitutional.
Commercial speech has been recognized by the U.S.
Supreme Court to be deserving of protection under the First Amendment,
commensurate with its position in relation to other constitutionally guaranteed
expression.81 In Central Hudson Gas & Elec. Corp. v. Public Service
Commission of New York,82 the Supreme Court outlined a four part test for
determining the validity of a restriction on commercial speech under the
First Amendment.
First, the underlying speech must be protected
under the First Amendment generally. This means that the speech is
legal and not misleading or fraudulent. Second, there must be a substantial
government interest. Third, the legislation must directly advance
the government interest, and fourth, the legislation must be no more extensive
than necessary to serve that interest.
Under the first prong of the test, it is conceded
that there is a good deal of unsolicited commercial e-mail which is not
misleading, illegal, or fraudulent, and therefore is deserving of First
Amendment protection. The second prong of the Central Hudson test
is most likely met in this case, since, as with FTC regulations of telemarketing
and mass-mailing, there is a substantial government interest in protecting
consumers from the huge volume of junk e-mail, the annoyance it causes,
and the strain it places on communication infrastructure.83
The third prong of the test requires that the proposed
restrictions on junk e-mail directly advance the government interests which
are present. The government must carry the burden in showing that
the proposed law will alleviate the harm it seeks to redress to a material
degree.84 The fourth prong requires that the government means employed
be narrowly tailored to achieve the desired objective, and is not as high
a standard as the "least restrictive means test".85
In this case, the third prong is satisfied by the
proposed model act. The harms which are presented by junk e-mail
will directly be addressed by the restrictions of the act. Consumers
will be able to relieve the burden of being deluged with countless junk
e-mails by opting out of future mailings. Consumers will also be
able to quickly determine which messages in their inbox are junk and which
are not. Mail screening programs will also be able to assist the
consumer, as a direct result of the subject line labeling requirements.
The fourth prong requires that the means be narrowly
tailored, in this case, that the restrictions imposed on junk e-mail be
closely related to the harm, and that the restrictions do not overreach
and unfairly restrict the protected speech. In this case, there is
not a wholesale ban on junk e-mail. Advertisers are not prohibited
from making at least one sales pitch to each consumer. Other than
minimal labeling requirements, there are no restrictions on the content
of the message (provided that it is otherwise truthful and not deceptive
or fraudulent).
The restrictions on commercial speech in the form
of junk e-mail are no more restrictive than those rules imposed by the
FTC on telemarketers or mass print mailers. Advertisers are not unreasonably
blocked in their attempts to reach consumers, and there are real benefits
from such regulation. The restrictions imposed by the model act are
believed to be fully in compliance with First Amendment jurisprudence.
Conclusion
The widespread prevalence of junk e-mail in our
society has placed real burdens on e-mail users and ISPs. While junk
e-mail does often contain legitimate advertising, there is nonetheless
a need to regulate it to serve the best interests of society. By
enforcing reasonable requirements for truthfulness, forcing junk e-mailers
to label their messages clearly, and providing consumers with the ability
to opt out of future advertisements, the model act proposed by this paper
complies with the restrictions imposed by the Dormant Commerce Clause.
The model act does not regulate wholly out-of-state conduct, and does not
place unreasonable burdens on the flow of interstate commerce.
While it is hoped that states will make use of
such legislation to assist in creating a uniform of national legislation
which is constitutional, it is hoped that Congress will step up and finally
enact legislation to regulate junk e-mail, and deal with the problems it
poses on a national level.
An Act For The Regulation of Unsolicited Commercial E-mail
Preamble:
The purpose and intent of the legislature in adopting
this law is to deal with the complex and unique issues associated with
Unsolicited Commercial E-mail on the internet, by placing fair and reasonable
restrictions on the use of Unsolicited Commercial E-mail. The legislature
expressly finds the following facts to be true:
1. Usage of the internet and e-mail is widespread
throughout this state, nation, and the world, and is essential to the functioning
of our society.
2. Many business organizations and individuals,
located both within the state and in foreign jurisdictions, use unsolicited
e-mail as a means for advertising and informing consumers of their products
and offers.
3. While there are many legitimate business purposes
behind unsolicited e-mail, some uses of unsolicited e-mail have fraudulent
or deceptive purposes or intentions.
4. Furthermore, many residents of this state have
expressed the desire to be free from unwanted commercial e-mail messages.
5. The sending of large amounts of unsolicited
commercial e-mails places a burden on the Internet Service Provides which
provide e-mail services for residents of this state.
6. Wishing to safeguard the residents of [state]
from fraudulent business communications, to relieve the burden on Internet
Service Providers, and to give the residents of [state] freedom from receiving
unsolicited commercial e-mails in the future if they wish to opt out, the
legislature does enact the following, to be known as the Uniform Unsolicited
Commercial E-mail Act:
1. Definitions
For the purposes of this Act, the following definitions
are applicable:
a. "Adult-Oriented Material" includes any material which
the average person, applying community standards, would view as appealing
to the prurient interest, depicts sexual conduct in an offensive way, and
has lacks serious literary, artistic, political, or scientific value.86
b. "Commercial E-mail" is any e-mail message sent to
an individual or group, which has the purpose, in part or in full, of proposing,
advertising, or describing any business transaction or opportunity, and
with the intended effect of persuading the recipient to engage in said
transaction or opportunity.
c. "Computer" means any device which performs numerical
computing functions, uses electrical, magnetic, optical, or other method
of storing data, and which is capable of being used to send, receive, or
otherwise handle electronic communications.
d. "Headers" or "Message Headers" are the information
contained at the beginning of an e-mail message which indicate the sender,
recipient, message priority, and any other information which is not contained
within the body or subject line of the e-mail message.
e. "Imbedded Link" is a line of characters, contained
within the body of an e-mail message, which gives the address of a page
located on the World Wide Web. Most e-mail programs will allow the
recipient to click directly on an imbedded link to transport the user to
that particular page.
f. "Internet Service Provider" is any business entity,
group, or individual that provides internet services to individuals, groups,
or business entities, including e-mail, World Wide Web access, and internet
connectivity.
g. "No-Contact List" is a list maintained by any
individual, group, or organization, in any format, which contains the e-mail
addresses of individuals who have affirmatively requested not to be contacted
by a specific sender of Unsolicited Commercial E-mail.
h. "Transmission Path" is the information, contained
with in the header of an e-mail message, which indicates the path that
the e-mail message took in traveling from the sender to the receiver.
This will include the Internet Protocol addresses of each computer on the
internet that handled the e-mail message, in either numeric or alphabetical
format.
i. "Unsolicited Commercial E-mail" is any commercial
e-mail message which is sent to a recipient, when the recipient of said
e-mail message did not affirmatively or implicitly request to receive said
message.
2. Jurisdiction
a. This statute shall only apply to Unsolicited
Commercial E-mail messages which are sent from a computer system physically
located within the state of [state], to a recipient who is a resident of
the state of [state].
b. The fact that the sender of an Unsolicited Commercial
E-mail message is not aware that the recipient is a resident of the state
of [state] shall be irrelevant for the purposes of this statute, except
as provided in section 6.
c. The fact that the recipient of Unsolicited Commercial
E-mail is not physically located within the state of [state] at the time
said message is opened and read shall be irrelevant for the purposes of
this statute.
3. Truthfulness in Unsolicited Commercial E-mail
a. It shall be a violation of this statute for
any person, group, or organization to knowingly send, or cause to be sent,
an Unsolicited Commercial E-mail to a recipient, subject to the requirements
of section 2, if
i. the E-mail message contains any false, fraudulent,
or misleading claims, statements, or other information, that are known
to the sender to be false, fraudulent, or misleading, or
ii. the E-mail message contains falsified information
in the message headers, or a falsified return address, or uses misleading
transmission paths, all with the intention of confusing or misleading the
recipient or disguising the true origin of the message.
4. Labeling
All Unsolicited Commercial E-mail messages shall contain
the words "UNSOLICITED ADVERTISEMENT" as the first words on the subject
line. If the e-mail message in question contains or refers to adult-oriented
material, the subject line shall also include the words "ADULT CONTENT".
Failure to comply with the subject line requirements in this section shall
be a violation of this statute.
5. Opt-out Provisions
a. Every Unsolicited Commercial E-mail message shall
contain one of the following methods for allowing recipients to opt out
of future messages from the sender:
i. A return e-mail address to which the recipient can
reply and request removal from future mailings from the sender. Requesting
removal from future mailings will require the sender to place the recipient's
e-mail address on a no-contact list, or
ii. An imbedded link to a web page which contains a form
into which the recipient can enter their e-mail address. Entering
an address into the form will place it onto a no-contact list maintained
by the sender, or
iii. A toll-free phone number that the recipient can
call and request removal from future mailings from the sender. Requesting
removal from future mailings will require the sender to place the recipient's
e-mail address on a no-contact list.
b. The sending of an Unsolicited Commercial E-mail
by any individual, group, or organization, to any e-mail address which
is located on the no-contact list maintained by that individual, group,
or organization shall be a violation of this statute.
c. As a defense, the individual, group, or organization
charged with a violation of section 5(b) may claim that they have not had
a reasonable amount of time in which to process the recipient's request
to be added to the no-contact list. A reasonable time for processing
the recipient's request shall be determined with reference to the facts
of the situation, but in any event shall not exceed five working days.
6. Affirmative Defense
A defendant who is sued under this act for violating
one or more of its provisions may claim, as an affirmative defense, that
they did in fact hold a good faith belief that the recipient of the e-mail
message in question was a resident of another state, and the message as
sent complies with the requirements, if any, of the state that the defendant
believed the recipient was a resident of. A showing by the defendant
on this point by clear and convincing evidence will defeat any claim under
this statute for liability with regard to the particular e-mail in question.
7. Penalties
a. A violation of this statute shall result in a fine
of $100 per e-mail sent, however, the total fine imposed shall not exceed
$10,000.
b. The sending of e-mail messages in violation of this
statute in one bulk transmission will not be considered to be a single
violation, but instead will result in one violation per unique e-mail sent
to a unique address.
8. Enforcement.
a. The provisions of this statute shall be enforced by
a civil suit against the violator in [name of appropriate state court].
b. The State Attorney General shall have the power to
sue violators of this statute on behalf of the people of the state, and
may sue in one action for all violations committed by a specific defendant
against the residents of [state].
c. Individuals who have received an e-mail message which
is in violation of any portion of this statute may sue the sender.
Individuals will be entitled to the fines recovered for any e-mails they
have personally received, but may not recover on behalf of third parties
who also received e-mails from the defendant in violation of this statute.
d. Internet service providers that provide e-mail services
to a customer, who has received an e-mail in violation of this statute,
may sue the sender under this statute on behalf of their customer, with
the customer's consent. An Internet Service Provider may sue a single
defendant for as many individual violations of this statute as have been
committed against the Internet Service Provider's customers in a single
action. Internet Service Providers may contract in advance for this
consent, and may condition the receipt of such consent on providing e-mail
services to an individual.
e. Recovery shall only be permitted once for each individual
violation of this statute; no double recovery shall be allowed. The
State Attorney General shall have priority over all other plaintiffs.
9. Miscellaneous.
a. This statute will become effective on [specified date,
specified conditions, if any desired to be imposed by the legislature].
b. If any portion of this statute is declared unconstitutional
by any state or federal court with proper jurisdiction, then said portion
of this statute will be void and without any effect, but the remainder
of this statute shall remain in effect to the fullest extent permitted
by the law.
Note: portions of the statute enclosed in [ ] brackets can and should be modified by each state as they see fit. The entire section on penalties can be modified if the state sees fit; the crucial components of this statute which should be uniform nationally are the provisions which substantively govern the requirements of junk e-mail.
a1 Candidate for Juris Doctor at the University of Iowa
Law School, 2002. B.S.M.E. from Iowa State University, 1998.
This paper was written for Cyberspace Law Seminar, spring 2002 semester,
Professor Nicholas Johnson.
1 Taken from A Nation Online report from Commerce Department
at http://www.cnn.com/2002/TECH/internet/02/06/internet.use/index.html.
The full report is available at http://www.esa.doc.gov/508/esa/USEconomy.htm
2 Though many believe otherwise, the internet and the
World Wide Web are actually two distinct things. The internet is
generally defined as the collection of all computers worldwide which exchange
data using TCP/IP protocol. Within the internet exist specific services
and functions, such as e-mail, Usenet news, and the WWW. See generally
American Civil Liberties Union v. Reno, 929 F.Supp. 824, 830-38 (E.D. Pa.
1996).
3 See note 1, supra.
4 Calvin Whang, An Analysis of California's Common And
Statutory Law Dealing With Unsolicited Commercial Electronic Mail:
An Argument For Revision, 37 San Diego L. Rev. 1201, 1202-03 (2000).
5 Id. at 1202.
6 http://www.usps.com/news/facts/lfu_032702.htm
7 http://members.aol.com/emailfaq/emailfaq.html
8 David E. Sorkin, Technical and Legal Approaches to
Unsolicited Electronic Mail, 35 U.S.F. L. Rev. 325, 338 (2001).
9 See Whang, supra note 3, at 1203 n.9.
10 Id.
11 http://www.ftc.gov/ftc/consumer.htm
12 http://www.ftc.gov/bcp/conline/pubs/online/inbox.htm
13 See Sorkin, supra note 6, at 355.
14 http://www.ftc.gov/bcp/conline/pubs/general/guidetoftc.htm
15 http://www.spamlaws.com/federal/summ106.html
16 http://www.spamlaws.com/federal/summ107.html
17 H.R. 3113, 106th Cong. (2nd Sess. 2000).
18 http://www.spamlaws.com/state/summary.html
19 Del. Code Ann. §937(a).
20 Del. Code Ann. §937(b).
21 Del. Code Ann. §937(c).
22 http://www.spamlaws.com/state/summary.html
23 U.S Const. art. I, § 8, cl. 3.
24 See Gibbons v. Ogden, 22 U.S. 1 (1824), Wilson v.
Black Bird Creek Marsh Co., 27 U.S. 245 (1829).
25 H.P. Hood & Sons v. Du Mond, 336 U.S. 525, 534
(1949).
26 Id. at 533.
27 Id.
28 Bacchus Imports, Ltd. v. Dias, 468 U.S. 263 (1984).
29 Dean Milk Co. v. Madison, 340 U.S. 349 (1951).
30 Hughes v. Oklahoma, 441 U.S. 322, 337 (1979).
31 Hunt v. Washington State Apple Advertising Comm'n,
432 U.S. 333 (1977).
32 Baldwin v. G.A.F. Seeling, Inc., 294 U.S. 511 (1935).
33 397 U.S. 137 (1970).
34 Id. at 142.
35 Lamm v. Volpe, 449 F.2d 1202, 1203 (10th Cir. 1971).
36 Kelley v. Johnson, 425 U.S. 238, 247 (1976).
37 City of El Paso v. Simmons, 379 U.S. 497, 584 (1965).
38 Minnesota v. Clover Leaf Creamery Co., 449 U.S.456,
472 (1981).
39 Healy v. Beer Institute, 491 U.S. 324, 337 (1989).
40 Lewis v. BT Investment Managers., Inc., 447 U.S. 27
, 43 (1980)
41 Southern Pac. Co. v. State of Ariz. ex rel. Sullivan,
325 U.S. 761, 773 (1945).
42 There is debate over exactly how far this extraterritoriality
principle goes, and whether it is simply an outgrowth of dormant commerce
clause jurisprudence, or it also related to the Due Process and Full Faith
and Credit clauses. See Goldsmith and Sykes, The Internet and the
Dormant Commerce Clause, 110 Yale L. J. 785, 803-806 (2001).
43 969 F.Supp. 160 (1997).
44 Id. at 163.
45 Id. at 169.
46 Id. at 172.
47 Edwards v. California, 314 U.S. 160, 172-73 (1941).
48 Pataki, 969 F.Supp. at 173-74.
49 Id. at 177.
50 Id. at 178.
51 There is somewhat of a contradiction in the court's
analysis here. In the extraterritoriality analysis, the court presupposes
that the act will have real effects on out-of-state conduct, while in the
Pike balancing, the court realistically admits that New York will have
little effect on out-of-state offenders. It appears that under the
extraterritoriality analysis, it is more important to look at the potential
effects, even if in reality the challenged law will have little effect
on wholly out-of-state conduct.
52 ACLU v. Johnson, 194 F.3d 1149 (10th Cir. 1999).
53 94 Cal.Rptr.2d 453 (Cal. 2000).
54 California Penal Code section 288.2 (2000).
55 Hatch, 94 Cal.Rptr.2d at 473.
56 The court does not explicitly invoke the Pike test
by name, but includes it in its discussion of the inconsistent national
regulation argument at page 473.
57 Hatch, 94 Cal.Rptr.2d at 472.
58 Arguably, with zero burden on interstate commerce
at all, there would similarly be zero requirement for a legitimate state
interest to be served. This is academic, however, since it is impossible
to think of a state statute that could purportedly affect interstate commerce
in some manner, yet not serve some miniscule state interest.
59 Washington v. Heckel, 24 P.3d 404 (Wash. 2001).
60 Wash. Rev. Code §19.190.020 (2001).
61 Spammers will sometimes falsify the return e-mail
address to make it look as if it came from a reputable internet domain,
or include a reputable internet domain's name in the message body in the
form of an implicit endorsement.
62 Wash. Rev. Code §19.190.020 (2001).
63 Heckel used the free juno.com e-mail service to send
out his bulk mailings. When juno.com would discover that he was spamming,
they would delete that account, and Heckel would simply open a new account
up. As a result, the return e-mail addresses that Heckel used with
his messages were closed down within days, effectively making the return
e-mail address useless.
64 Heckel, 24 P.3d at 412.
65 Id.
66 Heckel, 24 P.3d at 409.
67 Heckel, 24 P.3d at 409-10.
68 Heckel, 24 P.3d at 411.
69 Ferguson v. Friendfinders, Inc., 115 Cal.Rptr.2d 258
(Cal. 2002).
70 Cal. Bus. & Prof. Code 17538.4 (2002).
71 Friendfinders, 115 Cal.Rptr.2d at 265-66.
72 Id. at 267-68.
73 Id. at 268-69.
74 Id.
75 There is an entire sub-industry devoted to anti-spam
software, including programs with such unique names as SpamCop, SpamEater,
and SpamKiller. For more on these companies, visit the webguide page
at http://www.business2.com/webguide/0,1660,66086,00.html
76 Or for that matter, users may opt to delete the non-adult
messages and only view the adult ones. Just kidding.
77 Friendfinders, 115 Cal.Rptr.2d at 266.
78 For a summary of cases in which computer use created
personal jurisdiction, see Intercon, Inc. v. Bell Atlantic Internet Solutions,
Inc. 205 F.3d 1244, 1248 (10th Cir. 2000).
79 The burdens imposed by a law such as this seem facially
apparent. When states have inconsistent subject line requirements,
and thus the same message cannot be legal in two states, e-mail senders
must know the location of each and every recipient before they can send
e-mail. Since this is essentially an impossible burden on spammers,
it should not survive a DCC challenge. If, on the other hand, the
statutes apply only to intrastate conduct, then a spammer who is a resident
of California must only concern himself with the specific California requirements,
which may or may not be consistent with those of other states.
80 The reality is that any spammer who is conscientious
enough to meet the requirements of the affirmative defense will most likely
never be sued in the first place.
81 Lorillard Tobacco Co. v. Reilly, 533 U.S. 525, 553-54
(2001).
82 447 U.S. 557 (1980).
83 For a discussion of the substantiality of the government
interest in relation to telemarketing, see Bland v. Fessler, 88 F.3d 729,
734 (9th Cir. 1996).
84 Lorillard Tobacco, 533 U.S. at 556.
85 Id.
86 This is the obscenity test from Miller v. California,
413 U.S. 15 (1973).