[go: up one dir, main page]

Dahl, 2003 - Google Patents

A Further Darkside to Unsolicited Commercial E-mail? An Assessment of Potential Employer Liability for Spam E-mail, 22 J. Marshall J. Computer & Info. L. 179 (2003)

Dahl, 2003

View PDF
Document ID
121304448538732590
Author
Dahl B
Publication year
Publication venue
UIC John Marshall Journal of Information Technology & Privacy Law

External Links

Snippet

This article looks at employer liability for pornographic spam in the workplace. It begins with an analysis of the risks and unique problems posed by employees' Internet use while at work. The article makes note of some trouble areas where employers may be held …
Continue reading at repository.law.uic.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/12Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • H04L12/585Message switching systems, e.g. electronic mail systems with filtering and selective blocking capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • H04L12/5885Message switching systems, e.g. electronic mail systems with provisions for tracking the progress of a message
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • H04L12/5855Message switching systems, e.g. electronic mail systems with selective forwarding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • H04L12/5825Message adaptation based on network or terminal capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/14Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with selective forwarding
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/107Computer aided management of electronic mail
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/26Prioritized messaging
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it

Similar Documents

Publication Publication Date Title
O’Regan Hate speech online: an (intractable) contemporary challenge?
Halder et al. Cyber gender harassment and secondary victimization: A comparative analysis of the United States, the UK, and India
Sallavaci Crime and social media: Legal responses to offensive online communications and abuse
Hawley Taking spam out of your cyberspace diet: common law applied to bulk unsolicited advertising via electronic mail
Flynn Instant messaging rules: A business guide to managing policies, security, and legal issues for safe IM communication
Dahl A Further Darkside to Unsolicited Commercial E-Mail-An Assessment of Potential Employer Liability for Spam E-Mail
Dahl A Further Darkside to Unsolicited Commercial E-mail? An Assessment of Potential Employer Liability for Spam E-mail, 22 J. Marshall J. Computer & Info. L. 179 (2003)
Farrell The big mamas are watching: China's censorship of the Internet and the strain on freedom of expression
Lugaresi European Union vs. Spam: A Legal Response.
Grossman Keeping unwanted donkeys and elephants out of your inbox: the case for regulating political spam
Lueg Information dissemination in virtual communities as challenge to real world companies
Oriola Regulating unsolicited commercial electronic mail in the United States and the European Union: challenges and prospects
McNealy Spam and the first amendment redux: Free speech issues in state regulation of unsolicited email
McKeen et al. Developments in Practice XIII Electronic Communications: Strategies for Coping with the Deluge
Chigona et al. Perceptions on SPAM in a South African context
Gaskin Internet acceptable usage policies
Mika The benefit of adopting comprehensive standards of monitoring employee technology use in the workplace
Marchewka et al. Perceptions of unsolicited electronic mail or spam
Fasano Getting Rid of Spam: Addressing Spam in Courts and in Congress
Naidoo et al. Unpacking Cybersecurity Trends
Smith Robocalls Have Been Blocked, but Business Can-Spam Emails with Little Regulation
Alkahtani et al. Email SPAM Related Issues and Method of Controlling Used by Internet Service Providers [ISPs] in Saudi Arabia
Bower Make It Stop or I'll Sue: The Feasibility of a Hostil Work Environment Claim Created by Sexually Explicit Spam
Buerck et al. Ethical dimensions of spam
Fanning et al. Are you safe from son of spam?