Dahl, 2003 - Google Patents
A Further Darkside to Unsolicited Commercial E-mail? An Assessment of Potential Employer Liability for Spam E-mail, 22 J. Marshall J. Computer & Info. L. 179 (2003)Dahl, 2003
View PDF- Document ID
- 121304448538732590
- Author
- Dahl B
- Publication year
- Publication venue
- UIC John Marshall Journal of Information Technology & Privacy Law
External Links
Snippet
This article looks at employer liability for pornographic spam in the workplace. It begins with an analysis of the risks and unique problems posed by employees' Internet use while at work. The article makes note of some trouble areas where employers may be held …
- 230000001568 sexual 0 abstract description 60
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/12—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/585—Message switching systems, e.g. electronic mail systems with filtering and selective blocking capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/5885—Message switching systems, e.g. electronic mail systems with provisions for tracking the progress of a message
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/5855—Message switching systems, e.g. electronic mail systems with selective forwarding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/5825—Message adaptation based on network or terminal capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/14—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with selective forwarding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/107—Computer aided management of electronic mail
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/26—Prioritized messaging
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/436—Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| O’Regan | Hate speech online: an (intractable) contemporary challenge? | |
| Halder et al. | Cyber gender harassment and secondary victimization: A comparative analysis of the United States, the UK, and India | |
| Sallavaci | Crime and social media: Legal responses to offensive online communications and abuse | |
| Hawley | Taking spam out of your cyberspace diet: common law applied to bulk unsolicited advertising via electronic mail | |
| Flynn | Instant messaging rules: A business guide to managing policies, security, and legal issues for safe IM communication | |
| Dahl | A Further Darkside to Unsolicited Commercial E-Mail-An Assessment of Potential Employer Liability for Spam E-Mail | |
| Dahl | A Further Darkside to Unsolicited Commercial E-mail? An Assessment of Potential Employer Liability for Spam E-mail, 22 J. Marshall J. Computer & Info. L. 179 (2003) | |
| Farrell | The big mamas are watching: China's censorship of the Internet and the strain on freedom of expression | |
| Lugaresi | European Union vs. Spam: A Legal Response. | |
| Grossman | Keeping unwanted donkeys and elephants out of your inbox: the case for regulating political spam | |
| Lueg | Information dissemination in virtual communities as challenge to real world companies | |
| Oriola | Regulating unsolicited commercial electronic mail in the United States and the European Union: challenges and prospects | |
| McNealy | Spam and the first amendment redux: Free speech issues in state regulation of unsolicited email | |
| McKeen et al. | Developments in Practice XIII Electronic Communications: Strategies for Coping with the Deluge | |
| Chigona et al. | Perceptions on SPAM in a South African context | |
| Gaskin | Internet acceptable usage policies | |
| Mika | The benefit of adopting comprehensive standards of monitoring employee technology use in the workplace | |
| Marchewka et al. | Perceptions of unsolicited electronic mail or spam | |
| Fasano | Getting Rid of Spam: Addressing Spam in Courts and in Congress | |
| Naidoo et al. | Unpacking Cybersecurity Trends | |
| Smith | Robocalls Have Been Blocked, but Business Can-Spam Emails with Little Regulation | |
| Alkahtani et al. | Email SPAM Related Issues and Method of Controlling Used by Internet Service Providers [ISPs] in Saudi Arabia | |
| Bower | Make It Stop or I'll Sue: The Feasibility of a Hostil Work Environment Claim Created by Sexually Explicit Spam | |
| Buerck et al. | Ethical dimensions of spam | |
| Fanning et al. | Are you safe from son of spam? |