[go: up one dir, main page]

McNealy, 2017 - Google Patents

Spam and the first amendment redux: Free speech issues in state regulation of unsolicited email

McNealy, 2017

Document ID
416601103805306963
Author
McNealy J
Publication year
Publication venue
Communication Law and Policy

External Links

Snippet

The scourge of email spam is almost forty years old, and, yet, it does not appear to be disappearing. In fact, spam has expanded to other ubiquitous Internet platforms including social media Web sites. It seems, then, that the many state anti-spam statutes have been …
Continue reading at www.tandfonline.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/107Computer aided management of electronic mail
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • H04L12/585Message switching systems, e.g. electronic mail systems with filtering and selective blocking capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/12Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/02Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
    • G06Q30/0241Advertisement
    • G06Q30/0251Targeted advertisement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic

Similar Documents

Publication Publication Date Title
Kerr A User's Guide to the Stored Communications Act, and a Legislator's Guide to Amending it
Bakalis Rethinking cyberhate laws
McGoldrick The limits of freedom of expression on Facebook and social networking sites: a UK perspective
Candeub Reading Section 230 as written
Kelin State Regulation of Unsolicited Commercial E-Mail
Magee The law regulating unsolicited commercial e-mail: an international perspective
McNealy Spam and the first amendment redux: Free speech issues in state regulation of unsolicited email
Batiste-Boykin In re Google Inc.: ECPA, Consent, and the Ordinary Course of Business in an Automated World
Oriola Regulating unsolicited commercial electronic mail in the United States and the European Union: challenges and prospects
Black Facebook and the future of fair housing online
McDonald Defamation in the Internet Age: Why Roomates. com Isn't Enough to Change the Rules for Anonymous Gossip Websites
Smith Robocalls Have Been Blocked, but Business Can-Spam Emails with Little Regulation
Armond State Internet Regulation and the Dormant Commerce Clause
Simon The CAN-SPAM Act of 2003: Is Congressional regulation of unsolicited commercial e-mail constitutional
Rozenshtein et al. Beyond the Editorial Analogy: First Amendment Protections for Platform Content Moderation After Moody v. NetChoice
Huh Invasion of privacy v. commercial speech: Regulation of spam with a comparative constitutional point of view
Reidenberg et al. Section 230 of the Communications Decency Act: A Survey of the Legal Literature and Reform Proposals
Mehta A New SCA Framework to Unclothe the Business Model Attack
Jungman You've got libel: How the can-spam act delivers defamation liability to spam-fighters and why the First Amendment should delete the problem
Chigona et al. Perceptions on SPAM in a South African context
Zentner State Regulation of Unsolicited Bulk Commercial E-mail and the Dormant Commerce Clause
Poullet et al. Data Protection and Privacy in Global Networks: A European Approach... Meda Conference, Athens, 25 April 2001
Lavi Sharing" Bad Shaming" on Social Networks
Marino Is Spam the Rock of Sisyphus: Whether the Can-Spam Act and Its Global Counterparts Will Delete Your E-mail
Bepko A State-by-State Comparison of Spam Laws