The New Can-Spam Act and Attorney Communications Avoiding the Ethical Traps TABLE OF CONTENTS I. Biographies a. b. c. d. e. Daniel Appelman L. Elizabeth Bowles William R. Denny Michael Fleming Henry L. Judy II. What Every Attorney Should Know About Spam By L. Elizabeth Bowles III. Electronic Communication by Lawyers: Navigating the Intersection of the Ethics Rules and the CAN-SPAM Act of 2003 By William R. Denny IV. Ethics and Can-Spam – PowerPoint Presentation V. The Can-Spam Act of 2003 (Available on CD-Rom) Menlo Park DIRECT: (650) 324-6706 FAX: (650) 324-0638 [email protected] Daniel L. Appelman, Shareholder Intellectual Property Transactions Corporate Securities, M&A Venture Law Group Life Sciences Technology Private Equity Daniel Appelman joined Heller Ehrman in 1988. He is a member of the firm’s Life Sciences & Technology National Practice Group, as well as the Corporate Securities, M&A National Practice Group; and he was the founding co-chair of the firm’s technology practice. EXPERIENCE Mr. Appelman's practice focuses on complex technology-related transactions and strategic alliances, particularly in the semiconductor, networking, software, telecommunications, electronic commerce and Internet areas; and also in biotechnology, bioinformatics and medical devices. He has over twenty years of experience representing both early stage and established companies in licensing, joint ventures, technology transfers, outsourcing, system acquisitions and other commercial and strategic transactions in the United States and abroad and in establishing intellectual property rights related to their inventions. He also counsels clients on emerging legal and regulatory compliance issues, including privacy, export control, data security and digital content rights management. Mr. Appelman has published articles on computer and telecommunications law and the law of electronic commerce, and he has frequently lectured on legal developments in those fields. He currently serves as chair of the California State Bar’s Cyberspace Law Committee and as an Advisory Member of the Entrepreneurs Forum of the Haas School of Business at the University of California at Berkeley. L. Elizabeth Bowles President, Aristotle.Net Inc. Elizabeth Bowles became President of Aristotle.Net Inc. in June of 2003. She is responsible for the company’s direction and vision, as well as constructing its business plan. Prior to becoming president, Elizabeth served as Vice President and General Counsel of Aristotle, Inc. In that capacity, she represented Aristotle in all legal, intellectual property/technology matters, and contract negotiations. Elizabeth has been integral in the development of Aristotle’s business relationships, including partnerships, investments, and joint ventures. Elizabeth also served as a Web site consultant and client manager for a number of Aristotle Inc.’s larger clients, including Elvis Presley Enterprises, Stephens Inc., and Brinker International (Macaroni Grill and Chili’s). Elizabeth graduated summa cum laude with a 4.0 G.P.A. from the University of Arkansas at Little Rock with a B.A. in International Studies. Elizabeth went on to receive her Doctorate of Jurisprudence from the Vanderbilt University School of Law in 1993, where she was first in her class. She was awarded the Founder’s Medal for the Class of 1993 and graduated Order of Coif. She served as Special Project Editor of the Vanderbilt Law Review, was a member of the 1993 champion National Moot Court Team, and served as Executive Editor for the Vanderbilt International. Elizabeth received the top score on the Arkansas Bar Exam in 1993. Following law school, Elizabeth clerked for Richard S. Arnold, then Chief Judge of the United States Court of Appeals for the Eighth Circuit. Following her judicial clerkship, she was an attorney with the Washington, D.C. law firm Arnold & Porter, where she practiced in the fields of intellectual property and commercial litigation with an emphasis on international and technology law. Elizabeth is licensed to practice law in Washington, D.C. and Arkansas, as well as before the Supreme Court of the United States and a number of U.S. Courts of Appeals. L. Elizabeth Bowles Biography 1 Last Update 7/8/2004 William R. Denny, Partner (302) 984-6039 Email Background Born in Charlottesville, Virginia, January 11, 1961. Admitted to bar 1988, Delaware. Education: Princeton University (AB, cum laude, 1983), History and Russian Studies; Helsinki University; University of Virginia School of Law (J.D., 1987). Member: Delaware State and American Bar Associations; Computer Law Association; Christian Legal Society. Areas of Practice Mr. Denny practices primarily in the areas of electronic commerce, information licensing, and commercial litigation. Mr. Denny has represented both public and privately held companies in a wide range of technology and intellectual propertyrelated transactions, including outsourcing of IT services, mergers and acquisitions, technology licensing, sales of Internet domain names, and the development of ecommerce on Web sites. His clients include major licensees of information technology as well as Internet service providers, software developers and system integration service providers. Mr. Denny's litigation experience includes litigating disputes over the interpretation and enforcement of liability insurance contracts and software licenses in both federal and state courts, and litigating preference, turnover and fraudulent conveyance actions in bankruptcy court. Mr. Denny has tried jury and non-jury cases in federal and state trial and appellate courts, before arbitration panels, and by use of other alternative dispute resolution techniques. Recent Activity In 1997, Mr. Denny successfully represented a major Fortune 100 corporation in a two month jury trial over insurance coverage for mass-tort product claims. In that case, the jury returned all special verdicts in favor of the corporation, on issues of trigger of coverage and numerous insurance policy defenses. In 1998 and 1999, Mr. Denny represented several major corporations in complex-multi-party mediation over insurance coverage for mass-tort claims involving pharmaceutical products. The mediation resulted in the successful resolution of numerous issues outside of litigation. More recently, Mr. Denny has represented major corporations seeking to recover their Year 2000 remediation costs from their property insurance carriers. Mr. Denny has counseled dozens of clients on issues relating to the Year 2000 computer problem. These issues have included review of legal liability issues and updating of standard contract provisions, assessment and remediation of noncompliant computer systems, information sharing and risk allocation among supply chain business partners, insurance coverage review, and development of contingency plans. Publications & Seminars "Electronic Contracting in Delaware: E-Sign and UETA", Delaware Law Review, Winter 2001 "E-Sign, UETA and UCITA," Advanced Computer and Internet Law Institute, sponsored by Georgetown University Law Center, March 8-9, 2001 "El t i Si t i C b l i " ABS th W b S iti ti Technology and the Internet, sponsored by Strategic Research Institute, March 5-6, 2001 "The ABCs of UCITA," E-Commerce Law Institute, Vail, CO, sponsored by Law Education Institute, Inc., January 10-15, 2001 "Legal Status of Electronic Contracting Under New Federal and State Law," ECommerce: The Law of E-Business, sponsored by CLE International, May 8-9, 2000 "Limiting Vicarious Liability for Employee Fraud," Protecting Electronic Information, Economic Crime Investigation Institute Tenth Annual Conference, Nov. 1999 "The Year 2000 in the Delaware Corporate Boardroom," Andrews Year 2000 Law Bulletin, Sept. 1999, co-authored with Gregory A. Inskip and Peter J. Walsh, Jr. "The Year 2000 In Delaware — A Legal Forecast," Mealey's Year 2000 Law Reporter, Vol. 2, No.4, May 1999, co-authored with Gregory A. Inskip and Laurie S. Silverstein. "Vendor Compliance Issues and Insurance Coverage Issues Related to the Millennium Bug", New Castle County Chamber of Commerce Business Technology Conference, April 21, 1999. "Online Issues in Corporate Law: The Impact of New Technology on Investor Relations", Tulane Corporate Law Institute, March 4-5, 1999, co-authored with Michael D. Goldman, Michael A. Pittenger, and Eileen M. Filliben. "Update on Coverage Claims Arising From Recent Underlying Liabilities: Fen-Phen", Mealey's Conference on Emerging Insurance Battles, March 1-2, 1999, co-authored with Richard L. Horwitz. "Insurance Coverage for Year 2000 Losses", Delaware State Bar Association Seminar: Year 2000 Litigation in Delaware Courts, February 24, 1999. "Insurance Claims and Litigation", Delaware State Bar Association Seminar: Year 2000: Beyond the Hype, February 5, 1999. "Introduction to Year 2000 Legal Issues", Delaware State Bar Association Seminar: Technology and the Law, January 19, 1999. "UCC Update: Recent Case Developments and Code Revisions, Overview of Proposed UCC Article 2B", Johnson Controls, Inc. Seminar, Milwaukee, WI, September 23, 1998. "The Year 2000 Crisis: Practical Issues Affecting Business", Delaware State Chamber of Commerce Business Journal, March 1998. "The State of Contract Law and Intellectual Property Law on the Internet", Delaware State Bar Association Seminar on Computer Technology Issues, December 6, 1996, co-authored with William J. Marsden, Jr. "Internet and On-Line Transactions: Access Contracts Under Current Law And Under The Proposed UCC Article 2B", ABA Annual Meeting, Orlando, FL, June 27, 1996. P f i l Withi th ABA M D i Vi Ch i f th ABA B i S ti ' S b itt Activities and Affiliations on Information Licensing. He has been an active participant at meetings of the National Conference of Commissioners on Uniform State Laws relating to the drafting of the Uniform Computer Information Transactions Act (UCITA). Mr. Denny was the Chair of the Delaware State Bar Association's Joint Task Force to review UCITA and the Uniform Electronic Transactions Act, which resulted in the Delaware State Bar Association's endorsement of both uniform acts. He serves as Chair of the Delaware State Bar Association Computer Law Section and has served as Co-Chair of the DSBA Committee on Professional Ethics. Mr. Denny is fluent in Finnish and has a reading knowledge of Russian. Michael F. Fleming FAEGRE & BENSON LLP Michael Fleming practices in Faegre & Benson’s intellectual property and information technology transactions groups. Michael was formerly the primary corporate counsel for intellectual property, advertising and marketing, in-store risk management, e-commerce and information technology at The Musicland Group, Inc., a Twin Cities based national retailer. Technology Transactions and Electronic Commerce. Michael’s primary practice concerns assisting his clients in their licensing – as buyers or as vendors – of business technology systems. This ranges from drafting form software license agreements for off-the-shelf licensors, to the negotiation of a complex contract for a new customdeveloped system, to the development of an outsourcing program for a primary business function. Many of his clients use his expertise in specialized industries such as financial institutions and health care, which both have heightened concerns over data privacy and security as well as liability issues. Those same issues are not just limited to banks and hospitals, but have also become issues for nearly every employer, retailer and general business – and Michael also looks for places to apply knowledge from the specialized industries to help his other clients as well. Michael has also assisted businesses as part of the firm’s merger and acquisition team, assisting in the assessment of a company’s intellectual property assets and the negotiations concerning the terms of sale of those assets. Michael advises operators of Web sites, Internet Service Providers, hosting services, application services providers and other electronic commerce outlets. Issues include advertising and marketing practices, privacy policies, sales terms and warranty policies, Digital Millennium Copyright Act enforcement and response, privacy-brand affiliations and memberships, and linking and referral fee agreements. He has also advised on volatile electronic commerce legal issues such as patent disputes, digital downloading, e-mail marketing and anti-spam laws, telemarketing, data privacy and data sharing, sales taxes, and commercial e-mail marketing. In 2003, Michael was appointed as co-chair of the subcommittee on Corporate Aspects of Information Technology, a part of the Cyberspace Law Committee of the American Bar Association. Through “CAIT,” Michael has joined with attorneys from around the country and the world to develop commentary and practice recommendations for businesses that use technology – such as electronic contracting, privacy and data security, and IT purchasing. Michael served as Adjunct Professor at William Mitchell College of Law from 2001-2003, teaching subject matter relating to his technology practice. Other Practice Areas. Michael also advises retail and institutional clients on marketing and advertising issues, ranging from advice on a corporate advertising compliance program to spotchecking particular advertising issues. Michael has advised many clients on how to set up sweepstakes and contests that are compliant with the arcane laws in that area. continued FAEGRE & BENSON LLP MICHAEL FLEMING Michael continues to advise clients in the retail business, including vendor contracts, in-store marketing, intellectual property compliance programs, payment-tender methods such as credit cards, debit cards and stored-value cards (gift cards), unclaimed property and, private branding. Michael also maintains an active practice in the entertainment law field. He has managed legal and business affairs for a small record label, has advised on the emerging fields of digital music distribution over the Web, and also assists musical artists, composers and producers with their needs. Publications: n n n n n n n n Publication update – DMCA Safe Harbors May Require Careful - If Not Strict - Compliance Media Law Resouces Center MediaLaw Letter (2004) Sarbanes-Oxley and IT: Beware of Magic Bullet Solutions Trends (Faegre & Benson) (2003) Technology Toys for Attorneys: A Means to Ethical Violations? Hennepin Lawyer (2002) Have You Built Advertising Law into Your Web Site? Intellectual Property Counselor Issue No. 58 (2001) How to Prepare for Electronic Discovery Before the Lawsuit Arrives Hennepin Lawyer (2000) The Question That Nobody Wants Answered: Would a Government Mandated Entertainment Ratings Systems Pass Constitutional Muster? MSBA CLE Arts and Entertainment Section (2000) Non Traditional Revenue Sources and Pitfalls for the Musical Artist MSBA CLE Arts and Entertainment Section (1999) The Compilation CD, a ’How To’ Primer MSBA CLE Arts and Entertainment Section (1998) Speeches: n n n n n A Legal Checklist for Your Advertising Campaign Minnesota CLE (Advertising Law), Minneapolis (2004) CAN-SPAM – A Compliance Program for Law Firms American Bar Association Annual Meeting, Atlanta (2004) Privilege in Peril: Avoiding Inadvertent Waiver Through Use of Technology (Panel Presentation) BNA Electronic Discovery, New York, NY (2003) Minnesota’s New Anti-Spam and Internet Privacy Statutes Minnesota CLE (Computer Law), Minneapolis (2002) “Oops – I Did It Again” – Use of Technology in Legal Practices (Panel Presentation) American Bar Association Annual Meeting, Washington, DC (2002) PAGE TWO FAEGRE & BENSON LLP MICHAEL FLEMING n n n n n n n n n P3P - A New Privacy Technology for Web Site Operators MILE (Electronic Commerce), Minneapolis (2001) Advertising Law for Web Site Operators, Speaker and Co-Chair MILE (Advertising Law) (2001) Hot Spots in Software and Technology Contracts Defense Research Institute, Chicago, Ill (2001) ASP Contracting Issues American Bar Association, Business Law Section, Philadelphia, PA (2001) Electronic Discovery-Corporate Preparation American Bar Association, Litigation Section, Orlando, FL (2001) New Business Models for Affiliate Marketing Minnesota CLE (E-Commerce), Minneapolis (2001) The Merger of Clicks and Bricks (Legal Issues for E-tailing by Traditional Retailers) Minnesota CLE (E-Commerce), Minneapolis (2000) An In-House Perspective On Electronic Discovery Glasser Legal Seminars, Chicago, San Francisco (2000) Digitally Downloaded Music Business Models and Issues MILE (Electronic Commerce), Minneapolis (2000) Professional and Trade Associations: n n American Bar Association; Business Law Section (Cyber-Space Law Committee) Chair, Subcommittee on Corporate Aspect of Information Technology (2003 ) Minnesota State Bar Association, Arts & Entertainment Law Section, Chairman (20012002); Vice Chairman (1999-2001; Secretary (1997-1999) Media Mentions: n n Minneapolis Star Tribune, “California’s New Anti-Spam Law” (October 25, 2003) Upsize Magazine, “Federal Do Not Call Statute” (October, 2003) FAEGRE & BENSON LLP PAGE THREE MICHAEL FLEMING Admitted to Practice (State): n Minnesota Practice Areas: n Intellectual Property n Information Technology and Technology Outsourcing n Advertising and Marketing n Retail n E-Commerce n Entertainment Education: n B.A., University of Minnesota (1987) n J.D., William Mitchell College of Law (1992), magna cum laude 041704v1 FAEGRE & BENSON LLP Michael F. Fleming Direct Dial 612.766.6920 90 South Seventh Street Minneapolis, Minnesota 55402-3901 Telephone 612.766.7000 Facsimile 612.766.1600 www.faegre.com E-mail [email protected] PAGE FOUR FAEGRE & BENSON LLP Henry L. Judy Of Counsel AREAS OF PRACTICE WASHINGTON OFFICE 1800 Massachusetts Ave., N.W. 202.778.9032 TEL 202.778.9100 FAX [email protected] Advises clients on a wide range of corporate, commercial and financial law matters, as well as Federal and state securities, legislative and regulatory matters, with a particular emphasis on financial institutions, housing finance and technology and e-commerce law. Legislative and regulatory practice emphasizes issues affecting the structure and regulation of financial services firms. Technology and e-commerce practice emphasizes all aspects of electronic commerce law, including federal, state and global privacy and information security law. Privacy and information security practice focuses on financial services and web-based enterprises. Provides counsel to the firm with respect to its own technology contracting. PROFESSIONAL BACKGROUND Committee on Banking Law and Committee on Cyberspace Law, Section of Business Law, American Bar Association Computer Law Association International Bar Association PROFESSIONAL/CIVIC ACTIVITIES Co-Chair, Program and Publications Subcommittee, ABA Cyberspace Law Committee Advisory Board, Shidler eJournal of Law, Commerce and Technology, Shilder Center for Law, Commerce and Technology, University of Washington Law School Editorial Advisory Board, Electronic Banking Law and Commerce Report Co-chair, ABA Cyberspace Law Committee Task Force on Online Alternative Dispute Resolution Co-Chair, Working Group on Financial Services, ABA Report on the Global Jurisdiction Issues of the Internet—“Achieving Legal and Business Order in Cyberspace” Federal Home Loan Mortgage Corporation, Executive Vice President and General Counsel Federal Home Loan Bank Board, Deputy General Counsel, Associate General Counsel and Assistant General Counsel Savings Institutions and Mortgage Lending Committee - Section of Business Law International Bar Association, Past Chairman U.S. Securities and Exchange Commission, Administrative Officer, Division of Trading and Markets Frequent lecturer at trade association and professional association conferences BAR MEMBERSHIP District of Columbia Maryland EDUCATION J.D., Georgetown University Law Center, 1968 A.B. (Classical), Georgetown University, 1961 (Woodrow Wilson Fellow) Kirkpatrick & Lockhart LLP Henry L. Judy Graduate work in History and Economics, Cornell and George Washington Universities Program for Management Development, Harvard Business School, 1980 SELECTED PUBLICATIONS AND PRESENTATIONS Articles Records Management of E-Mail by Securities Firms: Legal Compliance Technology Issues, Wall Street Lawyer, by Henry L. Judy, Benjamin S. Hayes. October 2002. Emerging Trends in International Privacy Law, Emory International Law Review, by Jeffrey B. Ritter, Benjamin S. Hayes, Henry L. Judy. April 1, 2001. Between a Rock and an Unsafe Harbor-Options for Compliance with the EU Data Protection Directive, Electronic Banking Law and Commerce Report, by Henry L. Judy, Benjamin S. Hayes. March 2001. The ABA’s Project on Jurisdiction and the Internet: Banking and Payment Systems, Electronic Banking Law and Commerce Report, by Henry L. Judy. December 2000/January 2001. Books Privacy, Computer Security Handbook, by Jeffrey B. Ritter, Henry L. Judy, Benjamin S. Hayes. October 1, 2001. Client Alerts/Updates Standard Contract Clauses under the EU Data Protection Directive, Electronic Commerce Alert, by Henry L. Judy, Benjamin S. Hayes, Jeffrey B. Ritter. February 26, 2001. Presentations Homeland Security, Information Security and New Technologies, Financial technology Forum, February 2003 Emerging Trends in Global Privacy Law, presented to The International Information Integrity Institute, June 21, 2000, by Jeffrey B. Ritter, Benjamin S. Hayes, Henry L. Judy. June 2000. OTHER Served as artillery officer in US Army; awarded Army Commendation Medal. Married; three children. What Every Attorney Should Know About Spam L. Elizabeth Bowles President Aristotle.Net Inc. May 2004 When the exciting potential of the Internet was just being discovered, no one dreamed that one day the phrase “You’ve got mail!” would come to mean “You’ve got spam (and lots of it).” Today over 60% of e-mail received in consumers’ inboxes is spam, more formally known as unsolicited commercial e-mail (UCE).1 And this percentage keeps growing. Annoying, bothersome, irritating, distracting, and expensive, spam cost U.S. businesses almost 10 billion dollars last year. Consumers hate it, ISPs pay for it, and businesses lose time and productivity over it. Spam threatens to bring to a screeching halt the Internet (and e-mail) as we know it. What is Spam? The FTC defines spam as any “unsolicited commercial e-mail,”2 and this is also the commonly understood definition of spam. This is what consumers mean when they discuss spam, what ISPs refer to when they filter spam, and what businesses are opposed to when it comes to spam.3 The vast bulk of spam coming into mailboxes today is financial in nature and from legitimate institutions (for example, home loan rates), but unsolicited.4 Non-fraudulent marketing efforts (not including pornography) account for 77% of the spam volume today.5 1 State v. Heckel, 143 Wash.2d 824, 24 P.3d 404 (2001), for a definition of UCE. 2 “You’ve Got Spam: How to ‘Can’ Unwanted E-mail,” FTC FACTS for Consumers. 3 Some businesses that mine their customer databases would like to alter that definition of spam to include only those unsolicited e-mails that are fraudulent. (“Spam White Paper,” Internet Alliance at p.4.) The Internet Alliance is a trade association that represents Internet companies active in the business to consumer channel. Its salaries are paid by the Direct Marketers Association. Defining spam to include only fraudulent e-mail does not resolve the problem most consumers and businesses are facing. In fact, only 5% of the UCE received by Internet users is fraudulent; therefore, limiting the definition to fraudulent email would do little to help consumers, businesses, or ISPs staunch the flood of spam. 4 Brightmail, “The State of Spam Impact and Solutions.” Jan. 2003. 5 Id. 1 A Little History Why is UCE called “spam?” Blame the lawyers. In 1994, two Phoenix lawyers hired a programmer to write code to send a message to every newsgroup on USENET concerning their services in a United States green card lottery. Each of the thousands of newsgroups, and therefore each member of each newsgroup, received the message. These tens of thousands of participants started calling the commercial message “spam” in honor of the famous SPAM® skit by the British comedy troupe Monty Python. In this skit, every menu item included SPAM® luncheon meat, whether or not the customer wanted it.6 The term “spam” has now come to mean something that a person has not asked for but that nonetheless annoys by repeating and repeating.7 What is Not Spam Spam is unsolicited commercial e-mail, which means that the e-mail must be both commercial in nature and unsolicited in order to qualify. A newsletter distributed by a company to those who request it is not spam because such e-mail is not unsolicited. Unsolicited e-mails sent by individuals as a form of personal communication are not spam because they are not commercial. The gray area, email sent to customers with whom a business has an on-going commercial relationship, may be both unsolicited and commercial but should not rise to the level of spam so long as the recipient has the opportunity to prevent further unsolicited email communications through a valid unsubscribe mechanism. 6 7 2 Graham Chapman et al., The Complete Monty Python's Flying Circus: All the Words 27 (Pantheon Books 1989). When the waitress explained the menu, a group of Vikings (don't ask) in the corner started singing: "Spam, spam, spam, spam, spam, spam, spam, spam, lovely spam! Wonderful spam!" Hormel Foods Corporation, which debuted its SPAM® luncheon meat in 1937, no longer objects to the use of spam to refer to UCE, and even has its own website, www.spam.com. Laurie J. Flynn, Gracious Concession on Internet "Spam," N.Y. Times, Aug. 17, 1998, at D3. 2 The Trouble with Spam So what is the scope of the problem? According to Brightmail, an anti-spam filter provider, nearly 40% of the e-mail received by U.S. inboxes in 2002 was spam. In the first quarter of 2003, this figure had risen to 45%.8 Currently spam accounts for more than 60% of the total volume of e-mail in the United States.9 The amount of spam coming through ISPs, however, can be even higher in spite of blocking software and other solutions that stem some of the flow.10 This is well over 80 billion individual pieces of e-mail, and the quantity of spam keeps growing.11 As a result, spam is much more than just an annoyance; it cost Internet Service Providers and other American businesses $10 billion in 2003.12 This amounts to $14 per user per month.13 As for the senders, spam is a good deal. Unlike junk mail (the U. S. Postal Service counterpart to spam) UCEs cost very little to send.14 The fact that spam is so inexpensive means that there is little incentive for unscrupulous marketers to ensure that the lists they are using are verified or to limit in any way the 8 http://www.nytimes.com/2003/04/22/technology/22SPAM.html. 9 Brightmail, Feb. 2004. See www.brightmail.com. 10 AOL estimates that over 70% of the mail its customers receive is spam. Id. 11 Brightmail, “The State of Spam Impact and Solutions.” Jan. 2003. 12 http://www1.internetwire.com/iwire/release_html_b1?release_id=49906. 13 http://www1.internetwire.com/iwire/release_html_b1?release_id=49906. Ferris research arrived at this figure by assuming that spam accounts for 20 percent of all in-bound corporate email and 30 percent of all ISP in-bound email; however, Brightmail estimates this percentage to be much higher – closer to 40 percent of corporate and up to 60 percent of all ISP in-bound mail – with resulting higher costs to businesses and ISPs. 14 The microscopic cost of sending e-mail, compared with the price of postal mailings, allows senders to make money on products bought by as little as one recipient for every 100,000 e-mail messages. Internet marketing companies typically charge $500 to $2,000 to send a solicitation to a million in-boxes, but the cost goes up if the list is from a reputable source or is focused on people in certain favored demographic groups. Sending the same offer to a million people by mail costs at least $40,000 for a list, $190,000 for bulk-rate postage and more for paper and printing. 3 transmission of UCE.15 There is every incentive for even scrupulous marketers to milk their mailing lists through repeated mailings to the same e-mail addresses and by selling or renting the list to “affiliates” or other marketing companies. Some marketers go so far as to use spam to advertise spam blockers or advertise spam blockers on their unsubscribe pages. The courts have also recognized the cost of spam to both businesses and ISPs. In addressing the cost to business, a Pennsylvania court stated Unwanted e-mail creates other burdens. Mass advertising by e-mail is virtually free. Thus, recipients may be receiving on a daily basis large numbers of unwanted e-mail. This means that recipients may be required to spend substantial time sorting, reading, and deleting unwanted e-mail. In many instances, an e-mail cannot be deleted without examining the text of the message because the sender uses a vague or misleading subject line. Unwanted e-mail may preclude a business from promptly responding to desired e-mail because of the time spent deleting unwanted e-mail. Internet service providers incur substantial expenses (that are eventually passed on to their customers) caused by the volume of unsolicited e-mail, including the need for additional bandwidth, additional storage, and additional staff.16 The Washington Supreme Court recently addressed the attendant harm to ISPs: To handle the increased e-mail traffic attributable to deceptive spam, ISPs must invest in more computer equipment. Operational costs likewise increase as ISPs hire more customer service representatives to field spam complaints and more system administrators to detect accounts being used to send spam.17 15 An e-mail list is verified when each recipient on the list has expressly indicated that he or she wants to receive the marketing message and has confirmed this preference in subsequent dealings with the marketer. 16 Aronson v. Bright-Teeth Now, L.L.C., 2002 WL 1466477, 57 Pa. D. & C.4th 1, 2 (Pa. Com. Pl. 2002). 17 State v. Heckel, 143 Wash.2d 824, 834, 24 P.3d 404, 410 (2001), citing CompuServe Inc. v. Cyber Promotions, Inc., 962 F.Supp. 1015, 1022 (S.D.Ohio1997). See also Am. Online, Inc. v. IMS, 24 F.Supp.2d 548, 550 (E.D.Va.1998) (finding that a bulk e-mailer injured AOL’s business goodwill and diminished the value of its possessory interest in its computer network.) 4 Another significant issue is the sheer volume of spam.18 In April of 2001, Aristotle installed a commercial spam filtering system in an attempt to staunch the flood of spam into its customers’ inboxes. In February of 2002, the filter trapped 1,340,885 pieces of spam, approximately 35% of Aristotle’s total mail volume. By January of 2003, this number had jumped to 6,092,414 pieces of spam – close to 60% of Aristotle’s total mail volume. Currently, 80% or more of the servers attempting to send mail to Aristotle customers have mail streams that are 100% spam. Even those that are not 100% spam contain a significant percentage of spam, and streams that have no spam whatsoever comprise less than 5%. Spam continues to increase at a rate of 5-10% a month.19 The Cold Chill of Spam Spam clearly creates substantial costs to businesses, ISPs, and to the Internet itself, but perhaps the greatest cost of spam is its chill on the free speech rights of legitimate Internet users. The overwhelming volume of spam causes users 18 To understand the impact of the increasing volume of spam, it is useful to understand the process. The United States District Court, E.D. Virginia recently explained the process as follows: To send or receive e-mail to or from other Internet users, one must obtain Internet access through an ISP. See generally, Anne E. Hawley, Comment, Taking Spam Out of Your Cyberspace Diet: Common Law Applied to Bulk Unsolicited Advertising Via Electronic Mail, 66 UMKC L.REV. 381, 683 (1997)(discussion of e-mail basics). An ISP operates a computer communication service through a proprietary network. In addition to allowing access to the content available within its own network, an ISP provides its subscribers with a doorway to the Internet. Subscribers use the ISP's domain name, e.g., "verizon.net," together with their own personal identifier to form a distinctive e-mail mailing address, e.g., "[email protected]." The subscriber's e-mail address is used to send and receive e-mail from other Internet users throughout the world. An e-mail address does not contain any geographic designation, nor does it correspond to any geographic location. The ISP subscriber can retrieve her e-mail using any computer connected to the Internet from anywhere in the world. However, e-mail transmitted to an ISP subscriber is processed and stored on the ISP's e-mail computer servers. The e-mail server is located in a discrete geographic location. An e-mail server processes every e-mail that is addressed to the ISP's customer. In other words, once the e-mail is transmitted, it must first pass through the ISP's computer server to reach its ultimate destination--the subscriber's computer. Verizon Online Services, Inc. v. Ralsky, 203 F.Supp.2d 601, 605-06 (E.D.Va. 2002). 19 ModusGate. 5 to view with suspicion all commercial email, legitimate or not. The Center for Democracy and Technology’s recent report to the Federal Trade Commission explained: The most dangerous, if least easily quantified cost, is the damage that unsolicited commercial email can cause to the reputation of email. The crashes, delays, lost messages and other problems causally related to unsolicited commercial email may well undermine the public's willingness to embrace this communication device for a range of functions that require a high degree of predictability an d reliability. In addition, UCE can have a chilling effect on individuals’ speech in that individuals may be reluctant to participate in online forums and Usenet groups, or may remove their email addresses from home pages for fear of getting their email addresses placed on mailing lists for UCE.20 Aristotle’s research bears out this warning. In March of 2003, Aristotle posted an email address, [email protected], and asked its then-26,000-member customer base to send in their experiences with spam. During the subsequent 10 days, Aristotle received over 700 responses, all of which addressed the negative impact of spam. What became immediately clear from these responses is that the sheer volume of spam has had a significant chilling effect on consumer’s use of the Internet. I've seriously considered going off-line permanently because of spam. I get virtually NO meaningful e-mails (e-mail directed at me by someone that knows me, that is). It almost wouldn't matter anyway, because I commonly delete my e-mail without even looking at it. Another by-product of junk e-mail. -- P. M. I have a very important work project that I e-mailed to myself to work on, I had to delete 1900 spam mails before I could get my project to start on. It takes hours. I do not read them just Delete. Also I am very thankful that Aristotle does delete some in there [sic] software. -- T. H. I receive between 20 and 46 SPAM messages per day. I love the convenience of ordering online, but most merchants insist on having my email address. Does selling my address to other vendors net them more money than my purchases? At this rate, online shopping may become too much trouble. -- B. N. 20 http://www.cdt.org/spam/ 6 Increasingly, Internet users are reluctant to shop online or to provide their e-mail addresses for any reason for fear that doing so will result in more spam. Because spam by its nature is commercial speech, reasonable restrictions can be placed on its proliferation without violating the free speech guarantees of the First Amendment. Cases to date have been brought on private trespass theories and therefore have not implicated the First Amendment.21 The First Amendment debate can be informed by the Federal courts’ analysis of the prohibitions against junk faxes. Those against limitations on junk faxes argued that the First Amendment was implicated by those prohibitions; however, legislation restricting those faxes has been found constitutional.22 Spam is the email equivalent of the junk fax. To be constitutional, spam legislation needed only to put permissible content-neutral and generally-applicable restrictions on commercial speech.23 The Supreme Court has recognized that such restrictions are constitutionally-acceptable time, place, and manner regulations that do not violate the First Amendment.24 Therefore, the spam legislation being considered by Congress and subsequent regulations needed only to be “narrowly tailored to serve a significant governmental interest, and . . . leave open ample alternative channels for communication of the information.”25 Requiring that e-mail solicitations provide reasonable opt-out provisions and that the solicitations not be fraudulent (do not attempt to disguise the sender or the content) are reasonable restrictions that would be narrowly tailored, content neutral, and leave open ample avenues for legitimate commercial email. 21 22 23 Id.; Green v. America Online (AOL), ___ F.3d ___, 2003 WL 135811 (3rd Cir. 2003). Telephone Consumer Protection Act of 1991 ("TCPA"). Watchtower Bible &Tract Society of New York, Inc. v. Village of Stratton, 536 U.S. 150 (2002). 24 City of Los Angeles v. Alameda Books, Inc., 535 U.S. 425 (2002). 25 Clark v. Community for Creative Non-Violence, 468 U.S. 288, 293 (1984). 7 The Can-Spam Act In late 2003, Congress passed the Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (“Can-Spam”). Congress had considered potential anti-spam legislation some two-years previous, but the proposed legislation never came to a vote. One reason for this was the heavy lobbying on the part of the Direct Marketing Association (“DMA”), which felt that e-mail marketing should be self-regulated, and among some larger ISPs concerned about their ability to continue to send marketing message to their own customer bases. In 2003, however, the picture changed. A number of states, most notably Washington, had taken the lead and passed aggressive anti-spam legislation. Other states quickly followed suit, and suddenly marketers were facing a multiplicity of state legislation.26 The risk posed by having to comply with numerous and sometimes conflicting state standards caused the DMA to revise its opposition to national spam legislation and to lobby instead for a watered-down version that would pre-empt existing and potential state laws and that the DMA could live with. The front runner for national legislation remained the Burns-Wyden CanSpam bill (S.877), which had been around in various forms for over three years. However, there were a number of other competing anti-spam proposals floating around in Congress, ranging from a National Do-Not-E-mail Registry (modeled on the Do-Not-Call Registry) to a “bounty” to be given to civilians who turned in spammers. A number of the proposed statutes contained a private right of action, and some did not preempt state law. While the debate continued in Congress, the California legislature passed a statute that placed an outright ban on all spam in California. The California spam ban was to take effect in January of 2004; therefore, it became imperative that national legislation be passed before the California law’s effective 26 Arkansas also passed anti-spam legislation, which was pre-empted by Can-Spam prior to becoming effective. 8 date. To meet this deadline, Congress cobbled together the revised Can-Spam Act in the last quarter of 2003 and gave the Act an effective date of January 1, 2004. The final version of the Act retained many aspects of the Burns-Wyden proposal but avoided anything that would have taken time to negotiate and resolve, such as the requirement of a Do-Not-E-mail Registry or a bounty for turning in spammers. Congress appointed the Federal Trade Commission (“FTC”) the agency for enforcement of most aspects of the Act. Although the FTC has yet to issue its final Rulemaking, the Act is currently in force, and anyone using e-mail to communicate with clients or potential clients should be aware of the Act’s requirements. Although the Act was primarily targeted at spammers, anyone who sends out an e-mail newsletter or any other form of e-mail solicitation must be aware of the Act’s mandates. This includes attorneys, law firms, and legal organizations, such as the American Bar Association.27 Defining what E-mail is Commercial – The “Primary Purpose” Can-Spam regulates commercial electronic mail messages, which it defines as “any electronic mail message the primary purpose of which is the commercial advertisement or promotion of a commercial product or service (including content on an Internet website operated for a commercial purpose).”28 The key language in this definition is “primary purpose.” If the primary purpose of the e-mail is not commercial, then it would ostensibly be outside the purview of the Can-Spam Act. For the lawyers and firms that send out legal bulletins and the like to clients and potential clients via e-mail, the determination of whether these e-mails have 27 There is a question as to whether FTC has enforcement powers against non-profit organizations like the ABA. Until this issue is resolved, however, even non-profit legal organizations should comply with Can-Spam, and this is, in fact, the position taken by the American Bar Association. 28 Can-Spam, § 3(2)(A). Can-Spam also regulates pornography as well as fraudulent behavior via e-mail (such as the Nigerian scheme); however, these issues are not relevant to the average practicing attorney and are not addressed by this paper. 9 “advertising or promotion of a commercial product or service” as their primary purpose is critical. Few would argue that legal bulletins and e-newsletters have no commercial purpose; after all, if there was no business development to be gained from sending out legal bulletins by e-mail, few lawyers would bother to do so. In fact, legal bulletins and the like serve to provide information about the lawyer or firm, to promote the lawyer or firm’s expertise/knowledge/utility in a particular area of law, and to remind clients and potential clients that the lawyer or firm is there to serve legal needs should any arise. However, these e-newsletters also serve another purpose – to inform and educate on current developments in the law. Which of these competing purposes is “primary” makes all the difference as to whether the legal bulletin is considered “commercial” and therefore subject to Can-Spam. Tasked with defining the terms contained in Can-Spam, the FTC issued an Advance Notice of Proposed Rulemaking (“ANPR”) which addressed a number of open questions in the statute, including “defining the relevant criteria to facilitate the determination of the primary purpose of an electronic mail message.”29 In the ANPR, the FTC requested input on a number of different criteria to determine an e-mail message’s “primary purpose.” The FTC suggested seven different possible criteria: 29 1. “Primary purpose” means that an e-mail’s “commercial advertisement or promotion is more important than all of the e-mail’s other purposes combined.” 2. “Primary purpose” means that the “commercial advertisement or promotion is more important than any other single purpose of the email, but not necessarily more important that all other purposes combined.” 3. “Primary purpose” should be determined by reference to the “net impression” test applied by the FTC in other marketing contexts. If so, then the e-mail must be “judged by the net impression that the material as a whole makes on the reasonable observer.” 4. “Primary purpose” means that the “commercial advertisement or promotion in an email is more than incidental to the email.” Can-Spam, § 3(2)(C). 10 5. “Primary purpose” should be analyzed “on whether the commercial aspect of the email financially supports other aspects of the email,” such as when the e-mail is supported by banner ads. 6. “Primary purpose” should be affected by the identity of the sender. “for example, if a professional sports league sends email promoting its involvement with a charitable organization, should that email be considered to have a commercial ‘primary purpose’ under the Act based on the league’s ‘for-profit’ status?” 7. “Primary purpose” should be determined by a set of criteria different from those above. The comment period for the ANPR ended on April 12, and the FTC is expected to issue final rulemaking the next couple of months.30 In the meantime, there is a great deal of uncertainty as to whether “informative” e-newsletters such as legal bulletins are commercial and must therefore comply with Can-Spam. Certainly, some of the above definitions, particularly the fourth definition, would seem to encompass legal bulletins sent by law firms or counsel. Requirements for E-Mail Solicitations Can-Spam § 5 requires that any e-mail whose “primary purpose” is advertisement or solicitation to comply with certain rules, summarized below: 1. Header information, the “from” line, and the subject line cannot be false or misleading. 2. Every e-mail solicitation must clearly and conspicuously include a functioning return e-mail address or other Internet-based mechanism (such as a link to a web page), that allows a recipient to opt-out of receiving future mailings and that is capable of receiving such messages for 30 days after the mailing is sent. 3. It is permissible to provide recipients a choice of what types of mail he/she does or does not want to receive. 31 30 The ANPR also requested comment on the creation of a “Do-Not-E-mail Registry.” The comment period for this aspect of the ANPR ended March 31. 31 For example, here is an opt-out from the Direct Marketing Association newsletter: The DMA sends various types of e-mail communications. To unsubscribe from future Membership e-mail, send us a blank e-mail message by clicking here. To unsubscribe from all DMA e-mail communications, including industry breaking news, send us a blank e-mail message by clicking here. 11 4. Anyone who requests to be removed from the e-mail list must be removed within 10 business days of the request. If the person subsequently signs up again, then they can be included in future mailings. 5. All commercial e-mail messages must contain the following: a. Clear and conspicuous identification that the message is an advertisement or solicitation.32 You do not have to include this notice if the recipient has given prior affirmative consent to receipt of the message.33 b. Clear and conspicuous notice of the opportunity to decline to receive further commercial e-mail messages (clear and conspicuous opt-out); and c. Valid physical postal address of the sender.34 The statute does not require that a statement of how the sender obtained the recipient’s e-mail address be included, but many ISPs, including AOL and Aristotle, require that this information be included in newsletters before they are distributed to the ISP’s customers. Additionally, Can-Spam provides that the FTC must issue a report by June of 2005 that “sets forth a plan for requiring commercial electronic mail to be identifiable from its subject line, by means of compliance with Internet Engineering Task Force Standards, the use of the characters ‘ADV' in the subject line, or other comparable identifier, or an explanation of any concerns the Commission has that cause the Commission to recommend against the plan.”35 In its ANPR, the FTC requested 32 This language should not be construed to require the precise words, “advertisement” or “solicitation,” see Can-Spam §13(b). Nonetheless, if an e-mail is determined to be an advertisement or solicitation, this must be clear from the subject line even if those precise words are not used. 33 Example 1: Client conducts a contest in which it garners a number of e-mail addresses. The first mailing to each of these new e-mail addresses should contain the clear and conspicuous identification of the mail as an advertisement or solicitation. Example 2: Recipient goes to client website and signs up for Client’s e-newsletter. You do not have to state that the subsequent e-mail is an advertisement or solicitation. 34 It is an open question as to whether the “physical postal” address would include a P.O. Box or mail drop. The language “physical address” would preclude such addresses, whereas the language “postal address” would include them. It is unclear, then, where “physical postal” address fits in this spectrum. This is one of the issues raised by the FTC’s ANPR. 35 Can-Spam, §11(2). 12 comment on the utility and effectiveness of labeling such as “ADV,” the obstacles to enforcing labeling requirements, and whether such labeling should be required for all commercial e-mail. Ethical Implications36 If an e-mail contains direct promotion of the attorney’s services, the same rules would apply as to a letter sent to potential clients, and the e-mail should comply with Rules 7.1 and 7.2 of the Rules of Professional Conduct. Additionally, if the email is sent to potential clients the attorney knows needs the legal services being offered by the attorney, then the text of the message must state that the email is advertising. But many e-newsletters and legal bulletins do not contain direct promotion of the attorney’s services. It’s a much more difficult question when the e-mail is an informational newsletter or legal bulletin (as opposed to a newsletter lauding the benefits or successes of a particular attorney or firm). In the case of informative e-newsletters, most lawyers and firms have taken the position that these types of communications are not solicitations or advertisements even if there is a tangential or direct marketing benefit from sending them. Enter Can-Spam. Depending on how the FTC defines the “primary purpose” term, e-newsletters and legal bulletins could be categorized as “commercial” and be required to comply with the statute. At a minimum, this would require that these e-mails make clear that they are advertisements and/or solicitations (though not necessary in these express words), and might ultimately include a requirement that a label, such as ADV be placed on these e-mails. This result might, in turn, cause a re-definition of e-newsletters and legal bulletins as 36 The ethics rules discussed below are the advertising rules adopted by the Supreme Court of Arkansas. While similar in many ways to the model rules, there are some differences. Each attorney should check his or her local Rules of Professional Responsibility to see if any material differences exist. 13 advertisements or solicitations under the Rules of Professional Conduct. This is even more likely when the legal bulletin in question is sent to recipients who are not current clients of the attorney or firm, since such missives could easily cross the line into solicitation if the attorney is not careful. It would therefore be incumbent upon attorneys to comply not only with the requirements of Can-Spam but also with the rules of the Rules of Professional Responsibility and in particular the rules governing advertising, Rules 7.1-7.5. To some extent, the ethics rules and Can-Spam share certain requirements; however, they are not co-equal, and an attorney should fully understand the requirements of both before sending out unsolicited e-mail. A. Rule 7.1 Can-Spam does not regulate the accuracy of content of an e-mail except to the extent that it prohibits and criminalizes fraudulent statements. But there is a great gray area that is regulated by Rule 7.1 that falls somewhere between the obviously fraudulent and the 100% truthful. Rule 7.1 of the Rules of Professional Responsibility requires that an attorney not make false or misleading statements about the services he or she offers. A statement is false and misleading if it “contains a material misrepresentation of fact or law, or omits a fact necessary to make the statement considered as a whole not materially misleading.” The Rule further provides that the communication cannot contain statements that are likely to create an unjustified expectation of the possible results and cannot include testimonials or endorsements.37 Can-Spam does, however, layer on another set of requirements with respect not to the content of but to the structure of the e-mail itself. First, Can-Spam prohibits false and misleading transmission information. This means that the 37 Rule 7.1. Communications Concerning A Lawyer’s Services. 14 header information cannot be materially false or materially misleading.38 Technically accurate information as to the originator of an e-mail that is nonetheless “obtained by means of false or fraudulent pretenses or representations shall be considered materially misleading,” as is header information obscured because the mailer used “another protected computer to relay or retransmit the message for purposes of disguising its origin.”39 In practical terms, this means that the attorney is responsible for ensuring that whoever the attorney is using to send out the e-newsletter, whether it is the firm’s own mail servers or a third party, provides accurate technical information. This is especially critical when using a third-party mailer, since newsletter services will often provide legitimate e-mail services to one set of clients while at the same time engaging in marginal spamming behavior on their own behalf of others. If these third parties route the mail they send in such a way as to obscure the true origin of the mail, then the attorney may be held liable for this under Can-Spam.40 Second, Can-Spam requires that the “from” line accurately identify the person initiating the message.41 Third, the Act requires the subject line to be accurate in that it must not “mislead a recipient, acting reasonably under the circumstances, about a material fact regarding the contents or subject matter of the message. . . .” 42 B. Rule 7.2 Can-Spam, § 5(a)(1). “Header information” is defined as “the source, destination, and routing information attached to an electronic mail message, including the originating domain name and originating electronic mail address, and any other information that appears in the line identifying or purporting to identify, a person initiating the message.” Id. § 3(8). 38 39 Id. § 5(a)(1)(A) and (C). 40 Occasionally, companies that offer e-newsletter mailing services to legitimate businesses send so much spam from their servers that ISPs have blacklisted these servers. Since no mail can get through from a blacklisted server, there is motivation for some of these companies to try to disguise the source of the mail. Attorneys would be well-advised to look closely at any third-party e-newsletter service. 41 Can-Spam § 5(a)(1)(B). 42 Id. § 5(a)(2). 15 Rule 7.2 allows advertising through a number of different media, but as this rule was written prior to the Internet, it does not specifically address advertising via the World Wide Web or e-mail. The term “written communication,” however, can fairly be read to include e-mail, which has been recognized in other contexts as equivalent to other forms of written documentation. The Rule would therefore appear to permit advertising via e-mail and the Internet. The other requirements of the Rule, however, provide complications. First, Rule 7.2 requires that a “copy or recording of an advertisement or communication shall be kept for five years after its last dissemination along with a record of when and where it was used.” This means that an e-newsletter or legal bulletin sent by e-mail must be retained by the attorney or firm for five full years. The attorney must keep track of when and to whom the e-mail communication was sent. Second, the e-mail must include the name of at least on lawyer licensed to practice law and must “disclose the geographic location of the office or offices of the attorney or the firm in which the lawyer or lawyers who actually perform the services advertised principally practice law.” This requirement is similar to the Can-Spam requirement that the e-mail include the physical postal address of the sender; however, regardless of whether the FTC determines that a P.O. Box would be sufficient for purposes of Can-Spam, it in all likelihood is not sufficient for Rule 7.2. C. Rule 7.3 Rule 7.3 states that “a lawyer shall not solicit, by any form of direct contact, in person or otherwise, professional employment from a prospective client with whom the lawyer has no family or prior professional relationship when a significant motive . . .is pecuniary gain.”43 There is an exception to this prohibition, in that a lawyer may solicit a potential client in writing, by regular mail, provided that the 43 Rule 7.3(a) 16 lawyer includes the word “ADVERTISEMENT” in red on the face of the envelope, ensures that the letter does not resemble official pleadings, includes certain mandatory statements, and complies with all the other rules governing lawyer advertising.44 Applying this rule to e-mail, no direct solicitation through e-mail is permitted. Although e-mail is generally considered equivalent to a “writing,” it can not be sent by regular mail; therefore, Rule 7.3 precludes solicitation where a “significant motive” for the e-mail is pecuniary gain. Can-Spam classifies an e-mail as advertisement or solicitation when it’s “primary purpose” is advertisement or promotion.45 As stated above at pages 10-11, the FTC is considering regulations that, at worst, would include e-mails in which the commercial message was “more than incidental” to the e-mail message or, at best, in which the “commercial advertisement or promotion is more important than all of the e-mail’s other purposes combined.” In any event, and regardless of how “primary purpose” is defined, it is unlikely that the definition will be completely consistent with Rule 7.3’s standard of “significant motive.” Obviously, advertisement or promotion can be a significant motive even when it is not “more important than all of the e-mail’s other purposes combined.” By the same token, an e-mail in which the advertisement or promotion is “more than incidental” would not necessarily have pecuniary gain as its “significant motive.” Any lawyer considering using e-newsletters as a communication tool would be well-advised not only to consider how the FTC ultimately defines “primary purpose” but also to pay close attention to how the “significant motive” standard is applied. For example, a generally informative legal bulletin-type e-newsletter would likely not be considered to have pecuniary gain as a significant motive. It is 44 45 Rule 7.3(b)(1)-(7) Can-Spam §3(2)(A). 17 a much closer call, however, if that e-newsletter addresses the law applying to a particular set of circumstances (such as the law applying to toxic torts) and is directed to specific individuals known to be in need of those services (those injured in a large chemical accident). If pecuniary gain is a significant motive for the message, then Rule 7.3 states that e-mail cannot be the vehicle used to convey it. D. Rule 7.4 Rule 7.4 allows an attorney to communicate that he or she practices or does not practice a particular type of law. However, with a few circumscribed exceptions, the Rule prohibits an attorney from implying that he or she is a “specialist” in any given area.46 Of course, this limitation applies to e-mail communication as well. If a particular statement would not be acceptable in a firm brochure, letter, or print advertisement, it is not acceptable in an e-mail newsletter. E. Rule 7.5 Rule 7.5 requires that attorneys use a firm name or other professional designation that complies with Rule 7.1. Rule 7.5 allows attorneys to use trade names so long as the trade name does not imply connection to a government agency or charitable organization and does not violate Rule 7.1.47 In the context of e-mail communication, this rule addresses what is permissible to put in the “from” line. The requirements of 7.5 dictate that the name chosen to go in the “from” line, if it is a trade name rather than the name of the attorney or firm, must not be false or misleading (as prohibited by Rule 7.1). For example, a personal injury attorney who handles a lot of airline crash cases may want to put the trade 46 An attorney is allow to say that he or she is a “Patent Attorney,” and, if engaged in the practice of admiralty law, may use the designation “Admiralty,” “Proctor in Admiralty” or similar designation. Rule 7.4(b) and (c). Currently certified Board Recognized Specialists in Tax Law may continue to so state through December 31, 2005. Rule 7.4(e). 47 Many states do not allow the use of trade names at all, but they are permissible in Arkansas. 18 name “Airline Crash Lawyers” in the “from” line, and this would be permissible. Obviously, however, a tax attorney should not use this trade name, since it would be completely unrelated to the type of law the tax attorney practices. Can-Spam similarly requires that the “from” line must accurately identify the person who initiated the message and must not be materially false or materially misleading. Using the Airline Crash Attorneys as an example, so long as the attorneys initiating the message are in fact attorneys that handle airline crash cases, this designation in the “from” line probably will pass muster with Can-Spam as well. In short, it is probable that any trade name that complies with Rule 7.5’s requirements will also fulfill the requirements of Can-Spam. Penalties for Violating Can-Spam Can-Spam does not provide for a right of action on the part of those who are receiving the unsolicited mail. Can-Spam does, however, allow for enforcement by the FTC, the States Attorneys General, and Internet service providers.48 In the event of a violation, the penalties include fines that range from $25.00 to $250.00 per violation and/or jail time for up to five years, as well as forfeiture of software, equipment, and technology used (or intended to be used) in furtherance of the violation and forfeiture of property traceable as proceeds from the violation.49 The penalties under Can-Spam vary based on the egregiousness of the violation and on whether certain aggravating factors exist. Conclusion The problems created by spam will not be going away anytime soon. It is cheap for direct marketers, easy to do, and hard to track. Can-Spam will do little to change these facts. Can-Spam will necessarily change the behavior of legitimate marketers with its requirements for unsolicited commercial e-mail. Although the 48 49 Can-Spam §§ 7. Can-Spam § 4. 19 FTC has yet to issue its final rulemaking under Can-Spam, the law is currently in effect. Attorneys sending out newsletters e-mail would be well advised to look closely and comply with the Act’s requirements, in addition to the Rules of Professional Responsibility. In the case of doubt, attorneys and law firms should err on the side of caution. 20 Text of the Rules of Professional Responsibility Governing Attorney Advertising Rule 7.1 – Communications Concerning a Lawyer’s Services A lawyer shall not make a false or misleading communication about the lawyer or the lawyer’s services. A communication is false or misleading if it (a) contains a material misrepresentation of fact or law, or omits a fact necessary to make the statement considered as a whole not materially misleading. (b) is likely to create an unjustified expectation about the results the lawyer can achieve, or states or implies that the lawyer can achieve results by means that violate the rules of professional conduct or other law; (c) compares the lawyer’s services with other lawyer’s services, unless the comparison can e factually substantiated; or (d) contains a testimonial or endorsement. Rule 7.2 – Advertising (a) Subject to the requirements of Rules 7.1 and 7.3, a lawyer may advertise services through public media, such as a telephone directory, legal directory, newspaper or other periodical, outdoor advertising, radio or television, or through written communication. (b) A copy or recording of an advertisement or communication shall be kept for five years after its last dissemination along with a record of when and where it was used. (c) Any lawyer shall not give anything of value to a person for recommending the lawyers services, except that a lawyer may pay the reasonable cost of advertisements or communications permitted by this rule and may pay the usual charges for notfor-profit lawyer referral service or other legal service organization; and may pay for a law practice in accordance with Rule 1.17. (d) Any communication made pursuant to this Rule shall include the name of at least one lawyer who is licensed in Arkansas and who is responsible for its content, and shall disclose the geographic location of the office or offices of the attorney or the firm in which the lawyer or lawyers who actually perform the services advertised principally practice law. (e) Advertisements may include photographs, voices or images of the lawyers who are members of the firm who will actually perform the services. If advertisements utilize actors or other individuals, those persons shall be clearly and conspicuously 21 identified by name and relationship to the advertising lawyer or law firm and shall not mislead or create an unreasonable expectation about the results the lawyer may be able to obtain. Clients or former clients shall not be used in any manner whatsoever in advertisements. Dramatization in any advertisement is prohibited. (1) Rule 7.3 – Direct Contact with Prospective Clients (a) A lawyer shall not solicit, by any form of direct contact, inperson or otherwise, professional employment from a prospective client with whom the lawyer has no family or prior professional relationship when a significant motive for the lawyer’s doing so is the lawyer’s pecuniary gain. (b) Notwithstanding the prohibitions described in Paragraph (a), a lawyer may solicit professional employment from a prospective client know to be in need of legal services in a particular matter by written communication. Such written communication shall: (1) include on the bottom left hand corner of the face of the envelope the word “advertisement in red ink, with type twice as large as that used for the name of the addressee; (2) only be sent by regular mail; (3) not have the appearance of legal pleadings or other official documents; (4) plainly state in capital letters “ADVERTISEMENT” on each page of the written communication; (5) begin with the statement that “If you have already retained a lawyer, please disregard this letter; (6) include the following statement in capital letters, “ANY COMPLAINTS ABOUT THIS LETTER OR THE REPRESENTATION OF ANY LAWYER MAY BE DIRECTED TO THE SUPERME COURT COMMITTEE ON PROFESSIONAL CONDUCT, C/O CLERK, ARKANSAS SUPERE COURT, 625 MARSHALL STREET, LITTLE ROCK, ARKANSAS 72201; (7) shall comply with all applicable rules governing lawyer advertising. (c) In death claims, the written communication permitted by paragraph (b) shall not be sent until 30 days after the accident. (d) Any written communication prompted by a specific occurrence involving or affecting the intended recipient of the communication or a family member shall disclose how the lawyer obtained the information prompting the communication. 22 (e) (f) (4) Even when otherwise permitted by this rule, a lawyer shall not solicit professional employment from a prospective client by written or recorded communication or by in-person or telephone contact if: (1) the prospective client has made known to the lawyer a desire not to be solicited by the lawyer; (2) the solicitation involves coercion, duress, harassment, fraud, overreaching, intimidation, or undue influence; or (3) the prospective client is known to the lawyer to be represented in connection with the matter concerning the solicitation by counsel, except where the prospective client has initiated the contact with the lawyer. Notwithstanding the prohibitions in paragraph (a), a lawyer may participate with a prepaid group legal service plan operated by an organization not owned or directed by the lawyer which uses in-person or telephone contact to solicit memberships or subscriptions for the plan from persons who are not known to need legal services in a particular matter covered by the plan. Rule 7.4 – Communication of Fields of Practice and Specialization (a) A lawyer may communicate the fact that the lawyer does or does not practice in particular fields of law. (b) A lawyer admitted to engage in patent practice before the United States Patent and Trademark Office may use the designation “Patent Attorney” or a substantially similar designation. (c) A lawyer engage in admiralty practice may use the designation “Admiralty,” “Proctor in Admiralty” or a substantially similar designation. (d) A lawyer shall not state or imply that a lawyer is certified as a specialist in a particular field of law, unless: (1) the lawyer has been certified as a specialist by an organization that has been approved by an appropriate state authority or that has been accredited by the American Bar Association; and (2) the name of the certifying organization is clearly identified in the communication. (e) [Transitional Provision s(December 31, 2002 – December 31, 2005)] 23 (1) A lawyer who is currently certified as a Board Recognized Specialist in Tax Law under the Arkansas Plan of Specialization may communicate such fact through December 31, 2005. (2) The Arkansas Legal Specialization Transition Task Force shall discharge any administrative supervisory, or other duties previously discharged by the Board of Legal Specialization or the Tax Specialty Committee that may arise during the transition period. No new specialists shall be recognized under the Arkansas Plan of Specialization. (5) Rule 7.5 – Firm Names and Letterhead (a) A lawyer shall not use a firm name, letterhead or other professional designation that violates Rule 7.1. A trade name may be used by a lawyer in private practice if it does not imply a connection with a government agency or with a public or charitable legal services organization and is not otherwise in violation of Rule 7.1. (b) A law firm with offices in more than one jurisdiction may use the same name in each jurisdiction, but identification of the lawyer in an office of the firm shall indicate the jurisdictional limitations on those not licensed to practice in the jurisdiction where the office is located. (c) The name of a lawyer holding a public office shall not be used in the name of a law firm, or in communication son its behalf, during any substantial period in which the lawyer is not actively and regularly practicing with the firm. (d) Lawyers hall not state or imply that they practice in a partnership, association or other organization unless that is the fact. 24 Electronic Communication by Lawyers: Navigating the Intersection of the Ethics Rules and the CAN-SPAM Act of 2003 William R. Denny* Potter Anderson & Corroon LLP June 2004 I. Introduction Lawyers who attempt to navigate both their state’s ethics rules and the CAN-SPAM Act1 will likely end up lost. Generally, the CAN-SPAM Act regulates the character and transmission of unsolicited commercial electronic mail (“email”) popularly known as “spam.”2 The Act specifically prevents the sending of false or misleading message information,3 requires that the message be labeled an advertisement4 and that the recipient be given an “opt-out” option to avoid further contact.5 Though the CAN-SPAM Act does not directly mention lawyers, lawyers often use email to send what might be considered unsolicited commercial messages. * William R. Denny is a partner at Potter Anderson & Corroon LLP, Wilmington, Delaware, practicing in the area of information technology law. He can be reached at [email protected]. Gabriel R. MacConaill, law student at the Dickinson School of Law, assisted in the preparation of this paper. 1 Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (“CAN-SPAM”) §§ 1-16, 15 U.S.C.S. §§ 7701-7713 (Lexis 2003) (effective Jan. 1, 2004). 2 See CAN-SPAM Act § 2. 3 See CAN-SPAM Act § 5(a)(1). The use of deceptive subject headings is expressly prohibited. Id. § 5(a)(2). 4 See id. § (5)(a)(5)(i). 5 See id. § (5)(a)(3). Not only must the sender include an electronic option to cancel further contact, under § (5)(a)(3), the sender must provide a valid “physical postal address”. Id. § (5)(a)(5)(iii). Some state ethics rules also require the inclusion of a valid “physical address” for any legal services advertisement. See N.Y. State Bar Ass’n Comm. on Prof’l Ethics, Op. 756 (2002). The absence of an address in a widely disseminated advertisement could be misleading by suggesting physical proximity to the recipient. See id. In a now famous incident, Laurence Canter, an attorney, placed an electronic advertisement on the Internet that reached more than 5,000 Internet groups, and many thousands of email addresses.6 Mr. Canter’s April 1994 unsolicited electronic message offered to help almost anyone get a green card.7 The Tennessee Supreme Court’s Board of Professional Responsibility determined that Mr. Canter’s conduct violated numerous ethics rules, 8 and suspended him for one year.9 Although the Canter case represents extreme misuse of email communication, over the past decade, state bars have been faced with increasingly frequent questions regarding the ethics of advertising online.10 Widespread attorney advertising is itself a relatively recent development. The Supreme Court struck down absolute bans on lawyer advertising in 1977.11 In Bates v. State Bar of 6 See In re Canter, Docket No. 95-831-O-H, at ¶ 47 (Disciplinary District, Board of Professional Responsibility, Supreme Court of Tennessee, Feb. 27, 1997). Estimates vary, but one source reports that Canter’s ad generated more than 30,000 irate responses. See J.T. Westermeier, Ethics and the Internet, 17 Geo. J. Legal Ethics 267, 291 (2004). 7 See In re Canter, at ¶ 47. The advertisement began “Green Card Lottery 1994 May Be The Last One! THE DEADLINE HAS BEEN ANNOUNCED.” Id. (emphasis in original). 8 See id. at ¶ 48 Because the postings appeared on computer screens unsolicited, because each reader was required to read at least the introduction to the message, and because the postings appeared on Bulletin Boards having no relevance to immigration law, it was deemed to be an improper intrusion into the privacy of the recipients, in violation of DR 1-102(A)(1), (5) and (6) and DR 2-103. Because Internet users generally pay by the minute for their access to the Internet, the unsolicited message was at the recipients’ expense, in violation of DR 1-102(A)(5) and (6), and DR 2-103(A). The message did not include the words “This Is An Advertisement”, in violation of DR 2-101(N). The attorney held himself out as a specialist, without the disclaimer required by DR 2-101(C). Finally, the attorney did not deliver a copy of the posting to the Board of Professional Responsibility within three days of the posting, as required by DR 2-101(F). 9 See id. at ¶ 56 Canter was disbarred in the same hearing for a non-Internet-related matter. Id. 10 See, e.g., Ariz. Comm. on Rules of Prof’l Conduct, Op. 97-04 (1997) (noting several recent ethics opinions from other jurisdictions regarding electronic communication). 11 See Bates v. State Bar Of Ariz., 433 U.S. 350, 382-83 (1977). 2 Arizona, the Court held that although the First Amendment prohibited blanket bans, states retain the right to prohibit advertising containing false or misleading information.12 A year later the Supreme Court revisited the issue, holding that states could completely ban in-person solicitation because of the potentially coercive effects on laypersons.13 The ethics rules regulating attorney conduct when soliciting potential clients have at their foundation the same concerns about the coercive effects of overreaching, fraud, and undue influence.14 Electronic communication may represent a danger similar to that of direct mail, and also may pose risks more similar to in-person communication. The state bars have taken varied approaches to ethical regulation of Internet-based solicitations. This paper outlines the general approaches of states to specific types of attorney conduct, along with references to possible overlap and non-congruence with the CAN-SPAM Act. II. Specific Conduct by Attorneys The modern practice of law involves frequent electronic communication between lawyers and clients. Some states have expressly recognized and regulated this form of communication through their ethics rules, while other states have interpreted preexisting rules by comparing electronic communication to more traditional forms of communication. Following are examples of the application of different state ethics rules to two general types of conduct: sending newsletters and linking to websites in email. A. Electronic Newsletters, Advice, and Other Direct Communication 12 See Id. at 383-84. 13 See Ohralik v. Ohio State Bar Ass’n, 436 U.S. 447, 465-66 (1978). Justice Potter was also concerned about the state’s ability to regulate unrecorded in-person communication that represents a heightened risk of fraud. Id. at 467. 14 See Model Rules of Prof’l Conduct R. 7.3(a) (2003). Rule 7.3(a) prohibits all in-person solicitation other than another lawyer, or a person with whom the lawyer has a close relationship. See id. 3 This category includes unsolicited direct communications from attorneys to prospective clients by electronic transmission, commonly email. Within this category there are two subcategories based on the states’ different ethics rules. Some jurisdictions track the old Code of Professional Responsibility or the pre-2000 Rules of Professional Conduct, and other jurisdictions include Internet-specific provisions similar to the post-2000 Rules of Professional Conduct.15 1. Ethics rules that do not Expressly Regulate Electronic Communication a. Code of Professional Responsibility The Code of Professional Responsibility does not expressly regulate electronic communication. The Ohio Code of Professional Responsibility (the “Ohio Code”),16 for example, do not mention electronic communication in their advertising section.17 Without direct textual guidance, lawyers are faced with uncertainty as to their obligations when using the Internet. Attorneys in Ohio are discouraged from sending unsolicited emails advertising legal services.18 The Ohio Supreme Court’s Board of Commissioners on Grievances and Disciple (the “Ohio Board”) recently considered the question of whether it is proper for attorneys to advertise 15 After adoption of most of the recommendations of the ABA Ethics 2000 Commission Rule 7.3 included express regulation of electronic communication. See id. R. 7.3(a)-(c). In 2002 the ABA House of Delegates adopted more of the Ethics 2000 Commission proposal, including an express prohibition on “real-time electronic” contact in Rule 7.3. See Stephen Gillers & Roy D. Simon, Regulation of Lawyers: Statutes and Standards 373 (2004 edition). 16 Ohio Code of Professional Responsibility (2003). The Ohio Code is made up of nine Canons with corresponding Ethical Considerations and Disciplinary Rules. Id. 17 See id. DR 2-101 to 2-105. 18 Ohio Sup. Ct. Bd. of Comm’rs, Op. 2004-1 (2004) (“attorneys are discouraged from, but not barred from, advertising their legal services through unsolicited email.”). 4 legal services by sending unsolicited emails to potential clients.19 The Ohio Board initially recognized the controversial nature of unsolicited commercial email, and the often deceptive techniques used by many senders.20 Next, the Ohio Board noted that spamming had occurred in the legal profession, and outlined some of the provisions of the CAN-SPAM Act.21 Although the Ohio Code does not mention Internet communication, the Ohio Board took the position that its advertising rules apply to “all forms of public communication including email.”22 The Ohio Code generally prohibits an attorney from providing false or misleading statements in any public communication.23 The Ohio Board ruled that email is a form of direct mail advertising since email travels to an electronic mail address and each address is unique.24 As a form of targeted direct mail advertising, email must satisfy the specific provisions of Ohio’s DR 2-101(F)(2), 2-101(F)(4), and DR 2-101(H)(1).25 Disciplinary Rule 2-101(F)(2) requires, among other things, that the mail be labeled “ADVERTISEMENT ONLY” both in the text and 19 Id. 20 See id. The Ohio Board noted specifically that spam messages often come with subject intended to make the recipient think they know the sender. Id. (citing Kenneth E. Johnson, ABA Law Practice Management Section, The Lawyer’s Quick Guide to Email 115 (1998)). 21 See Ohio Sup. Ct. Bd. of Comm’rs, Op. 2004-1 (2004). 22 See id. The Ohio Board was able to provide some guidelines from previous opinions: (1) “A lawyer may communicate with established clients through e-mail[,]” (2) “A lawyer may receive and respond to e-mail legal questions from visitors to the law firm’s Web site[,]” (3) “A lawyer may communicate with other attorneys to express an interest in serving as counsel in a matter[,]” (4) “E-mail solicitation of prospective clients known to have a legal need is subject to regulation as direct mail solicitation[.]” Id. (enumeration added). 23 Ohio Code DR 2-101. 24 See Ohio Sup. Ct. Bd. of Comm’rs, Op. 2004-1 (2004) (“[w]hen a person receives an email addressed to his or her electronic mail address, the person is a direct target of the sender.”). 25 See id. 5 upon the envelope.26 Where the direct mail solicitation is sent to a defendant in a civil action, DR 2-101(F)(4) requires the lawyer to first verify service upon that defendant.27 Finally, if the communication is to a prospective client or their relative within thirty days of an accident that might give rise to a claim of personal injury or wrongful death, DR 2-101(H)(1) requires the inclusion of a pamphlet entitled “Understanding Your Rights.”28 Next the Ohio Board provided guidance on how lawyers should apply the direct mail restrictions to email communication.29 The Board recognized that this task would not be easy.30 Placing the warning “ADVERTISEMENT ONLY” on the subject line of the email, as well as in the text will satisfy DR 2-101(F)(2)(e).31 Simple labeling will not however, satisfy the requirements of DR 2-101(F)(4) and 2-101(H)(1). A lawyer or law firm using a database of email addresses to send newsletters or other advertising email will have almost no way of knowing whether an email will go to a defendant in a civil action who has not yet been served.32 Neither will a broad database offer the attorney an opportunity to know whether an email will go to a prospective client or his or her relative within a thirty day period following an accident or disaster that might give rise to a claim of personal 26 See Ohio Code DR 2-101(F)(2). The recital “ADVERTISEMENT ONLY” must be in red ink and type no smaller than 10 point. Id. DR 2-101(F)(2)(e). 27 Id. DR 2-101(F)(4). 28 See id. DR 2-101(H)(1). 29 Ohio Sup. Ct. Bd. of Comm’rs, Op. 2004-1 (2004). 30 The application of direct mail requirements to email communication “will require effort by attorneys.” Id. 31 See id. (citing Ohio Sup. Ct. Bd. of Comm’rs, Op. 2002-6 (2002)). If possible the language should be written in red and in no smaller than 10 point font. Id. If not possible, the Ohio Board will be satisfied with black type on the subject line and in the text. Id. 32 See id. (discussing the requirements of DR 2-101(F)(4)). 6 injury or wrongful death.33 The Ohio Board nevertheless advised attorneys to use due diligence to avoid sending email not in compliance with the Ohio ethics rules as well as any other rules governing advertising.34 The Ohio Board did not detail how this form of due diligence could be satisfied. The Ohio Board advised that until specific ethics rules addressing unsolicited email advertising of legal services are set forth in the Ohio Code, attorneys are discouraged, but not barred, from advertising through unsolicited email.35 The requirements of the Ohio Code likely cannot be satisfied with respect to email advertising, and the term due diligence is not defined, thus creating risks for Ohio attorneys choosing to advertise by email. By contrast, the same Ohio attorneys would likely be able to satisfy the general requirements of the CAN-SPAM Act. The CAN-SPAM Act would require labeling similar to the Ohio Code to avoid the transmission of false or misleading information.36 In addition CAN-SPAM requires an opt-out 33 See id. (discussing the requirements of DR 2-101(H)(1)). 34 See id. The Ohio Board expressly referred to “applicable federal and state laws.” Id. This reference along with the specific discussion of CAN-SPAM earlier in the opinion may be a general warning to lawyers that CAN-SPAM applies to their email as it would to the email of any other business. Id. 35 See id. The Ohio Board also advised against attorney use of online advertising groups or services that send unsolicited email until ethical rules were promulgated. See id. As with direct attorney solicitation, the use of these groups must satisfy the Ohio Code, including provisions on referrals. See id. Other jurisdictions have ruled, however, that newsgroup postings are instead a form of improper solicitation similar to phone calls, and are strictly prohibited. See Tenn. Sup. Ct. Bd. of Prof’l Responsibility Op. 95-A-570 (1995). Section 6 of the CAN-SPAM Act makes it unlawful to allow a business to be promoted in violation of the prohibition of transmission of false or misleading information in § 5(a)(1). See CAN-SPAM § 6. This provision makes attorneys responsible for newsgroup or referral solicitation through email that violates CAN-SPAM. See id. 36 See CAN-SPAM § 5(a)(1). The inclusion of “ADVERTISEMENT ONLY” as a subject is also likely to avoid running afoul of the prohibition on deceptive subject headings. See id. § 5(a)(2). 7 feature, allowing the recipient to avoid future advertising.37 In contrast, the Ohio Code requires that the attorney satisfy certain conditions prior to contacting certain individuals.38 If a potential client opts out of future advertising communication, the attorney will be required to mark or otherwise label that email address. b. Rules of Professional Conduct The difficulty of applying ethics rules that do not mention electronic communication is not limited to Ohio and other Code jurisdictions. Jurisdictions that have adopted a form of the Rules of Professional Conduct without the Ethics 2000 Commission changes to Rule 7.3 provide the second example of ethical rules that do not expressly regulate electronic communication. Arizona’s Rules of Professional Conduct (the “Arizona Rules”) do not include a reference to the regulation of written electronic communication.39 In 1997, the State Bar of Arizona’s Committee on the Rules of Professional Conduct (the “Arizona Committee”), provided answers to certain questions about attorney activity on the Internet.40 One question posited whether it was a violation of Arizona Rule 7.3 to contact a prospective client directly through email if the attorney knew that the client was in need of legal representation for a particular matter.41 Arizona’s version of Rule 7.3 only requires labeling disclosures if the client is known to need legal advice.42 The Arizona Committee responded by 37 See id. § 5(a)(3). The Ohio Board does advise that attorneys should provide a method for a recipient to opt-out of receiving further email. See Ohio Sup. Ct. Bd. of Comm’rs, Op. 2004-1 (2004). 38 Compare CAN-SPAM § 5(a)(3) with Ohio Code DR 2-101(F)(4), (H)(1). 39 See Ariz. Rules of Prof’l Conduct, ER 7.3(a), (d) (2002). 40 See Ariz. Comm. on Rules of professional Conduct Op. 97-04 (1997). 41 See id. 42 See Ariz. Rules ER 7.3(b). 8 initially advising that neither email nor “chat room” communications should be considered prohibited telephone or in-person solicitation.43 These types of communications are not prohibited because there is not an aspect of immediacy and confrontation, a potential client reading an email or participating in a chat room has the option of not responding to unwanted solicitation.44 The Arizona Committee went on to advise, however, that email contact with a prospective client known to need legal services might be a violation of Arizona Rule 7.3(b).45 That is, Arizona Rule 7.3(b) would be violated if the attorney initiated the contact,46 and the client had a “known legal need for a particular matter,”47 unless the attorney complied with the written communication requirements of the rule.48 When applicable, Arizona Rule 7.3(b) requires that a writing be labeled on the envelope, and on the first page of text “ADVERTISING MATERIAL: THIS IS A COMMERCIAL SOLICITATION.”49 Since there would be no envelope or specific first page of text in an email, the Arizona Committee recognized that applying its advertising rules “pose[d] a slight dilemma for 43 See Ariz. Comm. on Rules of professional Conduct, Op. 97-04 (1997). 44 See id. 45 See id. 46 Lawyer responses to inquiries sent by prospective clients need not comply with Arizona Rule 7.3(b). Id. 47 Id. Thus, solicitations sent to all the members of a particular topical list serve would not be affected by Arizona Rule 7.3(b), because although the recipients might be interested in a particular area of the law, they do not necessarily need representation in a particular matter. See id. 48 See id. 49 See Ariz. Rules ER 7.3(b). This notification must be printed in red ink and be in “type size at least double the largest type size used in the body of the communication.” Id. 9 electronically transmitted solicitations.”50 Attorneys in Arizona are advised to make a reasonable effort to comply with the Arizona Rules if technologically feasible.51 The Arizona Committee suggested, at a minimum, that the disclaimer be included in all capitals on the subject line of the email, and in the body of the communication.52 Labeling requirements under CAN-SPAM, however, are broader than the Arizona Rules.53 CAN-SPAM likely requires that all unsolicited commercial emails sent by attorneys be labeled in such a manner to indicate they are advertisements.54 Similarly, the CAN-SPAM Act requires the inclusion of an opt-out feature in every unsolicited commercial email.55 The Arizona Rules include a prohibition against future written communication, but the prohibition only applies “if it has been made known to the lawyer that the person does not want to receive such communications from the lawyer.”56 The confusion over application of rules of ethics to email communication exists even in jurisdictions that have amended portions of their Rules of Professional Conduct to include 50 Ariz. Comm. on Rules of professional Conduct, Op. 97-04 (1997). 51 See id. 52 See id. 53 Compare CAN-SPAM § 5(a)(2) with Ariz. Rules ER 7.3. Section 5(a)(2) of CAN-SPAM prohibits the transmission of commercial email where the subject heading would likely mislead the recipient about a material fact regarding the contents. CAN-SPAM § 5(a)(2). The absence of a subject heading indicating that an attorney email was an advertisement would seem to be materially misleading. See id. 54 See CAN-SPAM § 5(a)(1)-(2). Section 5 generally prohibits the transmission of false or misleading information. See id. It is likely that an unsolicited commercial email from an attorney, not labeled an advertisement, would be considered false or misleading. The prohibition against deceptive subject headings may require the “advertising label” on the subject line. See id. § 5(a)(2). 55 See id. § 5(a)(3)-(4). 56 Ariz. Rules ER 7.3(d)(1). The language of this rule suggests that the burden of informing the lawyer of a desire to be removed from a mailing list lies with the recipient. See id. 10 reference to electronic communication. Utah’s current Rules of Professional Conduct (the “Utah Rules”) contain a prohibition against real-time electronic communication within the rule against in-person solicitation.57 The Utah Rule concerning written communication, however, is broadly worded and does not contain a specific reference to electronic communication.58 In particular, Utah Rule 7.3(c) requires that every written communication from a lawyer soliciting employment that is sent to a prospective client include the words “Advertising Material” on the outside of the envelope, and at the beginning of the communication.59 In 2002, the Utah State Bar’s Ethics Committee (the “Utah Committee”) was asked to clarify the applicability of Utah Rule 7.3(c) to various law firm activities.60 The question centered on the Internet related activities of sending emails, newsletters, brochures, advisories, and alerts to existing and prospective clients.61 The Utah Committee responded that an email sent directly to a prospective client was similar to a regular mailing and must therefore include the legend “Advertising Material” at the beginning of the message.62 Further, newsletters, advisories, alerts or brochures sent to clients that either extolled the firm’s expertise, encouraged the client to engage the firm, or contact the firm for more information were considered solicitation by the Utah Committee and require the proper warning.63 When, however, the 57 See Utah Rules of Prof’l Conduct, R. 7.3(a) (2003). The proscription against real-time communication exists because, like in-person communication, such a situation is fraught with the dangers of undue influence upon the layperson by the knowledgeable attorney. See id. R. 7.3 cmt. 58 See id. R. 7.3(c). 59 See id. 60 See Utah State Bar Ethics Comm., Op. 02-02 (2002). 61 See id. 62 See id. 11 emails, newsletters, advisories, alerts or brochures are sent to a current or former client, the advertising legend is unnecessary.64 The CAN-SPAM Act does not contain a similar exception for current clients or consumers. Instead, the CAN-SPAM labeling and opt-out features apply to unsolicited commercial emails sent to any recipient, regardless of whether there is an existing relationship.65 As a result, an attorney must determine how the CAN-SPAM Act might apply to client communication. 2. Ethics Rules that Expressly Regulate Electronic Communication Even where the states have expressly included electronic communication in their rules of ethics, jurisdictional rules differ and application can be confusing. A few states, following the lead of the ABA, have expressly mentioned electronic communications in their ethics codes. ABA Model Rule 7.3(c) includes electronic communications in its definition of written communications, requiring that emails soliciting employment from prospective clients contain the words “Advertising Material” at the beginning and end of the message.66 Some states have included similar language in their counterparts to ABA Model Rule 7.3. Hawaii is an interesting exception.67 The Hawaii Rules of Professional Conduct (the “Hawaii Rules”) forbid email solicitation of prospective clients in Rule 7.3(f).68 The comments 63 See id. 64 See Utah Rules R. 7.3(c). Utah, like the ABA Model Rules, exempts from the advertisement warning requirement persons with whom the attorney has, or has had, a professional relationship. See id.; see also Model Rules R. 7.3(c). 65 See CAN-SPAM §§ 3(13), 5(a). Utah, like Arizona, does provide that a prospective client may avoid future communication if such desire is made known to the attorney. See Utah Rules R. 7.3(b)(1). 66 See Model Rules R. 7.3(c). 67 See Haw. Sup. Ct. Disciplinary Bd., Op. 41 (2001) (discussing the application of Hawaii’s ethics rules to Internet advertising). 12 to Hawaii Rule 7.3 do not mention subsection (f), but do reference the threat of undue influence and overreaching that accompany certain solicitation of prospective clients.69 One can speculate that the Hawaiian Rules prohibit email contact simply because of the informal nature of such solicitation. Most jurisdictions have not banned email contact, but do require warnings in unsolicited electronic advertising much like the requirements in Model Rule 7.3. For example, Tennessee’s current version of the Rules of Professional Conduct contains an express labeling requirement for “computer transmissions.”70 A solicitation sent from a Tennessee lawyer must include the words “THIS IS AN ADVERTISEMENT” in conspicuous print size at the beginning and the end of the writing.71 Other jurisdictions not only expressly regulate electronic communication, but include in that regulation an incorporation of all of the traditional direct written contact rules as well. Florida’s Rules of Professional Conduct (the “Florida Rules”) have a separate subchapter devoted to computer-accessed communications.72 Within that subchapter, there is a subsection entitled “Electronic Mail Communications” that incorporates by reference all of the Florida Rules on traditional direct communication.73 The email subsection goes on to require that any 68 See Haw. Rules of Prof’l Conduct R. 7.3(f)(1) (2002). Hawaii Rule 7.3(f)(1) provides: “written communications to prospective clients shall be sent only by regular U.S. mail, not by registered mail or other forms of restricted delivery, and not by facsimile or email[.]” Id. (emphasis in original). 69 See id. R. 7.3 cmt. [1]-[6]. 70 See Tenn. Rules of Prof’l Conduct, R. 7.3(c) (2004). 71 Id. 72 See Fla. Rules of Prof’l Conduct, R. 4-7.6 (2002). Computer-accessed communications are defined as: “information regarding a lawyer’s or law firm’s services that is read, viewed, or heard directly through the use of a computer.” Id. 13 such communication disclose at least one office location of the lawyer or lawyers and include the statement “legal advertisement” in the subject line.74 According to the comments to Florida Rule 4-7.6, unsolicited electronic mail messages are “functionally comparable” to direct mail communications.75 It is likely that attorneys will satisfy the labeling requirements of the CAN-SPAM Act by following states ethics rules expressly regulating email solicitation. And yet, the numerous optout requirements of CAN-SPAM remain a hurdle independent of most existing state ethics rules, even those that expressly regulate email. Including opt-out options and monitoring client lists to prevent future solicitation of those who have opted-out will be a difficult task for lawyers and law firms. B. Linking to the Firm’s Website in an Email When an attorney sends an otherwise innocuous email, does the inclusion of a website link transform the email into a commercial communication or a solicitation for pecuniary gain? If so, the email’s author might be required to satisfy CAN-SPAM, the state ethics rules, or both. CAN-SPAM by its terms applies to “commercial electronic mail messages.”76 1. Application of CAN-SPAM to Website Links Commercial electronic mail is defined in the CAN-SPAM Act as any message the “primary purpose of which is the commercial advertisement or promotion of a commercial product or service.”77 The CAN-SPAM definition of commercial email parenthetically includes 73 See id. R. 4-7.6(c)(1). 74 See id. R. 4-7.6(c)(2)-(3). 75 See id. R. 4-7.6 cmt. [3]. 76 See, e.g., CAN-SPAM § 5(a). 14 content on a website operated for a commercial purpose.78 This reference suggests that the inclusion of a commercial website link destroys the non-commercial nature of an email. The CAN-SPAM Act, however, provides that the inclusion of a link to a commercial website does not make an email commercial if the contents or circumstances of the message indicate a primary purpose that is not commercial.79 This somewhat circular language suggests that a website link alone does not represent a commercial primary purpose. Interpretation of the CAN-SPAM Act will, however, require reference to its underlying broad public policy. Email is relied upon by millions of Americans every day in their personal and professional lives.80 Unsolicited commercial email accounts for over half of all email traffic, according to an estimate relied on by Congress.81 Against this backdrop, Congress found a substantial government interest in regulation of email, and it is against this backdrop that a court will interpret the Act. It is possible that courts will find a primary commercial purpose solely on the basis of a website link contained in an email, based on the Act’s broad public policy. 2. Application of State Ethics Rules to Website Links While the CAN-SPAM Act relies on the primary purpose test to label a message commercial, the majority of state ethics rules apply only where a significant motive for an 77 Id. § 3(2)(A). By comparison the Supreme Court has defined commercial speech as “expression related solely to the economic interests of the speaker and its audience.” See Cent. Hudson Gas & Elec. Corp. v. Pub. Serv. Comm’n, 447 U.S. 557, 561 (1980). 78 CAN-SPAM § 3(2)(A). 79 See id. The primary purpose must be “other than commercial advertisement or promotion of a commercial product or service.” Id. 80 See id. § 2(a)(1). 81 See id. § 2(a)(2). The exponential growth of unsolicited commercial email is shown by reference to the same data in 2001 where commercial email represented only seven percent of electronic mail traffic. See id. 15 attorney communication is the lawyer’s pecuniary gain.82 As such, solicitations of employment almost always fall within the ambit of the rules. In order to determine if an email containing a link is subject to state regulation, one must initially determine whether a significant motive for the email is a lawyer’s pecuniary gain. The Utah Committee has advised that any newsletter, alert or brochure that encourages the recipient to contact the firm for more information is a solicitation of professional employment and thus subject to the Utah Rules.83 A link in an email that is not otherwise a solicitation could be viewed as an encouragement to contact the firm for more information. This interpretation would result in broad application of state ethics rules if attorneys include a link to their firm in emails as a matter of course. Even if the inclusion of a link to the firm website does not make an email a solicitation subject to regulation, most state ethics rules regulate the domain names directly.84 The Maryland State Bar Association Committee on Ethics has recognized that an Internet domain name is a communication subject to the general requirement that attorney communications not be false or misleading.85 Avoiding a false or misleading domain name does 82 See, e.g., Tenn. Rules R. 7.3(c). Some state rules simply require that a motive of the communication is pecuniary gain. See Ariz. Rules ER 7.3(a). A few states mention “significant motive” only in the prohibition against in-person contact, but the later use of the undefined term “solicitation” in their rules suggests that the “significant motive” requirement applies to the entire body of advertising rules. See, e.g., Utah Rules R. 7.3. Finally states such as Delaware prohibit in-person communication where a significant motive is the lawyer’s pecuniary gain, but regulate all written communication “soliciting professional employment.” See Del. Lawyers’ Rules of Prof’l Conduct R. 7.3(a)-(b) (2003). Since the solicitation of employment is likely to be significantly motivated by the attorney’s pecuniary gain, the rule in Delaware applies in a similar fashion to rules from states using the significant motive test directly. See id. 83 See Utah State Bar Ethics Comm., Op. 02-02 (2002). 84 See Bar Ass’n of the City of N.Y. Comm. on Prof’l Ethics, Op. 2003-01 (undated). 16 not necessarily require an attorney to use the firm’s name, but does require refraining from including descriptive phrases in the name itself.86 State jurisdictions have cautioned lawyers against using such domain names as “bestlawyer.com,” “bigverdict.com,” or “personalinjuryexpert.com.”87 In response to a specific inquiry, the Arizona Committee advised a law firm against adopting the domain names “countybar.com” or “arizonalawyer.org.”88 Use of “countybar.com” is unacceptable as it erroneously suggests an affiliation between the law firm and the local bar association.89 And “arizonalawyer.org” cannot be used because the “.org” designation is meant to indicate a non-profit organization. The use of “.org” by a private law firm would be misleading because it would suggest that the firm was not operating for profit.90 3. Preemption The CAN-SPAM Act expressly supersedes any state rule that regulates the use of electronic mail to send commercial messages, except to the extent that the state law prohibits falsity or deception in the message or attachments.91 Since all of the state ethics rules discussed in this memo are couched in terms of the prevention of false or misleading communications it 85 See Md. State Bar Ass’n. Comm. on Ethics Op. 02-18 (2002); see also Cal. State Bar Standing Comm. on Prof’l Responsibility, Op. 2001-155 (2001). 86 See Md. State Bar Ass’n. Comm. on Ethics, Op. 02-18 (2002). 87 See, e.g., Bar Ass’n of the City of N.Y. Comm. on Prof’l Ethics, Op. 2003-01 (undated) (names seeking to promote the lawyer’s skill or talent may be considered misleading). 88 See Ariz. Comm. on Rules of professional Conduct, Op. 2001-05 (2001). 89 See id. The Arizona Committee reminded all lawyers that the Rules of Professional Conduct “do not require evidence of actual or even potential confusion; they require that lawyers refrain from false, deceptive or misleading communications.” Id. 90 See id. 91 CAN-SPAM § 8(b)(1). 17 would seem that none are preempted.92 Instead, the state rules could be viewed as additions to the requirements of CAN-SPAM where attorneys send unsolicited commercial email material. One United States district court has discussed the preemptive effect of the CAN-SPAM Act. In White Buffalo Ventures v. The University of Texas at Austin, the court held that the CAN-SPAM Act did not preempt the University’s pre-existing email filter of certain unwanted commercial solicitation.93 Although this holding is not based on the CAN-SPAM Act’s allowance for the continued viability of state rules that prevent falsity or deception, it is evidence that the various requirements of state ethics rules consistent with or in addition to CAN-SPAM are still valid. Since both sets of regulations likely apply to electronic communication by attorneys, a number of additional issues arise. Some of the additional issues, not addressed in this memo, involving application of both the CAN-SPAM Act and state ethics rules to attorney emails, are as follows: Is a violation of the CAN-SPAM Act also a violation of state ethics rules?94 Can individuals enforce the CANSPAM act through state ethics rules?95 Which ethics rules apply to emails that cross borders?96 92 See, e.g., Model Rules R. 7.1 (“a lawyer shall not make a false or misleading communication.”). 93 See White Buffalo Ventures v. The Univ. of Tex at Austin, No. A-03-CA-296-SS, slip op. at 7 (W.D. Tex. Mar. 9, 2004). 94 Model Rule 8.4(c) states that it is professional misconduct to “engage in conduct involving dishonesty, fraud, deceit or misrepresentation.” See Model Rules R. 8.4(c). Violating the prohibition in CAN-SPAM of avoiding false or misleading transmission information may be conduct involving deceit or misrepresentation. See CAN-SPAM § 5(a)(1)-(2). It is not clear however, that the failure to provide the proper opt-out information, or the failure to avoid contacting a person who has opted out is conduct necessarily involving dishonestly, fraud, deceit or misrepresentation. See id. § 5(a)(3)(5). 95 CAN-SPAM is by its terms enforceable only by the Federal Trade Commission, or the state attorney generals. See CAN-SPAM § 7(a), (f). But if a violation of CAN-SPAM is concurrently a violation of the state’s ethics rules, then it is possible that an individual 18 Although a complete analysis of these issues is not within the scope of this discussion, their existence adds to an understanding of the difficult and confusing position attorneys are in with respect to their electronic communications. IV. Conclusion Attorneys across the country need to become informed about the provisions of the CANSPAM Act, and how the new regulations interact with their jurisdiction’s rules of ethics. Although the CAN-SPAM Act does not mention attorneys specifically, its provisions apply to conduct engaged in by most lawyers every day. Many current state ethics rules governing Internet communication are out of date, are confusing, or both. Amendment of these rules to include express reference to the Internet, and regulation consistent with CAN-SPAM, would help to provide attorneys with a recognizable rule regarding their conduct. This may prevent lawyers from violating a new federal law, annoying prospective clients, and embarrassing the profession. 636277v2 could bring an ethics complaint that would relate to violation of the CAN-SPAM provisions. See Model Rules R. 8.4. 96 Model Rule 8.5(a) provides that a lawyer is subject to the disciplinary authority of the jurisdiction in which he or she practices, along with the authority of a jurisdiction in which the lawyer provides or offers to provide legal services. See Model Rules R. 8.5(a). The Choice of law provision in Model Rule 8.5(b) allows the application of the rules of a jurisdiction in which the predominant effect of the conduct occurs. See id. § 8.5(b). The fluid and omnipresent nature of the Internet makes a clear interpretation of the “predominant effect” test difficult at best. 19 The Can-Spam Act: Potential Ethics Pitfalls Presented By Elizabeth Bowles, President, Aristotle.Net Inc. Michael Fleming, Special Counsel, Faegre & Benson LLP William Denny, Partner Potter Anderson & Corroon LLP Henry Judy, Of Counsel, Kirkpatrick & Lockhart LLP Dan Appelman, Partner, Heller Ehrman White & McAuliffe LLP Outline The History of Spam & Scary Spam Stats The Act’s Provisions The Rules of Professional Responsibility Best Practices The History of Spam What is E-mail? E-mail is data converted by the computer into digital bits of information for transmission over a wire or the airwaves. If using a land-line connection, all email goes over the phone wires. If sending e-mail from a cellular phone or PDA, e-mail is transmitted over the airwaves. Why Do We Like It? E-Mail W Convenient W Simple W Immediate W Expected WHAT IS SPAM? Spam = Unsolicited Commercial E-mail The Roots of Spam: Blame the Lawyers The Roots of Spam In 1994, two Phoenix lawyers hired a programmer to write code to send a message to tens of thousands of newsgroup users. This was the first SPAM. How did it get its name? Newsgroup members dubbed these messages “Spam” in honor of the well-known Monty Python bit. The name stuck. Scary Spam Stats Scary Spam Stats Over 60% of all mail received into U.S. inboxes is Spam! (Source: (Source: BrightMail) BrightMail) Scary Spam Stats • The majority of spammers are located in the U.S. • 90% of all spam is directed to computers inside the U.S. • As of this year for the first time, over 60% of all spam is coming from outside the U.S. Scary Spam Stats Increasingly, US spammers are using overseas servers to deliver their messages. Scary Spam Stats Spammers also use viruses and worms to attack unsuspecting computers and cause them to deliver their messages. These computers are called Zombies Scary Spam Stats Spam cost U.S. Businesses $10 Billion in 2003 (online (online service) service) Scary Spam Stats 77% of spam is not fraudulent (excluding pornography) The Can-Spam Act of 2003 Can-Spam Act of 2003 • The DMA and most large ISPs opposed national legislation. • By 2003, 26 States, including Arkansas, had passed anti-spam legislation. • Numerous proposals competed in Congress, but none could get sufficient traction. Can-Spam Act of 2003 • In late 2003, California passed a 100% ban on all spam being sent to California recipients. The new law had an effective date of Jan. 1, 2004. • The DMA and large ISPs realized that the multiplicity of state laws was a bad thing and reversed their position on national legislation. Can-Spam Act of 2003 • Congress took the front-runner, Burns Wyden, modified it and rushed it through. • Congress “punted” on anything controversial or time consuming to resolve: • Do not spam registry • “Bounty” for turning in spammers The Can-Spam Act means You Can Spam Can-Spam Act of 2003 The Act’s definition of Spam: “Any electronic mail message the primary purpose of which is the commercial advertisement or promotion of a commercial product of service (including content on an Internet website operated for a commercial purpose).” Can-Spam Act of 2003 • The FTC has primary enforcement powers and must issue “primary purpose” rulemaking to define key terms. • The FTC has yet to issue final rulemaking, but the Act is currently in force. Can-Spam Act of 2003 What the Act Requires • The header, “from” line, and subject line must not be false or misleading. • Every solicitation must clearly and conspicuously include a functioning return address or other Internetbased mechanism to allow recipients to opt-out. Can-Spam Act of 2003 What the Act Requires • The sender must remove anyone who requests it within 10 business days of the request. • This is not required if the person subsequently re-subscribes. Can-Spam Act of 2003 Each e-mail solicitation must contain the following: • Clear and conspicuous identification that the e-mail is an advertisement or solicitation; • Clear and conspicuous notice of the opportunity to opt-out; and • A valid “physical postal” address of the sender. Can-Spam Act of 2003 Notice that the e-mail is a solicitation is not required if the recipient has given prior affirmative consent. Spammer Sentenced to 7 Years in Prison A man who sent 850 million junk e-mails through accounts he opened with stolen identities was sentenced to up to seven years in prison on Thursday. May 28, 2004 Can-Spam Act of 2003 So what relevance does all this have for attorneys? The Rules of Professional Responsibility Rules of Professional Responsibility The Easy Case The Rules obviously apply if an e-mail contains direct promotion of the attorney’s services or would otherwise qualify as solicitation of potential clients. Rules of Professional Responsibility The Tougher Case What if the e-mail or e-newsletter does not contain direct promotion but rather contains useful information, current events, or legal updates? Rules of Professional Responsibility Traditionally, these types of legal communications have not been considered advertising in spite of their marketing benefit. Can-Spam may change this. Rules of Professional Responsibility The key is in the definition of “primary purpose”: The FTC is considering defining the term to mean that the marketing message is “more than incidental to the email.” What Rules Apply? The Advertising Rules – 7.1-7.5 • Rule 7.1 • Can-Spam only prohibits (and criminalizes) fraudulent statements. • Rule 7.1 governs that which is not fraudulent, but may not be 100% truthful. What Rules Apply? Rule 7.1: The Content • Do not make false or misleading statements – your communication may not contain a material misrepresentation of fact or law or omit a necessary fact. • Do not create unjustifiable expectations of the results you can obtain. What Rules Apply? Can-Spam: The Structure • Can-Spam requires that the transmission information not be materially false or misleading. • Technically accurate information obtained in a fraudulent manner is prohibited. What Rules Apply? What does this mean? • The attorney or firm must ensure that whoever is sending the enewsletter is transmitting accurate information. • Some e-newsletter services provide legitimate services to one set of clients while spamming for others. What Rules Apply? Rule 7.2: You May Advertise Because the Rule predates the Internet, it does not specifically address websites or e-mail. Nonetheless, the term “written communication” fairly can be interpreted to include e-mail. What Rules Apply? Rule 7.2 • Retain a copy of any e-mail communications for 5 years. • Keep track of to whom and when the communication was sent. • Include the name and geographic location of at least one attorney licensed to practice in Arkansas. What Rules Apply? Can-Spam & 7.2 • Can-Spam requires a “physical postal address” be included. This may mean that a P.O. Box or mail drop would be allowed. • Rule 7.2 requires a geographic location of the offices. A Mail drop or P.O. Box in all likelihood is not sufficient. What Rules Apply? Rule 7.3: Solicitation • A lawyer shall not solicit, by any form of direct contact. . . professional employment . .. .when a significant motive is pecuniary gain. • EXCEPTION: Solicitation permitted in writing by regular mail, provided the word ADVERTISEMENT is included on the envelope face. What Rules Apply? Rule 7.3 On its face, this rule appears to preclude the use of e-mail for solicitation of potential clients. • E-mail can’t be sent by regular mail • There is no envelope on which to write ADVERTISEMENT What Rules Apply? Rule 7.3 Ohio has found that although 7.3 does not apply on its face, attorneys should use “due diligence” to ensure their communications comply. • Labeling in the subject line • Inclusion of appropriate text in the body What Rules Apply? Rule 7.4: Specialization The prohibition against declaring oneself a “specialist” applies equally to the context of e-mail communication and e-newsletters. If it’s not acceptable in a firm brochure or print ad, it’s not acceptable in an e-mail message. What Rules Apply? Rule 7.5: What’s in a Name A trade name is permissible so long as it does not violate Rule 7.1 The name cannot be false or misleading. A domain name may be considered a trade name unless it is the name of the firm. What Rules Apply? Rule 7.5 & Can-Spam The “from” line cannot be false or misleading Example: From: Mass Tort Attorney permissible from a mass tort attorney impermissible from a tax attorney What Rules Apply? Rule 7.5 & Can-Spam Odds are if you comply with the requirements of 7.5, you will satisfy Can-Spam as well. Best Practices Best Practices Overview – Best Practices • • • • • • E-Mail Template – Notice – Opt-Out and Opt-In – Physical Address Distribution – Who can distribute? Systems Integration Staff Instruction and Training Documentation Compliance Testing Best Practices 1. "It is unlawful for any person to initiate the transmission of any commercial electronic mail message ... unless the message provides clear and conspicuous identification that the message is an advertisement or solicitation...". [The FTC's regulatory authority] "may not be construed to authorize the Commission to establish a requirement pursuant to section 5(a)(5)(A) to include any specific words, characters, marks, or labels in a commercial electronic mail message..." 4. ... unless the message provides ... a valid physical postal address of the sender." Best Practices 2. “…clear and conspicuous notice of the opportunity ... to decline to receive further commercial electronic mail messages from the sender 3. MORE DETAILED OPTIONS POSSIBLE.—The person initiating a commercial electronic mail message may comply with subparagraph (A)(i) by providing the recipient a list or menu from which the recipient may choose the specific types of commercial electronic mail messages the recipient wants to receive or does not want to receive from the sender,if the list or menu includes an option under which the recipient may choose not to receive any commercial electronic mail messages from the sender. Best Practices Distribution and Systems • Distribution - Who can distribute? – Individual Attorneys (inc. assistants & paralegals) – Marketing Department – Both? • Systems Integration – How do the opt-outs, out-ins etc get tied to e-mails lists, databases, CRM software? Best Practices Administrative • Staff Instruction and Training – Reliance on osmosis does not work • Documentation – Document your procedures • Compliance Testing – How do you know they are doing what they are supposed to be doing? Best Practices • Ask clients to agree in advance to e-mail communication. • Include an opt-out in each and every e-newsletter and honor opt-out requests. • Ensure that header, subject, and from line information is accurate, whether sent by you or a third party. Best Practices • If the content of the message is primarily commercial rather than informative (or if a significant motive is pecuniary gain), include clear and conspicuous identification that the message is an advertisement or solicitation. • Provide a physical (street) address. Best Practices Recommended but not Required • Double opt-in. • Letting the recipient know how you got his or her e-mail address. .net One Hundred Eighth Congress of the United States of America AT THE FIRST SESSION Begun and held at the City of Washington on Tuesday, the seventh day of January, two thousand and three An Act To regulate interstate commerce by imposing limitations and penalties on the transmission of unsolicited commercial electronic mail via the Internet. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SECTION 1. SHORT TITLE. This Act may be cited as the `Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003', or the `CAN-SPAM Act of 2003'. SEC. 2. CONGRESSIONAL FINDINGS AND POLICY. (a) FINDINGS- The Congress finds the following: (1) Electronic mail has become an extremely important and popular means of communication, relied on by millions of Americans on a daily basis for personal and commercial purposes. Its low cost and global reach make it extremely convenient and efficient, and offer unique opportunities for the development and growth of frictionless commerce. (2) The convenience and efficiency of electronic mail are threatened by the extremely rapid growth in the volume of unsolicited commercial electronic mail. Unsolicited commercial electronic mail is currently estimated to account for over half of all electronic mail traffic, up from an estimated 7 percent in 2001, and the volume continues to rise. Most of these messages are fraudulent or deceptive in one or more respects. (3) The receipt of unsolicited commercial electronic mail may result in costs to recipients who cannot refuse to accept such mail and who incur costs for the storage of such mail, or for the time spent accessing, reviewing, and discarding such mail, or for both. (4) The receipt of a large number of unwanted messages also decreases the convenience of electronic mail and creates a risk that wanted electronic mail messages, both commercial and noncommercial, will be lost, overlooked, or discarded amidst the larger volume of unwanted messages, thus reducing the reliability and usefulness of electronic mail to the recipient. (5) Some commercial electronic mail contains material that many recipients may consider vulgar or pornographic in nature. (6) The growth in unsolicited commercial electronic mail imposes significant monetary costs on providers of Internet access services, businesses, and educational and nonprofit institutions that carry and receive such mail, as there is a finite volume of mail that such providers, businesses, and institutions can handle without further investment in infrastructure. (7) Many senders of unsolicited commercial electronic mail purposefully disguise the source of such mail. (8) Many senders of unsolicited commercial electronic mail purposefully include misleading information in the messages' subject lines in order to induce the recipients to view the messages. (9) While some senders of commercial electronic mail messages provide simple and reliable ways for recipients to reject (or `optout' of) receipt of commercial electronic mail from such senders in the future, other senders provide no such `opt-out' mechanism, or refuse to honor the requests of recipients not to receive electronic mail from such senders in the future, or both. (10) Many senders of bulk unsolicited commercial electronic mail use computer programs to gather large numbers of electronic mail addresses on an automated basis from Internet websites or online services where users must post their addresses in order to make full use of the website or service. (11) Many States have enacted legislation intended to regulate or reduce unsolicited commercial electronic mail, but these statutes impose different standards and requirements. As a result, they do not appear to have been successful in addressing the problems associated with unsolicited commercial electronic mail, in part because, since an electronic mail address does not specify a geographic location, it can be extremely difficult for law-abiding businesses to know with which of these disparate statutes they are required to comply. (12) The problems associated with the rapid growth and abuse of unsolicited commercial electronic mail cannot be solved by Federal legislation alone. The development and adoption of technological approaches and the pursuit of cooperative efforts with other countries will be necessary as well. (b) CONGRESSIONAL DETERMINATION OF PUBLIC POLICY- On the basis of the findings in subsection (a), the Congress determines that-(1) there is a substantial government interest in regulation of commercial electronic mail on a nationwide basis; (2) senders of commercial electronic mail should not mislead recipients as to the source or content of such mail; and (3) recipients of commercial electronic mail have a right to decline to receive additional commercial electronic mail from the same source. SEC. 3. DEFINITIONS. In this Act: (1) AFFIRMATIVE CONSENT- The term `affirmative consent', when used with respect to a commercial electronic mail message, means that-(A) the recipient expressly consented to receive the message, either in response to a clear and conspicuous request for such consent or at the recipient's own initiative; and (B) if the message is from a party other than the party to which the recipient communicated such consent, the recipient was given clear and conspicuous notice at the time the consent was communicated that the recipient's electronic mail address could be transferred to such other party for the purpose of initiating commercial electronic mail messages. (2) Commercial electronic mail message(A) IN GENERAL- The term `commercial electronic mail message' means any electronic mail message the primary purpose of which is the commercial advertisement or promotion of a commercial product or service (including content on an Internet website operated for a commercial purpose). (B) TRANSACTIONAL OR RELATIONSHIP MESSAGES- The term `commercial electronic mail message' does not include a transactional or relationship message. (C) REGULATIONS REGARDING PRIMARY PURPOSE- Not later than 12 months after the date of the enactment of this Act, the Commission shall issue regulations pursuant to section 13 defining the relevant criteria to facilitate the determination of the primary purpose of an electronic mail message. (D) REFERENCE TO COMPANY OR WEBSITE- The inclusion of a reference to a commercial entity or a link to the website of a commercial entity in an electronic mail message does not, by itself, cause such message to be treated as a commercial electronic mail message for purposes of this Act if the contents or circumstances of the message indicate a primary purpose other than commercial advertisement or promotion of a commercial product or service. (3) COMMISSION- The term `Commission' means the Federal Trade Commission. (4) DOMAIN NAME- The term `domain name' means any alphanumeric designation which is registered with or assigned by any domain name registrar, domain name registry, or other domain name registration authority as part of an electronic address on the Internet. (5) ELECTRONIC MAIL ADDRESS- The term `electronic mail address' means a destination, commonly expressed as a string of characters, consisting of a unique user name or mailbox (commonly referred to as the `local part') and a reference to an Internet domain (commonly referred to as the `domain part'), whether or not displayed, to which an electronic mail message can be sent or delivered. (6) ELECTRONIC MAIL MESSAGE- The term `electronic mail message' means a message sent to a unique electronic mail address. (7) FTC ACT- The term `FTC Act' means the Federal Trade Commission Act (15 U.S.C. 41 et seq.). (8) HEADER INFORMATION- The term `header information' means the source, destination, and routing information attached to an electronic mail message, including the originating domain name and originating electronic mail address, and any other information that appears in the line identifying, or purporting to identify, a person initiating the message. (9) INITIATE- The term `initiate', when used with respect to a commercial electronic mail message, means to originate or transmit such message or to procure the origination or transmission of such message, but shall not include actions that constitute routine conveyance of such message. For purposes of this paragraph, more than one person may be considered to have initiated a message. (10) INTERNET- The term `Internet' has the meaning given that term in the Internet Tax Freedom Act (47 U.S.C. 151 nt). (11) INTERNET ACCESS SERVICE- The term `Internet access service' has the meaning given that term in section 231(e)(4) of the Communications Act of 1934 (47 U.S.C. 231(e)(4)). (12) PROCURE- The term `procure', when used with respect to the initiation of a commercial electronic mail message, means intentionally to pay or provide other consideration to, or induce, another person to initiate such a message on one's behalf. (13) PROTECTED COMPUTER- The term `protected computer' has the meaning given that term in section 1030(e)(2)(B) of title 18, United States Code. (14) RECIPIENT- The term `recipient', when used with respect to a commercial electronic mail message, means an authorized user of the electronic mail address to which the message was sent or delivered. If a recipient of a commercial electronic mail message has one or more electronic mail addresses in addition to the address to which the message was sent or delivered, the recipient shall be treated as a separate recipient with respect to each such address. If an electronic mail address is reassigned to a new user, the new user shall not be treated as a recipient of any commercial electronic mail message sent or delivered to that address before it was reassigned. (15) ROUTINE CONVEYANCE- The term `routine conveyance' means the transmission, routing, relaying, handling, or storing, through an automatic technical process, of an electronic mail message for which another person has identified the recipients or provided the recipient addresses. (16) SENDER(A) IN GENERAL- Except as provided in subparagraph (B), the term `sender', when used with respect to a commercial electronic mail message, means a person who initiates such a message and whose product, service, or Internet web site is advertised or promoted by the message. (B) SEPARATE LINES OF BUSINESS OR DIVISIONSIf an entity operates through separate lines of business or divisions and holds itself out to the recipient throughout the message as that particular line of business or division rather than as the entity of which such line of business or division is a part, then the line of business or the division shall be treated as the sender of such message for purposes of this Act. (17) Transactional or relationship message(A) IN GENERAL- The term `transactional or relationship message' means an electronic mail message the primary purpose of which is-(i) to facilitate, complete, or confirm a commercial transaction that the recipient has previously agreed to enter into with the sender; (ii) to provide warranty information, product recall information, or safety or security information with respect to a commercial product or service used or purchased by the recipient; (iii) to provide-(I) notification concerning a change in the terms or features of; (II) notification of a change in the recipient's standing or status with respect to; or (III) at regular periodic intervals, account balance information or other type of account statement with respect to, a subscription, membership, account, loan, or comparable ongoing commercial relationship involving the ongoing purchase or use by the recipient of products or services offered by the sender; (iv) to provide information directly related to an employment relationship or related benefit plan in which the recipient is currently involved, participating, or enrolled; or (v) to deliver goods or services, including product updates or upgrades, that the recipient is entitled to receive under the terms of a transaction that the recipient has previously agreed to enter into with the sender. (B) MODIFICATION OF DEFINITION- The Commission by regulation pursuant to section 13 may modify the definition in subparagraph (A) to expand or contract the categories of messages that are treated as transactional or relationship messages for purposes of this Act to the extent that such modification is necessary to accommodate changes in electronic mail technology or practices and accomplish the purposes of this Act. SEC. 4. PROHIBITION AGAINST PREDATORY AND ABUSIVE COMMERCIAL EMAIL. (a) OFFENSE(1) IN GENERAL- Chapter 47 of title 18, United States Code, is amended by adding at the end the following new section: `Sec. 1037. Fraud and related activity in connection with electronic mail `(a) IN GENERAL- Whoever, in or affecting interstate or foreign commerce, knowingly-`(1) accesses a protected computer without authorization, and intentionally initiates the transmission of multiple commercial electronic mail messages from or through such computer, `(2) uses a protected computer to relay or retransmit multiple commercial electronic mail messages, with the intent to deceive or mislead recipients, or any Internet access service, as to the origin of such messages, `(3) materially falsifies header information in multiple commercial electronic mail messages and intentionally initiates the transmission of such messages, `(4) registers, using information that materially falsifies the identity of the actual registrant, for five or more electronic mail accounts or online user accounts or two or more domain names, and intentionally initiates the transmission of multiple commercial electronic mail messages from any combination of such accounts or domain names, or `(5) falsely represents oneself to be the registrant or the legitimate successor in interest to the registrant of 5 or more Internet Protocol addresses, and intentionally initiates the transmission of multiple commercial electronic mail messages from such addresses, or conspires to do so, shall be punished as provided in subsection (b). `(b) PENALTIES- The punishment for an offense under subsection (a) is-`(1) a fine under this title, imprisonment for not more than 5 years, or both, if-`(A) the offense is committed in furtherance of any felony under the laws of the United States or of any State; or `(B) the defendant has previously been convicted under this section or section 1030, or under the law of any State for conduct involving the transmission of multiple commercial electronic mail messages or unauthorized access to a computer system; `(2) a fine under this title, imprisonment for not more than 3 years, or both, if-`(A) the offense is an offense under subsection (a)(1); `(B) the offense is an offense under subsection (a)(4) and involved 20 or more falsified electronic mail or online user account registrations, or 10 or more falsified domain name registrations; `(C) the volume of electronic mail messages transmitted in furtherance of the offense exceeded 2,500 during any 24hour period, 25,000 during any 30-day period, or 250,000 during any 1-year period; `(D) the offense caused loss to one or more persons aggregating $5,000 or more in value during any 1-year period; `(E) as a result of the offense any individual committing the offense obtained anything of value aggregating $5,000 or more during any 1-year period; or `(F) the offense was undertaken by the defendant in concert with three or more other persons with respect to whom the defendant occupied a position of organizer or leader; and `(3) a fine under this title or imprisonment for not more than 1 year, or both, in any other case. `(c) FORFEITURE- `(1) IN GENERAL- The court, in imposing sentence on a person who is convicted of an offense under this section, shall order that the defendant forfeit to the United States-`(A) any property, real or personal, constituting or traceable to gross proceeds obtained from such offense; and `(B) any equipment, software, or other technology used or intended to be used to commit or to facilitate the commission of such offense. `(2) PROCEDURES- The procedures set forth in section 413 of the Controlled Substances Act (21 U.S.C. 853), other than subsection (d) of that section, and in Rule 32.2 of the Federal Rules of Criminal Procedure, shall apply to all stages of a criminal forfeiture proceeding under this section. `(d) DEFINITIONS- In this section: `(1) LOSS- The term `loss' has the meaning given that term in section 1030(e) of this title. `(2) MATERIALLY- For purposes of paragraphs (3) and (4) of subsection (a), header information or registration information is materially falsified if it is altered or concealed in a manner that would impair the ability of a recipient of the message, an Internet access service processing the message on behalf of a recipient, a person alleging a violation of this section, or a law enforcement agency to identify, locate, or respond to a person who initiated the electronic mail message or to investigate the alleged violation. `(3) MULTIPLE- The term `multiple' means more than 100 electronic mail messages during a 24-hour period, more than 1,000 electronic mail messages during a 30-day period, or more than 10,000 electronic mail messages during a 1-year period. `(4) OTHER TERMS- Any other term has the meaning given that term by section 3 of the CAN-SPAM Act of 2003.'. (2) CONFORMING AMENDMENT- The chapter analysis for chapter 47 of title 18, United States Code, is amended by adding at the end the following: `Sec. `1037. Fraud and related activity in connection with electronic mail.'. (b) UNITED STATES SENTENCING COMMISSION(1) DIRECTIVE- Pursuant to its authority under section 994(p) of title 28, United States Code, and in accordance with this section, the United States Sentencing Commission shall review and, as appropriate, amend the sentencing guidelines and policy statements to provide appropriate penalties for violations of section 1037 of title 18, United States Code, as added by this section, and other offenses that may be facilitated by the sending of large quantities of unsolicited electronic mail. (2) REQUIREMENTS- In carrying out this subsection, the Sentencing Commission shall consider providing sentencing enhancements for-(A) those convicted under section 1037 of title 18, United States Code, who-(i) obtained electronic mail addresses through improper means, including-(I) harvesting electronic mail addresses of the users of a website, proprietary service, or other online public forum operated by another person, without the authorization of such person; and (II) randomly generating electronic mail addresses by computer; or (ii) knew that the commercial electronic mail messages involved in the offense contained or advertised an Internet domain for which the registrant of the domain had provided false registration information; and (B) those convicted of other offenses, including offenses involving fraud, identity theft, obscenity, child pornography, and the sexual exploitation of children, if such offenses involved the sending of large quantities of electronic mail. (c) SENSE OF CONGRESS- It is the sense of Congress that-(1) Spam has become the method of choice for those who distribute pornography, perpetrate fraudulent schemes, and introduce viruses, worms, and Trojan horses into personal and business computer systems; and (2) the Department of Justice should use all existing law enforcement tools to investigate and prosecute those who send bulk commercial e-mail to facilitate the commission of Federal crimes, including the tools contained in chapters 47 and 63 of title 18, United States Code (relating to fraud and false statements); chapter 71 of title 18, United States Code (relating to obscenity); chapter 110 of title 18, United States Code (relating to the sexual exploitation of children); and chapter 95 of title 18, United States Code (relating to racketeering), as appropriate. SEC. 5. OTHER PROTECTIONS FOR USERS OF COMMERCIAL ELECTRONIC MAIL. (a) REQUIREMENTS FOR TRANSMISSION OF MESSAGES(1) PROHIBITION OF FALSE OR MISLEADING TRANSMISSION INFORMATION- It is unlawful for any person to initiate the transmission, to a protected computer, of a commercial electronic mail message, or a transactional or relationship message, that contains, or is accompanied by, header information that is materially false or materially misleading. For purposes of this paragraph-(A) header information that is technically accurate but includes an originating electronic mail address, domain name, or Internet Protocol address the access to which for purposes of initiating the message was obtained by means of false or fraudulent pretenses or representations shall be considered materially misleading; (B) a `from' line (the line identifying or purporting to identify a person initiating the message) that accurately identifies any person who initiated the message shall not be considered materially false or materially misleading; and (C) header information shall be considered materially misleading if it fails to identify accurately a protected computer used to initiate the message because the person initiating the message knowingly uses another protected computer to relay or retransmit the message for purposes of disguising its origin. (2) PROHIBITION OF DECEPTIVE SUBJECT HEADINGS- It is unlawful for any person to initiate the transmission to a protected computer of a commercial electronic mail message if such person has actual knowledge, or knowledge fairly implied on the basis of objective circumstances, that a subject heading of the message would be likely to mislead a recipient, acting reasonably under the circumstances, about a material fact regarding the contents or subject matter of the message (consistent with the criteria used in enforcement of section 5 of the Federal Trade Commission Act (15 U.S.C. 45)). (3) Inclusion of return address or comparable mechanism in commercial electronic mail(A) IN GENERAL- It is unlawful for any person to initiate the transmission to a protected computer of a commercial electronic mail message that does not contain a functioning return electronic mail address or other Internet-based mechanism, clearly and conspicuously displayed, that-(i) a recipient may use to submit, in a manner specified in the message, a reply electronic mail message or other form of Internet-based communication requesting not to receive future commercial electronic mail messages from that sender at the electronic mail address where the message was received; and (ii) remains capable of receiving such messages or communications for no less than 30 days after the transmission of the original message. (B) MORE DETAILED OPTIONS POSSIBLE- The person initiating a commercial electronic mail message may comply with subparagraph (A)(i) by providing the recipient a list or menu from which the recipient may choose the specific types of commercial electronic mail messages the recipient wants to receive or does not want to receive from the sender, if the list or menu includes an option under which the recipient may choose not to receive any commercial electronic mail messages from the sender. (C) TEMPORARY INABILITY TO RECEIVE MESSAGES OR PROCESS REQUESTS- A return electronic mail address or other mechanism does not fail to satisfy the requirements of subparagraph (A) if it is unexpectedly and temporarily unable to receive messages or process requests due to a technical problem beyond the control of the sender if the problem is corrected within a reasonable time period. (4) PROHIBITION OF TRANSMISSION OF COMMERCIAL ELECTRONIC MAIL AFTER OBJECTION(A) IN GENERAL- If a recipient makes a request using a mechanism provided pursuant to paragraph (3) not to receive some or any commercial electronic mail messages from such sender, then it is unlawful-(i) for the sender to initiate the transmission to the recipient, more than 10 business days after the receipt of such request, of a commercial electronic mail message that falls within the scope of the request; (ii) for any person acting on behalf of the sender to initiate the transmission to the recipient, more than 10 business days after the receipt of such request, of a commercial electronic mail message with actual knowledge, or knowledge fairly implied on the basis of objective circumstances, that such message falls within the scope of the request; (iii) for any person acting on behalf of the sender to assist in initiating the transmission to the recipient, through the provision or selection of addresses to which the message will be sent, of a commercial electronic mail message with actual knowledge, or knowledge fairly implied on the basis of objective circumstances, that such message would violate clause (i) or (ii); or (iv) for the sender, or any other person who knows that the recipient has made such a request, to sell, lease, exchange, or otherwise transfer or release the electronic mail address of the recipient (including through any transaction or other transfer involving mailing lists bearing the electronic mail address of the recipient) for any purpose other than compliance with this Act or other provision of law. (B) SUBSEQUENT AFFIRMATIVE CONSENT- A prohibition in subparagraph (A) does not apply if there is affirmative consent by the recipient subsequent to the request under subparagraph (A). (5) INCLUSION OF IDENTIFIER, OPT-OUT, AND PHYSICAL ADDRESS IN COMMERCIAL ELECTRONIC MAIL- (A) It is unlawful for any person to initiate the transmission of any commercial electronic mail message to a protected computer unless the message provides-(i) clear and conspicuous identification that the message is an advertisement or solicitation; (ii) clear and conspicuous notice of the opportunity under paragraph (3) to decline to receive further commercial electronic mail messages from the sender; and (iii) a valid physical postal address of the sender. (B) Subparagraph (A)(i) does not apply to the transmission of a commercial electronic mail message if the recipient has given prior affirmative consent to receipt of the message. (6) MATERIALLY- For purposes of paragraph (1), the term `materially', when used with respect to false or misleading header information, includes the alteration or concealment of header information in a manner that would impair the ability of an Internet access service processing the message on behalf of a recipient, a person alleging a violation of this section, or a law enforcement agency to identify, locate, or respond to a person who initiated the electronic mail message or to investigate the alleged violation, or the ability of a recipient of the message to respond to a person who initiated the electronic message. (b) Aggravated Violations Relating to Commercial Electronic Mail(1) Address harvesting and dictionary attacks(A) IN GENERAL- It is unlawful for any person to initiate the transmission, to a protected computer, of a commercial electronic mail message that is unlawful under subsection (a), or to assist in the origination of such message through the provision or selection of addresses to which the message will be transmitted, if such person had actual knowledge, or knowledge fairly implied on the basis of objective circumstances, that-- (i) the electronic mail address of the recipient was obtained using an automated means from an Internet website or proprietary online service operated by another person, and such website or online service included, at the time the address was obtained, a notice stating that the operator of such website or online service will not give, sell, or otherwise transfer addresses maintained by such website or online service to any other party for the purposes of initiating, or enabling others to initiate, electronic mail messages; or (ii) the electronic mail address of the recipient was obtained using an automated means that generates possible electronic mail addresses by combining names, letters, or numbers into numerous permutations. (B) DISCLAIMER- Nothing in this paragraph creates an ownership or proprietary interest in such electronic mail addresses. (2) AUTOMATED CREATION OF MULTIPLE ELECTRONIC MAIL ACCOUNTS- It is unlawful for any person to use scripts or other automated means to register for multiple electronic mail accounts or online user accounts from which to transmit to a protected computer, or enable another person to transmit to a protected computer, a commercial electronic mail message that is unlawful under subsection (a). (3) RELAY OR RETRANSMISSION THROUGH UNAUTHORIZED ACCESS- It is unlawful for any person knowingly to relay or retransmit a commercial electronic mail message that is unlawful under subsection (a) from a protected computer or computer network that such person has accessed without authorization. (c) SUPPLEMENTARY RULEMAKING AUTHORITY- The Commission shall by regulation, pursuant to section 13-(1) modify the 10-business-day period under subsection (a)(4)(A) or subsection (a)(4)(B), or both, if the Commission determines that a different period would be more reasonable after taking into account-(A) the purposes of subsection (a); (B) the interests of recipients of commercial electronic mail; and (C) the burdens imposed on senders of lawful commercial electronic mail; and (2) specify additional activities or practices to which subsection (b) applies if the Commission determines that those activities or practices are contributing substantially to the proliferation of commercial electronic mail messages that are unlawful under subsection (a). (d) REQUIREMENT TO PLACE WARNING LABELS ON COMMERCIAL ELECTRONIC MAIL CONTAINING SEXUALLY ORIENTED MATERIAL(1) IN GENERAL- No person may initiate in or affecting interstate commerce the transmission, to a protected computer, of any commercial electronic mail message that includes sexually oriented material and-(A) fail to include in subject heading for the electronic mail message the marks or notices prescribed by the Commission under this subsection; or (B) fail to provide that the matter in the message that is initially viewable to the recipient, when the message is opened by any recipient and absent any further actions by the recipient, includes only-(i) to the extent required or authorized pursuant to paragraph (2), any such marks or notices; (ii) the information required to be included in the message pursuant to subsection (a)(5); and (iii) instructions on how to access, or a mechanism to access, the sexually oriented material. (2) PRIOR AFFIRMATIVE CONSENT- Paragraph (1) does not apply to the transmission of an electronic mail message if the recipient has given prior affirmative consent to receipt of the message. (3) PRESCRIPTION OF MARKS AND NOTICES- Not later than 120 days after the date of the enactment of this Act, the Commission in consultation with the Attorney General shall prescribe clearly identifiable marks or notices to be included in or associated with commercial electronic mail that contains sexually oriented material, in order to inform the recipient of that fact and to facilitate filtering of such electronic mail. The Commission shall publish in the Federal Register and provide notice to the public of the marks or notices prescribed under this paragraph. (4) DEFINITION- In this subsection, the term `sexually oriented material' means any material that depicts sexually explicit conduct (as that term is defined in section 2256 of title 18, United States Code), unless the depiction constitutes a small and insignificant part of the whole, the remainder of which is not primarily devoted to sexual matters. (5) PENALTY- Whoever knowingly violates paragraph (1) shall be fined under title 18, United States Code, or imprisoned not more than 5 years, or both. SEC. 6. BUSINESSES KNOWINGLY PROMOTED BY ELECTRONIC MAIL WITH FALSE OR MISLEADING TRANSMISSION INFORMATION. (a) IN GENERAL- It is unlawful for a person to promote, or allow the promotion of, that person's trade or business, or goods, products, property, or services sold, offered for sale, leased or offered for lease, or otherwise made available through that trade or business, in a commercial electronic mail message the transmission of which is in violation of section 5(a)(1) if that person-(1) knows, or should have known in the ordinary course of that person's trade or business, that the goods, products, property, or services sold, offered for sale, leased or offered for lease, or otherwise made available through that trade or business were being promoted in such a message; (2) received or expected to receive an economic benefit from such promotion; and (3) took no reasonable action-(A) to prevent the transmission; or (B) to detect the transmission and report it to the Commission. (b) Limited Enforcement Against Third Parties(1) IN GENERAL- Except as provided in paragraph (2), a person (hereinafter referred to as the `third party') that provides goods, products, property, or services to another person that violates subsection (a) shall not be held liable for such violation. (2) EXCEPTION- Liability for a violation of subsection (a) shall be imputed to a third party that provides goods, products, property, or services to another person that violates subsection (a) if that third party-(A) owns, or has a greater than 50 percent ownership or economic interest in, the trade or business of the person that violated subsection (a); or (B)(i) has actual knowledge that goods, products, property, or services are promoted in a commercial electronic mail message the transmission of which is in violation of section 5(a)(1); and (ii) receives, or expects to receive, an economic benefit from such promotion. (c) EXCLUSIVE ENFORCEMENT BY FTC- Subsections (f) and (g) of section 7 do not apply to violations of this section. (d) SAVINGS PROVISION- Except as provided in section 7(f)(8), nothing in this section may be construed to limit or prevent any action that may be taken under this Act with respect to any violation of any other section of this Act. SEC. 7. ENFORCEMENT GENERALLY. (a) VIOLATION IS UNFAIR OR DECEPTIVE ACT OR PRACTICEExcept as provided in subsection (b), this Act shall be enforced by the Commission as if the violation of this Act were an unfair or deceptive act or practice proscribed under section 18(a)(1)(B) of the Federal Trade Commission Act (15 U.S.C. 57a(a)(1)(B)). (b) ENFORCEMENT BY CERTAIN OTHER AGENCIES- Compliance with this Act shall be enforced-(1) under section 8 of the Federal Deposit Insurance Act (12 U.S.C. 1818), in the case of-(A) national banks, and Federal branches and Federal agencies of foreign banks, by the Office of the Comptroller of the Currency; (B) member banks of the Federal Reserve System (other than national banks), branches and agencies of foreign banks (other than Federal branches, Federal agencies, and insured State branches of foreign banks), commercial lending companies owned or controlled by foreign banks, organizations operating under section 25 or 25A of the Federal Reserve Act (12 U.S.C. 601 and 611), and bank holding companies, by the Board; (C) banks insured by the Federal Deposit Insurance Corporation (other than members of the Federal Reserve System) and insured State branches of foreign banks, by the Board of Directors of the Federal Deposit Insurance Corporation; and (D) savings associations the deposits of which are insured by the Federal Deposit Insurance Corporation, by the Director of the Office of Thrift Supervision; (2) under the Federal Credit Union Act (12 U.S.C. 1751 et seq.) by the Board of the National Credit Union Administration with respect to any Federally insured credit union; (3) under the Securities Exchange Act of 1934 (15 U.S.C. 78a et seq.) by the Securities and Exchange Commission with respect to any broker or dealer; (4) under the Investment Company Act of 1940 (15 U.S.C. 80a-1 et seq.) by the Securities and Exchange Commission with respect to investment companies; (5) under the Investment Advisers Act of 1940 (15 U.S.C. 80b-1 et seq.) by the Securities and Exchange Commission with respect to investment advisers registered under that Act; (6) under State insurance law in the case of any person engaged in providing insurance, by the applicable State insurance authority of the State in which the person is domiciled, subject to section 104 of the Gramm-Bliley-Leach Act (15 U.S.C. 6701), except that in any State in which the State insurance authority elects not to exercise this power, the enforcement authority pursuant to this Act shall be exercised by the Commission in accordance with subsection (a); (7) under part A of subtitle VII of title 49, United States Code, by the Secretary of Transportation with respect to any air carrier or foreign air carrier subject to that part; (8) under the Packers and Stockyards Act, 1921 (7 U.S.C. 181 et seq.) (except as provided in section 406 of that Act (7 U.S.C. 226, 227)), by the Secretary of Agriculture with respect to any activities subject to that Act; (9) under the Farm Credit Act of 1971 (12 U.S.C. 2001 et seq.) by the Farm Credit Administration with respect to any Federal land bank, Federal land bank association, Federal intermediate credit bank, or production credit association; and (10) under the Communications Act of 1934 (47 U.S.C. 151 et seq.) by the Federal Communications Commission with respect to any person subject to the provisions of that Act. (c) EXERCISE OF CERTAIN POWERS- For the purpose of the exercise by any agency referred to in subsection (b) of its powers under any Act referred to in that subsection, a violation of this Act is deemed to be a violation of a Federal Trade Commission trade regulation rule. In addition to its powers under any provision of law specifically referred to in subsection (b), each of the agencies referred to in that subsection may exercise, for the purpose of enforcing compliance with any requirement imposed under this Act, any other authority conferred on it by law. (d) ACTIONS BY THE COMMISSION- The Commission shall prevent any person from violating this Act in the same manner, by the same means, and with the same jurisdiction, powers, and duties as though all applicable terms and provisions of the Federal Trade Commission Act (15 U.S.C. 41 et seq.) were incorporated into and made a part of this Act. Any entity that violates any provision of that subtitle is subject to the penalties and entitled to the privileges and immunities provided in the Federal Trade Commission Act in the same manner, by the same means, and with the same jurisdiction, power, and duties as though all applicable terms and provisions of the Federal Trade Commission Act were incorporated into and made a part of that subtitle. (e) AVAILABILITY OF CEASE-AND-DESIST ORDERS AND INJUNCTIVE RELIEF WITHOUT SHOWING OF KNOWLEDGENotwithstanding any other provision of this Act, in any proceeding or action pursuant to subsection (a), (b), (c), or (d) of this section to enforce compliance, through an order to cease and desist or an injunction, with section 5(a)(1)(C), section 5(a)(2), clause (ii), (iii), or (iv) of section 5(a)(4)(A), section 5(b)(1)(A), or section 5(b)(3), neither the Commission nor the Federal Communications Commission shall be required to allege or prove the state of mind required by such section or subparagraph. (f) Enforcement by States(1) CIVIL ACTION- In any case in which the attorney general of a State, or an official or agency of a State, has reason to believe that an interest of the residents of that State has been or is threatened or adversely affected by any person who violates paragraph (1) or (2) of section 5(a), who violates section 5(d), or who engages in a pattern or practice that violates paragraph (3), (4), or (5) of section 5(a), of this Act, the attorney general, official, or agency of the State, as parens patriae, may bring a civil action on behalf of the residents of the State in a district court of the United States of appropriate jurisdiction-(A) to enjoin further violation of section 5 of this Act by the defendant; or (B) to obtain damages on behalf of residents of the State, in an amount equal to the greater of-(i) the actual monetary loss suffered by such residents; or (ii) the amount determined under paragraph (3). (2) AVAILABILITY OF INJUNCTIVE RELIEF WITHOUT SHOWING OF KNOWLEDGE- Notwithstanding any other provision of this Act, in a civil action under paragraph (1)(A) of this subsection, the attorney general, official, or agency of the State shall not be required to allege or prove the state of mind required by section 5(a)(1)(C), section 5(a)(2), clause (ii), (iii), or (iv) of section 5(a)(4)(A), section 5(b)(1)(A), or section 5(b)(3). (3) Statutory damages(A) IN GENERAL- For purposes of paragraph (1)(B)(ii), the amount determined under this paragraph is the amount calculated by multiplying the number of violations (with each separately addressed unlawful message received by or addressed to such residents treated as a separate violation) by up to $250. (B) LIMITATION- For any violation of section 5 (other than section 5(a)(1)), the amount determined under subparagraph (A) may not exceed $2,000,000. (C) AGGRAVATED DAMAGES- The court may increase a damage award to an amount equal to not more than three times the amount otherwise available under this paragraph if-(i) the court determines that the defendant committed the violation willfully and knowingly; or (ii) the defendant's unlawful activity included one or more of the aggravating violations set forth in section 5(b). (D) REDUCTION OF DAMAGES- In assessing damages under subparagraph (A), the court may consider whether-(i) the defendant has established and implemented, with due care, commercially reasonable practices and procedures designed to effectively prevent such violations; or (ii) the violation occurred despite commercially reasonable efforts to maintain compliance the practices and procedures to which reference is made in clause (i). (4) ATTORNEY FEES- In the case of any successful action under paragraph (1), the court, in its discretion, may award the costs of the action and reasonable attorney fees to the State. (5) RIGHTS OF FEDERAL REGULATORS- The State shall serve prior written notice of any action under paragraph (1) upon the Federal Trade Commission or the appropriate Federal regulator determined under subsection (b) and provide the Commission or appropriate Federal regulator with a copy of its complaint, except in any case in which such prior notice is not feasible, in which case the State shall serve such notice immediately upon instituting such action. The Federal Trade Commission or appropriate Federal regulator shall have the right-(A) to intervene in the action; (B) upon so intervening, to be heard on all matters arising therein; (C) to remove the action to the appropriate United States district court; and (D) to file petitions for appeal. (6) CONSTRUCTION- For purposes of bringing any civil action under paragraph (1), nothing in this Act shall be construed to prevent an attorney general of a State from exercising the powers conferred on the attorney general by the laws of that State to-(A) conduct investigations; (B) administer oaths or affirmations; or (C) compel the attendance of witnesses or the production of documentary and other evidence. (7) VENUE; SERVICE OF PROCESS(A) VENUE- Any action brought under paragraph (1) may be brought in the district court of the United States that meets applicable requirements relating to venue under section 1391 of title 28, United States Code. (B) SERVICE OF PROCESS- In an action brought under paragraph (1), process may be served in any district in which the defendant-(i) is an inhabitant; or (ii) maintains a physical place of business. (8) LIMITATION ON STATE ACTION WHILE FEDERAL ACTION IS PENDING- If the Commission, or other appropriate Federal agency under subsection (b), has instituted a civil action or an administrative action for violation of this Act, no State attorney general, or official or agency of a State, may bring an action under this subsection during the pendency of that action against any defendant named in the complaint of the Commission or the other agency for any violation of this Act alleged in the complaint. (9) REQUISITE SCIENTER FOR CERTAIN CIVIL ACTIONSExcept as provided in section 5(a)(1)(C), section 5(a)(2), clause (ii), (iii), or (iv) of section 5(a)(4)(A), section 5(b)(1)(A), or section 5(b)(3), in a civil action brought by a State attorney general, or an official or agency of a State, to recover monetary damages for a violation of this Act, the court shall not grant the relief sought unless the attorney general, official, or agency establishes that the defendant acted with actual knowledge, or knowledge fairly implied on the basis of objective circumstances, of the act or omission that constitutes the violation. (g) Action by Provider of Internet Access Service(1) ACTION AUTHORIZED- A provider of Internet access service adversely affected by a violation of section 5(a)(1), 5(b), or 5(d), or a pattern or practice that violates paragraph (2), (3), (4), or (5) of section 5(a), may bring a civil action in any district court of the United States with jurisdiction over the defendant-(A) to enjoin further violation by the defendant; or (B) to recover damages in an amount equal to the greater of-(i) actual monetary loss incurred by the provider of Internet access service as a result of such violation; or (ii) the amount determined under paragraph (3). (2) SPECIAL DEFINITION OF `PROCURE'- In any action brought under paragraph (1), this Act shall be applied as if the definition of the term `procure' in section 3(12) contained, after `behalf' the words `with actual knowledge, or by consciously avoiding knowing, whether such person is engaging, or will engage, in a pattern or practice that violates this Act'. (3) STATUTORY DAMAGES(A) IN GENERAL- For purposes of paragraph (1)(B)(ii), the amount determined under this paragraph is the amount calculated by multiplying the number of violations (with each separately addressed unlawful message that is transmitted or attempted to be transmitted over the facilities of the provider of Internet access service, or that is transmitted or attempted to be transmitted to an electronic mail address obtained from the provider of Internet access service in violation of section 5(b)(1)(A)(i), treated as a separate violation) by-(i) up to $100, in the case of a violation of section 5(a)(1); or (ii) up to $25, in the case of any other violation of section 5. (B) LIMITATION- For any violation of section 5 (other than section 5(a)(1)), the amount determined under subparagraph (A) may not exceed $1,000,000. (C) AGGRAVATED DAMAGES- The court may increase a damage award to an amount equal to not more than three times the amount otherwise available under this paragraph if-(i) the court determines that the defendant committed the violation willfully and knowingly; or (ii) the defendant's unlawful activity included one or more of the aggravated violations set forth in section 5(b). (D) REDUCTION OF DAMAGES- In assessing damages under subparagraph (A), the court may consider whether-(i) the defendant has established and implemented, with due care, commercially reasonable practices and procedures designed to effectively prevent such violations; or (ii) the violation occurred despite commercially reasonable efforts to maintain compliance with the practices and procedures to which reference is made in clause (i). (4) ATTORNEY FEES- In any action brought pursuant to paragraph (1), the court may, in its discretion, require an undertaking for the payment of the costs of such action, and assess reasonable costs, including reasonable attorneys' fees, against any party. SEC. 8. EFFECT ON OTHER LAWS. (a) FEDERAL LAW- (1) Nothing in this Act shall be construed to impair the enforcement of section 223 or 231 of the Communications Act of 1934 (47 U.S.C. 223 or 231, respectively), chapter 71 (relating to obscenity) or 110 (relating to sexual exploitation of children) of title 18, United States Code, or any other Federal criminal statute. (2) Nothing in this Act shall be construed to affect in any way the Commission's authority to bring enforcement actions under FTC Act for materially false or deceptive representations or unfair practices in commercial electronic mail messages. (b) STATE LAW(1) IN GENERAL- This Act supersedes any statute, regulation, or rule of a State or political subdivision of a State that expressly regulates the use of electronic mail to send commercial messages, except to the extent that any such statute, regulation, or rule prohibits falsity or deception in any portion of a commercial electronic mail message or information attached thereto. (2) STATE LAW NOT SPECIFIC TO ELECTRONIC MAILThis Act shall not be construed to preempt the applicability of-(A) State laws that are not specific to electronic mail, including State trespass, contract, or tort law; or (B) other State laws to the extent that those laws relate to acts of fraud or computer crime. (c) NO EFFECT ON POLICIES OF PROVIDERS OF INTERNET ACCESS SERVICE- Nothing in this Act shall be construed to have any effect on the lawfulness or unlawfulness, under any other provision of law, of the adoption, implementation, or enforcement by a provider of Internet access service of a policy of declining to transmit, route, relay, handle, or store certain types of electronic mail messages. SEC. 9. DO-NOT-E-MAIL REGISTRY. (a) IN GENERAL- Not later than 6 months after the date of enactment of this Act, the Commission shall transmit to the Senate Committee on Commerce, Science, and Transportation and the House of Representatives Committee on Energy and Commerce a report that-(1) sets forth a plan and timetable for establishing a nationwide marketing Do-Not-E-Mail registry; (2) includes an explanation of any practical, technical, security, privacy, enforceability, or other concerns that the Commission has regarding such a registry; and (3) includes an explanation of how the registry would be applied with respect to children with e-mail accounts. (b) AUTHORIZATION TO IMPLEMENT- The Commission may establish and implement the plan, but not earlier than 9 months after the date of enactment of this Act. SEC. 10. STUDY OF EFFECTS OF COMMERCIAL ELECTRONIC MAIL. (a) IN GENERAL- Not later than 24 months after the date of the enactment of this Act, the Commission, in consultation with the Department of Justice and other appropriate agencies, shall submit a report to the Congress that provides a detailed analysis of the effectiveness and enforcement of the provisions of this Act and the need (if any) for the Congress to modify such provisions. (b) REQUIRED ANALYSIS- The Commission shall include in the report required by subsection (a)-(1) an analysis of the extent to which technological and marketplace developments, including changes in the nature of the devices through which consumers access their electronic mail messages, may affect the practicality and effectiveness of the provisions of this Act; (2) analysis and recommendations concerning how to address commercial electronic mail that originates in or is transmitted through or to facilities or computers in other nations, including initiatives or policy positions that the Federal Government could pursue through international negotiations, fora, organizations, or institutions; and (3) analysis and recommendations concerning options for protecting consumers, including children, from the receipt and viewing of commercial electronic mail that is obscene or pornographic. SEC. 11. IMPROVING ENFORCEMENT BY PROVIDING REWARDS FOR INFORMATION ABOUT VIOLATIONS; LABELING. The Commission shall transmit to the Senate Committee on Commerce, Science, and Transportation and the House of Representatives Committee on Energy and Commerce-(1) a report, within 9 months after the date of enactment of this Act, that sets forth a system for rewarding those who supply information about violations of this Act, including-(A) procedures for the Commission to grant a reward of not less than 20 percent of the total civil penalty collected for a violation of this Act to the first person that-(i) identifies the person in violation of this Act; and (ii) supplies information that leads to the successful collection of a civil penalty by the Commission; and (B) procedures to minimize the burden of submitting a complaint to the Commission concerning violations of this Act, including procedures to allow the electronic submission of complaints to the Commission; and (2) a report, within 18 months after the date of enactment of this Act, that sets forth a plan for requiring commercial electronic mail to be identifiable from its subject line, by means of compliance with Internet Engineering Task Force Standards, the use of the characters `ADV' in the subject line, or other comparable identifier, or an explanation of any concerns the Commission has that cause the Commission to recommend against the plan. SEC. 12. RESTRICTIONS ON OTHER TRANSMISSIONS. Section 227(b)(1) of the Communications Act of 1934 (47 U.S.C. 227(b)(1)) is amended, in the matter preceding subparagraph (A), by inserting `, or any person outside the United States if the recipient is within the United States' after `United States'. SEC. 13. REGULATIONS. (a) IN GENERAL- The Commission may issue regulations to implement the provisions of this Act (not including the amendments made by sections 4 and 12). Any such regulations shall be issued in accordance with section 553 of title 5, United States Code. (b) LIMITATION- Subsection (a) may not be construed to authorize the Commission to establish a requirement pursuant to section 5(a)(5)(A) to include any specific words, characters, marks, or labels in a commercial electronic mail message, or to include the identification required by section 5(a)(5)(A) in any particular part of such a mail message (such as the subject line or body). SEC. 14. APPLICATION TO WIRELESS. (a) EFFECT ON OTHER LAW- Nothing in this Act shall be interpreted to preclude or override the applicability of section 227 of the Communications Act of 1934 (47 U.S.C. 227) or the rules prescribed under section 3 of the Telemarketing and Consumer Fraud and Abuse Prevention Act (15 U.S.C. 6102). (b) FCC RULEMAKING- The Federal Communications Commission, in consultation with the Federal Trade Commission, shall promulgate rules within 270 days to protect consumers from unwanted mobile service commercial messages. The Federal Communications Commission, in promulgating the rules, shall, to the extent consistent with subsection (c)-(1) provide subscribers to commercial mobile services the ability to avoid receiving mobile service commercial messages unless the subscriber has provided express prior authorization to the sender, except as provided in paragraph (3); (2) allow recipients of mobile service commercial messages to indicate electronically a desire not to receive future mobile service commercial messages from the sender; (3) take into consideration, in determining whether to subject providers of commercial mobile services to paragraph (1), the relationship that exists between providers of such services and their subscribers, but if the Commission determines that such providers should not be subject to paragraph (1), the rules shall require such providers, in addition to complying with the other provisions of this Act, to allow subscribers to indicate a desire not to receive future mobile service commercial messages from the provider-(A) at the time of subscribing to such service; and (B) in any billing mechanism; and (4) determine how a sender of mobile service commercial messages may comply with the provisions of this Act, considering the unique technical aspects, including the functional and character limitations, of devices that receive such messages. (c) OTHER FACTORS CONSIDERED- The Federal Communications Commission shall consider the ability of a sender of a commercial electronic mail message to reasonably determine that the message is a mobile service commercial message. (d) MOBILE SERVICE COMMERCIAL MESSAGE DEFINED- In this section, the term `mobile service commercial message' means a commercial electronic mail message that is transmitted directly to a wireless device that is utilized by a subscriber of commercial mobile service (as such term is defined in section 332(d) of the Communications Act of 1934 (47 U.S.C. 332(d))) in connection with such service. SEC. 15. SEPARABILITY. If any provision of this Act or the application thereof to any person or circumstance is held invalid, the remainder of this Act and the application of such provision to other persons or circumstances shall not be affected. SEC. 16. EFFECTIVE DATE. The provisions of this Act, other than section 9, shall take effect on January 1, 2004. Speaker of the House of Representatives. Vice President of the United States and President of the Senate. END
© Copyright 2025 Paperzz