Home / Blogs

CAN SPAM Applies Even Within a Single Provider

Protect your privacy:  Get NordVPN  [73% off 2-year plans, 3 extra months]
10 facts about NordVPN that aren't commonly known
  • Meshnet Feature for Personal Encrypted Networks: NordVPN offers a unique feature called Meshnet, which allows users to connect their devices directly and securely over the internet. This means you can create your own private, encrypted network for activities like gaming, file sharing, or remote access to your home devices from anywhere in the world.
  • RAM-Only Servers for Enhanced Security: Unlike many VPN providers, NordVPN uses RAM-only (diskless) servers. Since these servers run entirely on volatile memory, all data is wiped with every reboot. This ensures that no user data is stored long-term, significantly reducing the risk of data breaches and enhancing overall security.
  • Servers in a Former Military Bunker: Some of NordVPN's servers are housed in a former military bunker located deep underground. This unique location provides an extra layer of physical security against natural disasters and unauthorized access, ensuring that the servers are protected in all circumstances.
  • NordLynx Protocol with Double NAT Technology: NordVPN developed its own VPN protocol called NordLynx, built around the ultra-fast WireGuard protocol. What sets NordLynx apart is its implementation of a double Network Address Translation (NAT) system, which enhances user privacy without sacrificing speed. This innovative approach solves the potential privacy issues inherent in the standard WireGuard protocol.
  • Dark Web Monitor Feature: NordVPN includes a feature known as Dark Web Monitor. This tool actively scans dark web sites and forums for credentials associated with your email address. If it detects that your information has been compromised or appears in any data breaches, it promptly alerts you so you can take necessary actions to protect your accounts.

I recently came across a copy of a ruling in the bizarre case of MySpace vs. theglobe.com. Theglobe.com was the ultimate dot.com bubble company. It started up here in Ithaca, and went public at the peak of dot.com hysteria with one of the the greatest one-day price runups ever. Since then they bought and sold a variety of busineses, none of which ever made any money, including the Voiceglo VoIP service which appears to be what the spam was promoting.

In January 2006, theglobe.com set up over 95 dummy MySpace accounts, using throway e-mail addresses from free webmail providers, and then sent out about 400,000 automated spams to other MySpace members. After a month, MySpace sent them a cease and desist letter, so they stopped for a while, but then resumed spamming through May. I cannot begin to fathom how they thought that sending internal MySpace spam was a good idea, or how they thought they could get away with it. As I noted in another blog entry, theglobe has since shut down Voiceglo, and settled the case by paying MySpace all the money they had, about $2.5 million. At this point theglobe’s only remaing line of business is the .TRAVEL domain, and only infusions of cash from the company president are keeping it afloat.

Due to the unusual facts of this case, it raises some interesting issues. Theglobe argued that MySpace isn’t an ISP as required to apply CAN SPAM, and internal MySpace messages aren’t the e-mail that CAN SPAM regulates. The judge disposed of those arguments in a few paragraphs, noting that the law’s definition of “internet access provider” is quite broad, and that since MySpace lets you send messages from one named user to another, that’s e-mail and CAN SPAM applies.

Another part of the decision related to MySpace’s terms of service, which include a $50 charge per spam. The court found that enforcable, too, over strenuous objections from theglobe. This isn’t particularly relevant to normal e-mail, which doesn’t have any prior agreement between the parties, but should be good news for instant messaging systems. (The ruling is likely only to be persuasive in the Central District of California, but since that happens to be where Yahoo and Hotmail are, it could be pretty persuasive.) Even though the court agreed that there were open issues relating to how deceptive some of the subject lines were, fifty bucks per spam adds up rather quickly, and it’s no wonder that theglobe settled.

After a couple of recent losses in the weak Mumma and Gordon CAN SPAM cases, it’s somewhat reassuring to see that in a case with strong facts, the court had no problem finding that CAN SPAM applied and that a spammer had violated it.

By John Levine, Author, Consultant & Speaker

Filed Under

Comments

Larry Seltzer  –  Jun 21, 2007 10:30 AM

>>The judge disposed of those arguments in a few paragraphs, noting that the law’s definition of “internet access provider” is quite broad, and that since MySpace lets you send messages from one named user to another, that’s e-mail and CAN SPAM applies.

I guess this means that it applies to IM networks as well? I’m not sure if there’s any language in the law about that.

Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API