Technical and legal approaches to spam
Sep 17, 1999
AbstractUnsolicited bulk e-mail, commonly known as "spam," causes a variety of problems for network administrators and end users. Networks generally have policies that prohibit spam, but it is often difficult to enforce these policies, particularly against spam that originates on other networks.
A variety of technical responses to spam have been implemented, but most of these have met with at best limited success. Within the past three years several states and the U.S. government have considered legislation that would attempt to regulate spam, and a few states have enacted such laws. Most of the proposed and enacted laws, however, fail to address the fundamental problems with spam, and few of them have been designed to work in conjunction with technical solutions to the problem. Neither technical nor legal approaches alone are likely to produce a satisfactory solution to spam.
About the SpeakerDavid Sorkin is a professor at the John Marshall Law School in Chicago, and is currently in residence at Purdue as a CERIAS visiting scholar. He is the associate director of John Marshall's Center for Information Technology and Privacy Law. He has written about legal aspects of unsolicited e-mail, Internet governance, Internet content filtering, informational privacy, and ATM surcharges. Among his current research projects is an analysis of bidding procedures in online auctions.
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.