Richard Warner, Trespass I

advertisement
Trespass to Chattels: Spam
Richard Warner
CompuServe v. Cyber Promotion


:“CompuServe has received many complaints
from subscribers threatening to discontinue
their subscription unless CompuServe
prohibits electronic mass mailers from using
its equipment to send unsolicited
advertisements.”
“CompuServe asserts that the volume of
messages generated by such mass mailings
places a significant burden on its equipment
which has finite processing and storage
capacity.”
The CompuServe Fact Pattern

This is typical of the spam cases:
 huge volumes of spam
 overload the processing capacity of the ISP,
 imposing costs, and
 producing dissatisfied customers,
 on whom the spam imposes both delivery
costs and e-mail management costs.
Did CompuServe Consent?


When you connect a publicly accessible
system to the Internet, you impliedly consent
to access by the general public to that system.
Did CompuServe consent in this way to
receiving e-mails from Cyber Promotions?
Limited Scope and Revocability



Connecting to the Internet does not constitute
an invitation to commit hack into the system
and delete data, for example.
Moreover: even if CompuServe did consent,
can’t it revoke that consent?
It certainly tried to do so.
The CompuServe Fact Pattern


“CompuServe has notified defendants that
they are prohibited from using its proprietary
computer equipment to process and store
unsolicited e-mail and has requested them to
cease and desist from sending unsolicited email to its subscribers.”
Is this revocation effective?
Revocability


Courts have held that ISPs can effectively
revoke whatever consent they might have
initially given to access by a spammer.
Cyber Promotions continued to send e-mails
after consent was revoked.
Summary



Cyber Promotions intentionally accessed
CompuServe’s system,
without authorization, and
caused significant harm in form of




slow downs, delays, personnel costs; and
dissatisfied customers,
some of whom terminate their accounts
because of the delivery and e-mail management
costs they bear.
Two Questions



What liability, if any, does Cyber Promotions
have for these harms?
The common law doctrine of trespass to
chattels provides an answer.
A chattel is personal property. What is the
personal property involved here?
What Is the Chattel?



CompuServe’s computers.
Cyber Promotions must send the necessary
message data and computer code into
CompuServe’s computers.
Those computers follow the instructions in the
code to deliver the message to the subscriber’s
inbox.
Trespass

“Trespass to a chattel is committed by
intentionally dispossessing another of the
chattel or using or intermeddling with it.”



Restatement (Second) of Torts, Section 217.
Cyber Promotions does not dispossess
CompuServe of its computers.
They stay in CompuServe’s possession.
“Using or Intermeddling”



Cyber Promotions merely uses some of the
computer’s processing capacity.
This is “using or intermeddling” with a
chattel.
To be a trespass, the use the use must invade
the possessory rights of the owner.
Liability

An unauthorized use does so.


CompuServe, at 1024 (citing Restatement
(Second) of Torts, Sections 252 and 892(5), 217,
Comment f and Comment g).
In such a case, the user is liable if
 the use impairs the value of the chattel, or
 the use harms a legally protected interest.
Value and Harm in CompuServe



Does sending vast amounts of spam through
the CompuServe computers impair their value
or harm a relevant interest?
It impairs value by slowing down or shutting
down the computers.
It harms a relevant interest by producing
dissatisfied customers, some of whom
terminate their accounts.
Remedies


Monetary compensation for the harm done.
An injunction against future access.
Effective?

Trespass to chattels is not a particular
effective tool against spammers.


The enormous number of spammers makes it
difficult for Internet service providers to track
down the source of the spam.
It can be difficult to prove damages as the number
of different spammers bombarding an ISP can
make it difficult to determine which spammer
caused what damage.
Beyond the Spam Cases



First: to what extent does one impliedly consent to
access by the general public when one connects a
publicly accessible system to the Internet?
Second: can one always revoke such implied
consent by explicitly notifying third parties seeking
access that their access is unauthorized?
Third: when does access by a third party to a
publicly accessible system impair the value of that
system or harm a relevant interest?
Download