Ethics in Unsolicited Commercial Email

 

Ethical business practices are a keystone to success in any business.  Wall Street has taught that without ethics, economic forces will force companies out of business.  The current Enron scandal is a shining example of the effect of unethical business practices.  A top Fortune 100 Company, Enron plummeted from 100 Billion dollars of profit to bankruptcy in less than a year.  Attempts to cheat the ethical business world left such a bad taste in the mouth of potential investors no other companies or banks would aid Enron in its fight for survival and new competitors with ethical reputations moved in on the business opportunity.  While a company may exist, and even thrive for a while, eventually the unethical practices catch up to it and the company fails.  E-commerce is no different than brick and mortar companies such as Enron.  Ethics will prove, over the long run, to be very much a part of successful E-Business.

            .  “Junk mail” has been around almost as long as the post office has been delivering mail.  Direct mail advertising is a good way for companies to get their products in front of potential consumers at substantially lower cost compared to television and radio advertising.  Also, since advertising is a numbers game, direct mailing provides an increased exposure for the dollars spent.  In much the same way, Unsolicited Commercial Email (UCE) has become a very successful endeavor for e-commerce.  The cost to send email to thousands of users is significantly lower than traditional methods of mail delivery.  This in turn leads to a lower cost of advertising for e-commerce companies versus Direct mail advertising through the Post office.

Another reason for the success of UCE is a higher response rate from consumers.  Forrester Research found that click through rates on email were much higher at 18% than traditional website banner ads at .18%. (Hinde, 400)  The more successful an advertising avenue is, the more likely a business will adopt that avenue.  E-Mail remains the number one mission-critical application on the Internet and is used by more than 60.6 million business users. (Hancock, 188)  With more and more people turning to the Internet for information and communication and the rise of email as one of the most important features of the Internet, ethics must play a role in helping e-commerce succeed.

 

History of UCE

Unsolicited commercial email can trace its roots back to about 1994.  UCE began in the USENET newsgroups.  Newsgroups are an online discussion forum where individual topics comprise a forum to post messages.  Users log in to a newsgroup service and can browse the thousands of newsgroups available.  Once inside a newsgroup, a user could read and post messages to other users perusing the same forum.  There are thousands of newsgroups, discussing just about any topic imaginable.  In 1994 a small legal firm decided to advertise their business in the USENET newsgroups.

This is the first time a commercial entity can be tied to a large-scale attempt at advertising to digital users.  The law firm posted in each and every newsgroup an advertisement for their services in the “Green Card Lottery” being offered by the U.S. Immigration office.  This was not the first time each and every newsgroup had been posted to by the same person, but it was the first time it wasn’t done anonymously.  The law firm quickly stepped up and defended their actions as a valid business practice.   The attempt to reach many potential customers with little cost with a service was a success.  The payoff for their efforts was between $100,000 and $200,000 dollars.  The revenue produced wasn’t remarkable in itself, except that the cost of posting all of those messages was negligible according to Mr. Canter one of the lawyers of the law firm.  (Feist, Online)  This relative success led to other entities adopting the practice of Unsolicited Commercial E-mail.

 

Ethical Unsolicited Commercial email Practices 

          UCE is valid business practice with great potential for small company start-ups with little to no starting capital.  In order to engage in UCE in a manner that is ethically correct a company already has plenty of standards and guidance in place.  Many of the pitfalls of unsolicited advertising have been found and dealt with in direct mail advertising.  Many parallels in ethical advancement of UCE can be made with direct mail advertising.

            In order to send advertisements to potential consumers, there must be a destination address.  Some of the methods used by UCE companies are inappropriate.  Early on, UCE companies would use programs designed to search through the newsgroups, cull out and create a database of email addresses contained in the posts. (Neumann, 112)  This almost caused newsgroups to cease to exist.  Once users of the newsgroups realized that each time they posted to a newsgroup, they would get deluged with email advertisements, the user was less likely to post again if at all. 

There are two ethical problems with this method of gaining email addresses for use in advertising.  The first problem was the servers where the newsgroups were posted had not given UCE companies permission to search their databases of newsgroup postings to strip out email addresses. Without permission to use the service provided in this manner, the UCE company is building a bad business relationship. 

Second, newsgroup companies thrive on the activity of each newsgroup.  More postings and better dissemination of information between newsgroup users is what builds the newsgroup business for companies.  If the newsgroup becomes less active, then users don’t have a reason to pay for the service of reading a newsgroup.  UCE companies were causing forums to be less active.  This is worse than stealing the customers of the newsgroup company, UCE companies were driving them right out of business.  The paradox here is the UCE company was relying on the very business it was destroying. 

The success of the Internet has led some companies to create website databases of public information about people including email addresses.  These websites were created to bring together the information on people into central databases to allow friends to lookup long lost family members or acquaintances.  www.four11.com and www.bigfoot.com are examples of such companies that provide this service.  UCE companies began entering into these websites and conducting extensive searches on these databases to collect email addresses.

The ethical downside to this method of collection is that UCE companies are conducting large-scale searches on these websites at the expense of the website company.  UCE companies are using the website services in a manner not intended by the website company and as such aren’t acting in good faith.  The website company is attempting to create a place where people can come together and find each other.  As users realize that these sites are being used to gather email addresses for advertising purposes these users are asking that they be removed from the database.  This is reducing the amount of information available to the website company and thus reducing there effectiveness to provide the service intended.  Again, UCE companies are destroying the very part of the business they need to continue to operate.

As the Internet has grown, so have the Internet Service Provider (ISP) companies.  ISPs, in attempt to differentiate themselves from competition, look to provide new services.  One such service is the chat room.  Chat rooms are a place where Internet users can gather and hold conversations with other people in real time with flowing conversation.  One of the options available to users is to click on fellow users in the chat room and bring up information about the user.  This allows users to make available, to fellow chat room folks, information about themselves.

UCE companies began logging into these ISPs to gather email addresses.  The UCE company would use a program to systematically enter all chat rooms and acquire all the email addresses associated with the users in the chat rooms.  This was a simple process as each of the usernames in the room is associated with an email address that is active and working. 

Again, the UCE companies are using another company’s assets in a manner that was not intended to generate the databases of email addresses to be used.  It also serves to minimize the effectiveness of ISPs to operate and grow their business.  As users found that by entering chat rooms users were inviting UCE, users responded by no longer using the service.  This leads to a degradation of service and could cause some users to leave the ISP.  This makes for one less active email address, thus leading to a smaller market for UCE.

UCE companies like all direct mail companies need destination addresses in order to run their business.  Collecting email addresses is going to be an ongoing concern for the UCE company to stay in business and grow the business.  The methods chosen to collect email addresses must be done in a manner that is ethical and is approved by the service provider.  Using other company’s assets in a manner not intended is not an acceptable method of collecting addresses to be used in UCE.

Each of the methods discussed can lead to another ethical problem that has not been discussed.  None of the aforementioned methods used to derive email addresses can discern the likes or dislikes of the user or users of those collected email addresses.  This can lead to problems for those UCE companies that intend to distribute advertisements concerning pornographic content.  There is already an accepted standard to use to determine what is pornographic or obscene content.  In determining pornographic content, The “Community” Standards test should be used.  The “Community” Standards test can be found in the decision concerning Miller v. California cited below.

Miller v. California, 413 U.S. 15, 23 (1973). In Miller, the Supreme Court announced what remains to this day the three-part test for identifying obscene speech:

(a) whether the average person, applying contemporary community standards would find that the work, taken as a whole, appeals to the prurient interest, (b) whether the work depicts or describes, in a patently offensive way, sexual conduct specifically defined by the applicable state law; and (c) whether the work, taken as a whole, lacks serious literary, artistic, political, or scientific value.1

 

As UCE companies begin to evaluate their products this “Community” test must be applied to determine if the product will fall into the pornographic category.

            Currently pornographic content finds itself among the most frequent topics in UCE deliveries.  As companies choose to advertise and sell these products the higher standard in choosing which email accounts are to receive these advertisements must be adhered to.  There are two ethical concerns that need to be addressed.

            The first ethical problem arises when a UCE company sends a pornographic product advertisement to someone who doesn’t wish to be associated with pornographic products.   Some people choose not to purchase or take part in pornographic product purchases because pornography is reviled and considered unethical in some sections of the population.  By contacting someone who thinks pornography in itself is unethical about purchasing pornographic products the UCE has failed in running its business in an ethical manner.

UCE by definition is unsolicited, so how do the UCE companies determine who to send the pornographic content to using methods of collection described above?  Simply, it can’t.  Sending advertisements concerning topics that some people might find inappropriate is unethical.  To remain ethical, UCE companies need to adhere to the wishes of computer users and err on the side of caution by not distributing pornographic content to an inbox without explicit adult consent.

Those UCE companies that do decide to enter into advertising for pornographic content must acquiesce to the higher standard for a second ethical reason. If the advertisement to be sent out meets the “Community” Standards test, as noted above, as pornographic then the UCE must comply with the standard set forth by the US Congress for distribution of obscene materials.  A Federal law excerpt is shown below.

United States Code Title 18, Part I, Chapter 71, Section 1461 states in part: 

Every obscene, lewd, lascivious, indecent, filthy or vile article, matter, thing, device, or substance and -

 

 

 

Every paper, writing, advertisement, or representation that any article, instrument, substance, drug, medicine, or thing may, or can, be used or applied for producing abortion, or for any indecent or immoral purpose; and

Every description calculated to induce or incite a person to so use or apply any such article, instrument, substance, drug, medicine, or thing -

Is declared to be nonmailable matter and shall not be conveyed in the mails or delivered from any post office or by any letter carrier.

 

The distribution of pornographic materials should not be delivered to an address without express prior consent of the adult resident of the address for direct mail companies.  UCE companies must adhere to the same standard when engaging in the distribution of pornographic materials to allow the owner of the email inbox to control the type of messages received.

            The issue of control of the email inbox becomes an even greater concern when families are involved and access is granted to minors.  Families sometimes share an email box with children and parents alike in order to facilitate communication with family members not living in the same house.  If a UCE company that is engaging in distribution of pornographic content were to send lewd or indecent materials that were opened by minors the company may unknowingly engage in exposing a minor to pornography.  By sending such materials to a minor a UCE company leaves itself open to potential legal problems by feloniously distributing pornographic content to a minor across state lines.

            The ethical UCE would be sure to take all aspects of delivery of pornography into account when setting up the email addresses to be used for distribution.  Sending pornography to everyone on the list without express consent from the adult of the email address could lead to multiple instances of unethical conduct in a single email.  The reputation gained from distributing pornography to minors or audiences that oppose such materials will lead to strong anti-UCE sentiment that is already in abundance among users on the Internet.  In order for UCE to continue to grow as a viable business trust must be garnered by UCE companies from the users of the Internet.

            Direct mail companies have over time developed trust from the people that they send their mailings to.  People who head to their mailbox in the front yard do not fear they will get lewd and indecent mailings without prior written consent.  Over time people may begin to actually even read the materials being sent to them.  The return address on the letter is a place for a person to get a sense of who sent the mail.  With this information people can rely on the information being accurate or at the very least in good taste.  The same can be said for email.  Often people will look at the return address on the email to determine if the mail will even be opened before it is deleted.

            Some UCE companies recognize that people don’t want to be bothered or want to have some trust that the person sending the letter is someone they know.  These UCE companies may resort to putting a false address or “spoofing” the return address on their emails to disguise the real sender.  This is an attempt to ride on the backs of those companies that have worked hard to earn a good reputation and trust in the community to get users to open and read the advertisements contained in the email.    One of these companies, Juno online filed a 5 Million dollar lawsuit against 5 known spammers and 10 that that had yet to be identified for using its name as a return address in email headers alleging false designation of origin and false description.  (Samorski, 678)

            Spoofing the return address poses two ethical problems.  The first ethical problem deals with trust.  The UCE company that engages in spoofing the return address has immediately blown all trust and quite possibly angered the user by tricking them into opening the email.  Who wants to do business with someone who opens the line of communication under a false pretense?  A business relationship must be built over time and under the very strictest standards involving trust.

            The second ethical issue deals with the complaints and lost business the “spoofed” company receives.  Through no action of its own, a company may have to defend itself to users in its own community for the actions of others.  This puts undue stress on the customer service department of the company that was spoofed.

The return address is the quickest way to determine sender of an email message.  Over time UCE companies could build a reputation for ethical advertising provided the return address remains the same and the UCE company provides a service or product that its potential customers might be interested in.  This will also build trust among users that the UCE company is just trying to build a business in this competitive Internet economy rather than make a quick buck at the expense of others.

Another aspect of the trust issue it the ethical UCE company placement of a link within the body of the email message to allow a user to click a link and be removed from the email database.  This is a quick and effective way for a UCE company to no longer bother those users not interested in receiving UCE.  To ensure long-term success a company only wants to deal with those folks interested in their products.  By continually sending email advertisements to people not interested a UCE company can actually create an enemy of the business.

Some UCE companies have decided to use the link within the email address for a different purpose than intended.  Rather than opting a user out for clicking on the link, some UCE companies use this action to verify that the email address that was entered is an active email address.  This email address is then updated in the database as active and may be inundated with UCE as the email address is more valuable now that it is verified.

As in the spoofing of the return email address, using the opt-out link to verify an email address is an extremely unethical practice.  It again destroys the faith users have in the link actually being of any use and breaks the trust in doing business with the company.  Without trust a viable business relationship cannot be established.

This practice also infringes on ethical companies legitimately trying to give users a convenient method to indicate the desire to no longer receive the email advertisements. Those UCE companies trying to grow a long term business then lose the opportunity to truly gauge the interest in their products by potential customers. 

 

Legal intervention in UCE

As unethical UCE abuse has risen, lawmakers have taken notice.  The federal level of the government is taking an active role in trying to regulate and control UCE.  Introduced so far by the House of Representatives in the 107th Congress is the Unsolicited Commercial Mail Act (H.R. 95), Wireless Telephone Spam Protection Act (H.R. 113), Unsolicited Commercial Electronic Mail Act (H.R. 718), Anti-Spamming Act (H.R. 1017), Who Is E-Mailing our kids Act (H.R. 1846), Protect Children from E-Mail Smut Act (H.R 2472) and Netizens Protection Act (H.R. 3146).  The Senate has also introduced the Controlling Assault of Non-Solicited Pornography and Marketing Act (S. 630).  Again there is much debate concerning the rights of the American Citizens to privacy and the ability of consumers to control their own destiny.

Unethical UCE companies have caused regulation by governments to help curb the onslaught of indecent and false messages.  Congressional constituents have harangued their representatives into action to help stem the tide of unethical emails.  This is causing undue legislative hardships on those UCE companies trying to grow and build an ethical and profitable business.

States have also entered into the legal business of controlling the UCE onslaught in their own back yards.  California and Washington both have enacted state legislation to help curb the tide of UCE into and out of their states.

Washington’s state law permits users to sue UCE companies that use false email addresses for emails sent to or sent from the state of Washington.

California’s state laws attempt to label the UCE with “ADV” in the subject and the body of the message must have a toll free phone number or e-mail address that allows the recipient to decline future contacts.

The problem with state laws to stop UCE is when they run afoul of the dormant commerce clause of the United States Constitution. (Kelin, 4) When the Constitution was ratified, giving Congress the power to regulate interstate commerce, a negative inference arose that States no longer had that same power. States cannot, even in the absence of Congressional action, regulate interstate commerce.      

As the basic structure of the internet crosses state lines and any commerce conducted stands a large percentage chance of the consumer residing in one state while the seller resides in another, state laws by definition will inhibit inter-state commerce.  Therefore the best hopes for anti-UCE legislation rest in the hands of the federal government. 

One of the best ways to truly affect unethical use is self-regulation.  Professional associations are meeting and developing guidelines to be followed voluntarily by their respective members. But ultimately, the burden falls to the individual using the internet.

 

How to Stop Unsolicited Commercial E-mail

For the consumer there are many ways to stop UCE from arriving in their email boxes.  The first and easiest strategy is to protect your email address like you do other personal information.  While most people wouldn’t think of just handing out their telephone number or social security number, many users will enter their email address in a website they visit for the first time. 

Using multiple email addresses is another common way to help block UCE.   Most ISPs allow the users multiple email accounts with their monthly fee.  Users can create an email account they use while surfing the web and visiting websites and keep their personal account private for family and business associates only.

A third option is to use software filters.  There are websites that provide a service to filter UCE from email received by online users.  These websites build databases of known UCE abusers and automatically filter messages from these companies from the website inbox used by the customer.  The computer user can then log in to the website to check to see if any of the email messages that were filtered out are of value to the user.  The user then has the option of downloading email messages from the bulk website inbox or deleting the message with all other unwanted bulk email messages. 

To access email on the Internet requires an email program.  Many of these email programs come with built in software filters that attempt to separate UCE from legitimate email as defined by the user.  The sophistication of these programs also allows a user to define filters of their own to help curb the amount of UCE received.  These filters can consist of keeping a list of known UCE abusers as defined by the user and contain some advanced algorithms to help determine if an email is UCE.  Once found the email program will move those messages to a bulk inbox or have the messages deleted automatically.

Government agencies are also joining the users in an attempt to stem the tide of UCE.  The Federal Trade Commission is one of those agencies working to help stop UCE.  If UCE is received and a user attempts to stop the UCE and still receive UCE, the user can forward the UCE to an email address at the FTC.  The email address to use is uce@ftc.gov.

In testimony before the Subcommittee on Telecommunications, Trade and Consumer Protection of the House Commerce Committee, November 3, 1999, Eileen Harrington of the FTC's Bureau of Consumer Protection said, “The Commission has steadfastly called for self-regulation as the most desirable approach to Internet policy. The Commission generally believes that economic issues related to the development and growth of electronic commerce should be left to industry, consumers and the marketplace to resolve.”

The easiest way to stop unwanted UCE from filling up the inbox is to choose not to do business with those companies participating in UCE.  UCE has grown and proliferated at an astonishing rate because it has been successful.  With little or no cost and quick results, UCE has become another scourge to deal with on the Internet.  Consumers must find another way to obtain the product listed in the UCE.  Only when it is not profitable for UCE companies to continue with unethical practices will the UCE companies adopt different practices and tactics.

 

Conclusion

While the abuse of UCE is rampant and is currently costing society time and money, this avenue of valid advertising should not be completely legislated out of use.  Federal and state regulations combined with private enterprise initiatives by upstanding companies should eventually provide sufficient safeguards and controls to allow appropriate use of email as a valid avenue of advertising.  Lastly, the free enterprise system with its reliance on ethical business practices will ultimately enforce the use of said practices.  Those business entities failing to follow appropriate tactics will find themselves on the endangered species and extinct businesses list.


Refereed Resources

Hancock, Bill, “First Internet E-mail Corporate Usage Report; Concludes E-mail Abuse at Epidemic Levels,” Computers & Security, 1999, Vol. 18 Issue 3, p 188.

 

Hinde, Stephen, “E-mail Can Seriously Damage Your Health, ” Computers & Security, 1999, Vol. 18, pp 396-408.

 

Kelin, Sabra-Anne, “State Regulation of Unsolicited Commercial E-mail,” Berkely Technology Law Journal, 2001, Vol. 16 Issue 1, p 435.

 

Neumann, Peter G.; Weinstein, Lauren, “Spam, spam, spam,” Communications of the ACM, June 97, Vol. 40 Issue 6, p 112.

 

Samorski, Jan, “Unsolicited Commercial E-mail, the Internet and the First Amendment: Another Free Speech Showdown in Cyberspace?,” Journal of Broadcasting & Electronic Media, Fall 1999, pp 670-689.

 

Other Resources

Feist, Sharael, “The Father of Modern Spam,” 2002. Online. Internet. 26 March 2002.  Available HTTP: news.com.com/2008-1082-868483.html