Order Code RL31953
CRS Report for Congress
Received through the CRS Web
“Junk E-Mail”: An Overview of Issues
and Legislation Concerning Unsolicited
Commercial Electronic Mail (“Spam”)
Updated June 25, 2003
Marcia S. Smith
Specialist in Aerospace and Telecommunications Policy
Resources, Science, and Industry Division
Congressional Research Service ˜ The Library of Congress

“Junk E-Mail”: An Overview of Issues and
Legislation Concerning Unsolicited
Commercial Electronic Mail (“Spam”)
Summary
Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,”
aggravates many computer users. Not only can spam be a nuisance, but its cost may
be passed on to consumers through higher charges from Internet service providers
who must upgrade their systems to handle the traffic. Also, some spam involves
fraud, or includes adult-oriented material that offends recipients or that parents want
to protect their children from seeing. Proponents of UCE insist it is a legitimate
marketing technique that is protected by the First Amendment. While 34 states have
anti-spam laws, there is no federal law specifically concerning spam. Nine “anti-
spam” bills are pending in the 108th Congress: H.R. 1933 (Lofgren), H.R. 2214 (Burr-
Tauzin-Sensenbrenner), H.R. 2515 (Wilson), S. 563 (Dayton), S. 877 (Burns-
Wyden), S. 1052 (Nelson-FL), S. 1231 (Schumer), S. 1293 (Hatch), and S. 1327
(Corzine). Tables providing brief “side-by-side” comparisons of the bills are
included in this report.
Spam on wireless devices such as cell phones is discussed in CRS Report
RL31636, Wireless Privacy: Availability of Location Information for Telemarketing.
State spam laws, and an existing federal law (the Computer Fraud and Abuse statute)
that is being used by some Internet Service Providers to bring suit against spammers,
are discussed in CRS Report RL31488, Regulation of Unsolicited Commercial E-
Mail
.
This report will be updated as events warrant.

Contents
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Avoiding and Restraining Spam . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
State Action . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Congressional Action: 105th-107th Congresses . . . . . . . . . . . . . . . . . . . . . . . 4
Congressional Action: 108th Congress . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
List of Tables
Table 1: Brief Comparison of Pending Spam Legislation in the House . . . . . . . . 6
Table 2: Brief Comparison of Pending Spam Legislation in the Senate . . . . . . . 10

“Junk E-Mail”: An Overview of Issues and
Legislation Concerning Unsolicited
Commercial Electronic Mail (“Spam”)
Overview
One aspect of increased use of the Internet for electronic mail (e-mail) has been
the advent of unsolicited advertising, also called “unsolicited commercial e-mail
(UCE),” “unsolicited bulk e-mail,” “junk e-mail, “or “spam.”1 Complaints focus
on the fact that some spam contains or has links to pornography, that much of it is
fraudulent, and the volume of spam is steadily increasing. In April 2003, the Federal
Trade Commission (FTC) reported that of a random survey of 1,000 pieces of spam,
18% concerned “adult” offers (pornography, dating services, etc.) and 66% contained
indications of falsity in “from” lines, “subject” lines, or message text.2 According to
Brightmail [http://www.brightmail.com], a company that sells anti-spam software,
the volume of spam rose from 8% of all e-mail in January 2001 to 45% in January
2003. Some project that spam will reach or exceed 50% of all e-mail by 2004.
Opponents of junk e-mail argue that not only is it annoying and an invasion of
privacy (see CRS Report RL31408 for more on Internet privacy), but that its cost is
borne by consumers and Internet Service Providers (ISPs), not the marketers.
Consumers reportedly are charged higher fees by ISPs that must invest resources to
upgrade equipment to manage the high volume of e-mail, deal with customer
complaints, and mount legal challenges to junk e-mailers. Businesses may incur
costs due to lost productivity, or investing in upgraded equipment or anti-spam
software. The Ferris Research Group [http://www.ferris.com], which offers
consulting services on managing spam, estimates that spam will cost U.S.
organizations over $10 billion in 2003.
Proponents of UCE argue that it is a valid method of advertising, and is
protected by the First Amendment. The Direct Marketing Association (DMA)
argued for several years that instead of banning UCE, individuals should be given
the opportunity to “opt-out” by notifying the sender that they want to be removed
1 The origin of the term spam for unsolicited commercial e-mail was recounted in
Computerworld, April 5, 1999, p. 70: “It all started in early Internet chat rooms and
interactive fantasy games where someone repeating the same sentence or comment was said
to be making a ‘spam.’ The term referred to a Monty Python’s Flying Circus scene in which
actors keep saying ‘Spam, Spam, Spam and Spam’ when reading options from a menu.”
2 Federal Trade Commission. False Claims in Spam: A Report by the FTC’s Division of
Marketing Practices. April 30, 2003. P. 10. Available at the FTC’s spam Web site:
[http://www.ftc.gov/bcp/conline/edcams/spam/index.html]

CRS-2
from the mailing list. Hoping to demonstrate that self regulation could work, in
January 2000, the DMA launched the E-mail Preference Service where consumers
who wish to opt-out can register themselves at a DMA Web site [http://www.e-
mps.org]. DMA members sending UCE must check their lists of recipients and
delete those who have opted out. Critics argued that most spam does not come from
DMA members, so the plan is insufficient, and on October 20, 2002, the DMA
agreed. Concerned that the volume of unwanted spam was undermining the use of
e-mail as a marketing tool, the DMA announced that it now would pursue legislation
to battle the rising volume of spam.
One challenge of controlling spam is that some of it originates outside the
United States and thus is not subject to U.S. laws or regulations. Spam is a global
problem, and the European Commission estimates that Internet subscribers globally
pay 10 billion Euros a year in connection costs to download spam
[http://europa.eu.int/comm/internal_market/privacy/studies/spam_en.htm]. Several
European countries have anti-spam laws. The FTC and other U.S. and foreign
agencies have called on organizations in 59 countries to close “open relays” that
allow spam to be routed through third-party computers, permitting spammers to
avoid detection [http://www.ftc.gov/opa/2003/05/swnetforce.htm].
Avoiding and Restraining Spam
Tips on avoiding spam are available on the FTC Web site [http://www.ftc.gov/
bcp/menu-internet.htm], and from [http://home.cnet.com/internet/0-3793-8-5181225-
1.html], a non-government site. Consumers may file a complaint about spam with the
FTC by visiting the FTC Web site [http://www.ftc.gov] and choosing “File a
Complaint” at the bottom of the page. The offending spam also may be forwarded
to the FTC (UCE@ftc.gov) to assist the FTC in monitoring UCE trends and
developments.
To date, the objective of restraining junk e-mail has been fought primarily over
the Internet or in the courts. Some groups opposed to junk e-mail will send blasts of
e-mail to a mass e-mail company, disrupting the company’s computer systems. The
FTC has taken action against spam involving fraud under its existing authority, and
is requesting expanded legislative authority to track, investigate, and sue spammers.3
In addition, three major ISPs — America OnLine (AOL), Earthlink, and Microsoft
Network — all have brought lawsuits under existing laws to stop spammers.4
Another approach is to enact specific anti-spam legislation. As discussed
below, more than half the states already have enacted spam laws, though no federal
legislation has passed. An oft-discussed approach is requiring senders of UCE to
3 The FTC proposal for increased authority was detailed at hearings on reauthorization of
the FTC on June 11, 2003 before the Senate Commerce Committee and the House Energy
and Commerce Committee. A copy of the FTC statement is available at
[http://commerce.senate.gov] and [http://energycommerce.house.gov] under hearings for
that day.
4 CRS Report RL31488, Regulation of Unsolicited Commercial E-Mail, summarizes existing
laws and FTC actions.

CRS-3
provide a legitimate opportunity for recipients to “opt-out” of receiving additional
messages.5 Others want to prevent bulk e-mailers from sending messages to anyone
with whom they do not have an established business relationship, treating junk e-mail
the same way as junk fax (see CRS Report RL30763 for information on the law
pertaining to junk fax).
Another approach is creating a “do not e-mail” list similar to the “do not call”
list for telemarketers, where individuals can place their names on a list to opt-out of
receiving UCE. Another possibility is requiring that senders of UCE use a label
such as “ADV” in the subject line of the message so the recipient will know before
opening an e-mail message that it is an advertisement. That would also make it
easier for spam filtering software to identify UCE and eliminate it. Some propose that
adult-oriented spam have a special label to highlight that the material may be
inappropriate for children, in particular.
Several anti-spam groups argue that legislation should go further, prohibiting
commercial e-mail from being sent to recipients who have not specifically requested
such messages or otherwise given their affirmative prior consent — called “opt-in.”
Eight groups, including Junkbusters, the Coalition Against Unsolicited Commercial
Email (CAUCE), and the Consumer Federation of America, wrote a letter to several
Members of Congress expressing their view that the “opt-out” approach advanced in
several of the pending bills would “undercut those businesses who respect consumer
preferences and give legal protection to those who do not.”
[http://www.cauce.org/pressreleases/20030522.shtml].
Others argue that legislation cannot stop spam because much spam originates
outside the United States or is routed through non-U.S. computers, or because
legislation includes so many “loopholes” that it is ineffective. Senator McCain was
quoted in Time magazine as saying that he supports legislation but is not optimistic
about its effect: “I’ll support it, report it, vote for it, take credit for it, but will it make
much difference? I don’t think so.”6 The fact that spam is rising despite the growing
number of state laws suggests that legislation is not a sure solution.
One proposed alternative is trying to make spam less attractive economically by
increasing the cost of sending spam, perhaps by establishing systems whereby
recipients could charge spammers “postage” for UCE. A technological alternative
is using “challenge-response” software that requires the sender to respond to an
action requested in an automatically generated return e-mail before the original e-
mail reaches the intended recipient. Earthlink offers this option to its subscribers.
Challenge-response is based on the concept that spammers are sending e-mail with
5 Some spam already contains instructions, usually to send a message to an e-mail address,
for how a recipient can indicate that future such messages are not desired. However, in
many cases this is a ruse by the sender to trick a recipient into confirming that the e-mail has
reached a valid e-mail address. The sender then sends more spam to that address and/or
includes the e-mail address on lists of e-mail addresses that are sold to bulk e-mailers. It is
virtually impossible for a recipient to discern whether the proffered opt-out instructions are
genuine or duplicitous.
6 Quoted in: Chris Taylor. Spam’s Big Bang! Time, June 16, 2003, p. 52.

CRS-4
automated systems that cannot read a return e-mail and respond to a requested action
(such as “click here”), but a person can, so if the e-mail was sent by an individual
rather than a bulk e-mail system, the person will perform the requested action and the
e-mail will be delivered. It is not clear to what extent such software may become
popular, since it places an additional burden on the sender and could delay an e-
mail’s arrival.
Some argue that the issue of controlling spam should be left to the ISPs, since
they have the economic incentive to do so in terms of retaining subscribers who
might weary of spam and abandon e-mail entirely, avoiding the costs associated with
litigation, and reducing the need to upgrade server capacity to cope with the traffic.
Many ISPs already use spam filtering software,7 but with the increase in the amount
of spam, a large number of such messages still get through. In June 2003, Microsoft
announced the creation of a special team of researchers and programmers to develop
new technological tools to fight spam. However, Microsoft also is supporting the
need for federal legislation, as is AOL.
State Action
According to the SpamLaws Web site [http://www.spamlaws.com], 34 states
have passed laws regulating spam: Alaska, Arizona, Arkansas, California, Colorado,
Connecticut, Delaware, Idaho, Illinois, Indiana, Iowa, Kansas, Louisiana, Maine,
Maryland, Minnesota, Missouri, Nevada, New Mexico, North Carolina, North
Dakota, Ohio, Oklahoma, Pennsylvania, Rhode Island, South Dakota, Tennessee,
Texas, Utah, Virginia, Washington, West Virginia, Wisconsin, and Wyoming. The
specifics of each law varies. Summaries of and links to each law are provided on that
Web site. CRS Report RL31488, Regulation of Unsolicited Commercial E-Mail, provides
a brief review of the state laws and challenges to them.
Congressional Action: 105th-107th Congresses
In the 105th Congress, the House and Senate each passed legislation (H.R. 3888,
and S. 1618), but no bill ultimately cleared Congress. In the 106th Congress, several
UCE bills were introduced. One, H.R. 3113 Wilson), passed the House. There was
no further action. Several spam bills were introduced in the 107th Congress, but none
passed. One, H.R. 718 (Wilson), was reported from the House Energy and
Commerce Committee (H.Rept. 107-41, Part I), and the House Judiciary Committee
(H.Rept. 107-41, Part II). The two versions were substantially different. A Senate
bill, S. 630 (Burns), was reported (S.Rept. 107-318) from the Senate Commerce
Committee. There was no further action.
7 On June 5, 2003, the Associated Press reported that Earthlink’s spam filter blocks up to
80% of spam, and AOL blocks 80% of incoming e-mail traffic. Anick Jesdanun,
Technology for Challenging Spam is Challenged, AP, June 5, 2003, 23:59.

CRS-5
Congressional Action: 108th Congress
Nine bills are currently pending. H.R. 1933, H.R. 2214, H.R. 2515, S. 877, S.
1052, and S. 1327 are “opt-out” bills. (H.R. 1933 and S. 1327 have the same title
and are similar, but not identical.) S. 563 is a “do not e-mail” bill. S. 1231
combines elements of both approaches. S. 1293 creates criminal penalties for
fraudulent e-mail.
The provisions of these bills are summarized in the following two tables — one
for House bills and one for Senate bills. Some of the provisions affect all
commercial e-mail, while others affect only unsolicited commercial e-mail (spam).
S. 877 was ordered reported, amended, by the Senate Commerce Committee on June
19, 2003. Table 2 shows the provisions in the bill as it was ordered reported.

CRS-6
Table 1: Brief Comparison of Pending Spam Legislation in the House
Provision
H.R. 1933 (Lofgren)/S. 1326 (Corzine)
H.R. 2214 (Burr-Tauzin-Sensenbrenner)
H.R. 2515 (Wilson)
Title
REDUCE Spam Act
Reduction in Distribution of Spam Act
Anti-Spam Act
Definition of Commercial E-Mail
E-mail whose primary purpose is
E-mail whose primary purpose is commercial
E-mail that contains a commercial
commercial advertisement or promotion
advertisement or promotion of commercial
advertisement or promotion of a product or
of commercial product or service, unless
product or service, with exceptions.
service, but is not a commercial transactional
the sender has a personal relationship
e-mail message (as defined in the Act).
with the recipient.
Definition of Unsolicited
Commercial e-mail sent to a recipient
Commercial e-mail transmitted without prior
Not defined.
Commercial E-mail (UCE)
with whom the sender does not have a
consent.
pre-existing business relationship, and is
not sent at the request of, or with the
Consent means the recipient has expressly
express consent of, the recipient.
consented to receive the message, and it
includes consent to receipt of a message from
Pre-existing business relationship means
a third party pursuant to transfer of the
that there has been a business
recipient’s e-mail address if the recipient was
transaction between the sender and
notified that such transfer could occur. If
recipient within the past 5 years and the
commercial e-mail is delivered to a recipient
recipient was provided at that time with
at an e-mail address that was reassigned from
an opt-out opportunity and did not
a previous user, the recipient is considered to
exercise it, or the recipient opted-in and
have consented to the same extent as the
has not revoked that permission.
previous address user unless the sender knows
that the address has been reassigned or the
new user has opted-out.
Prohibits false or misleading
Yes, in UCE.
Yes, in all commercial e-mail.
Yes, in all commercial e-mail.
header information
Prohibits deceptive subject
Yes, in UCE.
No
Yes, in all commercial e-mail.
headings
Prohibits false, misleading, or
No
No
No
deceptive information in body of
message

CRS-7
Provision
H.R. 1933 (Lofgren)/S. 1326 (Corzine)
H.R. 2214 (Burr-Tauzin-Sensenbrenner)
H.R. 2515 (Wilson)
Prohibits transmission of e-mail
No
Yes, for all commercial e-mail.
Yes, in commercial e-mail prohibited under
from improperly or illegally
other sections of the Act.
harvested e-mail addresses
Also prohibits dictionary attacks.
Prohibits sending e-mails through
NA
NA
NA
computers accessed without
authorization
Creates “do not e-mail” registry at
No
No
No
FTC
Penalties for falsifying sender’s
No
Yes
Yes
identity
Requires FTC-prescribed
No, but see requirements for subject line
Yes
Yes
“warning labels” on sexually
labels (next).
oriented material
Requires specific characters in
Yes, “ADV:” for advertisement;
No, but message must provide clear and
No, but message must contain clear and
subject line of UCE to indicate the
“ADV-ADLT:” for adult-oriented
conspicuous identification that it is an
conspicuous identification that it is a
message is an advertisement
advertisements. Or identification may
advertisement.
commercial e-mail message.
comply with standards set by Internet
Engineering Task Force.
Requires opt-out mechanism
UCE must contain valid sender-operated
Commercial e-mail must contain functioning
Commercial e-mail must contain functioning
return e-mail address to which recipient
return e-mail address or other Internet-based
return e-mail address or other Internet-based
may opt-out.
mechanism to which the recipient may opt-
mechanism to which the recipient may opt-
out.
out.
Damages or Penalties
Civil penalties to be set by FTC, except
Varies per section of Act.
Varies per section of Act. Also creates
that under private right of action, court
criminal penalties for falsifying sender’s
may impose penalties up to $10 per
identity, failing to placing warning lables on
violation.
sexually oriented material, illicit e-mail
address harvesting, and other sections of the
act.

CRS-8
Provision
H.R. 1933 (Lofgren)/S. 1326 (Corzine)
H.R. 2214 (Burr-Tauzin-Sensenbrenner)
H.R. 2515 (Wilson)
Penalties for persons who promote
NA
NA
NA
their trade, business, goods,
products, etc. in e-mail that
violates Act, under specific
circumstances
Reward for first person identifying
Yes, not less than 20% of the penalty.
No
No
a violator and supplying
information leading to the
collection of a civil penalty
Private Right of Action
Yes. Recipient of UCE or ISP may
Yes, but for ISPs only.
Yes, but for ISPs only.
bring civil action in a U.S. district court
to enjoin further violations and recover
damages.
Affirmative Defense/Safe Harbor
Person is not liable if the person has
It is an affirmative defense against charges
NA
established and implemented, with due
that a commercial e-mail message falsifies the
care, reasonable practices and
sender’s identity if the defendant sent fewer
procedures to prevent violations, and
than 100 such messages during any 30-day
violation occurred despite good faith
period.
efforts to comply, or if, within 2-days
ending upon the initiation of the
transmission that is in violation, such
person initiated the transmission of such
message, or one substantially similar to
it, to less than 1,000 e-mail addresses.
Enforcement
By FTC
By FTC and U.S. Attorney General.
By FTC and U.S. Attorney General.
State action allowed
NA
Yes, but not if FTC or Attorney General
Yes, but U.S. district courts, the U.S. courts
already has commenced an action. FTC must
of any territory, and the D.C. court have
be notified in all cases, and may intervene.
exclusive jurisdiction over all civil actions
brought by states. State must notify FTC,
and FTC may intervene.

CRS-9
Provision
H.R. 1933 (Lofgren)/S. 1326 (Corzine)
H.R. 2214 (Burr-Tauzin-Sensenbrenner)
H.R. 2515 (Wilson)
Class action suits allowed
NA
No
NA
Effect on ISPs
ISPs may bring civil action in U.S.
ISPs may bring civil action in U.S. district
ISPs may bring civil action in U.S. district
district court.
court.
court.
Does not change law regarding when
Does not affect the lawfulness or
Does not affect the lawfulness or
ISP may disclose customer
unlawfulness under other laws of ISP policies
unlawfulness under other laws of ISP
communications or records; does not
declining to transmit, route, relay, handle, or
policies declining to transmit, route, relay,
require ISP to block, transmit, route,
store certain types of e-mail.
handle, receive or store certain types of e-
relay, handle or store certain types of e-
mail.
mail; does not prevent or limit ISP from
adopting a policy regarding commercial
e-mail including declining to transmit
certain commercial e-mail; and does not
render lawful any such policy that is
unlawful under any other provision of
law.
Supersedes state and local laws
State and local governments may not
Yes, with exceptions.
Yes, with exceptions.
and regulations
impose civil liabilities inconsistent with
Act. The Act does not preempt certain
remedies available under certain other
federal, state, or local laws.
NA = Not Addressed

CRS-10
Table 2: Brief Comparison of Pending Spam Legislation in the Senate
Provision
S. 563 (Dayton)
S. 877 (Burns-Wyden)
S. 1052
S. 1231 (Schumer)
S. 1293 (Hatch)
S. 1327 (Corzine)
(As ordered reported)
(Nelson-FL)
Title
Computer
CAN SPAM Act
Ban on
SPAM Act
Criminal Spam Act
REDUCE Spam Act
Owners Bill of
Deceptive
Rights Act
Unsolicited
Bulk
Electronic
Mail Act
Definition of
None
E-mail whose primary
None
E-mail whose primary
E-mail whose
E-mail whose
Commercial E-
purpose is commercial
purpose is to advertise or
primary purpose is
primary purpose is
Mail
advertisement or promotion
promote, for a
commercial
commercial
of commercial product or
commercial purpose, a
advertisement or
advertisement or
service, with exceptions.
commercial product or
promotion of a
promotion of
service.
commercial product
commercial product
or service.
or service

CRS-11
Provision
S. 563 (Dayton)
S. 877 (Burns-Wyden)
S. 1052
S. 1231 (Schumer)
S. 1293 (Hatch)
S. 1327 (Corzine)
(As ordered reported)
(Nelson-FL)
Definition of
None
Commercial e-mail sent
None
Commercial e-mail sent
None
Commercial e-mail
Unsolicited
without the recipient’s prior
without prior affirmative
sent without the
Commercial E-
affirmative or implied
consent or implied
recipient’s prior
mail (UCE)
consent and that is not a
consent, or sent after the
affirmative or implied
transactional or relationship
recipient has opted-out,
consent and that is
message (as defined in the
with an exception.
not a transactional or
Act). A visit to a Web site,
relationship message.
if the recipient did not
Affirmative consent
knowingly submit his e-
means the message falls
(Affirmative and
mail address, is not a
within the scope of an
implied consent are
transaction.
express and unambiguous
not defined.)
invitation or permission
Affirmative consent means
granted by the recipient
the recipient has expressly
and not subsequently
consented to receive the
revoked; the recipient
message. Implied consent
knew permission was
means there has been a
being granted; and the
business transaction
recipient did not
between the sender and
subsequently opt-out.
recipient within the past 3
Implied consent means
years and the recipient was
there has been a business
provided at that time with
transaction between the
an opt-out opportunity and
sender and recipient
did not exercise it.
within the past 3 years
and the recipient was
provided at that time with
an opt-out opportunity
and did not exercise it.

CRS-12
Provision
S. 563 (Dayton)
S. 877 (Burns-Wyden)
S. 1052
S. 1231 (Schumer)
S. 1293 (Hatch)
S. 1327 (Corzine)
(As ordered reported)
(Nelson-FL)
Prohibits false or
No
Yes, in all commercial e-
Illegal to
Yes, in all commercial e-
Yes
Yes, in UCE.
misleading header
mail.
falsify or
mail.
information
forge certain
header
information.
Prohibits
No
Yes, in all commercial e-
No
Yes, in all commercial e-
No
Yes, in UCE.
deceptive subject
mail.
mail.
headings
Prohibits false,
No
No, but does not affect
No
Yes
No
No
misleading, or
FTC’s authority to bring
deceptive
enforcement actions for
information in
materially false or deceptive
body of message
representations in
commercial e-mail.
Prohibits
No
Yes, for unlawful UCE.
Prohibits
Yes, of all commercial e-
No
No
transmission of e-
collecting e-
mail to addresses
mail from
Also prohibits dictionary
mail
obtained through illegal
improperly or
attacks and the automated
addresses
harvesting or automated
illegally
creation of multiple e-mail
from public
means.
harvested e-mail
or on-line accounts from
and private
addresses
which to transmit, or enable
spaces for the
someone else to transmit,
purpose of
UCE.
transmitting
UCE.
Prohibits sending
NA
Prohibits accessing a
NA
NA
Prohibits accessing a
NA
e-mails through
computer without
computer without
computers
authorization and
authorization and
accessed without
transmitting UCE from or
transmitting multiple
authorization
through it.
e-mails from or
through it.

CRS-13
Provision
S. 563 (Dayton)
S. 877 (Burns-Wyden)
S. 1052
S. 1231 (Schumer)
S. 1293 (Hatch)
S. 1327 (Corzine)
(As ordered reported)
(Nelson-FL)
Creates “do not e-
Yes
No, but requires FTC to
No
Yes, but “safe harbor”
No
No
mail” registry at
submit recommendations
provided if e-mail
FTC
concerning creation of such
address has been or list
a registry.
for less than 30 days or
person reasonably relied
on registry and takes
reasonable measures to
comply with the Act.
FTC to issue regulations
for the list, and may
create specific categories
to protect minors, e.g.
regarding e-mail that
contains or advertises
adult content or links to
such content. Senders
shall honor such
categories without regard
to actual or implied
consent given by the
minor.
Penalties for
No
No
No
No
Yes
No
falsifying
sender’s identity
Requires FTC-
No
No
No
No, but see provision
No
No, but see
prescribed
regarding “do not e-mail”
requirements for
“warning labels”
registry (above).
subject line labels
on sexually
(next).
oriented material

CRS-14
Provision
S. 563 (Dayton)
S. 877 (Burns-Wyden)
S. 1052
S. 1231 (Schumer)
S. 1293 (Hatch)
S. 1327 (Corzine)
(As ordered reported)
(Nelson-FL)
Requires specific
No
No, but message must
No
Yes, “ADV” must be in
No
Yes, “ADV:” for
characters in
provide clear and
subject line, but “safe
advertisement;
subject line of
conspicuous identification
harbor” provided if the
“ADV-ADLT:” for
UCE to indicate
that it is an advertisement.
sender is a member of an
adult-oriented
the message is an
FTC-approved self
advertisements. Or
advertisement
regulatory organization
identification may
and complies with those
comply with
requirements.
standards set by
Internet Engineering
Task Force.
Requires opt-out
Creates opt-out
Commercial e-mail must
Person
All commercial e-mail,
No
UCE must contain
mechanism
mechanism
contain functioning e-mail
sending UCE
including UCE, must
valid sender-operated
through do not e-
return address or other
must provide
have functioning e-mail
return e-mail address
mail registry.
Internet-based mechanism
recipient
address or other Internet-
to which recipient
to which the recipient may
clear and
based mechanism to
may opt-out.
opt-out.
conspicuous
which the recipient may
opportunity
opt-out.
to request to
opt-out.
Damages or
Up to $10,000 per
Varies per violation.
Civil
Varies per section of Act.
Establishes civil and
To be set by FTC,
Penalties
violation
penalties and
criminal penalties
except that under
fines to be set
which vary per
private right of
in accordance
specifics of the
action, statutory
with 18
violation.
damages of up to $10
U.S.C.
per violation.
Penalties for
NA
Yes
NA
NA
NA
NA
persons who
promote their
trade, business,
goods, products,
etc. in e-mail that
violates Act,
under specific
circumstances

CRS-15
Provision
S. 563 (Dayton)
S. 877 (Burns-Wyden)
S. 1052
S. 1231 (Schumer)
S. 1293 (Hatch)
S. 1327 (Corzine)
(As ordered reported)
(Nelson-FL)
Reward for first
No
No
No
No
No
Yes, not less than
person identifying
20% of the penalty.
a violator and
supplying
information
leading to the
collection of a
civil penalty
Private Right of
No
No
No
Recipient adversely
ISPs may bring civil
Yes. Recipient of
Action
affected may, if otherwise
action in U.S.
UCE or ISP may
permitted by laws or rules
District Court.
bring civil action in a
of State court, bring, in
U.S. district court to
an appropriate court of
enjoin further
the State, an action to
violations and recover
enjoin further violation
damages.
and recover damages.

CRS-16
Provision
S. 563 (Dayton)
S. 877 (Burns-Wyden)
S. 1052
S. 1231 (Schumer)
S. 1293 (Hatch)
S. 1327 (Corzine)
(As ordered reported)
(Nelson-FL)
Affirmative
NA
Person is not liable if the
NA
Establishes “safe harbors”
No
Person is not liable if
Defense/Safe
person has established and
as noted above.
the person has
Harbor
implemented, with due care,
established and
reasonable practices and
implemented, with
procedures to prevent
due care, reasonable
violations, and violation
practices and
occurred despite good faith
procedures to prevent
efforts to comply.
violations, and
violation occurred
despite good faith
efforts to comply, or
if, within 2-days
ending upon the
initiation of the
transmission that is in
violation, such person
initiated the
transmission of such
message, or one
substantially similar
to it, to less than
1,000 e-mail
addresses.

CRS-17
Provision
S. 563 (Dayton)
S. 877 (Burns-Wyden)
S. 1052
S. 1231 (Schumer)
S. 1293 (Hatch)
S. 1327 (Corzine)
(As ordered reported)
(Nelson-FL)
Enforcement
By FTC.
By FTC, except for certain
Violation
By FTC, except for
By the Attorney
By FTC.
entities that are regulated by
considered a
certain entities that are
General.
other agencies.
predicate
regulated by other
offense under
agencies.
RICO and an
unfair or
deceptive
practice
under FTC
Act.
State action
NA
Yes, but must notify FTC or
NA
Yes, but must notify
NA
NA
allowed
other appropriate regulator,
FTC, which may
which may intervene.
intervene.
Class action suits
NA
NA
NA
No
NA
NA
allowed

CRS-18
Provision
S. 563 (Dayton)
S. 877 (Burns-Wyden)
S. 1052
S. 1231 (Schumer)
S. 1293 (Hatch)
S. 1327 (Corzine)
(As ordered reported)
(Nelson-FL)
Effect on ISPs
NA
ISPs may bring civil action
NA
ISPs may bring civil
ISPs may bring civil
ISPs may bring civil
in U.S. district court.
action in U.S. district
action in U.S.
action in U.S. district
court.
district court.
court.
Does not affect the
lawfulness or unlawfulness
Senders of commercial e-
Does not change law
under other laws of ISP
mail including UCE must
regarding when ISP
policies declining to
comply with ISP policies
may disclose
transmit, route, relay,
with respect to electronic
customer
handle, or store certain
mail, account registration
communications or
types of e-mail.
and use, or other terms of
records; does not
service.
require ISP to block,
transmit, route, relay,
handle or store
certain types of e-
mail; does not
prevent or limit ISP
from adopting a
policy regarding
commercial e-mail
including declining to
transmit certain
commercial e-mail;
and does not render
lawful any such
policy that is
unlawful under any
other provision of
law.
Supersedes state
NA
Yes, with exceptions.
NA
NA
NA
NA
and local laws
and regulations
NA = Not addressed
RICO = Racketeer Influenced and Corrupt Organizations Act