Feeds

Microsoft wins UK ruling to ban spam list sales

Can seek compensation, too

Reducing security risks from open source software

Microsoft has stopped a man from selling lists of email addresses which were being used for spam. A court has granted a summary judgment against Paul Martin McDonald, stopping him from selling the lists.

Microsoft owns and runs Hotmail, a free, web based email service. It sought a summary judgment from the English courts to stop McDonald from operating his Bizads business, which offered for sale lists of email addresses of people which were used as the basis of spam by those who purchased the lists.

Microsoft said that the activity breached the Privacy and Electronic Communications (EC Directive) Regulations. It argued that because a high proportion of the people receiving the emails complained about them it was suffering loss and damage to the goodwill it had as operators of Hotmail.

Judge Lewison agreed and granted the judgment against McDonald. Pointing out that the law was designed to protect both email subscribers and electronic communications networks, Lewison said that Microsoft had a right to use the law.

"[Microsoft] had a cause of action under the Regulations, as it fell within the class of persons for whom the benefit of the statutory requirement in the Regulations was imposed and the purpose of the Regulations was to enable a claim for relief to be brought," he said in judgment.

"The evidence plainly established that the business of Bizads was supplying email lists of persons who had not consented to receive direct marketing mail and that it had encouraged purchasers of the lists to send emails to those people," said Lewison. "The lists contravened reg. 22, as they concerned the sending of unsolicited emails and the words of the Bizads website instigated the sending of emails."

A summary judgment was appropriate, he said, because "[McDonald] had no reasonable prospect of defending the allegation that he was behind the business".

"[Microsoft] had suffered a loss as a result of the breach of the Regulations and was entitled to compensation and an injunction restraining P from instigating the transmission of commercial emails to Hotmail accounts," ruled Lewison.

"This ruling represents a significant step forward in the UK and across Europe in discouraging perpetrators of spam by encouraging organisations to bring court proceedings against those who continue to conduct these illegal activities," a Microsoft spokesperson told OUT-LAW.

"Spam is damaging to all users of the internet, placing enormous demands on resources for both individuals and organisations," said the spokesperson. "Microsoft is committed to developing assistive technologies to help people reduce the levels of unsolicited email they receive and to using legal means against those who unlawfully instigate or transmit spam."

Copyright © 2006, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Microsoft: You NEED bad passwords and should re-use them a lot
Dirty QWERTY a perfect P@ssword1 for garbage websites
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
NIST told to grow a pair and kick NSA to the curb
Lrn2crypto, oversight panel tells US govt's algorithm bods
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.