Email disclaimer

Last updated

An email disclaimer is a disclaimer, notice or warning which is added to an outgoing email and forms a distinct section which is separate from the main message. [1] [2] The reasons for adding such a disclaimer include confidentiality, copyright, contract formation, defamation, discrimination, harassment, privilege and viruses. [3]

Contents

Issues frequently dealt with in email disclaimers

Confidentiality

A disclaimer may be added to mitigate the risk that a confidential email may be forwarded to a third-party recipient. Organizations may use the disclaimer to warn such recipients that they are not authorised recipients and to ask that they delete the email. The legal force and standing of such warnings is not well-established. [4] [5]

Contract

A disclaimer may state that the email does not form a contract. This may not be effective as the substantive body of the email may contradict and override this. In the case of Baillie Estates Limited against Du Pont (UK) Limited, which was heard in the Outer House of Scotland, it was found that a contract was in effect, as attached to the relevant email, even though there was a standard disclaimer. [6] [7]

Republication of emails may be protected by copyright law and a disclaimer may warn that such rights to copy the text of the email are reserved by the originator. [8]

Viruses

Computer viruses may be spread by email. To mitigate the risk that a recipient might sue the sender of an infected email, a disclaimer might warn of the possibility of infection and advise the recipient to conduct their own scan. The disclaimer might provide details of the outgoing scanning which has already been performed to provide some guidance about the level of risk. [9] [10]

Effectiveness of disclaimers

The Economist published an article asserting that disclaimers are presented largely as a result of imitation and habit, that people have long stopped paying attention to disclaimers, and suggested that they may not be legally enforceable. [11]

In the United States, the overuse of boilerplate disclaimers by law firms has been criticized as potentially rendering the disclaimers ineffective. [12] With little case law addressing email disclaimers, concerns remain that the use of a disclaimer provides little or no benefit to an attorney other person who misdirects an email that contains privileged or confidential information. [13] If the recipient of a misdirected email is not bound to a confidentiality agreement, the inclusion of a disclaimer has no binding effect upon that person. [14] [15]

In the EU, there is a directive that instructs courts to strike unreasonable provisions of consumer contracts that have not been freely negotiated by the consumer. [11]

Length and other awards

The Register conducted a survey in 2001 and found that UBS Warburg had the longest disclaimer 1,081 words. [16] Other categories in their Email Disclaimer Awards included the Most Incomprehensible Disclaimer and the Most PC Disclaimer. [17]

Related Research Articles

A signature block is a personalized block of text automatically appended at the bottom of an email message, Usenet article, or forum post.

An anonymous remailer is a server that receives messages with embedded instructions on where to send them next, and that forwards them without revealing where they originally came from. There are cypherpunk anonymous remailers, mixmaster anonymous remailers, and nym servers, among others, which differ in how they work, in the policies they adopt, and in the type of attack on the anonymity of e-mail they can resist. Remailing as discussed in this article applies to e-mails intended for particular recipients, not the general public. Anonymity in the latter case is more easily addressed by using any of several methods of anonymous publication.

In American jurisprudence, an excuse is a defense to criminal charges that is a distinct from an exculpation. Justification and excuse are different defenses in a criminal case. Exculpation is a related concept which reduces or extinguishes a person's culpability, such as their liability to pay compensation to the victim of a tort in the civil law.

Various anti-spam techniques are used to prevent email spam.

In law, a settlement is a resolution between disputing parties about a legal case, reached either before or after court action begins. A collective settlement is a settlement of multiple similar legal cases. The term also has other meanings in the context of law. Structured settlements provide for future periodic payments, instead of a one time cash payment.

A Joe job is a spamming technique that sends out unsolicited e-mails using spoofed sender data. Early Joe jobs aimed at tarnishing the reputation of the apparent sender or inducing the recipients to take action against them, but they are now typically used by commercial spammers to conceal the true origin of their messages and to trick recipients into opening emails apparently coming from a trusted source.

<span class="mw-page-title-main">Disclaimer</span> Any statement intended to specify or delimit the scope of rights and obligations

A disclaimer is generally any statement intended to specify or delimit the scope of rights and obligations that may be exercised and enforced by parties in a legally recognized relationship. In contrast to other terms for legally operative language, the term disclaimer usually implies situations that involve some level of uncertainty, waiver, or risk.

Trespass to chattels is a tort whereby the infringing party has intentionally interfered with another person's lawful possession of a chattel. The interference can be any physical contact with the chattel in a quantifiable way, or any dispossession of the chattel. As opposed to the greater wrong of conversion, trespass to chattels is argued to be actionable per se.

<span class="mw-page-title-main">Lottery scam</span> Fraud pretending to be a lottery

A lottery scam is a type of advance-fee fraud which begins with an unexpected email notification, phone call, or mailing explaining that "You have won!" a large sum of money in a lottery. The recipient of the message—the target of the scam—is usually told to keep the notice secret, "due to a mix-up in some of the names and numbers," and to contact a "claims agent." After contacting the agent, the target of the scam will be asked to pay "processing fees" or "transfer charges" so that the winnings can be distributed, but will never receive any lottery payment. Many email lottery scams use the names of legitimate lottery organizations or other legitimate corporations/companies, but this does not mean the legitimate organizations are in any way involved with the scams.

Basel II classified legal risk as a subset of operational risk in 2003. This conception is based on a business perspective, recognizing that there are threats entailed in the business operating environment. The idea is that businesses do not operate in a vacuum and in the exploitation of opportunities and their engagement with other businesses, their activities tend to become subjects of legal liabilities and obligations.

DoYouDo, Inc. is a Beverly Hills, California company that owns the patent to an anonymous matching service designed to detect mutual attraction between friends or acquaintances based on confidential lists they create of people they are interested in. On September 7, 1999, Israeli businessmen Gil S. Sudai and David J. Blumberg patented the methodology, which represented a departure from the approaches employed by other online dating services and dating systems. It focused on matching up people who already had a non-romantic relationship offline, rather than matching up strangers, and was designed to help solve the problems associated with unwanted romantic overtures on the one hand, and inhibition resulting from fears of unrequited love on the other.

Emailtracking is a method for monitoring whether the email message is read by the intended recipient. Most tracking technologies use some form of digitally time-stamped record to reveal the exact time and date when an email is received or opened, as well as the IP address of the recipient.

Consequential damages, otherwise known as special damages, are damages that can be proven to have occurred because of the failure of one party to meet a contractual obligation, a breach of contract. From a legal standpoint, an enforceable contract is present when it is: expressed by a valid offer and acceptance, has adequate consideration, mutual assent, capacity, and legality. Consequential damages go beyond the contract itself and into the actions that arise from the failure to fulfill. The type of claim giving rise to the damages, such as whether it is a breach of contract action or tort claim, can affect the rules or calculations associated with a given type of damages. For example, consequential damages are a potential type of expectation damages that arise in contract law.

An email loop is an infinite loop phenomenon, resulting from mail servers, scripts, or email clients that generate automatic replies or responses. If one such automatic response triggers another automatic response on the other side, an email loop is created. The process can continue until one mailbox is full or reaches its mail sending limit. In theory, the email loop could last indefinitely. Email loops may be caused accidentally or maliciously, causing denial of service. Although rare, email loops involving more than two participants can also occur.

Backscatter is incorrectly automated bounce messages sent by mail servers, typically as a side effect of incoming spam.

In online advertising, contact scraping is the practice of obtaining access to a customer's e-mail account in order to retrieve contact information that is then used for marketing purposes.

De-MailGerman pronunciation:[deːˈeːmɛɪ̯l] is a German e-government communications service that makes it possible to exchange legal electronic documents between citizens, agencies, and businesses over the Internet. The project was originally called Bürgerportal and has been implemented by the German government in cooperation with private business partners in an effort to reduce the communication costs of public administration and companies.

<i>DuPont v. Kolon Industries</i> Intellectual property lawsuit

DuPont v. Kolon Industries is an intellectual property lawsuit centering on the allegation that Kolon Industries, a South Korea-based company, stole trade secrets concerning the production and marketing of Kevlar from DuPont, an American chemical company. Kevlar is a high strength synthetic fiber used in applications as diverse as bicycle tires and body armor. On September 14, 2011, a jury found in favour of DuPont and awarded damages of $919.9 million. A 2015 settlement reduced the damages to $275 million.

Financial law is the law and regulation of the commercial banking, capital markets, insurance, derivatives and investment management sectors. Understanding financial law is crucial to appreciating the creation and formation of banking and financial regulation, as well as the legal framework for finance generally. Financial law forms a substantial portion of commercial law, and notably a substantial proportion of the global economy, and legal billables are dependent on sound and clear legal policy pertaining to financial transactions. Therefore financial law as the law for financial industries involves public and private law matters. Understanding the legal implications of transactions and structures such as an indemnity, or overdraft is crucial to appreciating their effect in financial transactions. This is the core of financial law. Thus, financial law draws a narrower distinction than commercial or corporate law by focusing primarily on financial transactions, the financial market, and its participants; for example, the sale of goods may be part of commercial law but is not financial law. Financial law may be understood as being formed of three overarching methods, or pillars of law formation and categorised into five transaction silos which form the various financial positions prevalent in finance.

Spy pixels or tracker pixels are hyperlinks to remote image files in HTML email messages that have the effect of spying on the person reading the email if the image is downloaded. They are commonly embedded in the HTML of an email as small, imperceptible, transparent graphic files. Spy pixels are commonly used in marketing, and there are several countermeasures in place that aim to block email tracking pixels. However, there are few regulations in place that effectively guard against email tracking approaches.

References

  1. Rand Morimoto (2004), "Using Email Disclaimers", Microsoft Exchange server 2003 unleashed, ISBN   9780672325816
  2. A Lampert; R Dale; C Paris (2009), Segmenting email message text into zones
  3. Alan Davidson (2003), "Email Disclaimers", Plaintiff (56)
  4. Theresa Heyd (2008), Email hoaxes: form, function, genre ecology, ISBN   978-9027254184
  5. Joshua L. Colburn (2006), "Don't Read This If It's Not for You: The Legal Inadequacies of Modern Approaches to E-Mail Privacy", Minnesota Law Review (91)
  6. Gillian Black (18 November 2009), Formation of Contract: Consensus or Intention? (PDF), archived from the original (PDF) on 14 September 2012, retrieved 22 September 2010
  7. Lord Hodge, OPINION OF LORD HODGE in the cause BAILLIE ESTATES LIMITED (Pursuer) against DU PONT (UK) LIMITED (Defender)
  8. Jack Shafer (June 1, 2004), "E-mail Confidential", Slate
  9. Robert F. Smallwood (2008), Taming the Email Tiger: Email Management for Compliance, Governance and Litigation, ISBN   9780615195759
  10. Lynda A. C. Macdonald (2004), Tolley's Managing Email & Internet Use: A Practical Guide to Employer's Obligations and Employee's Rights, Butterworth-Heinemann, ISBN   9780754524434
  11. 1 2 "Spare us the e-mail yada-yada". The Economist. 7 April 2011. Retrieved 21 January 2020.
  12. Rubin, Karen E. (November 2009). "Can E-Mail Disclaimers Help Avoid a Privilege Waiver". Ohio Lawyer. 23: 9.
  13. Lidstone, Herrick K. (2015). "Email Disclaimers A Worthwhile Endeavor or a Waste of Electronic Ink?". SSRN Electronic Journal. doi:10.2139/ssrn.2656466.
  14. Fry, Erika (15 October 2013). "The short history of email disclaimers". Fortune. Retrieved 21 January 2020.
  15. "Email Disclaimers: Legal Effect in American Courts".
  16. Lester Haines (18 May 2001), "The 2001 Daftas Longest Email Disclaimer", The Register
  17. Lester Haines (18 May 2001), "The Email Disclaimer Awards 2001", The Register