19BerkeleyTechLJ427 (3)
19BerkeleyTechLJ427 (3)
Citations:
Please note: citations are provided as a general guideline. Users should consult their preferred
citation format's style manual for proper citation formatting.
-- Your use of this HeinOnline PDF indicates your acceptance of HeinOnline's Terms and
Conditions of the license agreement available at
https://heinonline.org/HOL/License
-- The search text of this PDF is generated from uncorrected OCR text.
-- To obtain permission to use this article beyond the scope of your license, please use:
Copyright Information
CYBERLAW
© 2004 Berkeley Technology Law Journal & Berkeley Center for Law and Technology.
I. TECHNICAL PRIMER
Intel Corp. v. Hamidi, on its most basic level concerns the permissibil-
ity of one of the most common forms of electronic communication on the
Internet: e-mail. Intel Corporation owns and operates an e-mail system for
use by its employees in business and reasonable personal use. 5 An ex-
employee, Kenneth Kourosh Hamidi, sent several unsolicited e-mails to
thousands of addresses on Intel's system, the contents of which were un-
sympathetic to Intel.6 Intel then sought both technical and legal means to
forbid Hamidi that use of its system. 7 By itself, e-mail is just a form of
electronic communication, but its use in both commercial advertising as
well as personal and business communication has given rise to many ques-
tions concerning its proper use.
A. Basic Architecture of the Internet
Though any privately-owned computer qualifies as personal property,
it must be understood that connecting such a computer to the Internet
makes it accessible to many other entities attached to the architecture. The
Internet is a network of computers which transmit information and data to
one another through an established series of protocols. 8 Its utility increases
exponentially as more computers are connected to it due to the phenome-
non of "network benefits." 9 Each computer, as a point on the network,
5. Hamidi,30Cal.4that1349 n.1.
6. Id.at 1349, 1356.
7. Id.1348-49.
8. See generally CompuServe Inc., v. Cyber Promotions, Inc., 962 F. Supp. 1015,
1018 (S.D. Ohio 1997); ACLU v. Reno, 929 F. Supp. 824, 837-38 (E.D. Pa. 1996).
9. See generally Burk, supra note 4, at 50-51; Michael L. Katz & Carl Shapiro,
Network Externalities, Competition, and Compatibility, 75 AM. ECON. REv. 424 (1985);
20041 TRESPASS TO CHATTELS & A DOCTRINE OF CYBER-NUISANCE 429
C. Spam
Communication over the Internet is fast, inexpensive, and convenient;
a boon to private users as well as to commercial entities.' 7 Spam refers to
any unwanted unsolicited bulk e-mail ("UBE") or unsolicited commercial
e-mail ("UCE"). 8 While most think of spam as unwanted e-mail, the
broad definition of spam can include webpages and "pop-up" ads which
arrive in the course of ordinary web surfing 19 or through "adware" or
"spyware" which a remote party installs on a computer, often without the
owner's knowing or intended acquiescence. 20 The intent behind the trans-
mission of spam is sometimes commercially "legitimate," but often it is
fraudulent. 2 1 Even proponents of free speech and open access rarely advo-
cate, much less defend, the practice of "spamming. ' 22 Private parties
sometimes attempt to stem the tide of spam on their own, generally
through the use of filters 23 that selectively block IP addresses or identify
unwelcome messages by their e-mail address or message headers. Spam-
17. See CompuServe, 962 F. Supp. at 1018; Carol Jones, E-Mail Solicitation: Will
Opening a "Spain-Free" Mailbox Ever Be a Reality?, 15 LOY. CONSUMER L. REV 69, 70-
72 (2002) (sending spain is so inexpensive that even a low response rate gives a better
return on marketing over the Internet than through junk mail).
18. See generally Scot M. Graydon, Much Ado about Spain: Unsolicited Advertis-
ing, the Internet, and You, 32 ST. MARY'S L.J. 77, 78 (2000); David E. Sorkin, Technical
and Legal Approaches to Unsolicited Electronic Mail, 35 U.S.F. L. REV. 325, 327-36
(2001).
19. See, e.g., Reuters, FTC Accuses Pop-Up Maker of 'Extortion', CNN.COM, Nov.
7, 2003, at http://www.cnn.com/2003/TECH/internet/ 11/07/microsoft.popup.reut/index.
html.
20. See Stefanie Olsen, Gator Sheds Skin, Renames Itself CNET NEWS.COM, at
http://news.com.com/2100-1024 3-5099212.html (last modified Oct. 29, 2003).
21. See generally Calvin Whang, Comment, An Analysis of California's Common
and Statutory Law Dealing with UnsolicitedCommercial Electronic Mail: An Argument
for Revision, 37 SAN DIEGO L. REV. 1201 (2000).
22. See generally Burk, supra note 4, at 54; Hunter, supra note 3, at 478; Sorkin,
supra note 18, at 344-57; Whang, supra note 21.
23. See What is Firewall?, Webopedia Computer Dictionary, at http://www.
webopedia.com/TERM/F/firewall.html (last visited Feb. 2, 2004). The Webopedia de-
fines "firewall" as
[a] system designed to prevent unauthorized access to or from a private
network. Firewalls can be implemented in both hardware and software,
or a combination of both. Firewalls are frequently used to prevent un-
authorized Internet users from accessing private networks connected to
the Internet, especially intranets. All messages entering or leaving the
intranet pass through the firewall, which examines each message and
blocks those that do not meet the specified security criteria.
2004] TRESPASS TO CHATTELS & A DOCTRINE OF CYBER-NUISANCE 431
mers often employ techniques that circumvent such measures. 24 The prob-
lem of spain has reached such magnitude that Congress, after several false
starts, recently passed the "CAN-SPAM" Act, the first federal statute
aimed at curbing fraudulent and unduly burdensome advertising through 26
electronic communications. 25 In addition, services such as Brightmai
turn a Yprofit by selling services specifically designed to thwart or intercept
spam. The result is a free-for-all between senders of spam, unwilling re-
cipients of spam, and third parties seeking to turn a profit by aligning
themselves with or against one side or the other.28
D. Spiders and Robots
Spiders, webcrawlers, and robots are all computer programs that auto-
mate the process of cataloguing information available on the web. 29 A
human web-surfer can peruse pages and copy information of particular
interest. A spider does the same thing, requesting webpages or other data
from other computers connected to the Internet and combing through such
data or text for particular information. These requests and data transfers
constitute electronic communication, just like e-mail, instant messages, or
other exchanges of information. This activity comprises part of the traffic
on the Internet and therefore can contribute to congestion, depending on
the frequency and intensity of the spider's activity.3 °
24. See generally Intel Corp. v. Hamidi, 30 Cal. 4th 1342, 1371 n.2 (2003) (Brown,
J., dissenting); Sabra-Anne Kelin, Note, State Regulation of Unsolicited Commercial E-
Mail, 16 BERKELEY TECH. L.J. 435 (2001); Whang, supranote 21, at 1205-08.
25. See generally Associated Press, Bush Signs Anti-Spain Bill, CNN.CoM, Dec. 16,
2003, at http://www.cnn.com/2003/ALLPOLITICS/12/16/bush.bills.ap/index.html; Grant
Gross, U.S. Senate Approves Antispam Bill, InfoWorld, Dec. 16, 2003, at
http://www.infoworld.com/article/03/10/25/HNantispambill_1.html. The bill was ap-
proved on December 19, 2003, and codified at 15 U.S.C. §§ 7701-7713 (2000).
26. See Jones, supranote 17, at 73.
27. Id.
28. See, e.g., Reuters, FTC Accuses Pop-Up Maker of 'Extortion',CNN.CoM, Nov.
7, 2003, at http://www.cnn.com/2003/TECH/intemet/ 1/07/microsoft.popup.reut/index.
html.
29. See generally Stephen T. Middlebrook & John Muller, Thoughts on Bots: The
Emerging Law of ElectronicAgents, 56 Bus. LAW. 341 (2000) (describing the technology
behind spiders and laws which bear on automated search and indexing).
30. See, e.g., eBay, Inc. v. Bidder's Edge, Inc., 100 F. Supp. 2d 1058 (N.D. Cal.
2000). Bidder's Edge's robots accessed eBay's site approximately 100,000 times per day.
Id. at 1063. While a search engine aggregating website locations and subject matter might
need to visit a site only periodically to make sure its data is up-to-date, Bidder's Edge
was in the business of aggregating auction data. Id. at 1061-62. Timeliness of information
in an online auction is, of course, critical to bidders, and time-sensitivity is a feature of
many subjects of online commerce besides auctions. See, e.g., Press Release, Smith
BERKELEY TECHNOLOGY LAW JOURNAL [Vol. 19:427
As with e-mail, an entity may employ spiders for good aims or ill pur-
poses. Search engines, indispensable in the realization of the Internet's
utility,3 1 use spiders to aggregate indexing information. 32 But spiders also
enable spammers to comb webpages for personal and 33
commercial e-mail
addresses that they can add to their distribution lists.
School of Business Gets $2 Million NSF Grant to Study e-Markets, Robert H. Smith
School of Business, University of Maryland (Aug. 26, 2002), at http://www.rhsmith.umd
.edu/pr/news-nsf.htm.
31. See, e.g., Laura Quilter, Note, The Continuing Expansion of Cyberspace Tres-
pass to Chattels, 17 BERKELEY TECH. L.J. 421, 436 (2002).
32. See Maureen O'Rourke, Property Rights and Competition on the Internet: In
Search of an AppropriateAnalogy, 16 BERKELEY TECH. L.J. 561, 570-74 (2001).
33. See Jones, supra note 17, at 71-31. For example, a spider may search for text
strings within the code of personal and commercial websites, whether text or HTML
markup, that matches the format of an e-mail address. Public, unprotected publishing on
the World Wide Web makes the e-mail address available by default to anyone with Inter-
net access.
34. See, e.g., Ticketmaster Corp. v. Tickets.com, No. 99CV7654, 2000 WL 1887522
(C.D. Cal. Aug. 10, 2000); eBay, 100 F. Supp. 2d 1058; Am. Online, Inc. v. IMS, 24 F.
Supp. 2d 548 (E.D. Va. 1998); CompuServe, Inc. v. CyberPromotions, Inc., 962 F. Supp.
1015 (S.D. Ohio 1997); Thrifty-Tel v. Bezenek, 46 Cal. App. 4th 1559 (1996).
35. See Hunter, supra note 3, at 443.
36. Id. at 447.
37. See generally Burk, supra note 4, at 37 (noting that the harm associated with
spam is "unwanted content, and not some fictional lessening of goodwill or the capacity
of the proprietary network," because if the spam were offering something desirable, for
instance "certificates for free beer, or $100 in e-cash-not a word would have been
said"); Edward W. Chang, Bidding on Trespass: eBay, Inc. v. Bidder's Edge, Inc. and the
Abuse of Trespass Theory in Cyberspace-Law, 29 AIPLA Q.J. 445 (2001); Hunter, supra
note 3, at 483; Quilter, supra note 31, at 428-36.
2004] TRESPASS TO CHATTELS & A DOCTRINE OF CYBER-NUISANCE 433
The original tort provided redress for unauthorized use of, or inter-
meddling with, the personal property of another. 38 The tort requires proof
of intentional physical contact, causation, and the infliction of actual, sub-
stantial harm to the chattels. 39 The definitions of "intentional physical con-
tact" and "actual harm" underwent radical changes in order to apply this
ancient doctrine, more associated with livestock disputes, to the World
Wide Web.
A. Electron Trespass as Physical Trespass
In the 1996 decision of Thrifty-Tel, Inc. v. Bezenek, a case involving
phreaking (unorthodox access to telephone systems) in telephone net-
works, a California Court of Appeal held that a flow of electrons is suffi-
ciently physical to satisfy the requirement of intentional physical contact
for purposes of Trespass to Chattels. 40 CompuServe, Inc. v. Cyber Promo-
tions, Inc. followed in 1997, explicitly applying Thrifty-Tel's doctrine of
4
electron trespass directly to electronic communications on the Internet. 1
But electronic communications of any sort inherently involve this kind of
electron "trespass," leaving the element of "intentional physical contact"
completely trivial when applying trespass to chattels to activity in cyber-
space.42
B. Courts Broaden "Actual Harm" to Include "Threatened
Harm"
"Substantial" actual harm, originally meant harm that amounted to
more than a mere theoretical or de minimis deprivation,43 but when faced
44. PROSSER & KEETON, supra note 39, at 87. The Restatement (Second) of Torts
contains a comment which says substantially the same thing: "The interest of a possessor
of chattel in its inviolability, unlike the similar interest of a possessor of land, is not given
legal protection by an action for nominal damages for harmless intermeddlings with the
chattel." RESTATEMENT (SECOND) OF TORTS § 218, e.
45. 126 F. Supp. 2d238, 249-51 (S.D.N.Y. 2000).
46. 100,000 is not necessarily a large number in context. This activity caused no
visible end-user impact on the service. Computer systems vary widely in power and pur-
pose, and numbers should always be read with any relevant technical facts in mind. eBay,
Inc. v. Bidder's Edge, Inc., 100 F. Supp. 2d 1058, 1063-65 (N.D. Cal. 2000).
47. Id. at 1061-62.
48. See Register.com, 126 F. Supp. 2d at 250 (quoting Register.com's VP for tech-
nology's declaration, "I believe that if Verio's searching of Register.com's WHOIS data-
base were determined to be lawful, then every purveyor of Intemet-based services would
engage in similar conduct"); see also eBay, 100 F. Supp. 2d. at 1071-72 ("[I]f the court
were to hold otherwise, it would likely encourage other auction aggregators to crawl the
eBay site, potentially to the point of denying effective access to eBay's customers.").
49. See, e.g., Register com, 126 F. Supp. 2d at 252. The court found:
[I]t is highly probable that other Internet service vendors would also
use robots to obtain this potential customer information were it to be
permitted .... If the strain on Registercom's resources generated by
2004] TRESPASS TO CHATTELS & A DOCTRINE OF CYBER-NUISANCE 435
However, not all courts adopted such lenient standards for inchoate
harms. The court in Ticketmaster Corp. v. Tickets.com, Inc. found for the
defendant. 50 Although it noted that no actual harm had occurred, it distin-
guished eBay on the ground that in its present case, there was no "specter
of dozens or more parasites joining the fray, the cumulative total of which
could affect the operation of business," implicitly accepting the eBay
court's interpretation of cognizable harms, only disagreeing as to the
threshold of harm. 5 1
The application of trespass to chattels against senders of spain was not
nearly as controversial because the volume of spammers' activities pro-
vided straightforward, plausible measurements of actual harm.5 2 The
CompuServe court also found that actual harm had occurred because
CompuServe's end users experienced significant degradations in utility
and increases in cost.53 These harms resulted from the defendant's activity
on CompuServe's chattels, but the inconvenience to end users was cer-
tainly one degree removed from the computers' literal physical condition
or functionality.5 a
C. Creeping Strict Liability
Scholars, judges, and commentators began to fear a creeping doctrine
of strict liability for any unwanted or unsolicited electronic trespass, since
the plaintiffs were winning most of the cases even when the defendant was
not sending spain or engaging in spain-related activities. 55 In the absence
to deter unwanted messages. This change has troubling implications for the free flow of
information on the network... ").
56. See, e.g., Mark D. Robins, Electronic Trespass. An Old Theory in a New Con-
text, 15 No. 7 COMPUTER LAW. 1 (1998).
57. See generally Burk, supra note 4, at 35 (attributing the expansion of the doctrine
to a blurring between the traditional divide between real property law and personal prop-
erty law); Hunter, supra note 3, at 487; Quilter, supra note 31, at 440-42. Real property
trespass recognizes a legally defensible interest in inviolability and injunction is a natural
remedy for this kind of right. It is argued that the power of these remedies should not be
allowed to leak into other theories of trespass unless it addresses an interest of similar
gravity.
58. Quilter, supra note 31, at 433.
59. See generally Burk, supra note 4, at 42; Hunter, supra note 3, at 509-14; Quilter,
supranote 31, at 441. Quilter writes,
[t]he doctrine has become completely malleable, able to fit any and all
situations. With trespasses as they have now been defined, and without
a harm requirement, it would be difficult to conceive of anything that
might not constitute a trespass; trespass is effectively defined purely at
the owner's will and can encompass almost any kind of act.
Quilter, supra note 31, at 441. The California Supreme Court also notes academic opin-
ions that warn against propertization of the Internet which would have resulted from en-
forcement under Intel's theory. Hamidi, 30 Cal. 4th at 1362-63. Anticommons concerns
were also anticipated in the literature. For example, Edward Chang states that "cyber-
trespass theory will curtail the free flow of price and product information on the Internet
by allowing website owners to tightly control who and what may enter and make use of
the information housed on its Internet site." Chang, supranote 37, at 459.
60. Hamidi, 30 Cal. 4th at 1349 n.1 ("An 'intranet' is 'a network based on TCP/IP
protocols (an internet) belonging to an organization, usually a corporation, accessible
2004] TRESPASS TO CHATTELS & A DOCTRINE OF CYBER-NUISANCE 437
ties. Though Intel maintains the intranet to facilitate business, its policy
also allows employees to make "reasonable nonbusiness use" of the intra-
net. 61 Kenneth Kourosh Hamidi, a former Intel employee, had an acrimo-
nious falling out with Intel and subsequently founded FACE-Intel (Former
and Current Employees of Intel). 62 For a period of over twenty-one
months Hamidi, as president of FACE-Intel, sent six unsolicited mass e-
mails to a list of thousands of addresses. 63 The contents of these e-mails
criticized Intel's employment practices, warned employees that work at
Intel was damaging to their health and to their careers, encouraged em-
ployees to leave Intel and work elsewhere, and invited them to visit
www.faceintel.com. 64 Intel disapproved of the messages, asked Hamidi to
stop sending them, and engaged in technical self-help in an attempt to
block the messages. 65 Hamidi used techniques similar to those of spam-
mers to circumvent Intel's self-help, but did not actually breach any secu-
rity barriers or hack into Intel's computers in the process.66 No evidence
suggests that Hamidi's unsolicited e-mails adversely affected the technical
performance of any part of Intel's computer systems. The missives were 67
only e-mails, and the system handled them as it handled all e-mail.
Though Hamidi refused to heed Intel's requests to cease sending his unso-
licited e-mails, he did include within his messages an opt-out provision for
the end recipients, which Hamidi honored.68
B. The Holding
The California Supreme Court held that, in California, the common
law tort of trespass to chattels did "not encompass, and should not be ex-
tended to encompass, an electronic communication that neither damages
the recipient computer system nor impairs its functioning." 69 The court
also stated that the dispositive issue in a case such as this was whether the
74. Id. at 1353 (discussing Thrifty-Tel v. Bezenek, 46 Cal. App. 4th 1559 (1996)).
75. Id. at 1353-54 (discussing Am. Online, Inc. v. LCGM, Inc., 46 F. Supp. 2d 444
(E.D. Va. 1998); Am. Online, Inc. v. IMS, 24 F. Supp. 2d 548 (E.D. Va. 1998); Hotmail
Corp. v. Van$ Money Pie, Inc., No. C 98-20064 JW, 1998 U.S. Dist. LEXIS 10729 (N.D.
Cal. Apr. 16, 1998); CompuServe, Inc. v. Cyber Promotions, Inc., 962 F. Supp. 1015
(S.D. Ohio 1997)).
76. Id. at 1354-56 (summarizing "unauthorized robotic data collection" in Regis-
ter.com, Inc. v. Verio, Inc., 126 F. Supp. 2d 238 (S.D.N.Y. 2000); Ticketmaster Corp. v.
Tickets.com, No. 99CV7654, 2000 WL 1887522 (C.D. Cal. Aug. 10, 2000); eBay, Inc. v.
Bidder's Edge, Inc., 100 F. Supp. 2d 1058 (N.D. Cal. 2000)).
77. Register.com, 126 F. Supp. 2d at 251-52; eBay, 100 F. Supp. 2d at 1071-72.
78. Ticketmaster.com, 2000 WL 1887522, at *4.
BERKELEY TECHNOLOGY LAW JOURNAL (Vol. 19:427
79. RESTATEMENT (SECOND) OF TORTS § 822 cmt. b (1965) (discussing the growth
of modem nuisance doctrine from the former rule of strict liability articulated in Fletcher
v. Rylands, L.R. 1 Ex. 265 (1866), and affirmed in Rylands v. Fletcher, L.R. 3 E. & I.
App. 330 (H.L. 1868)). Early in its history, strict liability encompassed some of the legal
territory covered by nuisance law. Strict liability's doctrinal inflexibility was incompati-
ble with the realities of the then-dawning Industrial Age, and so the nuisance doctrine
developed, a sensible compromise necessitated by the proximity and press of modem
living. See RESTATEMENT (SECOND) OF TORTS § 822 cmt. f ("Not every intentional and
significant invasion.., is actionable, even when he is the owner of the land in fee simple
absolute .... Life in organized society and especially in populous communities involves
an unavoidable clash of individual interests."). A similar development is presently in the
works, as the previous extensions of TTC in cyberspace began establishing a doctrine of
near-strict liability. Only Ticketmaster and eBay suggested any resistance to this trend
until Hamidi's authoritative limitations. See Ticketmaster, 2000 WL 1887522 at *4; eBay,
100 F. Supp. 2d at 1065-66. The earlier cases could be seen as an Information Age analog
to Fletcher v. Rylands, which was an early doctrine of strict liability developed for a
situation in which there was no established tradition of case law. See, e.g., Am. Online,
Inc. v. IMS, 24 F. Supp. 2d 548; CompuServe, 962 F. Supp. 1015; Thrifty-Tel, 46 Cal.
App. 1559. But the aggregate realities of the Internet demand a rule of give and take, so
the common law must move past cyberspace's Fletcher v. Rylands and into the land of
nuisance.
80. See RESTATEMENT (SECOND) OF TORTS § 822 cmt. a.
81. Fairview Farms, Inc. v. Reynolds Metal Co., 176 F. Supp. 178, 186-88 (D. Or.
1959).
82. RESTATEMENT (SECOND) OF TORTS § 829 cmt. d, illus. 2 states:
A and B own small farms on the outskirts of a village. Their farms are
on opposite sides of a highway and their residences are directly oppo-
site one another and about 75 yards apart. A makes a practice of breed-
ing livestock in his front yard and in full view of persons in the front
20041 TRESPASS TO CHATTELS & A DOCTRINE OF CYBER-NUISANCE 441
90. Oyster Software, Inc. v. Forms Processing, Inc., No. C-00-0724 JCS, 2001 WL
1736382 (N.D. Cal. Dec. 6, 2001).
91. Intel Corp. v. Hamidi, 30 Cal. 4th 1342, 1357 n.5 (2003).
92. See generally PROSSER & KEETON, supra note 39; RESTATEMENT (SECOND) OF
TORTS § 218. The Restatement notes that for an interference or intermeddling to give rise
to an action, the deprivation of use "must be for a time so substantial that it is possible to
estimate the loss caused thereby. A mere momentary or theoretical deprivation of use is
not sufficient unless there is a dispossession." RESTATEMENT (SECOND) TORTS § 218.
93. See RESTATEMENT (SECOND) OF TORTS § § 218-19.
94. Hamidi, 30 Cal. 4th at 1346, 1349, 1353.
95. Recall that these are the first two listed factors weighing against the defendant's
activity or behavior. RESTATEMENT (SECOND) OF TORTS § 827(a)-(b).
96. Hamidi, 30 Cal. 4th at 1356.
BERKELEY TECHNOLOGY LAW JOURNAL [Vol. 19:427
ii) Suitability
Secondly, the court must consider the suitability of the conduct to the
character of the locality.' 00 The court placed special emphasis on the fact
that Hamidi merely used an e-mail system connected to the Internet for the
transmission of e-mail. Specifically, the court found that Hamidi did not
use Intel's system "in any manner in which it was not intended to function
.... 9,,A01Intel's e-mail system was equipment designed for speedy com-
munication between employees and the outside world; Hamidi communi-
cated with Intel employees over that system in a manner entirely consis-
tent with its design."' 0 2 The court had no need to make statements such as
these in an analysis of damages. Within the confines of trespass to chattels
doctrine, it would have sufficed to say that the effect of six UBEs in
twenty-one months consumes negligible storage space and computing
power. 10 3 Applied to nuisance analysis, however, these statements would
reduce the weight of harm in the0 4context of the "suitability of the conduct
to the character of the locality."'
iii) Unavoidable/Unpreventable Harm
Finally, there must be some impracticability of preventing or avoiding
the invasion, without which the defendant cannot excuse his conduct de- 05
spite its value, as otherwise the defendant inflicts unnecessary harm.'
The court noted that Intel's employees would have had an easy time opt-
ing out of Hamidi's mailings, as Hamidi made this option explicit and
genuine in the content of his UBE. 10 6 The court in effect emphasized that
the burden on the person harmed of avoiding the harm' 0 7 was slight, and
hence, the harm was also small. 10 8 Certainly, Hamidi could have avoided
completely any distraction to Intel's employees by not sending the UBE.
Still, by including an opt-out provision in his messages, Hamidi went to
lengths to notify recipients of their right to refuse further missives and his
willingness to abide by0 9their wishes, which demonstrates respect for the
intent behind § 828(c).'
2. Rigid Categorization:This is Still Not Cyber-Nuisance
Fundamentally, trespass to chattels still only protects possession and
related interests in personal property. Though the analysis in Intel v.
Hamidi often sounds like nuisance-based reasoning, the decision does not
rest primarily upon balancing economic efficiency or social utility, but
upon categorical pronouncements of what constitutes "harm" and "inter-
ests" under the rules of the tort. 110 Thus, the decision does not actually
create a common-law doctrine of cyber-nuisance under the name of tres-
pass to chattels. The court made rigid and categorical rejections of em-
119. See eBay, Inc. v. Bidder's Edge, Inc., 100 F. Supp. 2d 1058, 1071-72 (N.D. Cal.
2000). Also, some pop-up ads can be so aggressive as to render the computer unusable
until it is rebooted or until the user performs an action dictated by the pop-up maker.
Though the computer may still have memory or processing power available for other
tasks, the user's ability to enter input or access desired programs may be wholly dis-
rupted. See, e.g, Shields v. Zuccarini, 254 F.3d 476, 479-80 (3d Cir. 2001) (affirming a
judgment against the defendant for cybersquatting). In conjunction with cybersquatting,
the defendant in designed sites that "mousetrapped" visitors, rendering them "unable to
exit without clicking on a succession of advertisements." Id.
120. Fletcher v. Rylands, L.R. 1 Ex. 265 (1866). The court in Fletcherheld that
the person who for his own purposes brings on his lands and collects
and keeps there anything likely to do mischief if it escapes, must keep
it in at his peril, and, if he does not do so, is prima facie answerable for
all the damage which is the natural consequence of its escape.
Id.
121. Martin v. Reynolds Metals Co., 342 P.2d 790, 790 (Or. 1959).
122. Turner v. Big Lake Oil Co., 96 S.W.2d 221 (Tex. 1936).
123. See RESTATEMENT (SECOND) OF TORTS §§ 822 cmt. b, 828 cmt. g (1965); see
also Spano v. Perini Corp., 250 N.E.2d 31 (N.Y. 1969) (abolishing the former distinction
between "debris" as a tangible agent of trespass and "concussion" as an intangible which
BERKELEY TECHNOLOGY LAW JOURNAL [Vol. 19:427
Context, cost internalization, and network benefits are all concerns that
favor the development of a doctrine of cyber-nuisance. Whereas nuisance
in real property usually affects only neighbors or other landowners in the
immediate geographical vicinity, on the Internet, everyone is just an IP
address away. This interconnectedness magnifies network benefits-and
network harms. That many activities on the Internet have both highly pro-
ductive and highly destructive uses makes the inclusion of context, costs,
and benefits indispensable for fair and efficient adjudications.
The greatest obstacle to the development of cyber-nuisance lies in the
formalistic objection that one should not equate cyberspace with realty and
that nuisance is, by lineage, a real-property doctrine. Despite this formalis-
tic obstacle, the efficiency aims that comprise the underlying principles of
nuisance apply aptly to the problems of inherently communal cyber-
space. 124 The networked nature of the Internet leads to the conclusion that
a balancing of benefits and harms will achieve results that are superior to
the overdeterrence threatened by bright-line rules.125
will not support a claim of trespass). Use of the Internet and networked computers for
electronic communications would appear to be a "natural use" of such a system, qualified
by context. The California Supreme Court states that occasional unwanted communica-
tion is inevitable when a computer or system is connected to a network as large as the
Internet. Hamidi, 30 Cal. 4th at 1359-60. And frequently, as in the case with personal e-
mail, unsolicited communication is often welcome.
124. SINGER, supra note 112, at 325-31.
125. Recall the "tragedy of the anticommons" described by Hunter, supra note 3.
126. See PROSSER & KEETON, supra note 39, at 85-87. Though there is some analysis
as to the trespasser's intent or purpose, the analysis deals more with questions of culpa-
bility or thresholds than it deals with utility or defenses.
2004] TRESPASS TO CHATTELS & A DOCTRINE OF CYBER-NUISANCE 449
wholly controls liability. But use of a spider to aggregate data for search
engines or comparison shopping and use of a spider to collect e-mail ad-
dresses for facilitating spam should be treated differently, though the tech-
nical impact of their activity on the visited sites may be similar. Trespass
to chattels examines only the harm to the property's owner; the doctrine
does not address network harms or benefits.
B. Hamidi: Speech and Advocacy
Assume for the moment that a nuisance doctrine in cyberspace ex-
ists. 127 Hamidi's FACE-Intel messages dance on the borderline of UBE
versus UCE; Hamidi undoubtedly received some measure of personal sat-
isfaction in the activity and its results, and the court still recognized an as-
pect of "advocacy" in his speech without a detailed analysis of First
Amendment concerns.' If the court had considered the speech argument
under nuisance, it would have had to consider the social value of Hamidi's
speech. 129 The court did not endorse using electronic communication as a
means of harassment, but noted that if Intel wished to object to the content
or consequences of Hamidi's speech, it had other avenues of relief.1 30
Connecting an intranet to the Internet results in inevitable give-and-
take and requires a degree of reasonable tolerance sufficient to grant
Hamidi leeway under § 828(b). 131 Moreover, Hamidi mitigated the burden
of his conduct upon his audience to the extent possible through an opt-out
policy, satisfying § 828(c). In general, the extent of the harm of Hamidi's
127. As noted, the only reason why nuisance does not already apply to the Internet is
because by tradition it has always been a doctrine protecting "use and enjoyment of
land." RESTATEMENT (SECOND) OF TORTS § 827. Therefore, either nuisance must be ex-
pressly expanded to include electronic communications in cyberspace (the preferable
route) or the academic debate over Cyberspace as Place must be resolved in favor of
treating cyberspace as real property (undesirable due to anticommons concerns).
128. See Hamidi,30 Cal. 4th at 1356.
129. Id. at 1364-65. The court said nothing specific about the value of Hamidi's
speech per se. Its brief discussion of constitutional concerns implied that it would have
decided in Hamidi's favor. The court offered no opinion as to whether the content of
Hamidi's speech was valuable, nor did it suggest that he had an absolute right to use the
Internet as an avenue of expression. The court based its dicta on two facts: that Intel had
recourse to self-help, and that it does not find the constitutional right "not to listen" to
grant an employer the right to decide when its employees should or should not listen. Id.;
see also RESTATEMENT (SECOND) OF TORTS § 828(a) (providing commentary and exam-
ples on evaluating the "social value" the law attaches to the defendant's conduct).
130. Hamidi,30 Cal. 4th at 1347-48.
131. See id at 1359-60; RESTATEMENT (SECOND) OF TORTS § 822 cmt. g. This also
implicates § 828(b) because Hamidi's conduct was not beyond the extent of unwanted
communications that Intel would expect from connection to the Internet.
BERKELEY TECHNOLOGY LAW JOURNAL [Vol. 19:427
conduct under § 827 is quite low.' 32 Therefore, the weighing of harms and
balances under nuisance would also result in a finding for Hamidi. Note
also that if Hamidi's activities achieved a volume approaching commercial
spain, a court applying nuisance would find the gravity of the harms under
§ 827 sufficient to justify enjoining Hamidi. Such conduct would have
gone inexcusably beyond what is needed for the dissemination of speech,
and as a matter of policy, the extension of unbounded spamming rights to
everyone with a private opinion would encourage waste of Internet re-
sources. Intel's employees are not chattels and neither is Intel's interest in
their time, 133 but nuisance measures the value of conduct, use, and enjoy-
ment, not just the right of possession.134 Hamidi's e-mails are neither cate-
gorically condoned nor forbidden, but weighed in context.
C. Spidering: eBay, Ticketmaster, and Register.com Revisited
Nuisance would handle the spidering cases with greater factual consis-
tency than trespass to chattels because its analysis pays heed to the pur-
poses of the spidering. Although the California Supreme Court managed
to synthesize a rule from these cases, the outcomes remain awkward. eBay
and Ticketmaster both involve defendants who employ spiders to perform
data aggregation services thereafter made available to the public.' 35 In
both cases, the impact was too small to result in actual harm, yet courts
found threatened harm cognizable in eBay but not in Ticketmaster.136 A
"specter" of copycat auction aggregators was deemed likely, but not a
specter of copycat ticket sales aggregators. Why? The Register.com
court's concern about copycat spammers is legitimate because spammers
do not curtail their activities unless an outside agency imposes penalties
on their behavior, and spammers are not known for their concern about the
impact of behavior beyond their own profit margins or liability for dam-
ages. 137 But how many data aggregators are likely to enter the same mar-
use? 138
ket, where profits derive from competitive popularity of
A nuisance analysis would capture this concern under § 828 or its
equivalent. Section 828(a) addresses the social value that the law attaches
to the primary purpose of the conduct. Search engines have proven value
in cyberspace and have contributed immensely to the utility of the Inter-
net.139 But when the primarypurpose of the spidering is to facilitate spam,
the outcome of an application of § 828(a) is clear: the law attaches very
little social value to spain. Many states have already enacted anti-spain
statutes, with some even imposing criminal liability for failure to comply
with provisions that facilitate opt-out mechanisms, 40 and the CAN-SPAM
Act, which also provides for per-violation fines for spain-related offenses,
was approved on December 19, 2003.141 This factor alone would be
enough to halt fraudulent or misleading spain under nuisance without re-
gard to the resultant degree of harm. 14 Section 828(c) also examines the
137. See Jones, supra note 17, at 70-72 (sending spam is so inexpensive that even a
low response rate gives a better return on marketing over the Internet than through junk
mail). Much of the cost of dealing with spam is not borne by the spammers themselves,
and this failure to internalize the cost of their activity upon the end user results in a pre-
dictable, empirically obvious overproduction of spam.
138. Many businesses may pursue the same market, but the field becomes highly
competitive. Revenue models employed in Internet business have evolved from support
via advertising revenue to actual e-commerce involving fees, transactions, and the sale of
actual goods. The result is a crowded space, where generally a few firms pursue similar
revenue models but in different fields, waging a constant battle to maintain name recogni-
tion. See generally Gary P. Schneider, Chapter 3: Selling on the Web: Revenue Models
and Building a Web Presence, in ELECTRONIC COMMERCE (3d ed. 2002), available at
http://www.course.com/downloads/mis/ecommerce3eoc/ch03.cfm.
139. Quilter, supra note 31, at 424 ("[L]ocating any information on the Internet
would be an almost impossible task without search engines such as Google, Yahoo, or
FindLaw.").
140. See Kelin, supra note 24, at 441-49.
141. See 15 U.S.C. §§ 7701-7713 (2000). The chapter is titled "Controlling the As-
sault of Non-Solicited Pornography and Marketing" and leaves no doubt as to the con-
temporary target of the legislation. The act does not make spam illegal per se, but § 7703
imposes mandatory opt-out provisions and prohibits "predatory and abusive commercial
e-mail." Section 7704(b) targets other techniques including use of spidering and diction-
ary attacks as "aggravated violations" when employed in preparation for or execution of
spamming activities.
142. RESTATEMENT (SECOND) OF TORTS § 828 cmt. c (1965).
It is only when the conduct has utility from the standpoint of all of the
factors as a whole that its merit is ever sufficient to outweigh the grav-
ity of the harm it causes. If the conduct has no utility from the stand-
point of one of the factors, the fact that it has utility from the standpoint
of other factors is not controlling.
BERKELEY TECHNOLOGY LAW JOURNAL [Vol. 19:427
Id.
143. See CAL. Bus. & PROF. CODE § 17538.4(g) (West 1997 & Supp. 2003); Kelin,
supra note 24, at 444-49.
144. But see Jones, supra note 17, at 76-77. The statement is true if the various spam
regulations are internally consistent; if one jurisdiction requires that the message header
begin with "ADV:" and another jurisdiction requires that the message header begin with
"XXXSPAM:" then literal compliance with both will prove tricky if not impossible. This
is a strong argument for preferring a federal anti-spain statute enabled by the Commerce
Clause over separate and potentially inconsistent state commercial e-mail statutes.
145. See RESTATEMENT (SECOND) OF TORTS §§ 822, 827, 828 cmt. h, 830.
146. See eBay, Inc. v. Bidder's Edge, Inc., 100 F. Supp. 2d 1058, 1071 (N.D. Cal.
2000); see also RESTATEMENT (SECOND) OF TORTS § 830 (discussing the balancing con-
sideration regarding the defendant's attempt to mitigate the harm imposed by his or her
conduct). Even when the overall utility of a defendant's conduct may outweigh the harm
it inflicts, this does not by itself excuse the defendant from a duty reasonably to mitigate
that harm. See RESTATEMENT (SECOND) OF TORTS § 803.
147. See Quilter, supra note 31, at 424.
148. See generally SINGER, supra note 112, at 325-3 1.
20041 TRESPASS TO CHATTELS & A DOCTRINE OF CYBER-NUISANCE 453
VI. CONCLUSION
The California Supreme Court clarified the newly revived doctrine of
trespass to chattels in a way that achieved consistency with the majority of
prior case history and harmony with the concerns of economic efficiency
and freedom of expression. The expansion reflected the need for ready re-
lief against network congestion in a technology characterized by rapid ad-
vances and geometric growth. The court also restricted the tort, anchoring
it to its traditional foundation as a means for defending possession in per-
sonal chattels, and thereby forestalled the rise of a crippling rule of strict
liability in cyberspace. Though a landmark decision in tort law, Intel v.
Hamidi does not end the controversy regarding trespass law in cyberspace.
Rather, it highlights the limitations of one doctrine and encourages further
development of a responsible doctrine that prefers an efficient balancing
of rights to an awkward system of rigid rules and absolute interests. Law
has historically moved to accommodate changes in reality arising from
changes in technology, and just as tort law adapted to the advances of the
Industrial Age, so too will it adapt to the advances of the Information Age.
BERKELEY TECHNOLOGY LAW JOURNAL