Spam legislation in the
Netherlands: the law, results,
approach and lessons learned
Wout de Natris
De Natris Consult
Joint ATU ISOC meeting on combatting spam
Nairobi, Monday 9 September 2013
Introduction
1. Consultant at De Natris Consult
2. Member of London Action Plan
3. Asked to represent the Dutch Ministry of
Economic Affairs (and LAP)
4. Background in spam enforcement, national
and international cooperation spam and
cyber crime at OPTA
2
An overview
1. Dutch anti-spam law 2004
2. Approach by OPTA
3. Results
4. Lessons learned
5. Advanced Cyber DefenceCentre (ACDC)
3
The law 2004, Art. 11.7,1
Telecommunications Act (Tw)
1. The use of automatic calling systems without human
intervention, faxes and electronic messages for
transmitting unrequested communication to subscribers
for commercial, idealistic or charitable purposes will
only be permitted if the sender can demonstrate that the
subscriber concerned has given prior consent for this,
notwithstanding that laid down in paragraph 2.
4
The law 2004, Art. 11.7,2
2. Any party who has received electronic contact information for electronic
messages as part of the sales of his product or service may use this
information for transmitting communication for commercial, idealistic or
charitable purposes in relation to his own similar products or services,
provided that with the obtaining of the contact data the customer is
explicitly given the opportunity to submit an objection in a straightforward
manner and free of charge against the use of his electronic contact
information and, if the customer has not taken up this opportunity, he is
offered the opportunity with each communication transmitted to submit an
objection against the further use of his electronic contact information under
the same conditions. Article 41, paragraph 2, of the Personal Data
Protection Act is applicable mutatis mutandis.
5
The law 2004, Art. 11.7,3
3. The following information should be stated at all times
when using electronic messages for the purposes as
referred to in paragraph 1:
a. the actual identity of the party on whose
behalf the call is being made, and
b. a valid postal address or number to which a
recipient may direct a request to stop such
communications.
6
The law 2004, Art. 11.7,4
4. The use of means other than those referred to in paragraph 1 for
transmitting unrequested communication for commercial, idealistic
or charitable purposes to subscribers is permitted unless the
subscriber concerned has stated that he does not wish to receive
communications by such means and if the subscriber is offered the
opportunity with each communication transmitted to submit an
objection against the further use of his electronic contact
information. In that case, the subscriber will not be charged for the
facility that prevents such unrequested communications being
made to him.
7
The law 2004, Art. 11.8
The application of Article (…) 11.7 shall be limited to
subscribers who are natural persons.
8
The law 2004
 Basically one article, 11.7Tw on spam
 (One article on malware 4.1 BUDE (Decision
Universal Service End users))
 Tw empowers OPTA (Independent Post and
Telecommunications Authority), now ACM
 OPTA already has many enforcement powers
and they all applied to spam!
9
The law specified
 Automated calls, faxes and electronic
messages
 Subscribers
 Without prior consent
 Opt-in regime
 Commercial, idealistic and charitable
 Natural persons
10
The law specified interlude
 There is no definition of spam in the law.
 It’s on unsolicited electronic communications
 Whether by fax, computer, device or phone
 So, much broader than “spam”
11
The law specified, 2
 The exception:
 Existing customer “as part of a sale”
 Similar products
 His own products
 Explicitly asked for consent
 Easy and free to stop the mailing
 Opportunity to object with each mailing
12
The law specified, 3
 An electronic message must contain:
 A valid postal address or number to which a
recipient may direct a request to stop such
communications
 I.e. it is forbidden to send anonymous
messages and/or use spoofed headers
 Separate violation from just sending
13
The law specified, 3:
beyond 11.7 Tw
 All powers invested in OPTA as post and
telecommunications regulator were in place for
spam fighting
 Administrative coercion to enforce the
obligations
 Allowed to prevent to provide services
 (Periodic penalty) fines
14
The law specified, 4
 is authorised to seal off business premises
and objects ;
 Authorised to enter business premises;
private homes only with consent
 Seize or copy information
 OPTA is authorised to demand information
from anyone at any time (18.7)
 General Administrative Act Law
 OPTA law: allowed to share data
15
The law specified, 5
 Conclusions in general:
 Concise
 Effective
 Successful
16
The law specified, 6
 Conclusions:
 One, comprehensive, article is enough to
start
 Attribute one organisation
 Right to enquire information from every one
 Fine, stop, disrupt and seize where necessary
 Right to visit
 (International) cooperation
17
OPTA’s approach
 Asked for a budget
 € 300.000,= for 2004
 8 people for 50% of their time
 Complaint system opened on day 1
 Two hired, temporary forensic experts
 First forensic gear bought
 Active in international cooperation
 Active in national cooperation
18
Results
 85% of identifiable Dutch language spam was
gone in 6 months
 First fines given after 6 months
 Fraud cases involving Premium Rate Service
Numbers dissappeared within first year
However:
 It did nothing for international spammers
 ISP filters tackle these
 Country cooperation should too
19
Case examples
 Straight commercial e-mails
 Fraud in combination with newspaper print
 SMS spam in combination with PRS numbers
 War drive
 Lottery scam/autodialers
 Fax-to-e-mail spam
 Cross border cases
 Malware spreading
 Hosting of spammers
20
2013, lessons learned
 Costumer/subscriber is not enough
 Include legal persons
 Six months for two cases was not
enough time
 Cases involve fraud and crimes, up to
serious organised crime
 Tw was unclear on attribution
21
2013, lessons learned, 2
 Territoriality is a major problem
 Three major cases rejected in court
 Should ACM be able to deal with the
content of messages?
 Internet fraud and police do not match
 Spam law no longer effective for NL?
22
2013, lessons learned, 3
 But,
 First successes remain
 Dutch spam was halted
 Many frauds were stopped
23
2013 My advice to you
 Start simple and concise
 Work from there
 Celebrate early successes and build
on them
24
2013 My advice to you, 2
 On a model law
 Define what you think spam is
 Define a “spammer”  attribution
 Protect companies as well
 Give all reasonable enforcement
and inquiry powers needed
 Allow cooperation/data
exchange
25
ACDC
 Advanced Cyber Defence Centre
 EU co-funded botnet mitigation
program
 Open to all
 How could your country profit?
 www.botfree.eu
26
Conclusion
 Spam law works
 Law and enforcement tools need to be
in balance
 Effective enforcement does not come at
highest cost
 Find out about cooperation and training
 Be ambitious
27
Art. 4.1 BUDE
Section 4.1 of the Decision universal service
and endusersinterests (Bude) i.e.
implementation of art. 5, section 3 of
Directive 2002/58/EC (Directive on privacy
and electronic communications)
Section 4.1 Bude prohibits storage of
communications without prior consent:
OPTA authorized
28
De Natris Consult
 National and international cooperation
 Reach out officer for ACDC botnet program
 Internet governance
 Blogger
 Today represents the Dutch government
 Ex enforcement officer spam at OPTA (ACM)
29
More information
De Natris Consult
Wout de Natris
denatrisconsult@hotmail.nl
+31 64838 8813
http://woutdenatris.wordpress.com
www.circleid.com
30

More Related Content

PPTX
Prospective roles of governments in promoting cyber security and anti-spam me...
PPTX
Electronic Transactions Law - Lecture 5 : advertising and marketing
PDF
C:\Documents And Settings\Administrator\Desktop\Shadi Aaa99 E30 Gt
PDF
35/2012 Issuing Regulation on premium rate services
PDF
Consumer Guide
DOCX
PPTX
New microsoft office power point presentation
PDF
Myanmar_ Telecommunications Law No. 31 - 2013
Prospective roles of governments in promoting cyber security and anti-spam me...
Electronic Transactions Law - Lecture 5 : advertising and marketing
C:\Documents And Settings\Administrator\Desktop\Shadi Aaa99 E30 Gt
35/2012 Issuing Regulation on premium rate services
Consumer Guide
New microsoft office power point presentation
Myanmar_ Telecommunications Law No. 31 - 2013

What's hot (17)

PDF
Fs legal professional_privilege_eng
PPTX
Postal ballot
DOC
Postal ballot provisions & procedure under S.110 of the Companies Act, 2013
PDF
The Formation of Contract Online
PDF
Myanmar _ The Telecommunication Law
PDF
Are Genuine Informants Shying Away From CCI?
PDF
Surveillance and data retention in Poland
PDF
Vodafone law enforcement_disclosure_report_june 2014
PDF
Vodafone law enforcement disclosure report
PDF
Post,tweet, or chat! triple play handout
DOCX
Law-Exchange.co.uk Shared Resource
PDF
Kowalik banczyk - the publication of the european commission’s guidelines in ...
PDF
Legislative and jurisprudential developments in the telecommunications sector...
PDF
E voting procedure-companies act 2013
PPTX
E voting under Companies Act, 2013
PDF
TRA's 2009 Draft Law for Service Provider Licensing Regulation
PDF
Mts subscription rules
Fs legal professional_privilege_eng
Postal ballot
Postal ballot provisions & procedure under S.110 of the Companies Act, 2013
The Formation of Contract Online
Myanmar _ The Telecommunication Law
Are Genuine Informants Shying Away From CCI?
Surveillance and data retention in Poland
Vodafone law enforcement_disclosure_report_june 2014
Vodafone law enforcement disclosure report
Post,tweet, or chat! triple play handout
Law-Exchange.co.uk Shared Resource
Kowalik banczyk - the publication of the european commission’s guidelines in ...
Legislative and jurisprudential developments in the telecommunications sector...
E voting procedure-companies act 2013
E voting under Companies Act, 2013
TRA's 2009 Draft Law for Service Provider Licensing Regulation
Mts subscription rules
Ad

Similar to Presentation Nairobi 9 September 2013. Joint workshop on spam(law) of African Telecommunication Union and the Internet Society (20)

PPT
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
PPTX
Direct Marketing: Following the Rules in a Global Economy
PPTX
Privacy and Electronic Communications (EC Directive) Regulations 2003
PPTX
Btk fatih akpinar
PDF
Data retention directive is invalid
PDF
Expression on Platforms: Freedom of Expression and ISP Liability in the Frame...
PDF
Internet Regulation
PPTX
The Digital Services Act - soon in your country
PPTX
electronic commerce act 8792 (2000)
PPT
Fusion2006_SF Revisited_Alexander Singewald
PPTX
criminology Regulatory Framework.pptx l2
PDF
Help direct-enforcement-notice
PDF
Anthony M. Collins - Recent Developments in EU Case Law on Electronic Communi...
PPTX
Access to competition file as a precondition of access to justice
PPT
CYBER BULLYING THE COURT’S ROLE
PPS
Legislation
PPT
On line international contracts general terms(2)
PDF
6. annex_vi_dataprotection.pdf.... .....
PDF
Factsheet on the "Right to be Forgotten" ruling
PDF
Factsheet data protection_en
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Direct Marketing: Following the Rules in a Global Economy
Privacy and Electronic Communications (EC Directive) Regulations 2003
Btk fatih akpinar
Data retention directive is invalid
Expression on Platforms: Freedom of Expression and ISP Liability in the Frame...
Internet Regulation
The Digital Services Act - soon in your country
electronic commerce act 8792 (2000)
Fusion2006_SF Revisited_Alexander Singewald
criminology Regulatory Framework.pptx l2
Help direct-enforcement-notice
Anthony M. Collins - Recent Developments in EU Case Law on Electronic Communi...
Access to competition file as a precondition of access to justice
CYBER BULLYING THE COURT’S ROLE
Legislation
On line international contracts general terms(2)
6. annex_vi_dataprotection.pdf.... .....
Factsheet on the "Right to be Forgotten" ruling
Factsheet data protection_en
Ad

Recently uploaded (20)

PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PPTX
Configure Apache Mutual Authentication
PPTX
Modernising the Digital Integration Hub
PDF
CloudStack 4.21: First Look Webinar slides
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
Build Your First AI Agent with UiPath.pptx
DOCX
search engine optimization ppt fir known well about this
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPT
What is a Computer? Input Devices /output devices
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
Flame analysis and combustion estimation using large language and vision assi...
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Configure Apache Mutual Authentication
Modernising the Digital Integration Hub
CloudStack 4.21: First Look Webinar slides
sustainability-14-14877-v2.pddhzftheheeeee
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Taming the Chaos: How to Turn Unstructured Data into Decisions
The influence of sentiment analysis in enhancing early warning system model f...
1 - Historical Antecedents, Social Consideration.pdf
Build Your First AI Agent with UiPath.pptx
search engine optimization ppt fir known well about this
Microsoft Excel 365/2024 Beginner's training
sbt 2.0: go big (Scala Days 2025 edition)
A contest of sentiment analysis: k-nearest neighbor versus neural network
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
What is a Computer? Input Devices /output devices
NewMind AI Weekly Chronicles – August ’25 Week III
A proposed approach for plagiarism detection in Myanmar Unicode text
Flame analysis and combustion estimation using large language and vision assi...
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION

Presentation Nairobi 9 September 2013. Joint workshop on spam(law) of African Telecommunication Union and the Internet Society

  • 1. Spam legislation in the Netherlands: the law, results, approach and lessons learned Wout de Natris De Natris Consult Joint ATU ISOC meeting on combatting spam Nairobi, Monday 9 September 2013
  • 2. Introduction 1. Consultant at De Natris Consult 2. Member of London Action Plan 3. Asked to represent the Dutch Ministry of Economic Affairs (and LAP) 4. Background in spam enforcement, national and international cooperation spam and cyber crime at OPTA 2
  • 3. An overview 1. Dutch anti-spam law 2004 2. Approach by OPTA 3. Results 4. Lessons learned 5. Advanced Cyber DefenceCentre (ACDC) 3
  • 4. The law 2004, Art. 11.7,1 Telecommunications Act (Tw) 1. The use of automatic calling systems without human intervention, faxes and electronic messages for transmitting unrequested communication to subscribers for commercial, idealistic or charitable purposes will only be permitted if the sender can demonstrate that the subscriber concerned has given prior consent for this, notwithstanding that laid down in paragraph 2. 4
  • 5. The law 2004, Art. 11.7,2 2. Any party who has received electronic contact information for electronic messages as part of the sales of his product or service may use this information for transmitting communication for commercial, idealistic or charitable purposes in relation to his own similar products or services, provided that with the obtaining of the contact data the customer is explicitly given the opportunity to submit an objection in a straightforward manner and free of charge against the use of his electronic contact information and, if the customer has not taken up this opportunity, he is offered the opportunity with each communication transmitted to submit an objection against the further use of his electronic contact information under the same conditions. Article 41, paragraph 2, of the Personal Data Protection Act is applicable mutatis mutandis. 5
  • 6. The law 2004, Art. 11.7,3 3. The following information should be stated at all times when using electronic messages for the purposes as referred to in paragraph 1: a. the actual identity of the party on whose behalf the call is being made, and b. a valid postal address or number to which a recipient may direct a request to stop such communications. 6
  • 7. The law 2004, Art. 11.7,4 4. The use of means other than those referred to in paragraph 1 for transmitting unrequested communication for commercial, idealistic or charitable purposes to subscribers is permitted unless the subscriber concerned has stated that he does not wish to receive communications by such means and if the subscriber is offered the opportunity with each communication transmitted to submit an objection against the further use of his electronic contact information. In that case, the subscriber will not be charged for the facility that prevents such unrequested communications being made to him. 7
  • 8. The law 2004, Art. 11.8 The application of Article (…) 11.7 shall be limited to subscribers who are natural persons. 8
  • 9. The law 2004  Basically one article, 11.7Tw on spam  (One article on malware 4.1 BUDE (Decision Universal Service End users))  Tw empowers OPTA (Independent Post and Telecommunications Authority), now ACM  OPTA already has many enforcement powers and they all applied to spam! 9
  • 10. The law specified  Automated calls, faxes and electronic messages  Subscribers  Without prior consent  Opt-in regime  Commercial, idealistic and charitable  Natural persons 10
  • 11. The law specified interlude  There is no definition of spam in the law.  It’s on unsolicited electronic communications  Whether by fax, computer, device or phone  So, much broader than “spam” 11
  • 12. The law specified, 2  The exception:  Existing customer “as part of a sale”  Similar products  His own products  Explicitly asked for consent  Easy and free to stop the mailing  Opportunity to object with each mailing 12
  • 13. The law specified, 3  An electronic message must contain:  A valid postal address or number to which a recipient may direct a request to stop such communications  I.e. it is forbidden to send anonymous messages and/or use spoofed headers  Separate violation from just sending 13
  • 14. The law specified, 3: beyond 11.7 Tw  All powers invested in OPTA as post and telecommunications regulator were in place for spam fighting  Administrative coercion to enforce the obligations  Allowed to prevent to provide services  (Periodic penalty) fines 14
  • 15. The law specified, 4  is authorised to seal off business premises and objects ;  Authorised to enter business premises; private homes only with consent  Seize or copy information  OPTA is authorised to demand information from anyone at any time (18.7)  General Administrative Act Law  OPTA law: allowed to share data 15
  • 16. The law specified, 5  Conclusions in general:  Concise  Effective  Successful 16
  • 17. The law specified, 6  Conclusions:  One, comprehensive, article is enough to start  Attribute one organisation  Right to enquire information from every one  Fine, stop, disrupt and seize where necessary  Right to visit  (International) cooperation 17
  • 18. OPTA’s approach  Asked for a budget  € 300.000,= for 2004  8 people for 50% of their time  Complaint system opened on day 1  Two hired, temporary forensic experts  First forensic gear bought  Active in international cooperation  Active in national cooperation 18
  • 19. Results  85% of identifiable Dutch language spam was gone in 6 months  First fines given after 6 months  Fraud cases involving Premium Rate Service Numbers dissappeared within first year However:  It did nothing for international spammers  ISP filters tackle these  Country cooperation should too 19
  • 20. Case examples  Straight commercial e-mails  Fraud in combination with newspaper print  SMS spam in combination with PRS numbers  War drive  Lottery scam/autodialers  Fax-to-e-mail spam  Cross border cases  Malware spreading  Hosting of spammers 20
  • 21. 2013, lessons learned  Costumer/subscriber is not enough  Include legal persons  Six months for two cases was not enough time  Cases involve fraud and crimes, up to serious organised crime  Tw was unclear on attribution 21
  • 22. 2013, lessons learned, 2  Territoriality is a major problem  Three major cases rejected in court  Should ACM be able to deal with the content of messages?  Internet fraud and police do not match  Spam law no longer effective for NL? 22
  • 23. 2013, lessons learned, 3  But,  First successes remain  Dutch spam was halted  Many frauds were stopped 23
  • 24. 2013 My advice to you  Start simple and concise  Work from there  Celebrate early successes and build on them 24
  • 25. 2013 My advice to you, 2  On a model law  Define what you think spam is  Define a “spammer”  attribution  Protect companies as well  Give all reasonable enforcement and inquiry powers needed  Allow cooperation/data exchange 25
  • 26. ACDC  Advanced Cyber Defence Centre  EU co-funded botnet mitigation program  Open to all  How could your country profit?  www.botfree.eu 26
  • 27. Conclusion  Spam law works  Law and enforcement tools need to be in balance  Effective enforcement does not come at highest cost  Find out about cooperation and training  Be ambitious 27
  • 28. Art. 4.1 BUDE Section 4.1 of the Decision universal service and endusersinterests (Bude) i.e. implementation of art. 5, section 3 of Directive 2002/58/EC (Directive on privacy and electronic communications) Section 4.1 Bude prohibits storage of communications without prior consent: OPTA authorized 28
  • 29. De Natris Consult  National and international cooperation  Reach out officer for ACDC botnet program  Internet governance  Blogger  Today represents the Dutch government  Ex enforcement officer spam at OPTA (ACM) 29
  • 30. More information De Natris Consult Wout de Natris denatrisconsult@hotmail.nl +31 64838 8813 http://woutdenatris.wordpress.com www.circleid.com 30