White Buffalo Ventures, LLC v. University of Texas

United States Court of Appeals Fifth Circuit F I L E D August 2, 2005 In the United States Court of Appeals Charles R. Fulbruge III Clerk for the Fifth Circuit _______________ m 04-50362 _______________ WHITE BUFFALO VENTURES, LLC, Plaintiff-Appellant, VERSUS UNIVERSITY OF TEXAS AT AUSTIN, Defendant-Appellee. _________________________ Appeal from the United States District Court for the Western District of Texas ______________________________ Before DAVIS, SMITH, and DEMOSS, its internal anti-solicitation policy,2 UT Circuit Judges. blocked White Buffalo’s attempts to send un- solicited bulk commercial email. JERRY E. SMITH, Circuit Judge: White Buffalo sought to enjoin UT from This case involves the regulation of unsoli- excluding its incoming email. The district cited, commercial mass electronic messages court denied the injunction. On cross-motions (“emails”) (a species belonging to the larger for summary judgment, the court granted UT’s communication genus often referred to as motion and denied White Buffalo’s. White “spam”).1 Plaintiff White Buffalo Ventures, Buffalo appeals, challenging the ruling on the LLC (“White Buffalo”), operates several on- grounds that federal law preempts UT’s line dating services, including longhornsin- internal anti-spam policy (the “Regents’ gles.com, which targets students at the Uni- Rules”)3 and that the policy violates the First versity of Texas at Austin (“UT”). Pursuant to Amendment. Mindful that this case presents several novel issues, the significance of which will grow proportionally with heightened cul- tural and economic reliance on the Internet, we affirm. 1 Because the term “spam” is often thought of We make two determinations. First, we de- pejoratively, it is important to note that although cide that the CAN-SPAM Act does not pre- that term necessarily implies that the email was empt UT’s anti-spam policy. Second, we unsolicited, the more general meaning does not (1) imply anything about the veracity of the in- formation contained in the email; (2) require that 2 UT has a general policy against solicitation, the entity sending it be properly identified or au- which it articulates in the Rules and Regulations of thenticated; or (3) require that the email, even if the Board of Regents of the University of Texas true, be commercial in character. There nonethe- System (“the Regents”). Pursuant to that policy, less appears to be no consensus as to the precise UT, with limited exceptions, prohibits solicitation meaning of the term “spam,” which is sometimes at and on its facilities and has promulgated specific used synonymously with unsolicited “bulk” email. procedures dealing with unsolicited email commun- A set of spam messages sent out together is called ications, including commercial solicitations. Under an email “blast.” these procedures, when unsolicited email commun- ications come to the attention of university network The term “spam” derives from a 1970 Monty administrators (by way of complaints, system Python Flying Circus sketch in which a waitress monitors, or other means), UT takes steps to block recites a menu containing “egg and spam; egg ba- or otherwise stop the transmission of such emails, con and spam; egg bacon sausage and spam; spam with or without notice to the sender, as cir- bacon sausage and spam; spam egg spam spam cumstances permit or warrant. bacon and spam; spam sausage spam spam bacon 3 spam tomato and spam . . . .” See Roger Allen Specifically, White Buffalo contends that Ford, Comment, Preemption of State Spam Laws UT’s regulations are preempted by the Controlling by the Federal CAN-SPAM ACT, 72 U. CHI. L. the Assault of Non-Solicited Pornography and REV. 355, 355 n.1 (2005) (citing DAVID CRYSTAL, Marketings Act of 2003 (the “CAN-SPAM Act” or LANGUAGE AND THE INTERNET 53 (Cambridge the “Act”), 15 U.S.C. §§ 7701-7713, Pub. L. 108- 2001)). 187, 117 Stat. 2619 (2003). 2 determine that the policy is permissible under spam to targeted members of the UT our First Amendment commercial speech juris- community.5 prudence, but we reserve judgment on whether state university email servers constitute public UT received several complaints regarding or private fora. unsolicited email blasts from White Buffalo. UT investigated and determined that White I. Buffalo had indeed sent unsolicited emails to A. tens of thousands of UT email account-hold- The parties do not dispute the facts. UT ers, at which point UT issued a cease and de- provides, free of charge, Internet access and sist letter. White Buffalo refused to comply email addresses to faculty, staff, and students with that letter, so UT blocked all email in- at the domain “utexas.edu.” Owners of gress from the IP address6 that was the source electronic mail accounts can access those address for the unsolicited White Buffalo accounts either on-grounds (by means of spam. The filter blocked all email sent from wireless connections or of wired, authenticated that IP address to addresses containing the clusters) or remotely (by means of some other “@utexas.edu” string. Internet access provider). An owner of a UT user account may, for example, log on from B. any third-party dial-up or broadband service White Buffalo obtained a temporary re- provider and check for email residing on one straining order (“TRO”) in state court. UT re- of UT’s 178 email servers. moved the cause to federal court on the basis of federal question jurisdiction; there the TRO UT has a policy of blocking many types of was continued pending a hearing on the pre- incoming spam, irrespective of commercial liminary injunction. After a hearing in May content or source authenticity. Under the Re- 2003, the district court denied the injunction. gents’ Rules, the technology department (the The parties conducted discovery, and both “ITC”) implements procedures (1) to block moved for summary judgment. The district incoming unsolicited, commercial emails and (2) to stop the transmission of such emails.4 5 We presume the legality of these emails based White Buffalo operates several online dat- on this record, the parties’ agreement, and the ing services, including one, called “longhorn- absence of any challenge. singles.com,” that targets UT students. In February 2003, White Buffalo submitted a 6 An Internet Protocol (“IP”) address is a un- Public Information Act request seeking all ique 32-bit numeric address, written as numerals “non-confidential, non-exempt email address- separated by periods, identifying each sender or es” held by UT, which responded by disclosing receiver of information traveling across the In- all qualifying email addresses. In April 2003, ternet. An IP address has two parts: the identifier White Buffalo began sending legal commercial of a particular network on the Internet (say, the first 24 bits) and an identifier of the particular de- vice (which can be a server or a workstation) with- in that network. In essence, an IP address 4 These procedures may or may not provide identifies a single computer; that computer might notice to the sender, depending on the circum- be an entry point into an internal network, but that stances. is not important for our purposes. 3 court granted UT’s summary judgment motion power to supplant state law is “an extra- and denied White Buffalo’s. ordinary power in a federalist system.” Greg- ory v. Ashcroft, 501 U.S. 452, 460 (1991). II. Preemption radically alters the balance of state A. and federal authority, so the Supreme Court 1. has historically refused to impose that altera- This court reviews a summary judgment tion interstitially. See id. The Court has ex- grant de novo, in accordance with the FED R. pressed this principle as a presumption against CIV. PROC. 56 analysis that guides the district preemption of state law.9 Supremacy Clause court. Ford Motor Co. v. Tex. Dep’t of analysis is classic “tie goes to the state” juris- Transp., 264 F.3d 493, 498 (5th Cir. 2001). prudence, and the existence of an express pre- The district court entered judgment for UT on emption provision does not always plainly de- cross-motions for summary judgment. On re- marcate what the federal law expressly view, the motions are reviewed independently, preempts. with evidence and inferences taken in the light most favorable to the nonmoving party. See 3. id. We review a district court’s preemption The district court granted summary judg- determinations de novo. See Baker v. Farmers ment to UT on White Buffalo’s claim that the Elec. Coop., Inc., 34 F.3d 274, 278 (5th CAN-SPAM Act preempts ITC’s anti-spam Cir.1994). regulations. The court premised its holding on four propositions: (1) that the “purposes” of 2. CAN-SPAM, as determined by reference to The doctrine of preemption stems from the the statute and the accompanying Senate Re- Supremacy Clause,7 which gives federal law port, suggest that Congress did not mean to precedence over a conflicting state law. See preempt technological approaches to combat- Cipollone v. Liggett Group, Inc., 505 U.S. ing spam; (2) that § 7707(c) specifically ex- 504, 516 (1992). CAN-SPAM’s preemption empts UT from the scope of express preemp- of state law derives from an express provision tion; (3) that § 7707(b)(2), which states that in the Act. See 15 U.S.C. § 7707(b). “[s]tate laws not specific to electronic mail, including State trespass, contract, or tort law” Although a court should begin with the ex- are not preempted, exempts UT’s anti-spam pression provided by Congress, it must also policy because that policy is part of a larger set “identify the domain expressly pre-empted.”8 of anti-solicitation rules; and (4) that UT’s ITS The fact that Congress has expressly policy is not a “statute, regulation, or rule of a preempted certain activity is plain, but the State or political subdivision of a state” and is scope of that express preemption is not. The 9 See Cipollone, 505 U.S. at 517-18; see also 7 Bldg. & Constr. Trades Council v. Associated “This Constitution, and the Laws of the Unit- ed States which shall be made in Pursuance there- Builders & Contractors, 507 U.S. 218, 224 (1993) of; . . . shall be the supreme Law of the Land . . . .” (“We are reluctant to infer preemption . . . .”); U.S. CONST. art. VI, cl. 2. Maryland v. Louisiana, 451 U.S. 725, 746 (1981) (“Consideration under the Supremacy Clause starts 8 Cipollone, 505 U.S. at 517; see also Med- with the basic assumption that Congress did not tronic, Inc. v. Lohr, 518 U.S. 470, 484 (1996). intend to displace state law.”). 4 therefore not preempted by § 7707(b)(1). We ing to White Buffalo, because UT is a state do not organize our discussion around these actor and has conceded that White Buffalo’s four propositions (because the appellate spam is not false or fraudulent, CAN-SPAM briefing renders an alternate organization more preempts the Regents’ Rules authorizing the desirable), but we discuss each in its email filters. White Buffalo provides no au- appropriate context. thority beyond § 7707(b)(1) in support of this position. To our knowledge, no Fifth Circuit panel has scrutinized any portion of CAN-SPAM, Matters become more complicated because, and no court in this country has considered the in addition to setting forth the preemption legislation’s preemption clause. This is there- clause, § 7707 carves out a set of entities to be fore an issue of very, very first impression. exempt from any possible preemptive effect. It states that “[n]othing in this chapter shall be In part, CAN-SPAM prohibits fraudulent, construed to have any effect on the lawfulness abusive and deceptive commercial email, 15 or unlawfulness . . . of the adoption, imple- U.S.C. §§ 7703, 7704; provides for enforce- mentation, or enforcement by a provider of In- ment of the Act by federal agencies, states, and ternet access service of a policy of declining to Internet service providers (“ISPs”), id. § 7706; transmit, route, relay, handle, or store certain and provides for the issuance of regulations to types of electronic mail messages.” § 7707(c). implement the purposes of the Act, id. § 7711. The parties have agreed, in the district court and on appeal, that White Buffalo complied The district court held that CAN-SPAM with the requirements of the CAN-SPAM Act. does not preempt UT’s anti-solicitation policy. Its email blasts were not unlawful. It noted that § 7707(c) permits Internet service providers to employ protection measures, and Most relevant to White Buffalo’s claim is it held that UT belongs to that set of service CAN-SPAM’S preemption clause: providers. The court also relied on Congress’s acknowledgment of “the problems associated This chapter supersedes any statute, regu- with the rapid growth and abuse of unsolicited lation, or rule of a State or political subdi- commercial email [that] cannot be solved by vision of a State that expressly regulates the Federal legislation alone” but that will also use of electronic mail to send commercial require the “development and adoption of messages, except to the extent that any technological approaches” to serve the goals such statute, regulation, or rule prohibits of the Act. See 15 U.S.C. § 7701(a)(12). The falsity or deception in any portion of a court found that “[t]he Act . . . does not pre- commercial electronic mail message or in- clude a state entity like UT from using techno- formation attached thereto. logical devices [such as] spam-filters to con- serve server space and safeguard the time and § 7707(b)(1). resources of its employees, students, and fac- ulty.” White Buffalo Ventures, LLC v. Univ. White Buffalo argues that this preemption of Tex. at Austin, No. A-03-CA-296-SS, 2004 clause prevents UT from promulgating regula- WL 1854168, at *4 (W.D. Tex. Mar. 22, tions to impede the ingress of longhornsin- 2004). gles.com emails to utexas.edu users. Accord- 5 There are two competing interpretations, regulate the use of electronic mail to send both rooted firmly in the text of the Act, of the commercial spam except where those rules degree of authority state actors may wield in relate to source and content authenticity. UT response to commercial spam. Under the first, emphasizes Congress’s choice to use the word state entities may not regulate commercial “send” in the statute. As a result, UT argues, speech except where that regulation relates to CAN-SPAM does not preempt its regulation the authenticity of the speech’s source and of “received” emails. We decline to imbue the content. Under the second, state entities may word “send” with the particular significance implement a variety of non-authenticity related UT urges.11 commercial speech restrictions, provided the state entity implementing them is an “Internet 2. access provider.” CAN-SPAM does not preempt the Reg- ents’ Rules, because § 7701(b)(1) is in tension As a result of Congress’s apparent failure with plain text found elsewhere in the Act, and to contemplate this question, we must not infer that tension triggers the presumption against preemption. The textual ambiguity triggers preemption. The district court properly the strong presumption against such a finding, sought to interpret § 7707(c), which reads, and we cannot be sure whether UT’s “Nothing in this Act shall be construed to have regulations fall within the ambit of the express any effect on the lawfulness or unlawfulness preemption clause. UT may therefore imple- . . . of the adoption, implementation, or ment the Regents’ Rules without violating the enforcement by a provider of Internet Access Supremacy Clause. service of a policy of declining to transmit, route, relay, handle, or store certain types of B. electronic mail messages.” In finding no 1. express preemption, the court both (1) averred UT argues that CAN-SPAM does not pre- that the ITC policy may not constitute a empt the ITC policy (1) because the Act does not displace the state’s ability to supplement federal law and (2) because CAN-SPAM pre- 11 UT posits that CAN-SPAM regulates not the empts state rules that relate to the sending, “receipt” of email, but the “sending” of it. UT then rather than the receipt, of unsolicited commer- contends that the Regents’ Rules control the cial emails. Section 7707(b)(1) carefully spe- “receipt” of email. Section 7707(b)(1) preempts cifies state political subdivisions as falling state law regulating “the use of electronic mail to within the scope of its preemption, and UT is send commercial messages.” All email (and all a public school.10 “snail mail,” for that matter) is both “sent” and “received.” In a vacuum, the provision is explicit about the types of policies CAN-SPAM preempts. The event triggering preemption is that the In layman’s terms, state entities may not email was sent, not the particular identity of the entity sending it. We do not mean to say that “send” and “receive” never have more specialized meanings in the statute, but only that the gram- 10 UT argues that ITS is not a political subdi- matical construction of this particular provision vision of the state. This argument is meritless, as suggests emphasis should not be placed on that we explain in part II.B.3, infra. distinction here. 6 “statute, regulation, or rule of a State or pol- stant facts present. UT indeed provides Inter- itical subdivision of a state,” § 7707(b)(1), and net Access Service—any time somebody sits (2) noted that UT is a “provider of Internet down at a computer terminal on campus—but access.” Any suggestion along the lines of users need not check their UT email from UT (1)—that an ITC policy does not constitute a network computers, because they can access policy of a state subdivision—is incorrect and the email server remotely. Nonetheless, status requires little explanation. ITC implements the as an “Internet Access Provider” does not ap- directives of, and operates pursuant to the pear to turn on the fraction of access conduct- authority of, the Board of Regents; its policies ed remotely, and we are hard-pressed to find therefore constitute rules of a state that providing email accounts and email access subdivision.12 does not bring UT within the statutory de- finition borrowed from the Internet Tax Free- We therefore confine ourselves primarily to dom Act.13 We therefore decide that UT falls the discussion of (2). The district court stated within the ambit of § 7707(c). that “UT is certainly a provider of Internet ac- cess service to its students, if not to its em- D. ployees and faculty, so it is expressly author- We analyze this issue using a Venn dia- ized under the statute to implement policies gram,14 the intersecting area of which Con- declining to transmit, route, relay, handle or gress did not anticipate—where the state entity store spam.” is itself the provider of Internet access. In that area resides activity that Congress has both The district court says “certainly” without expressly preempted and expressly excepted any reference to the definition provided in the from preemption analysis. Such tension, statute. Congress, in fact, imports that defini- created by the text of the statute, leaves us tion wholesale from a statutory predecessor, unwilling to overrule the strong presumption the Internet Tax Freedom Act: “[A] service against preemption. The Regents Rules are that enables users to access content, informa- valid under the Supremacy Clause. tion, electronic mail, or other services offered over the Internet, and may also include access III. to proprietary content, information, and other A. services as a part of a package of services White Buffalo contends that the district offered to consumers.” 47 U.S.C. § 151. court erred in granting summary judgment on We doubt that those legislators responsible for passing the Internet Tax Freedom Act gave 13 It would be an unusual policy to allow pri- serious consideration to the situation the in- vate, but not public, educational institutions to act as custodians for the interests of its online com- munity. The prudence of the policy, however, does 12 In a related passage, the district court stated not drive our determination that UT should be that “the Board of [Regents] Rules governing so- considered an Internet Access Provider under the licitation using university facilities cannot be said Act. to be specific to electronic mail since it regulates 14 all forms of solicitation.” We need not decide this A Venn diagram uses circles to represent sets, issue, because we have alternate grounds of making with the position and overlap of the circles in- our preemption decision. dicating the relationships between the sets. 7 its First Amendment claim. Whether UT has speech is unlawful or misleading; (2) whether violated White Buffalo’s First Amendment the government’s expressed interest is sub- rights turns on the resolution of the four-part stantial; (3) whether the state action directly commercial speech test in Central Hudson Gas promotes that interest; and (4) whether the & Electric Corp. v. Public Service Com- state action is more extensive than necessary mission, 447 U.S. 557 (1980). We review to promote that interest. See id. at 566. First Amendment determinations under the commercial speech doctrine de novo. See 1. Moore v. Morales, 63 F.3d 358, 361 (5th Cir. Under the first Central Hudson prong, we 1995). Resolving this issue in favor of UT, we must determine whether the speech is unlawful decline to reach the issue of whether UT’s or misleading. See id. Both parties agree that email servers constitute public fora.15 White Buffalo’s commercial solicitations are legal and that they contain factually accurate B. information. Commercial speech is “expression related solely to the economic interests of the speaker 2. and its audience.” Central Hudson, 447 U.S. Under the second Central Hudson prong at 561. No one seriously disputes the com- we must assess the “substantiality” of the gov- mercial character of the speech at issue here. ernment’s proffered interests. See id. UT ad- vances two primary interests: (1) safeguarding In Central Hudson, the Court invalidated the time and interests of those with UT email portions of state regulations banning commer- accounts (“user efficiency”) and (2) protecting cial advertising that promoted the use of elec- the efficiency of its networks and servers tricity. See id. at 572. The Court determined (“server efficiency”). We distinguish between that the government’s action was more exten- the two interests for reasons that are important sive than necessary to promote the state’s sub- under the fourth prong of the Central Hudson stantial interest in energy conservation. Id. at analysis. 569-70. In so doing, the Court announced a four-part test to evaluate the legality of com- For purposes of evaluating the summary mercial speech regulation: (1) whether the judgment, we acknowledge as substantial the government’s gatekeeping interest in protect- ing users of its email network from the hassle 15 In other words, we consider two hypothetical associated with unwanted spam. Also substan- situations: one in which the UT servers are public tial is the “server efficiency” interest, but it fora, and one in which they are not. If the servers must independently satisfy a “goodness of fit” are not, then the First Amendment question is eas- inquiry under the fourth prong of Central ily resolved—if a server is a private forum, the Hudson. “Suffer the servers” is among the government may regulate the speech so long as it is most chronically over-used and under-substan- viewpoint-neutral. In the alternative, if a server is tiated interests asserted by parties (both a public forum, we apply Central Hudson. If we government and private ones)16 involved in determine that this particular regulation would satisfy either situation, we need not resolve the dicey but admittedly important question of the pub- 16 lic versus private forum status of public university The opinion in eBay, Inc. v. Bidder’s Edge, email servers. (continued...) 8 Internet litigation, and rules imposed pursuant 4. to such interests require more than a judicial Having resolved the first three Central rubber-stamp, for reasons we explain in part Hudson questions in UT’s favor, we must III.B.4.b, infra. finally conduct the most difficult in- quiry—whether the ITC policy is no more ex- 3. tensive than necessary to achieve at least one Pursuant to the third Central Hudson of the two substantial state interests. See id. at prong, we must next determine whether the 569-70.18 White Buffalo contends that UT’s UT policy directly advances both proffered anti-spam policy fails to meet this final re- substantial interests: (1) UT’s interest in sani- quirement, although White Buffalo’s precise tizing the network for its email account-hold- objection is hard to discern. It appears to pro- ers (user efficiency) and (2) its interest in test the over-restrictiveness of the policy on preserving the operating efficiency of its serv- the ground that it is impossible to articulate ers (server efficiency). See id. at 569. Again, precisely what the UT regulation is. there can be no serious dispute that UT’s anti- spam policy, which blocks specific incoming To the contrary, UT (relying on the district commercial spam after account-holders have court’s disposition of the issue) reasons that complained about it, directly advances both in- the policy is narrowly and specifically drawn to terests. One can hardly imagine a more direct protect the system and users from only those means of preventing commercial spam from unsolicited, commercial emails that have been appearing in account-holders’ inboxes and identified as problematic by complaint, system occupying server space than promulgating a monitors, or other means. The restriction is policy that excludes such material from the tailored by blocking only those emails from email network.17 specifically identified ISP addresses. Although we may not agree with all of UT’s char- acterizations of its policy, we are aware of what that policy is. White Buffalo’s objection 16 in this regard is without merit. (...continued) Inc., 100 F. Supp. 2d 1058 (N.D. Cal.2000), is one a. of the first and perhaps the most conspicuous in- stance of this rationale. The eBay court held, on a With respect to the first proffered substan- trespass to chattels theory, that if the defendants tial state interest, which is promoting user ef- crawling “activity is allowed to continue un- ficiency,19 the ITC policy is no more extensive checked, it would encourage other auction aggre- than necessary. We have little problem affirm- gators to engage in similar recursive searching of ing the proposition that, to keep community the eBay system such that eBay would suffer ir- reparable harm from reduced system performance, 18 system unavailability, or data losses.” Id. at 1066. For an explanation as to why only one sub- See also note 25, infra. stantial interest need be satisfied, see part III.C, infra. 17 Neither party provides caselaw in support of 19 its position on the question of substantial interest. By “user efficiency” we mean the ability of The district court relied on extensive comments in UT email account holders to go about their daily the Senate Report offered in support of the business without constantly having to identify and CAN-SPAM Act. delete unwanted commercial spam. 9 members from wasting time identifying, One might persuasively present evidence that deleting, and blocking unwanted spam, UT that spam, taken in its entirety, affects the may block otherwise lawful commercial spam efficiency of email servers; indeed, that (as long as the blocks are content- and appears to be what UT has proffered; it sub- viewpoint-neutral).20 mits a list of between 1,500 and 2,000 blocked IP addresses.22 Updegrove testified at the May b. 2003 Preliminary Injunction hearing that UT’s We reject, however, the proposition that “system” would not be able to function with- the ITC policy is no more extensive than nec- out these blocks. Such testimony is common essary to secure the state’s second substantial where server efficiency is offered as a state or interest, which is the efficiency of its servers.21 private interest in Internet litigation. We must nonetheless consider the evidence 20 in the light most favorable to the nonmovant. UT Vice President of Information Technology See Ford Motor Co., 264 F.3d at 498. More- Daniel Updegrove testified at the May 20, 2003, over, the challenged regulation should indicate preliminary injunction hearing: that its proponent “carefully calculated the [A]t a minimum there’s the time it takes to costs and benefits associated with the burden configure an e-mail filter, running the risk that on speech imposed by its prohibition.” Cin- legitimate messages will be filtered erroneously or one by one deleting the offending messages. 21 And there’s an ongoing question of how much (...continued) of this message you have to actually encounter harms it recites are real and that its restriction in order to decide that it’s spam. will in fact alleviate them to a material degree. Consequently, the regulation may not be He furthered affirmed that if UT “wasn’t allowed susta ined if it provides only ineffective or to block or was somehow required under the Con- remote support for the government’s purpose. stitution to unblock these 1700 some odd sites, that We have observed that this requirement is it would severely degrade an employee’s ability to critical; otherwise, a State could with ease re- do their job[.]” strict commercial speech in the service of other objectives that could not themselves justify a 21 This “poor fit” could be rephrased as an ob- burden on commercial expression. jection under several other Central Hudson prongs. For example, the Supreme Court has made a (Internal citations and quotation marks omitted.) similar analysis under the third prong. In Greater The prong under which we make our observations New Orleans Broadcasting Ass’n, Inc. v. United matters little for Central Hudson analysis, how- States, 527 U.S. 173, 188 (1999), the Court stated: ever, because the Supreme Court has stated that “[a]ll are important and, to a certain extent, inter- The third part of the Central Hudson test related: Each raises a relevant question that may asks whether the speech restriction directly and not be dispositive to the First Amendment inquiry, materially advances the asserted governmental but the answer to which may inform a judgment interest. This burden is not satisfied by mere concerning the other three.” Id. at 183. speculation or conjecture; rather, a govern- 22 mental body seeking to sustain a restriction on This information is contained in Exhibit 4. commercial speech must demonstrate that the There are two constituent lists—one of blocks by (continued...) host address and one of blocks by IP address. 10 cinnati v. Discovery Network, Inc., 507 U.S. For the server efficiency rationale to pass mus- 410, 417 (1993) (internal citations and quo- ter under the fourth prong of Central Hudson, tations omitted). spam filters must block a set of spam that poses a legitimate threat to server efficiency. There is record testimony that White Buf- falo can send a restricted volume of email at This is not to say that UT need draw gran- off-peak times, so as not to impede server ular distinctions between types of spam where efficiency. Moreover, UT’s list of blocked IP drawing them renders filtering economically addresses does not make any of the types of infeasible.23 It, however, is to say that where distinctions that Congress obviously thought UT may easily use certain types of fil- important—distinctions between, say, ters—e.g., time of day and volume filters—UT (1) truthful commercial messages and obscene should use them rather than categorically images, (2) commercial messages with an un- exclude all unsolicited commercial bulk email. subscribe feature and commercial messages If those types of filters are economically without one, (3) emails sent during peak traffic infeasible, that evidence should be in the times and those that are not, and (4) email that summary judgment record. The current record originates from an authentic source and email reflects only that UT does not employ such that does not. The rub is that although the filters because legal spammers are subjectively record demonstrates that unblocking all spam “misusing” the system, not because they are might compromise network efficiency, it says overburdening it. nothing about the effects of allowing lawful time- and volume-restricted commercial spam Our conclusion that, for summary judgment to enter UT’s email network. purposes, there is an insufficient fit between the ITC policy and the asserted interest in An exchange at the preliminary injunction server efficiency is of little moment in the hearing between UT’s attorney and Updegrove spam context. The server efficiency interest is most vividly illustrates the poor fit between almost always coextensive with the user ef- UT’s restrictions and the substantial interest in ficiency interest, and the fit is sufficient for the server efficiency: latter; but declaring server integrity to be a substantial interest without evidentiary sub- Q: Well, [White Buffalo’s attorney] is say- stantiation might have unforseen and unde- ing, well, “Hey, I can send this at night sirable ramifications in other online contexts.24 when the employees aren’t there. I won’t send too many at one time. It won’t affect your system that much because of that. 23 For example, as Updegrove testifies, it would Now, is there a reason why that’s not an be impossible to filter spam based on whether the acceptable proposition.” originator of the email was a legitimate business. The email filters could not automate this task. A: Well, if something is wrong, just be- 24 cause there’s a little bit of it doesn’t make This is no more than a cautionary note, the importance of which has become more plain as a it right. If a university makes resources result of our increasing familiarity with litigation available, misusing a little bit of those re- involving the Internet. For example, in the many of sources isn’t correct. the “digital trespass” cases, where a plaintiff bases (continued...) 11 C. A governmental entity may assert that a 24 (...continued) statute serves multiple interests, and only one a trespass to chattels theory on a defendant’s of those need be substantial. See Bolger v. unauthorized use of a network/computer system, Youngs Drug Prods. Corp., 463 U.S. 60, the court will merely conclude, without evidence or 71-73 (1983). The ITC policy survives First explanation, that the allegedly unauthorized use Amendment scrutiny despite its failure to jus- burdened the system. tify that policy in relationship to the server efficiency interest. We therefore decide that One of the most prominent such statements occurs in Compuserve v. Cyber Promotions, Inc., 24 962 F. Supp. 1015, 1022 (S.D. Ohio 1997) (“To (...continued) the extent that defendants’ multitudinous electronic available web site to gather information, without mailings demand the disk space and drain the more, is sufficient to fulfill the harm requirement processing power of plaintiff’s computer for trespass to chattels.”). equipment, those resources are not available to serve CompuServe subscribers. Therefore, the This rationale, with little to no evidentiary sub- value of that equipment to CompuServe is dimin- stantiation, has likewise justified claims under the ished even though it is not physically damaged by Computer Fraud and Abuse Act (“CFAA”), 18 defendants' conduct.”). Many courts mention sys- U.S.C. § 1030. See, e.g., Hotmail Corp. v. Van$ tem degradation and perfunctorily cite Compu- Money Pie, Inc., 1998 WL 388389, ¶ 34 (N.D. serve, but focus primarily on things such as decline Cal. Apr. 16, 1998) (unpublished) (“The evidence in customer goodwill, worker productivity, and the supports a finding that plaintiff will likely prevail like. See, e.g., Am. Online, Inc. v. IMS, 24 F. on its [CFAA] claim and that there are at least Supp. 2d 548, 550 (E.D. Va. 1998) (“[Plaintiff’s] serious questions going to the merits of this claim contact with [Defendant’s] computer network was in that plaintiff [including] that defendants took unauthorized; and [Plaintiff’s] contact with such actions [utilizing system capacity] knowing [Defendant’s] computer network injured [De- the risks caused thereby to Hotmail’s computer fendant’s] business goodwill and diminished the system and online services, which include risks that value of its possessory interest in its computer Hotmail would be forced to withhold or delay the network.”); Am. Online, Inc. v. LCGM, Inc., 46 F. use of computer services to its legitimate sub- Supp. 2d 444, 452 (E.D. Va. 1998) (citing Compu- scribers; that defendants’ actions caused damage to serve language). Hotmail; and that such actions were done by defendants without Hotmail’s authorization.”). In- Since eBay was issued, however, courts have terestingly, the court conducting the most thorough become a little more circumspect about using the inquiry into actual system damage did so in the “slippery slope” argument. See Ticketmaster process of declaring the issue to be one of triable Corp. v. Tickets.com, Inc., 2003 WL 21406289 fact, precluding summary review. See Am. Online, (C.D. Cal. Mar. 7, 2003) (“Since the spider does Inc. v. Nat’l Health Care Discount, Inc., 121 F. not cause physical injury to the chattel, there must Supp. 2d 1255, 1275 (N.D. Iowa 2000). Even in be some evidence that the use or utility of the com- the CFAA context, however, courts rely on the puter (or computer network) being ‘spiderized’ is “loss” rather than the “damage” language in the adversely affected by the use of the spider. No statute. See, e.g. EF Cultural Travel BV v. such evidence is presented here. This court re- Explorica, Inc., 274 F.3d 577, 585 (1st Cir. 2001), spectfully disagrees with other district courts’ find- a maneuver that almost mirrors courts’ tendency to ing that mere use of a spider to enter a publicly favor the server efficiency interest in name but the (continued...) user efficiency interest in substance. 12 UT’s anti-spam policy is constitutionally per- missible under Central Hudson. Because we so decide, we need not address what type of First Amendment forum a public university email network constitutes. The summary judgment is AFFIRMED. 13