Contact scraping is the practice of obtaining access to a customer's
e-mail
Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices. Email was thus conceived as the electronic ( digital) version of, or counterpart to, mail, at a time when "mail" mean ...
account in order to retrieve contact information that is then used for marketing purposes.
''The New York Times'' refers to the practices of
Tagged,
MyLife and desktopdating.net as "contact scraping".
Several commercial packages are available that implement contact scraping for their customers, including ViralInviter, TrafficXplode, and TheTsunamiEffect.
Contact scraping is one of the applications of
web scraping
Web scraping, web harvesting, or web data extraction is data scraping used for extracting data from websites. Web scraping software may directly access the World Wide Web using the Hypertext Transfer Protocol or a web browser. While web scrapin ...
, and the example of email scraping tools include Uipath, Import.io, and Screen Scraper.
The alternative web scraping tools include UzunExt,
R functions, and
Python Beautiful Soup. The legal issues of contact scraping is under the legality of web scraping.
Web scraping tools
Following web scraping tools can be used as alternatives for contact scraping:
# UzunExt is an approach of data scraping in which
string methods and
crawling process are applied to extract information without using a
DOM Tree .
# R functions ''data. rm()'' and ''data. rm.a()'' can be used as a web scraping strategy.
# Python
Beautiful Soup libraries can be used to scrape data and converted data into
csv files.
Legal issues
United States
In the United States, there exists three most commonly legal claims related to web scraping: compilation copyright infringement, violation of the
Computer Fraud and Abuse Act
The Computer Fraud and Abuse Act of 1986 (CFAA) is a United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law (), which had been included in the Comprehensive Crime Control Act of 1984. The law p ...
(CFAA), and
electronic trespass to chattel claims. For example, the users of "scraping tools" may violate the electronic trespass to chattel claims.
One of the well-known cases is ''
Intel Corp. v. Hamidi,'' in which the US court decided that the computer context was not included in the common law trespass claims. However, the three legal claims have been changed doctrinally, and it is uncertain whether the claims will still exist in the future.
For instance, the applicability of the CFAA has been narrowed due to the technical similarities between web scraping and web browsing.
In the case of ''EF Cultural Travel BV v. Zefer Corp.'', the court declined to apply CFAA since EF failed to meet the standard for "damage".
European Union
By the Article 14 of the EU’s
General Data Protection Regulation (GDPR), data controllers are obligated to inform individuals before processing personal data. In the case of ''Bisnode vs. Polish Supervisory Authority'', Bisnode obtained personal data from the government public register of business activity, and the data were used for business purpose. However, Bisnode only obtained email addresses for some of the people, so the mail notifications were only sent to those individuals. Instead of directly informing other people, Bisnode simply posted a notice on its website, and thus it failed to comply with the GDPR’s Article 14 obligations.
Australia
In Australia, address‑harvesting software and harvested‑address lists must not be supplied, acquired, or used under the
Spam Act 2003. The Spam Act also requires all marketing emails to be sent with the consent of the recipients, and all emails must include an opt-out facility. The company behind the GraysOnline shopping websites was fined after sending emails that breached the Spam Act. GraysOnline sent messages without an option for recipients to opt-out of receiving further emails, and it sent emails to people who had previously withdrawn their consent from receiving Grays' emails.
China
Under the Cybersecurity Law of the People's Republic of China, web crawling of publicly available information is regarded as legal, but it would be illegal to obtain nonpublic, sensitive personal information without consent. On November 24, 2017, three people were convicted of the crime of illegally scraping information system data stored on the server of Beijing ByteDance Networking Technology Co., Ltd.
See also
*
Web scraping
Web scraping, web harvesting, or web data extraction is data scraping used for extracting data from websites. Web scraping software may directly access the World Wide Web using the Hypertext Transfer Protocol or a web browser. While web scrapin ...
*
Data scraping
*
Information extraction
Information extraction (IE) is the task of automatically extracting structured information from unstructured and/or semi-structured machine-readable documents and other electronically represented sources. In most of the cases this activity concer ...
*
Web crawler
A Web crawler, sometimes called a spider or spiderbot and often shortened to crawler, is an Internet bot that systematically browses the World Wide Web and that is typically operated by search engines for the purpose of Web indexing (''web spi ...
*
Web archiving
Web archiving is the process of collecting portions of the World Wide Web to ensure the information is preserved in an archive for future researchers, historians, and the public. Web archivists typically employ web crawlers for automated captur ...
*
Search engine scraping
References
{{DEFAULTSORT:Contact Scraping
Internet privacy
Viral marketing
Spamming
Web scraping