Legal Impacts on the Application of the Computer-Related Offence Act B.E. 2560 to Protect Privacy Rights in Case of Spamming

  • Chonthicha Somsaard
  • Kanathip Thograweewong
Keywords: Privacy rights, Spam, unsolicited contact, law on computer related offence, computer crime



Recently, business sectors apply several methods to approach prospective customers, especially “Spam” which is considered an invasion of privacy of the contacted person.  This research project aimed to study the application of related Thai laws in relation to violation of privacy rights by Spam. The research approach was qualitative and information was collected from various documents for analytical purposes. It was revealed that there was no specific law in recent Thai legal system to protect the “right not to be contacted by Spam without expectation and consent”. Although there were currently various laws which could be applied to unsolicited contact by spam, i.e., the Computer-Related Offence Act B.E. 2560. This research indicated that the content, element, and scope of the laws were inappropriate to be applied to protect the individual privacy rights in case of invasion by Spam. Consequently, the research proposes public policies such as enacting a specific law and amending the existing laws in order to protect privacy rights in case of invasion by Spam.


Download data is not yet available.


Bambauer, E. Derek. (2005). Solving the Inbox Paradox: An Information-based policy Approach to Unsolicited E-mail Advertising, 10 VA.Journal of law & Technology 5, 8-14.
Bray, Hiawatha. (1996). Getting Rid of Junk E-Mail. Boston Globe, Sept. 26.
DeCew , Judith Wagner. (1997). In Pursuit of Privacy: Law Ethics and The Rise of Technology. US:Cornell University Press.
Donnelly, Jack. (1982). Human Rights and Human Dignity. The American Law Review, 76, No.2 (1982).
Hansell, S. (2003). Diverging Estimates of the Cost of Spam. New York Times, July 27.
Hossein Bidgoli (2006) Handbook of Information Security, Information Warfare, Social, Legal, and International issues, and Security Foundations, U.S.: John Wiley & Sons, Inc.. Volume 2
Schwabach, Aaron (2014), Internet and the Law: Technology, Society, and Compromises, 2nd Edition, ABC-CLIO LLC, .p223.
Sorkin, David. (2001).Technical and Legal Approaches to Unsolicited Electronic Mail. University of San Francisco Law Review, Vol. 35. 325
Wacks, Raymond. (1989). Personal Information: Privacy and the Law. UK: Oxford Clarendon Press.
Research articles