|Ðð©'§ Spam Blocking Library|
The CAN-SPAM Act of 2003 (Controlling the Assault of Non-Solicited Pornography and Marketing Act) establishes requirements for those who send commercial email, spells out penalties for spammers and companies whose products are advertised in spam if they violate the law, and gives consumers the right to ask emailers to stop spamming them.
The law, which became effective January 1, 2004, covers email whose primary purpose is advertising or promoting a commercial product or service, including content on a Web site.
A "transactional or relationship message" ? email that facilitates an agreed-upon transaction or updates a customer in an existing business relationship ? may not contain false or misleading routing information, but otherwise is exempt from most provisions of the CAN-SPAM Act.
The U.S. Federal Trade Commission is authorized to enforce the CAN-SPAM Act. CAN-SPAM also gives the U.S. Department of Justice the authority to enforce its criminal sanctions.
Other federal and state agencies can enforce the law against organizations under their jurisdiction, and companies that provide Internet access may sue violators, as well.
II. WHAT THE LAW REQUIRES
A. It bans false or misleading header information. Your email's "From," "To," and routing information ? including the originating domain name and email address ? must be accurate and identify the person who initiated the email.
B. It prohibits deceptive subject lines. The subject line cannot mislead the recipient about the contents or subject matter of the message.
C. It requires that your email give recipients an opt-out method. You must provide a return email address or another Internet-based response mechanism that allows a recipient to ask you not to send future email messages to that email address, and you must honor the requests. You may create a "menu" of choices to allow a recipient to opt out of certain types of messages, but you must include the option to end any commercial messages from the sender.
Any opt-out mechanism you offer must be able to process opt-out requests for at least 30 days after you send your commercial email. When you receive an opt-out request, the law gives you 10 business days to stop sending email to the requestor's email address. You cannot help another entity send email to that address, or have another entity send email on your behalf to that address. Finally, it's illegal for you to sell or transfer the email addresses of people who choose not to receive your email, even in the form of a mailing list, unless you transfer the addresses so another entity can comply with the law.
D. It requires that commercial email be identified as an advertisement and include the sender's valid physical postal address. Your message must contain clear and conspicuous notice that the message is an advertisement or solicitation and that the recipient can opt out of receiving more commercial email from you. It also must include your valid physical postal address.
Each violation of the above provisions is subject to fines of up to $11,000. Deceptive commercial email also is subject to laws banning false or misleading advertising.
Additional fines are provided for commercial emailers who not only violate the rules described above, but that also:
A. "Harvest" email addresses from Web sites or Web services that have published a notice prohibiting the transfer of email addresses for the purpose of sending email generate email addresses using a "dictionary attack" ? combining names, letters, or numbers into multiple permutations
B. Use scripts or other automated ways to register for multiple email or user accounts to send commercial email
C. Relay emails through a computer or network without permission ? for example, by taking advantage of open relays or open proxies without authorization.
The law allows the U.S. Department of Justice to seek criminal penalties, including imprisonment, for commercial emailers who do ? or conspire to:
A. Use another computer without authorization and send commercial email from or through it
B. Use a computer to relay or retransmit multiple commercial email messages to deceive or mislead recipients or an Internet access service about the origin of the message
C. Falsify header information in multiple email messages and initiate the transmission of such messages
D. Register for multiple email accounts or domain names using information that falsifies the identity of the actual registrant
E. Falsely represent themselves as owners of multiple Internet Protocol addresses that are used to send commercial email messages.
Glen Littlejohn, Esq. http://www.mortgagemarketingtsunami.com
BUSTED: Anti Spam Forces Bankrupt Super-Spammer Scott Richter
Microsoft scores one for the good guys
How To Identify Spam
Most of us have opened our email program and found, alongside correspondence from people that we know, offers for products from commercial web sites. Some of these emails we expect. We have asked to be notified of sales and other opportunities or joined a mailing list offered by the company.
Having a Bad e MALE Day? Email, Spam, Spam and More Spam
You just sat at your desk, opened your email account and what do you get? First there is some anonymous donkey from an anonymous and anything but respectable mortgage lender telling you that they can arrange your finance at 3% and all you need to do now that your application is approved is to sign along the dotted line and get in touch with them. This is despite the fact that you have never heard of them or even approached them ? ever!.
Eight Quick Tips For Stopping SPAM
If you are buried in SPAM then you're not alone. It's been suggested that as much as 50% to 75% of the e-mail traffic on any given day is SPAM. Reading through SPAM is a waste of your time and it subjects you to potential viruses, trojan horses, and sexual material which can be quite offensive. Here are some tips on how to win the SPAM war:
Avoid, Shun, Thwart, Prevent, and then Filter Spam
Email is rapidly becoming the standard means of communication among businesses, associates, and even friends. While many people have now been using the internet and email for years, there are thousands of new users on the internet each day. With inexpensive web hosting, free email services, and the blog burst upon us, getting your own slice of the internet pie has never been easier.
A Practical Approach to Eliminate Spam
Spam is out of control! I guess that would be the understatement of the year. Like any other annoying fact of life, you let it drive you crazy or you deal with it.
What Is Spam?
If you've been around the interenet any length of time then you probably know what spam is. However, if you're new to the internet you might be asking yourself the question "What is Spam?"
Kill The Messenger (Service)
You are familiar with the software applications that you run on your computer, but you may not be familiar with the dozens of programs running in the background on your computer. These programs, called "services" handle tasks like event logging, spooling files to the printer, and networking. One of these services, the Messenger Service, can be reconnoitered by spammers.
How Spammers Fool Bayesian Filters - And How to Stop Them
Effectively stopping spam over the long-term requires much more than blocking individual IP addresses and creating rules based on keywords that spammers typically use. The increasing sophistication of spam tools coupled with the increasing number of spammers in the wild has created a hyper-evolution in the variety and volume of spam. The old ways of blocking the bad guys just don't work anymore.
How To Analyze A Rip-Off Scheme
This review is taken DIRECTLY from a piece of "junk mail." It is or the program that starts out with the heading: "Before You Decide To Throw This Away, Please Read The Enclosed At Least Once - Then Decide. This is Not a Chain Letter! I Threw The Program in The Trash."
Email Spam and Phishing
It seems like the volume of email spam has doubled in the last month. Increasingly, we receive daily emails for better mortgage rates, pharmaceutical discounts, and offers to enlarge body parts we don't even have.
Your Dolphin E-mail Caught In Spam Tuna Net?
Let me ask a couple of questions:
Protecting Your Business From Spam
Even being as careful as possible with my email address, I still used to receive more than 100 email messages a day, which is no exaggeration. Only about 10% of those emails were from people that I knew and the rest of the messages were unwanted email?"spam". And I'm sure you can relate to my frustration. It is estimated that over seventy-six billion unwanted email messages were delivered in 2003, costing companies more than $10 billion each year.
Do Not Spam
The temptation among internet marketers to SPAM is greater than ever. By now, most people know that SPAM isn't the popular food from Hormel but a pseudonym for "unsolicited commercial email," also known as UCE.
Block Ads, Defeat Pop-Ups, and STOP Page Hijacking
You're not alone!
Dealing With SPAM - An E-mail Address Strategy
With SPAM being such a problem it might seem the right thing to do is never give anyone your email address. As a strategy that's not bad but it misses one rather important point; the purpose of having an email address is to be able to exchange emails, both with friends and also as a means to receive eZines from online forums and information sites. In theory any one of these sources could share your email address with a spammer (perhaps by listing it on a public site) and before you know it your email box is full of emails you don't want and can't stop... note, we do not do this, your address is safe with us. Therefore what you need would seem to be a list of separate email addresses, all of which are yours, that you allocate out to the different email lists and online forums you have. That way if one of the addresses gets picked up by the spammers you can just drop and block that one address (and perhaps the list it was subscribed to) and continue in your low or no-SPAM world. So how do we do this? What we're going to do is use one "real" email account (ideally with a hard to guess name) and then a set of forwarded email addresses, all of which are different, but all point back to the real email address. Typically your ISP (Internet Service Provider) provides a small number of email-boxes for you (normally called "POP3" mailboxes). Choose one of these to be your "real" email address and point your email client to it (follow the instruction in your email client such as Outlook Express and ISP to do this). Then we need to register a domain name which will allow us to have lots of forwarded email addresses. 123-Reg.com are an example of a company that provides an inexpensive high-quality service to do this, so we'll use them as an example. Create an account, it's free to do this, and give them your real email address. Then you should register a domain name with them; obviously you need to think of a domain name which you would like as part of your "public face." Choosing a name you like can take a little thought, but don't take too long, domain names are being registered at the rate of one every two seconds, so get in to secure yours as soon as you can! The cost is very low, with .uk domains at around UK£3 / US$5 per year and .com/.net around UK£9 / US$15 per year (note, you should register for at least two years). Using the email forwarding option from the 123-reg.com control panel, set the catch-all address as your real email address. Then any emails sent to any name at your domain will be forwarded on to you automatically. Here's a worked example for Brenda Wyatt. Brenda's ISP supplied POP3 email address is firstname.lastname@example.org She creates an account at 123-reg.com and registers the domain "WyattMail.net" She sets up email forwarding via the 123-reg control panel to forward all emails received to @wyattmail.net to email@example.com. Now when Brenda signs up to a forum or email list she gives an email address which is individual to that list. Let's say she registers with Amazon, she could register as 'Amazon@wyattemail.net'. They will send emails to that address which will be forwarded to her firstname.lastname@example.org email address and she can read them as she wishes. The nice thing about this system is that Brenda hasn't had to go anywhere else to register the email address 'Amazon@wyattemail.net', 123-reg just sees the wyattemail.net part and sends it on for her. So what happens if she finds one of her email addresses is being targeted by spammers? Let's assume this happens to her "email@example.com" email address. She then goes to 123-reg.com, logs in and goes to the control panel. She selects the email forwarding page, adds a fresh line with 'firstname.lastname@example.org' in it, clicks the 'return to sender' checkbox and clicks 'update'. Now any email to this address will be returned to whence it came. Nice, eh? ©2005 Paul Quirk & Mark Quirk. Article taken from CareOfWindowsXP.com.
How To Stop Spam (Especially If You?re Already a Victim)
Spam. Those annoying, time-consuming emails that clog your Inbox and ruin your day. You wonder: How did it ever get so bad? While it's not possible to completely eliminate spam, there are quite a few things you CAN do about the problem to reduce your burden.
What to Do to Avoid Getting Banned
How would you feel if you found a link on the web that was interesting to you but when you click the link it takes you to a page that is total rubbish? You are not only disappointed but it also wastes your time. Unfortunately, this is often true in many cases. To get a good ranking, often web page designers use "spamdexing". Spamdexing search engines is the practice of deliberately and dishonestly modifying HTML pages to artificially increase the chance of them ranking close to the top of search engine results. This spamming could result in your site getting banned from search engine indices.
|Home | Site Map|
|Copyright © 2005-2008 - DoC's pcMedix Computer Group Help Sites. All Rights Reserved.|