Spam Blocker Information |
CAN-SPAM Basics
I. BACKGROUND The CAN-SPAM Act of 2003 (Controlling the Assault of Non-Solicited Pornography and Marketing Act) establishes requirements for those who send commercial email, spells out penalties for spammers and companies whose products are advertised in spam if they violate the law, and gives consumers the right to ask emailers to stop spamming them. The law, which became effective January 1, 2004, covers email whose primary purpose is advertising or promoting a commercial product or service, including content on a Web site. A "transactional or relationship message" - email that facilitates an agreed-upon transaction or updates a customer in an existing business relationship - may not contain false or misleading routing information, but otherwise is exempt from most provisions of the CAN-SPAM Act. The U.S. Federal Trade Commission is authorized to enforce the CAN-SPAM Act. CAN-SPAM also gives the U.S. Department of Justice the authority to enforce its criminal sanctions. Other federal and state agencies can enforce the law against organizations under their jurisdiction, and companies that provide Internet access may sue violators, as well. II. WHAT THE LAW REQUIRES A. It bans false or misleading header information. Your email's "From," "To," and routing information - including the originating domain name and email address - must be accurate and identify the person who initiated the email. B. It prohibits deceptive subject lines. The subject line cannot mislead the recipient about the contents or subject matter of the message. C. It requires that your email give recipients an opt-out method. You must provide a return email address or another Internet-based response mechanism that allows a recipient to ask you not to send future email messages to that email address, and you must honor the requests. You may create a "menu" of choices to allow a recipient to opt out of certain types of messages, but you must include the option to end any commercial messages from the sender. Any opt-out mechanism you offer must be able to process opt-out requests for at least 30 days after you send your commercial email. When you receive an opt-out request, the law gives you 10 business days to stop sending email to the requestor's email address. You cannot help another entity send email to that address, or have another entity send email on your behalf to that address. Finally, it's illegal for you to sell or transfer the email addresses of people who choose not to receive your email, even in the form of a mailing list, unless you transfer the addresses so another entity can comply with the law. D. It requires that commercial email be identified as an advertisement and include the sender's valid physical postal address. Your message must contain clear and conspicuous notice that the message is an advertisement or solicitation and that the recipient can opt out of receiving more commercial email from you. It also must include your valid physical postal address. III. PENALTIES Each violation of the above provisions is subject to fines of up to $11,000. Deceptive commercial email also is subject to laws banning false or misleading advertising. Additional fines are provided for commercial emailers who not only violate the rules described above, but that also: A. "Harvest" email addresses from Web sites or Web services that have published a notice prohibiting the transfer of email addresses for the purpose of sending email generate email addresses using a "dictionary attack" - combining names, letters, or numbers into multiple permutations B. Use scripts or other automated ways to register for multiple email or user accounts to send commercial email C. Relay emails through a computer or network without permission - for example, by taking advantage of open relays or open proxies without authorization. The law allows the U.S. Department of Justice to seek criminal penalties, including imprisonment, for commercial emailers who do - or conspire to: A. Use another computer without authorization and send commercial email from or through it B. Use a computer to relay or retransmit multiple commercial email messages to deceive or mislead recipients or an Internet access service about the origin of the message C. Falsify header information in multiple email messages and initiate the transmission of such messages D. Register for multiple email accounts or domain names using information that falsifies the identity of the actual registrant E. Falsely represent themselves as owners of multiple Internet Protocol addresses that are used to send commercial email messages. Glen Littlejohn, Esq.http://www.mortgagemarketingtsunami.com
MORE RESOURCES: Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 404, exiting |
RELATED ARTICLES
Anti Trackback and Comment Spam Methods What is spam ? Spam is text or URL, in one or several exemplars, neither being waited nor wished, not having, neither directly nor from its shipper, no relationship neither with the recipient nor with a possible resource related to the recipient. How does spam appears in blogs ? Through the comments' body and commentator's URL. FTC Botches Fight on SPAM, Microsoft Takes Over the Battle While the Federal Trade Commission is busy fighting over definitions of "What is SPAM;" Microsoft and Bill Gates are taking it to the enemy. Today Microsoft announced another case and legal action, which is being taken against a spammer who is in Germany. Your Dolphin E-mail Caught In Spam Tuna Net? Let me ask a couple of questions:If (potential) customers sends an e-mail to your company, do they want to receive an answer?If you, in return, e-mail your customer, do you expect that your e-mail is delivered to the customer?Well, in my case, I answered "YES" on both questions. After all, the customer asks for an answer, so it's normal to expect that when you send an e-mail in return, that the customer receives it. Dont Look Spammy! We all hate spam and get way too much of it - agreed? Now that we have that out of the way it is important to realize that in everyone's zest to minimize their spam, we are deleting legitimate e-mails - and those e-mail could be YOUR business messages! Two factors are at play - not reviewing your trash before you empty it and sending e-mail with indicators that trip spam filters.When sending business e-mail, it is critical that you make certain efforts so that your e-mail will not be inadvertently, incorrectly perceived as spam. How to Fight Back BEFORE Youre Falsely Accused of Spam A friend of mine received a chilling email message from his ISP the other day. Someone had reported him as sending SPAM and the ISP warned that an additional SPAM complaint would result in losing his hosting service - period. Wiki Reek-y Havoc The Vandals are coming! And this time they're after your wallets.It's a new form of insidious spam and like its inbred email cousin, it's staggeringly stupid. Block Ads, Defeat Pop-Ups, and STOP Page Hijacking You're not alone!Who hasn't surfed the web looking for information only tohave their session interrupted by those annoying pop-upwindows displaying everything from banner ads to newslettersign-up's?Though pop-up windows and other methods of influencing auser's online experiences originally had positiveintentions, they now seem only to annoy and manipulateusers at every turn.For anyone who ever felt extremely irritated by onlineadvertising, the following advice should help. Getting Back To Basics. While we all agree that there`s way too much spamming/junk-mailing going on in our email boxes, there are a couple of things we can do to reduce the amount of mails we actually have to sift through, without having to resort to paying for expensive software that can be a real pain to set up properly. Firstly, and this is a great, little known tip. The Vanishing Mail Am I Just Being Paranoid Or Are The Robots Out To Get Me?It all started in the early part of the twenty-first century.In the early days of email we were thrilled with its speed and reliability, far superior to "snail mail" but there's always somebody who has to go and spoil things for everyone else. Is Email Dying? 2004 was really a year when the whole subject of email and spam has been at the forefront of the minds of internet marketers.The anti Spam legislation has had more than the desired effect. How Spammers Fool Rule-based and Signature-Based Spam Filters Effectively stopping spam over the long-term requires much more than blocking individual IP addresses and creating rules based on keywords that spammers typically use. The increasing sophistication of spam tools coupled with the increasing number of spammers in the wild has created a hyper-evolution in the variety and volume of spam. How Spammers Fool Whitelists - And How to Stop Them Effectively stopping spam over the long-term requires much more than blocking individual IP addresses and creating rules based on keywords that spammers typically use. The increasing sophistication of spam tools coupled with the increasing number of spammers in the wild has created a hyper-evolution in the variety and volume of spam. Get Your News Releases Through the Spam Filters in 11 Easy Steps In today's spam-filled email world, it's sometimes VERY difficult to get your news releases and PR pitches to the media person you are trying to reach. These tips hold true for personal emails, too, so even if you don't do P. Fight Spam and Fortify Your Web Site with RSS RSS is the answer to the Spam epidemic of the past. Spam, any mass distribution of material across the Internet, can cause systems to back up and crash with unwanted and unsolicited material. Phishing for an Identity Phishing is rapidly becoming on the largest threats to your personal, financial, and emotional wellbeing. No I am not talking about Saturday afternoons out on the boat with your grandfather, listening to stories that being with "When I was your age?"-now while these probably conjure up horrific childhood memories of such stores, they in no way come close to the horror felt by victims of Phishing. Do You Know Whats in Your Trash? A hearty welcome to all the spam fighting filters and programs created to rescue us from the deluge of unwanted e-mail! There is practically a "solution" for everything. But as with most online "solutions" filters and programs are only tools that users need to make some effort to use properly to reap the benefits. Internet Tip of the Week: Outsourcing It's no secret that the US economy has slowed down, and many jobs have been outsourced overseas. Thousands of companies are still and are being forced to cut costs, decrease benefits, and even lay off employees. Are You A Spam Zombie? Over the past few years you've all become familiar with the terms spam, spam filter, whitelists, blacklists and a whole myriad of other terminology associated with the problem of spam. You now have to add a new and extremely worrying phrase to that list - spam zombie. Internet Theft and Fraud My friends in the web hosting business have recently informed me that the big problem this year (2004) is security and fraud. I have read that currently the F. Blackhole or Fail - Which One Is Better For Your Mail Server? Very often SPAMMERS take advantage of catch-all email setup on webservers. Every email no matter what the recipients email address is will be caught by the default email account. |
home | site map | contact us |