CAN-SPAM Basics

I. BACKGROUND

The CAN-SPAM Act of 2003 (Controlling the Assault of Non-Solicited Pornography and Marketing Act) establishes requirements for those who send commercial email, spells out penalties for spammers and companies whose products are advertised in spam if they violate the law, and gives consumers the right to ask emailers to stop spamming them.

The law, which became effective January 1, 2004, covers email whose primary purpose is advertising or promoting a commercial product or service, including content on a Web site.

A "transactional or relationship message" ? email that facilitates an agreed-upon transaction or updates a customer in an existing business relationship ? may not contain false or misleading routing information, but otherwise is exempt from most provisions of the CAN-SPAM Act.

The U.S. Federal Trade Commission is authorized to enforce the CAN-SPAM Act. CAN-SPAM also gives the U.S. Department of Justice the authority to enforce its criminal sanctions.

Other federal and state agencies can enforce the law against organizations under their jurisdiction, and companies that provide Internet access may sue violators, as well.

II. WHAT THE LAW REQUIRES

A. It bans false or misleading header information. Your email's "From," "To," and routing information ? including the originating domain name and email address ? must be accurate and identify the person who initiated the email.

B. It prohibits deceptive subject lines. The subject line cannot mislead the recipient about the contents or subject matter of the message.

C. It requires that your email give recipients an opt-out method. You must provide a return email address or another Internet-based response mechanism that allows a recipient to ask you not to send future email messages to that email address, and you must honor the requests. You may create a "menu" of choices to allow a recipient to opt out of certain types of messages, but you must include the option to end any commercial messages from the sender.

Any opt-out mechanism you offer must be able to process opt-out requests for at least 30 days after you send your commercial email. When you receive an opt-out request, the law gives you 10 business days to stop sending email to the requestor's email address. You cannot help another entity send email to that address, or have another entity send email on your behalf to that address. Finally, it's illegal for you to sell or transfer the email addresses of people who choose not to receive your email, even in the form of a mailing list, unless you transfer the addresses so another entity can comply with the law.

D. It requires that commercial email be identified as an advertisement and include the sender's valid physical postal address. Your message must contain clear and conspicuous notice that the message is an advertisement or solicitation and that the recipient can opt out of receiving more commercial email from you. It also must include your valid physical postal address.

III. PENALTIES

Each violation of the above provisions is subject to fines of up to $11,000. Deceptive commercial email also is subject to laws banning false or misleading advertising.

Additional fines are provided for commercial emailers who not only violate the rules described above, but that also:

A. "Harvest" email addresses from Web sites or Web services that have published a notice prohibiting the transfer of email addresses for the purpose of sending email generate email addresses using a "dictionary attack" ? combining names, letters, or numbers into multiple permutations

B. Use scripts or other automated ways to register for multiple email or user accounts to send commercial email

C. Relay emails through a computer or network without permission ? for example, by taking advantage of open relays or open proxies without authorization.

The law allows the U.S. Department of Justice to seek criminal penalties, including imprisonment, for commercial emailers who do ? or conspire to:

A. Use another computer without authorization and send commercial email from or through it

B. Use a computer to relay or retransmit multiple commercial email messages to deceive or mislead recipients or an Internet access service about the origin of the message

C. Falsify header information in multiple email messages and initiate the transmission of such messages

D. Register for multiple email accounts or domain names using information that falsifies the identity of the actual registrant

E. Falsely represent themselves as owners of multiple Internet Protocol addresses that are used to send commercial email messages.

Glen Littlejohn, Esq. http://www.mortgagemarketingtsunami.com

Alexis limo rentals ..
In The News:

A Google DeepMind team has developed an artificial intelligence system that can play video games like a human and take native language commands from players.
Four of the largest school boards in Ontario, Canada have launched lawsuits against TikTok, Meta, and Snapchat, claiming that they have impacted students' thinking and behavior.
Finalists for the inaugural Women’s Prize for Nonfiction, aimed at addressing the gender imbalance in nonfiction publishing, were unveiled on Wednesday.
Tech guru Kurt "CyberGuy" Knutsson breaks down whether the government is watching citizens and what they can do to protect online privacy.
A benchmarking group for artificial intelligence has released new results evaluating the speed of hardware in running AI applications and responding to users.
Sierra Space’s Dream Chaser spaceplane provides a glimpse into the future of space travel. Traveling to space may become a part of everyday life.
The new European Hyperloop Center in the Netherlands aims bring in a new era of transportation. The center will use a steel tube as a proving ground for testing the new vehicle.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
While it may be incredibly tempting to have a “go with the flow" mindset like the rest of your vacation, your technology definitely should not be compromised while traveling.
Have you ever accidentally deleted an app from your iPhone that you’ve already paid for? Don't worry. We’ve got a trick that will help you get it back without having to buy it again.
Apple's new Journal app has raised privacy concerns among Apple's userbase. Tech expert Kim Komando examines social media rumors and explains what steps to take to protect yourself.
Although Facebook has denied that our phones listen to us, they do have other ways of finding out what we are talking about, listening to and searching for.
With the integration of OpenAI technology, Figure 01 has taken a significant leap forward, showcasing the potential of robots to understand and interact with us on a personal level.
Port Ellen, newly reopened whisky distillery in Scotland, is using SmokeDNAi technology to understand mouth-feel and flavors during the whisky maturation process.
Telly, a smart TV firm, is promising to give out their 4K 55-inch TV for free. What must you give in return? The innovative, yet potentially unsettling, answer might shock you.
The moment a spam invite hits your calendar, it’s like an uninvited guest at a party. So, what do you do? Show it the door.
Identity thieves are now targeting children and are making large sums of money by exploiting children's identities, possibly hurting their financial future.
There's a clever way to change the notification sounds on your Android without having to look at your screen. Kurt "CyberGuy" Knutsson explains.
If your bank accounted has been hacked, there are a number of steps you can take to prevent it from happening again. Kurt "CyberGuy" Knutsson explains.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
The Wave House, a data center in Heidelberg, Germany, is the the largest 3D-printed building in Europe. Its walls were built in about 140 hours.
Some government agencies around the world are struggling to meet their staffing goals when it comes to hiring artificial intelligence experts.
Google Maps' recent upgrades have introduced real-time ETA and turn-by-turn directions to your phone's lock screen while you are traveling.
Kat Cammack says AI could disrupt the 2024 election. A report says shared AI image tools generate election disinformation in 41% of cases and voting disinformation in 59% of cases.
Deepfakes have become commonplace, and the technology is only getting better, but there are certain elements that might give away the fact that an image is AI-generated.

All About Spam

Spam is annoying. Period. Why people would want to send... Read More

The War on Spam: Google Fights Back

Google is engaged in a war. It is a war... Read More

How Spammers Fool Rule-based and Signature-Based Spam Filters

Effectively stopping spam over the long-term requires much more than... Read More

Spam Filters Explained

What do they do? How do they work? Which one... Read More

Three Faces of SPAM

Like everybody who will ever read this, I get spam... Read More

Which Spam Filter Is Best For You?

With the number of spam filtering solutions increasing each week... Read More

Of Spam and Sandboxes

About a month ago I had the privilege of giving... Read More

How To Identify Spam

Most of us have opened our email program and found,... Read More

BUSTED: Anti Spam Forces Bankrupt Super-Spammer Scott Richter

Microsoft scores one for the good guysScott Richter, the self-proclaimed... Read More

Is Spam Affecting Your Business Email?

5 Ways Spam Is Affecting Your Business And what we... Read More

Avoid, Shun, Thwart, Prevent, and then Filter Spam

Email is rapidly becoming the standard means of communication among... Read More

5 Zero-Cost Spam Prevention Tools For All Situations!

Anyone who uses email knows what Spam is!It's annoying and... Read More

Are You A Spam Zombie?

Over the past few years you've all become familiar with... Read More

Getting Back To Basics.

While we all agree that there`s way too much spamming/junk-mailing... Read More

Dealing With SPAM - An E-mail Address Strategy

With SPAM being such a problem it might seem the... Read More

Dont Look Spammy!

We all hate spam and get way too much of... Read More

FTC Botches Fight on SPAM, Microsoft Takes Over the Battle

While the Federal Trade Commission is busy fighting over definitions... Read More

SPAM: A Nutrious Food or a Waste of Time?

Unless the filters on your computer are really good, you're... Read More

20 Words That Kill - At Least When It Comes to Spam Filters

Spam, spam, spam. It's terrible not only for those of... Read More

Anti Trackback and Comment Spam Methods

What is spam ? ... Read More

How To Stop Spam

I imagine you have seen, heard about, or already know... Read More

Block Spam with An Easy Behavioral Change

E-mails now have a connection back to their servers. I... Read More

How You Can Avoid The New Dangers Of Spam

Until recently, spam has been an annoyance, a definite load... Read More

CAN-SPAM Basics

I. BACKGROUNDThe CAN-SPAM Act of 2003 (Controlling the Assault of... Read More

Spam eMails Are Not Just Annoying - They Are A Main Distributor Of Viruses

Why is someone from India, Africa, or elsewhere writing you... Read More

car service from Midway Alsip ..