What Exactly is Spam?

Spam, as defined in the context of computers, the Internet and electronic messaging, is a term used to designate unsolicited bulk electronic messaging and communication. In particular, spam is unsolicited bulk mailings that are commercially oriented. It is most commonly used in advertising, but it is also used to perpetrate religious, political or other types of messages. Spam is, often times, considered the electronic equivalent of junk postal mail, telemarketing or broadcast faxing. Spam got its bad name and reputation from the advertisement of ill reputable and questionable products, such as pornography, pyramid schemes, fad products, pump-and-dump stocks, etc.

Spam is delivered via several mediums, to include:

? E-mail messages

? Search engines

? Instant messaging

? Web blogs

? Usenet newsgroups

? Text messaging mobile phones

? Internet telephony

The growth of spam is a result of the cost benefit to initiators, who need only devise and develop distribution lists. The other associated costs of spam, such as bandwidth, message management and loss of productivity, become the responsibility of recipients of the messages, ISPs or other public and private entities.

In 2003, the US passed the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act of 2003, which establishes standards for sending commercial e-mail. More specifically, the act is intended "to regulate interstate commerce by imposing limitations and penalties on the transmission of unsolicited, commercial electronic mail via the Internet". The act establishes the Federal Trade Commission (FTC) as the overseer of its provisions.

The act establishes electronic mail as extremely important in communication since it "provides an opportunity for the development and growth of frictionless commerce", which is being threatened by unsolicited commercial email. The act establishes the following as criminal behaviors when used in connection with foreign or interstate electronic mail:

? Knowingly accessing a protected computer without authorization

? Intentionally deceiving or misleading the origin of messages

? Falsifying header information

? Falsifying registration information for 5 or more e-mail accounts or 2 or more domain names

? Falsely representing one's self as the registrant of 5 or more IP addresses

? Obtaining e-mail addresses through improper means

? Perpetrating fraud, identity theft, child pornography, obscenity and the sexual exploitation of children.

Criminal penalties include a fine and/or imprisonment for up to 5 years dependent upon:

? The volume of electronic transmissions

? The amount of falsified information

? Losses incurred by others

? Monetary gains from the act

? Whether the act was committed in furtherance of an felony

? Prior offenses.

Civil penalties are dependent upon the jurisdiction placing the charges and may range from hundreds of dollars to millions of dollars, dependent upon the severity of the crimes and losses involved. Also, property traceable to proceeds from monetary gains and equipment used to commit an offense may be forfeited to the US government.

As critics of the law argue, the legislation fails to dictate to marketers and advertisers, not to spam. In fact, the act does not make reference to the term, "spam", except as used in the name, CAN-SPAM. The act makes reference to the phrase, commercial electronic mail message, and defines it to be "any electronic mail message, the primary purpose of which is the commercial advertisement or promotion of a commercial product or service (including content on an Internet website operated for a commercial purpose)".

Legislation is intended to curb practices inherent in spamming, such as e-mail harvesting, dictionary attacks and using viruses and Trojans to perpetrate messages. The act establishes the following with respect to commercial electronic mail messages:

? A message must contain a legitimate return address.

? A message must include and specify a method to opt-out of receiving further messages. The ability to opt-out must be available for 30 days.

? The sender may not initiate messages after 10 days of receipt of an opt-out.

? The sender may not sell, lease, exchange or transfer the opt-out e-mail address to an affiliate.

? The sender may offer a menu of options that allow the recipient to either opt-out or opt-in to future messages*.

? A message must include an identifier that specifies the message as an advertisement or solicitation.

? Messages containing sexually oriented material must contain clearly identifiable markings or notices

? A message must include a valid, physical, postal address by which the sender may be contacted.

? The sender may not send messages to addresses that were knowingly acquired from proprietary websites and ISPs, through automated methods. Particularly, when the site or ISP provides notice of their refusal to give, sell or transfer addresses for the purpose of initiating electronic mail messages.

? The sender may not create automated scripting and other means to gain multiple email addresses for the purpose of transmitting illegal messages.

? The sender may not transmit messages from a computer or email address obtained without authorization.

*Unlike opt-out advertising, which allows the recipients of advertisement to discontinue any unwanted advertisements from the sender, opt-in advertising allows the advertiser to request to have specific advertisement sent. The recipient may allow or deny permission to have further advertisement sent. If allowed, the advertiser immediately includes that e-mail address to its distribution list. Another option is, double opt-in advertising, which is similar to opt-in advertising except that once the recipient grants permission to send advertisements, a confirmation request is sent to the recipient to verify that they did, indeed, allow the permission. The e-mail address is added to the distribution list only after the recipient has positively responded to the confirmation request.

CAN-SPAM is not intended to provide cause for the general public to sue spammers, individually or in class action suits. It is designed to allow enforcement by the FTC and other federal agencies for the benefit of the general public. Individuals remain privy to the state laws and regulations of their particular jurisdictions.

Matt Bacak became "#1 Best Selling Author" in just a few short hours. Recent Entrepreneur Magazine's e-Biz radio show host is turning Authors, Speakers, and Experts into Overnight Success Stories. Discover The Secrets To Unleash The Powerful Promoter In You! Sign up for Matt Bacak's Promoting Tips Ezine ($100 value) just visit his website at http://www.powerfulpromoter.com or http://www.powerfulpromoter.com

Chicago limo Skokie ..
In The News:

Technology expert Kim Komando gives her tips and tricks on enhancing your user experience a smartphone and other devices you use everyday.
A new camera called NUCA uses artificial intelligence to create deepfake photos of subjects by stripping away clothing in close to real time.
The Kimberley Kube trail-ready camper has a compact but spacious design and combines luxury, functionality and ruggedness for a weekend getaway.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Emails instructing you to reset your password for an account may be legitimate, or they may be scams. Kurt "CyberGuy" Knutsson explains.
Northrop Grumman's Manta Ray uncrewed underwater vehicle aims to revolutionize undersea missions — it glides through the ocean without human assistance.
Learn how to work Google's calendar application to streamline and organize your daily tasks from technology expert Kim Komando.
If you do not want Facebook to have automatic access to your private photos, follow our tips to protect yourself. Kurt “CyberGuy" Knutsson shows you how.
Kurt “CyberGuy" Knutsson goes into detail about Apple’s recent iOS update that allows iPhone users to instantly translate spoken language simply by using the Action Button.
Safeguarding your digital life with a reliable physical backup isn't just a precaution, it's a necessity. Kurt “CyberGuy" Knutsson provides the essential backup checklist.
Kurt “CyberGuy" Knutsson reveals how a Redditor exposed false recycling claims at their apartment, highlighting a report that only 21% of U.S. recyclables are processed.
Kurt "CyberGuy" Knutsson offers a travel toolkit featuring five technology tools to help you with booking flights and hotels for your summer vacation.
The bubble behind the clock on your iPhone can appear in different colors. Kurt "CyberGuy" Knutsson explains what each of those colors mean.
Scammers are using the power of artificial intelligence to mimic voices of people and are using the fake voices to commit crimes, like kidnappings.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Tech guru Kurt "CyberGuy" Knutsson explains the science behind the Invisibility Shield, a 6-foot shield that makes people become invisible.
The International Olympic Committee on Friday announced plans to use AI in various Olympic aspects, including athlete identification, training and judging.
Tech guru Kurt "CyberGuy" Knutsson explains an easy trick to avoid squinting while working or surfing the web by zooming in on your personal computer.
Streaming giant Roku has recently been targeted by a pair of cyberattacks, and the company confirmed over a half million Roku accounts were compromised.
The Land Aircraft Carrier combines an all-terrain, six-wheeled vehicle with a two-seat aircraft, which features electric vertical takeoff and landing.
The European Union has sent TikTok a "request for information" on the video sharing platform's newest app, TikTok Lite, under the Digital Services Act, with the aim to clean up social media.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
The FBI is warning the public about a recent phishing scam via text that claims its targets owe money in Pennsylvania for unpaid road toll charges.
Your Apple Music settings may be revealing to your contacts what you're listening to. Kurt "CyberGuy" Knutsson explains the process to change those settings.
Learn how to secure social media accounts, implement legacy contacts, and create a digital estate plan to protect your online assets from 'ghost hackers' after your death.

Bayesian Spam Filters Explained

In a word Bayesian spam filters are "intelligent". Bayesian spam... Read More

Take Back Control of Your Inbox: Eliminate Annoying and Potentially Harmful E-mails

Are you tired of spam stealing your time, your money,... Read More

How to Fight Back BEFORE Youre Falsely Accused of Spam

A friend of mine received a chilling email message from... Read More

Winning the War On Spam

For years I didn't worry much about spam.But lately it's... Read More

Spam with Typos: Why Do They All Have Spelling Errors?

A friend asked me: I don't get it. Why do... Read More

How to Write a Privacy Policy

A Privacy Policy can be defined as the policy under... Read More

Dont Give the Spammers Your Address From Your Page

Spammers get email addresses from web pages using programs called... Read More

Stop Spam! New Spam Blockers

News last week that Internet service provider Verizon settled its... Read More

Im Guilty Until Proven Innocent

No doubt about it."Spam" (unsolicited commercial email) threatens to paralyze... Read More

Spam eMails Are Not Just Annoying - They Are A Main Distributor Of Viruses

Why is someone from India, Africa, or elsewhere writing you... Read More

How Spammers Fool Bayesian Filters - And How to Stop Them

Effectively stopping spam over the long-term requires much more than... Read More

Spam The Spammer - Will It Work?

Spam is everywhere. It's the "in-box lunch meat" nobody likes,... Read More

Which Spam Filter Is Best For You?

With the number of spam filtering solutions increasing each week... Read More

Dont Look Spammy!

We all hate spam and get way too much of... Read More

Spam Filters Explained

What do they do? How do they work? Which one... Read More

How To Analyze A Rip-Off Scheme

This review is taken DIRECTLY from a piece of "junk... Read More

Beware of the Newest Activity Online: Phishing

No. I'm not talking here about the outdoor activity enjoyed... Read More

A Practical Approach to Eliminate Spam

Spam is out of control! I guess that would be... Read More

Customers Demand Internet Privacy

... and you'd better sit up and take notice! Customers... Read More

Where Did The Word Spam Come From?

We've all become familiar with the term spam. It's become... Read More

Challenge Response Spam Filters Explained

As the flood of spam increases end users are looking... Read More

Evict the Spammers from Your Inbox

Block Spam and Other Email Threats From Entering Your Gateway... Read More

Ignoring These Tips Could Result in an Inbox Full of Spam

Although there still seem to be some differences among the... Read More

CAN-SPAM Basics

I. BACKGROUNDThe CAN-SPAM Act of 2003 (Controlling the Assault of... Read More

The Business Of Sending Spam

You all tear your hair out in frustration every time... Read More

limo O'Hare Bonfield ..