CAN-SPAM Basics

I. BACKGROUND

The CAN-SPAM Act of 2003 (Controlling the Assault of Non-Solicited Pornography and Marketing Act) establishes requirements for those who send commercial email, spells out penalties for spammers and companies whose products are advertised in spam if they violate the law, and gives consumers the right to ask emailers to stop spamming them.

The law, which became effective January 1, 2004, covers email whose primary purpose is advertising or promoting a commercial product or service, including content on a Web site.

A "transactional or relationship message" ? email that facilitates an agreed-upon transaction or updates a customer in an existing business relationship ? may not contain false or misleading routing information, but otherwise is exempt from most provisions of the CAN-SPAM Act.

The U.S. Federal Trade Commission is authorized to enforce the CAN-SPAM Act. CAN-SPAM also gives the U.S. Department of Justice the authority to enforce its criminal sanctions.

Other federal and state agencies can enforce the law against organizations under their jurisdiction, and companies that provide Internet access may sue violators, as well.

II. WHAT THE LAW REQUIRES

A. It bans false or misleading header information. Your email's "From," "To," and routing information ? including the originating domain name and email address ? must be accurate and identify the person who initiated the email.

B. It prohibits deceptive subject lines. The subject line cannot mislead the recipient about the contents or subject matter of the message.

C. It requires that your email give recipients an opt-out method. You must provide a return email address or another Internet-based response mechanism that allows a recipient to ask you not to send future email messages to that email address, and you must honor the requests. You may create a "menu" of choices to allow a recipient to opt out of certain types of messages, but you must include the option to end any commercial messages from the sender.

Any opt-out mechanism you offer must be able to process opt-out requests for at least 30 days after you send your commercial email. When you receive an opt-out request, the law gives you 10 business days to stop sending email to the requestor's email address. You cannot help another entity send email to that address, or have another entity send email on your behalf to that address. Finally, it's illegal for you to sell or transfer the email addresses of people who choose not to receive your email, even in the form of a mailing list, unless you transfer the addresses so another entity can comply with the law.

D. It requires that commercial email be identified as an advertisement and include the sender's valid physical postal address. Your message must contain clear and conspicuous notice that the message is an advertisement or solicitation and that the recipient can opt out of receiving more commercial email from you. It also must include your valid physical postal address.

III. PENALTIES

Each violation of the above provisions is subject to fines of up to $11,000. Deceptive commercial email also is subject to laws banning false or misleading advertising.

Additional fines are provided for commercial emailers who not only violate the rules described above, but that also:

A. "Harvest" email addresses from Web sites or Web services that have published a notice prohibiting the transfer of email addresses for the purpose of sending email generate email addresses using a "dictionary attack" ? combining names, letters, or numbers into multiple permutations

B. Use scripts or other automated ways to register for multiple email or user accounts to send commercial email

C. Relay emails through a computer or network without permission ? for example, by taking advantage of open relays or open proxies without authorization.

The law allows the U.S. Department of Justice to seek criminal penalties, including imprisonment, for commercial emailers who do ? or conspire to:

A. Use another computer without authorization and send commercial email from or through it

B. Use a computer to relay or retransmit multiple commercial email messages to deceive or mislead recipients or an Internet access service about the origin of the message

C. Falsify header information in multiple email messages and initiate the transmission of such messages

D. Register for multiple email accounts or domain names using information that falsifies the identity of the actual registrant

E. Falsely represent themselves as owners of multiple Internet Protocol addresses that are used to send commercial email messages.

Glen Littlejohn, Esq. http://www.mortgagemarketingtsunami.com

car service from Midway Burlington .. Lockport Chicago limo O’Hare
In The News:

Tech expert Kurt “CyberGuy" Knutsson says a malware app called SpyLend is posing as a financial tool, hitting 100,000-plus downloads.
Tech expert Kurt “CyberGuy" Knutsson says Clone Robotics’ Protoclone mimics humans with 1,000 muscles – too human for comfort.
Tech expert Kurt “CyberGuy" Knutsson urges you to use Apple’s App Privacy Report to see what your apps are really up to.
Tech expert Kurt “CyberGuy" Knutsson talks about how to smoothly transfer your data from an old laptop to a new one using cloud storage or external drives.
Kurt the CyberGuy offers tips to safeguard your personal information as scammers become more sophisticated with scam texts and other methods.
WeRide's unmanned electric delivery van, the Robovan W5, has 194 cubic feet of cargo space and can carry payloads up to about 2,205 pounds
Kurt the CyberGuy recommends deleting 16 browser extensions immediately in response to a report saying more than 3.2 million web users were affected by a security breach.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
A robotics firm in China claims a robot has performed the world's first humanoid robot front flip, which is significantly more difficult than a backflip.
A digital ID may be even more secure than a physical ID. Storing your driver's license in your Apple Wallet is an ideal solution for commuters.
A cybersecurity firm has shed some light on just how common tax scams have become. Kurt the CyberGuy offers his advice for how to protect your refund.
Lifesize Plans offers immersive walk-throughs that allow customers the opportunity to tour a home's design before construction actually begins.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
A man invested $4 million in bitcoin and lost it all with a single click when he was targeted by a vishing scam, which uses phone calls to trick people.
Expandable's Touchdown is a designer trailer that promises a luxury off-grid living experience and unfolds into a home in about 15 minutes.
Major employee screening company data breach affects 3.3 million people. Tech expert Kurt “CyberGuy" Knutsson explains what happened and gives five ways to protect your data.
Kurt “CyberGuy" Knutsson reveals mind-blowing tech that gives you sunlight on demand.
New malware "FrigidStealer" targets Mac computers. Tech expert Kurt “CyberGuy" Knutsson offers four ways to stay safe from infostealer malware.
Kurt “CyberGuy" Knutsson talks about how lab-grown muscles power a biohybrid hand for scalable prosthetics and research.
Reports of task scams have significantly risen in the past four years, according to the Federal Trade Commission. Kurt the CyberGuy offers some red flags.
iPhones have a hidden folder that eats up storage without you knowing it. Kurt the CyberGuy offers some tricks to free up storage on your device.
A recent ransomeware attack targeted Zacks, an American investment firm, and a cybercriminal claimed to have stolen records for millions of customers.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Researchers unveiled a new soft prosthetic hand that combines the natural coordination patterns of our fingers with the decoding of motoneuron activity in the spinal column.
Accidentally deleting a text message on your iPhone or iPad is not a problem if you still need the message. Apple has a built-in way to recover it.

Demand for Spam? It exists

Do you like spam? No, I'm not kidding. Everybody knows... Read More

Ignoring These Tips Could Result in an Inbox Full of Spam

Although there still seem to be some differences among the... Read More

Dont Give the Spammers Your Address From Your Page

Spammers get email addresses from web pages using programs called... Read More

Stuffing the Spammers!

I'm really, truly fed up with spam. Every day when... Read More

ANTI-S*P^A#M: Protecting Your Web Sites Email Address(es)

Did you know that there are software programs that view... Read More

Wiki Reek-y Havoc

The Vandals are coming! And this time they're after your... Read More

How Can I Stop Getting Spam?

Are you getting too much spam? We all are, but... Read More

How to Write a Privacy Policy

A Privacy Policy can be defined as the policy under... Read More

How to Fight Back BEFORE Youre Falsely Accused of Spam

A friend of mine received a chilling email message from... Read More

Challenge Response Spam Filters Explained

As the flood of spam increases end users are looking... Read More

Spam eMails Are Not Just Annoying - They Are A Main Distributor Of Viruses

Why is someone from India, Africa, or elsewhere writing you... Read More

The Fastest Delete Finger in the Midwest!

There are hundreds of thousands of people who are trying... Read More

How to Protect Your Email ID from Spammers?

You must be one of them experiencing a lot of... Read More

Do You Know Whats in Your Trash?

A hearty welcome to all the spam fighting filters and... Read More

The Vanishing Mail

Am I Just Being Paranoid Or Are The Robots Out... Read More

Spam The Spammer - Will It Work?

Spam is everywhere. It's the "in-box lunch meat" nobody likes,... Read More

Avoiding the Spam Trap: Get Your Message Delivered!

Your message is not being delivered.If you send emails to... Read More

BUSTED: Anti Spam Forces Bankrupt Super-Spammer Scott Richter

Microsoft scores one for the good guysScott Richter, the self-proclaimed... Read More

Dont Look Spammy!

We all hate spam and get way too much of... Read More

Pst... Pass It On... I Found Out Its a Hoax

When you receive an email telling you about a virus,... Read More

Where Did The Word Spam Come From?

We've all become familiar with the term spam. It's become... Read More

Eight Quick Tips For Stopping SPAM

If you are buried in SPAM then you're not alone.... Read More

How Spammers Fool Rule-based and Signature-Based Spam Filters

Effectively stopping spam over the long-term requires much more than... Read More

5 Zero-Cost Spam Prevention Tools For All Situations!

Anyone who uses email knows what Spam is!It's annoying and... Read More

Stop Spam: How To Escape The Spam Hell-Hole

If you're anything like me, you're pretty sick of it,... Read More

Granger limo Chicago ..