What Exactly is Spam?

Spam, as defined in the context of computers, the Internet and electronic messaging, is a term used to designate unsolicited bulk electronic messaging and communication. In particular, spam is unsolicited bulk mailings that are commercially oriented. It is most commonly used in advertising, but it is also used to perpetrate religious, political or other types of messages. Spam is, often times, considered the electronic equivalent of junk postal mail, telemarketing or broadcast faxing. Spam got its bad name and reputation from the advertisement of ill reputable and questionable products, such as pornography, pyramid schemes, fad products, pump-and-dump stocks, etc.

Spam is delivered via several mediums, to include:

? E-mail messages

? Search engines

? Instant messaging

? Web blogs

? Usenet newsgroups

? Text messaging mobile phones

? Internet telephony

The growth of spam is a result of the cost benefit to initiators, who need only devise and develop distribution lists. The other associated costs of spam, such as bandwidth, message management and loss of productivity, become the responsibility of recipients of the messages, ISPs or other public and private entities.

In 2003, the US passed the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act of 2003, which establishes standards for sending commercial e-mail. More specifically, the act is intended "to regulate interstate commerce by imposing limitations and penalties on the transmission of unsolicited, commercial electronic mail via the Internet". The act establishes the Federal Trade Commission (FTC) as the overseer of its provisions.

The act establishes electronic mail as extremely important in communication since it "provides an opportunity for the development and growth of frictionless commerce", which is being threatened by unsolicited commercial email. The act establishes the following as criminal behaviors when used in connection with foreign or interstate electronic mail:

? Knowingly accessing a protected computer without authorization

? Intentionally deceiving or misleading the origin of messages

? Falsifying header information

? Falsifying registration information for 5 or more e-mail accounts or 2 or more domain names

? Falsely representing one's self as the registrant of 5 or more IP addresses

? Obtaining e-mail addresses through improper means

? Perpetrating fraud, identity theft, child pornography, obscenity and the sexual exploitation of children.

Criminal penalties include a fine and/or imprisonment for up to 5 years dependent upon:

? The volume of electronic transmissions

? The amount of falsified information

? Losses incurred by others

? Monetary gains from the act

? Whether the act was committed in furtherance of an felony

? Prior offenses.

Civil penalties are dependent upon the jurisdiction placing the charges and may range from hundreds of dollars to millions of dollars, dependent upon the severity of the crimes and losses involved. Also, property traceable to proceeds from monetary gains and equipment used to commit an offense may be forfeited to the US government.

As critics of the law argue, the legislation fails to dictate to marketers and advertisers, not to spam. In fact, the act does not make reference to the term, "spam", except as used in the name, CAN-SPAM. The act makes reference to the phrase, commercial electronic mail message, and defines it to be "any electronic mail message, the primary purpose of which is the commercial advertisement or promotion of a commercial product or service (including content on an Internet website operated for a commercial purpose)".

Legislation is intended to curb practices inherent in spamming, such as e-mail harvesting, dictionary attacks and using viruses and Trojans to perpetrate messages. The act establishes the following with respect to commercial electronic mail messages:

? A message must contain a legitimate return address.

? A message must include and specify a method to opt-out of receiving further messages. The ability to opt-out must be available for 30 days.

? The sender may not initiate messages after 10 days of receipt of an opt-out.

? The sender may not sell, lease, exchange or transfer the opt-out e-mail address to an affiliate.

? The sender may offer a menu of options that allow the recipient to either opt-out or opt-in to future messages*.

? A message must include an identifier that specifies the message as an advertisement or solicitation.

? Messages containing sexually oriented material must contain clearly identifiable markings or notices

? A message must include a valid, physical, postal address by which the sender may be contacted.

? The sender may not send messages to addresses that were knowingly acquired from proprietary websites and ISPs, through automated methods. Particularly, when the site or ISP provides notice of their refusal to give, sell or transfer addresses for the purpose of initiating electronic mail messages.

? The sender may not create automated scripting and other means to gain multiple email addresses for the purpose of transmitting illegal messages.

? The sender may not transmit messages from a computer or email address obtained without authorization.

*Unlike opt-out advertising, which allows the recipients of advertisement to discontinue any unwanted advertisements from the sender, opt-in advertising allows the advertiser to request to have specific advertisement sent. The recipient may allow or deny permission to have further advertisement sent. If allowed, the advertiser immediately includes that e-mail address to its distribution list. Another option is, double opt-in advertising, which is similar to opt-in advertising except that once the recipient grants permission to send advertisements, a confirmation request is sent to the recipient to verify that they did, indeed, allow the permission. The e-mail address is added to the distribution list only after the recipient has positively responded to the confirmation request.

CAN-SPAM is not intended to provide cause for the general public to sue spammers, individually or in class action suits. It is designed to allow enforcement by the FTC and other federal agencies for the benefit of the general public. Individuals remain privy to the state laws and regulations of their particular jurisdictions.

Matt Bacak became "#1 Best Selling Author" in just a few short hours. Recent Entrepreneur Magazine's e-Biz radio show host is turning Authors, Speakers, and Experts into Overnight Success Stories. Discover The Secrets To Unleash The Powerful Promoter In You! Sign up for Matt Bacak's Promoting Tips Ezine ($100 value) just visit his website at http://www.powerfulpromoter.com or http://www.powerfulpromoter.com

Olympia Fields cheap limo service .. Lockport Chicago limo O’Hare
In The News:

Tech expert Kurt “CyberGuy" Knutsson says Hipshipper, which is used by eBay, Shopify and Amazon sellers, exposed millions of shipping labels.
Boxabl’s Baby Box is a 120-square-foot foldable home that can be set up in 60 minutes and has off-grid features. Kurt “CyberGuy" Knutsson says it's designed to maximize functionality.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Major IoT data breach: Mars Hydro database with 2.7 billion records exposed. Kurt “CyberGuy" Knutsson says the breach is a reminder of the risks that come with using IoT devices.
Unitree H1 robots dance at gala, blending AI and tradition. Tech expert Kurt “CyberGuy" Knutsson examines the convergence of cutting-edge technology and traditional culture.
For the first time ever, SpaceX launched a rocket into space from Florida and landed the booster the Bahamas, allowing for future polar-orbit spaceflight missions.
Attackers use caller ID spoofing and AI voices to steal money. Tech expert Kurt “CyberGuy" Knutsson provides seven ways to protect yourself.
Tech expert Kurt “CyberGuy" Knutsson talks about the Genesis GV60 MIV, an electric rescue EV with snow tracks for extreme missions.
Tech expert Kurt “CyberGuy" Knutsson helps you ensure a smooth online experience with a reliable, secure home network setup.
Kurt “CyberGuy" Knutsson talks about Vollebak’s Shielding Suit, which blocks EM radiation, infrared and tracking for privacy.
Even Apple products are vulnerable to cybercriminals, and a new report suggests the owners of Mac products will have to be more vigilant this year.
An inflatable six-person tiny house from a firm called 2001 looks like a space station with its inflatable dome that is transportable and eco-friendly.
Scams cost Americans an estimated $159 billion every year and average about $3,500 in losses per victim. The CyberGuy has advice to protect yourself.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents
Zeekr and Waymo are joining forces for the world's first mass-produced autonomous vehicle, combining an electric vehicle with self-driving technology.
A humanoid robot training center has opened in Shanghai, a big step in China's efforts to become a global leader in robotics and artificial intelligence.
Security experts have discovered that hackers are targeting apps on the App Store to spread malware that steals information from saved screenshots.
A new luxury SUV combines military-inspired design and high-end luxury transportation and includes two military-grade gas masks to protect against chemical warfare.
80% of stalking victims are tracked using tech. GPS trackers, like AirTags, are among the most popular ways to do it. Here's how to protect yourself.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Kurt "CyberGuy" Knutsson explains how to protect yourself against artificial intelligence-fueled romance scams, which have become the most common type of fraud in 2025.
Kurt "CyberGuy" Knutsson explains the steps to declutter text messages on a Mac or iPad. Apple offers ways to do this more efficiently.
Here's how to take control of the algorithms on Facebook, YouTube, Instagram and TikTok if your social media feeds aren't showing you content you want to see.
Beware of iCloud scams using urgent messages. Tech expert Kurt “CyberGuy" Knutsson helps you spot the red flags to protect yourself.
Travel abroad worry-free with these top translation apps for travelers. Tech expert Kurt “CyberGuy" Knutsson highlights some favorites.

Getting Back To Basics.

While we all agree that there`s way too much spamming/junk-mailing... Read More

Customers Demand Internet Privacy

... and you'd better sit up and take notice! Customers... Read More

Spasms & Spamocidal Mania

Below is a letter I wrote to the following organizations:S.H.U.... Read More

How to Write a Privacy Policy

A Privacy Policy can be defined as the policy under... Read More

Avoid, Shun, Thwart, Prevent, and then Filter Spam

Email is rapidly becoming the standard means of communication among... Read More

Spam - Its Whats For Breakfast

The first thing I do every morning when I wake... Read More

Anti Trackback and Comment Spam Methods

What is spam ? ... Read More

Invasion of the Email Snatchers

They're sneaky. And stealthy. They're quiet and mostly unobtrusive, but... Read More

Six Tips to Get Rid of Spam Email

1. Ignore Spam EmailDo not open an unsolicited email. Spammers... Read More

Spam: The Tasteless Internet Meat of Criminals

Spam. You've all heard of the crazy pink meat in... Read More

Im Guilty Until Proven Innocent

No doubt about it."Spam" (unsolicited commercial email) threatens to paralyze... Read More

Stop Spam! New Spam Blockers

News last week that Internet service provider Verizon settled its... Read More

Having a Bad e MALE Day? Email, Spam, Spam and More Spam

You just sat at your desk, opened your email account... Read More

Spam eMails Are Not Just Annoying - They Are A Main Distributor Of Viruses

Why is someone from India, Africa, or elsewhere writing you... Read More

How To Identify Spam

Most of us have opened our email program and found,... Read More

Block Ads, Defeat Pop-Ups, and STOP Page Hijacking

You're not alone!Who hasn't surfed the web looking for information... Read More

Is Email Dying?

2004 was really a year when the whole subject of... Read More

What Exactly is Spam?

Spam, as defined in the context of computers, the Internet... Read More

Dealing With SPAM - An E-mail Address Strategy

With SPAM being such a problem it might seem the... Read More

Why Your ISP Takes Bribes From Spammers

The lifeblood of the spammer is email. They need to... Read More

5 Zero-Cost Spam Prevention Tools For All Situations!

Anyone who uses email knows what Spam is!It's annoying and... Read More

20 Words That Kill - At Least When It Comes to Spam Filters

Spam, spam, spam. It's terrible not only for those of... Read More

Ignoring These Tips Could Result in an Inbox Full of Spam

Although there still seem to be some differences among the... Read More

Junk Mail Works!

Junk mail works. Why does it work? How does it... Read More

The Cybermagic of Whitelists

Before we start getting deep into the meat of this... Read More

prom limo Belle Rive ..