What Exactly is Spam?

Spam, as defined in the context of computers, the Internet and electronic messaging, is a term used to designate unsolicited bulk electronic messaging and communication. In particular, spam is unsolicited bulk mailings that are commercially oriented. It is most commonly used in advertising, but it is also used to perpetrate religious, political or other types of messages. Spam is, often times, considered the electronic equivalent of junk postal mail, telemarketing or broadcast faxing. Spam got its bad name and reputation from the advertisement of ill reputable and questionable products, such as pornography, pyramid schemes, fad products, pump-and-dump stocks, etc.

Spam is delivered via several mediums, to include:

? E-mail messages

? Search engines

? Instant messaging

? Web blogs

? Usenet newsgroups

? Text messaging mobile phones

? Internet telephony

The growth of spam is a result of the cost benefit to initiators, who need only devise and develop distribution lists. The other associated costs of spam, such as bandwidth, message management and loss of productivity, become the responsibility of recipients of the messages, ISPs or other public and private entities.

In 2003, the US passed the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act of 2003, which establishes standards for sending commercial e-mail. More specifically, the act is intended "to regulate interstate commerce by imposing limitations and penalties on the transmission of unsolicited, commercial electronic mail via the Internet". The act establishes the Federal Trade Commission (FTC) as the overseer of its provisions.

The act establishes electronic mail as extremely important in communication since it "provides an opportunity for the development and growth of frictionless commerce", which is being threatened by unsolicited commercial email. The act establishes the following as criminal behaviors when used in connection with foreign or interstate electronic mail:

? Knowingly accessing a protected computer without authorization

? Intentionally deceiving or misleading the origin of messages

? Falsifying header information

? Falsifying registration information for 5 or more e-mail accounts or 2 or more domain names

? Falsely representing one's self as the registrant of 5 or more IP addresses

? Obtaining e-mail addresses through improper means

? Perpetrating fraud, identity theft, child pornography, obscenity and the sexual exploitation of children.

Criminal penalties include a fine and/or imprisonment for up to 5 years dependent upon:

? The volume of electronic transmissions

? The amount of falsified information

? Losses incurred by others

? Monetary gains from the act

? Whether the act was committed in furtherance of an felony

? Prior offenses.

Civil penalties are dependent upon the jurisdiction placing the charges and may range from hundreds of dollars to millions of dollars, dependent upon the severity of the crimes and losses involved. Also, property traceable to proceeds from monetary gains and equipment used to commit an offense may be forfeited to the US government.

As critics of the law argue, the legislation fails to dictate to marketers and advertisers, not to spam. In fact, the act does not make reference to the term, "spam", except as used in the name, CAN-SPAM. The act makes reference to the phrase, commercial electronic mail message, and defines it to be "any electronic mail message, the primary purpose of which is the commercial advertisement or promotion of a commercial product or service (including content on an Internet website operated for a commercial purpose)".

Legislation is intended to curb practices inherent in spamming, such as e-mail harvesting, dictionary attacks and using viruses and Trojans to perpetrate messages. The act establishes the following with respect to commercial electronic mail messages:

? A message must contain a legitimate return address.

? A message must include and specify a method to opt-out of receiving further messages. The ability to opt-out must be available for 30 days.

? The sender may not initiate messages after 10 days of receipt of an opt-out.

? The sender may not sell, lease, exchange or transfer the opt-out e-mail address to an affiliate.

? The sender may offer a menu of options that allow the recipient to either opt-out or opt-in to future messages*.

? A message must include an identifier that specifies the message as an advertisement or solicitation.

? Messages containing sexually oriented material must contain clearly identifiable markings or notices

? A message must include a valid, physical, postal address by which the sender may be contacted.

? The sender may not send messages to addresses that were knowingly acquired from proprietary websites and ISPs, through automated methods. Particularly, when the site or ISP provides notice of their refusal to give, sell or transfer addresses for the purpose of initiating electronic mail messages.

? The sender may not create automated scripting and other means to gain multiple email addresses for the purpose of transmitting illegal messages.

? The sender may not transmit messages from a computer or email address obtained without authorization.

*Unlike opt-out advertising, which allows the recipients of advertisement to discontinue any unwanted advertisements from the sender, opt-in advertising allows the advertiser to request to have specific advertisement sent. The recipient may allow or deny permission to have further advertisement sent. If allowed, the advertiser immediately includes that e-mail address to its distribution list. Another option is, double opt-in advertising, which is similar to opt-in advertising except that once the recipient grants permission to send advertisements, a confirmation request is sent to the recipient to verify that they did, indeed, allow the permission. The e-mail address is added to the distribution list only after the recipient has positively responded to the confirmation request.

CAN-SPAM is not intended to provide cause for the general public to sue spammers, individually or in class action suits. It is designed to allow enforcement by the FTC and other federal agencies for the benefit of the general public. Individuals remain privy to the state laws and regulations of their particular jurisdictions.

Matt Bacak became "#1 Best Selling Author" in just a few short hours. Recent Entrepreneur Magazine's e-Biz radio show host is turning Authors, Speakers, and Experts into Overnight Success Stories. Discover The Secrets To Unleash The Powerful Promoter In You! Sign up for Matt Bacak's Promoting Tips Ezine ($100 value) just visit his website at http://www.powerfulpromoter.com or http://www.powerfulpromoter.com

limousine Ackley .. Lockport Chicago limo O’Hare
In The News:

A virtual private network can help ensure your information remains security and your privacy remains intact. Kurt the CyberGuy explains.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Artificial intelligence-based cameras are giving air defense operators unprecedented capabilities in monitoring and protecting airspace.
Apple's iOS 18.1 Inactivity Reboot automatically reboots your iPhone if it hasn't been used or unlocked for more than three days, providing better data protection.
An inventor designed rooftop solar panels for a Tesla that draws solar energy while the car is parked, adding travel mileage without plugging in.
There are currently no laws governing what artificial intelligence can and cannot do with the information it gathers; here are 10 things to avoid telling AI chatbots to keep yourself safe.
A credit union with over 240,000 members recently revealed it was targeted by cybercriminals, resulting in a data breach that was part of a two-month attack by hackers.
Scammers have become skilled at creating convincing fake websites that can easily fool unsuspecting users. The CyberGuy offers tips to protect yourself.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
CAPTCHAs, which are used by websites to confirm whether users are people or bots, are harmless, but hackers are using them to infect PCs with malware.
Hackers recently leaked personal information of about 500,000 Americans and stole patient medical records that included lab results and insurance details.
The holiday season sees a rise in mobile shopping scams. Tech expert Kurt “CyberGuy" Knutsson helps you learn how to stay safe.
Tech expert Kurt “CyberGuy" Knutsson says a VPN enhances online banking security by encrypting data and protecting privacy.
Beware of these six sneaky holiday scams. Tech expert Kurt “CyberGuy" Knutsson gives you tips to avoid falling victim.
Tech expert Kurt “CyberGuy" Knutsson reveals how to securely back up and factory reset your Android to protect your privacy and data.
Artificial intelligence is making life easier for cybercriminals, allowing them to create elaborate scams to trick people. Kurt the Cyberguy explains how to protect yourself.
Cut through all the digital clutter and delete multiple emails from your Android simultaneously. Kurt the CyberGuy explains how it's done.
Tips to prevent your holiday decorations from being stolen
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Kurt "CyberGuy" Knutsson lays out the immediate steps you should take if your phone has been hacked and your personal information becomes vulnerable.
Fraudsters are sending people bogus invoices through PayPal as part of a sneaky scam that is going around; here's how to protect yourself from being fooled.
A former Colgate-Palmolive employee was shocked to discover $750,000 had been drained from her 401(k) account. "CyberGuy" offers tips on how to prevent identity theft.
Electric vehicle maker Harbinger recently showed its electric delivery truck can handle icy roads with agility and stability in winter.
To make the busiest time of year more manageable, here are some tricks for tracking your packages, taking quality family photos and curating the perfect Christmas playlist.
Kurt "CyberGuy" Knutsson explains how to keep your online Amazon gift purchases a secret from loved ones or friends this holiday season.

How Can I Stop Getting Spam?

Are you getting too much spam? We all are, but... Read More

How Spammers Fool Spam Blacklists - And How to Stop Them

Effectively stopping spam over the long-term requires much more than... Read More

Do You Know Whats in Your Trash?

A hearty welcome to all the spam fighting filters and... Read More

Are You A Spam Zombie?

Over the past few years you've all become familiar with... Read More

Get Your News Releases Through the Spam Filters in 11 Easy Steps

In today's spam-filled email world, it's sometimes VERY difficult to... Read More

Is There A National Do Not Spam List?

You may have already received a do not spam list... Read More

How to Write a Privacy Policy

A Privacy Policy can be defined as the policy under... Read More

Internet Tip of the Week: Outsourcing

It's no secret that the US economy has slowed down,... Read More

Kill The Messenger (Service)

You are familiar with the software applications that you run... Read More

Spasms & Spamocidal Mania

Below is a letter I wrote to the following organizations:S.H.U.... Read More

Your Dolphin E-mail Caught In Spam Tuna Net?

Let me ask a couple of questions:If (potential) customers sends... Read More

Evict the Spammers from Your Inbox

Block Spam and Other Email Threats From Entering Your Gateway... Read More

How Spammers Fool Whitelists - And How to Stop Them

Effectively stopping spam over the long-term requires much more than... Read More

Spammer Stole My Email Address?

Do you get bounced, or rejected emails sent by someone... Read More

Im Guilty Until Proven Innocent

No doubt about it."Spam" (unsolicited commercial email) threatens to paralyze... Read More

Pst... Pass It On... I Found Out Its a Hoax

When you receive an email telling you about a virus,... Read More

The 4 Ws of Junk E-mail

Junk e-mail or spam has become the scourge of the... Read More

The Definition of Spam

Spam can bring down your website faster than a speeding... Read More

The Anti Spam Challenge ? Minimizing False Positives

Email is the quintessential business communication tool, so when it... Read More

Stop Intrusive Pop-up Ads and Regain Control of Your Online Experience!

Stop intrusive pop-up ads and regain control of your online... Read More

Why Your ISP Takes Bribes From Spammers

The lifeblood of the spammer is email. They need to... Read More

Getting Back To Basics.

While we all agree that there`s way too much spamming/junk-mailing... Read More

Internet Tip of the Week: Information Overload

We receive so much information on the Internet, especially via... Read More

Stop Spam! New Spam Blockers

News last week that Internet service provider Verizon settled its... Read More

SPAM: A Nutrious Food or a Waste of Time?

Unless the filters on your computer are really good, you're... Read More

shuttle from O'Hare Alexander ..