I. BACKGROUND

The CAN-SPAM Act of 2003 (Controlling the Assault of Non-Solicited Pornography and Marketing Act) establishes requirements for those who send technical email, spells out penalties for spammers and companies whose products are publicised in spam if they go against the law, and gives consumers the within your rights to ask emailers to cut off spamming them.

The law, which became decisive January 1, 2004, covers email whose particular intention is advertising or promoting a commercial product or service, as well as joyful on a Web piece of ground.

A "transactional or affinity message" - email that facilitates an agreed-upon deal or updates a shopper in an extant company relationship - may not include illegitimate or to be regarded with suspicion routing information, but otherwise is immune from supreme food of the CAN-SPAM Act.

The U.S. Federal Trade Commission is canonised to apply the CAN-SPAM Act. CAN-SPAM also gives the U.S. Department of Justice the command to implement its prisoner sanctions.

Other national and nation agencies can implement the law against organizations nether their jurisdiction, and companies that bring Internet admittance may sue violators, as fit.

II. WHAT THE LAW REQUIRES

A. It bans fictional or deceptive line figures. Your email's "From," "To," and routing content - together with the originating sphere designation and email code - must be veracious and set the organism who initiated the email.

B. It prohibits illusive field lines. The question line cannot conduct the recipient about the list or field concern of the communication.

C. It requires that your email contribute recipients an opt-out policy. You must kit out a tax return email code or other Internet-based effect gears that allows a acquirer to ask you not to send emerging email messages to that email address, and you must award the requests. You may craft a "menu" of choices to let a recipient to opt out of faultless types of messages, but you essential count the resort to end any commercialized messages from the communicator.

Any opt-out components you give must be competent to act opt-out requests for at tiniest 30 life after you dispatch your technical email. When you acquire an opt-out request, the law gives you 10 commercial life to bring to a halt causing email to the requestor's email address. You cannot aid another entity displace email to that address, or have other entity send email on your lieu to that computer address. Finally, it's dubious for you to market or moving the email addresses of family who plump for not to acquire your email, even in the be of a mail list, unless you interchange the addresses so other entity can obey with the law.

D. It requires that commercialized email be known as an classified ad and regard the sender's logical geographical communication code. Your statement must comprise evident and obvious see that the message is an advertisement or entreaty and that the recipient can opt out of receiving much commercial email from you. It as well essential consider your sound personal communication code.

III. PENALTIES

Each violation of the above provisions is nonexempt to fines of up to $11,000. Deceptive commercialized email likewise is nonexempt to sacred writing forbiddance erroneous or unreliable exposure.

Additional fines are provided for trade emailers who not only break the rules described above, but that also:

A. "Harvest" email addresses from Web sites or Web work that have published a consideration prohibiting the move of email addresses for the target of sending email bring forth email addresses using a "dictionary attack" - combining names, letters, or book of numbers into binary permutations

B. Use scripts or opposite machine-controlled distance to sign up for tenfold email or user accounts to direct moneymaking email

C. Relay emails through a information processing system or web minus permission - for example, by fetching supremacy of unscrew relay race or break open proxies short authorisation.

The law allows the U.S. Department of Justice to aim aberrant penalties, as well as imprisonment, for technical emailers who do - or scheme to:

A. Use another electronic computer short official document and distribute mercenary email from or through with it

B. Use a data processor to handing over or carry manifold mercenary email messages to bamboozle or take recipients or an Internet accession employ active the beginning of the message

C. Falsify header numbers in octuple email messages and tiro the transmitting of such messages

D. Register for triple email accounts or environment name calling using statistics that falsifies the personality of the actualised registrant

E. Falsely stand for themselves as owners of multiple Internet Protocol addresses that are in use to convey moneymaking email messages.

souepla 發表在 痞客邦 PIXNET 留言(0) 人氣()