Feeds

CAN-SPAM means we can spam

'No effect' on junk mail

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

A miniscule proportion of unsolicited commercial email complies with US Federal anti-spam laws introduced this month, according to a survey published yesterday.

Email security firm MX Logic found that of a random sample of over 1,000 unsolicited commercial emails received during the first week this year only THREE of the messages complied with the CAN-SPAM Act. The CAN-SPAM (Controlling the Assault of Non-Solicited Pornography and Marketing) Act went into effect on January 1.

"Calling this a high rate of non-compliance would be a gross understatement," said Scott Chasin, MX Logic’s chief technology officer. "It is no surprise that rogue spammers would fail to comply, but the non-compliant messages we saw appeared to be from all types of companies.

“There appears to be an unstated, unofficial grace period for companies to comply, but if this high level of illegal spam continues, I think it will be interesting to see how enforcement of the new legislation will unfold."

MX Logic notes that companies have had little time to digest the new law, signed onto the statute book by President Bush on December 16, let alone bring their marketing practices in line with the new legislation. That's a more forgiving line than other critics such as anti-spam group Spamhaus which argues that the US laws will make the spam problem even worse.

The CAN-SPAM Act set up an opt-out regime for the regulation of commercial email. The Act contains the following provisions:

  • Permissions for certain forms of unsolicited commercial email as long as it is clearly marked as an advertisement and allows consumers to unsubscribe from future unsolicited commercial email from the sender.
  • Prohibition of sending commercial email containing sexually oriented material unless labelled as such.
  • The Outlawing of the use of false email headers or the use of a mail server or open relay to deceive recipients about the origin of a commercial email message.
  • Allows the FTC, state attorneys general and Internet providers (but not the public) to sue companies who violate the law.
  • Provision for the establishment by the FTC of a "Do-Not-SPAM" registry.

    More than fifty per cent of Internet email is spam creating problems of lost productivity, communication bandwidth consumption, increased storage costs, IT resource drain and increased corporate liability.

    Legislation needs to be supplemented with robust technology, industry cooperation and consumer education if the spam tsunami is to be stopped, the MX says. ®

    Related Stories

    Spammers not deterred by Can Spam Act
    US anti-spam laws 'will legalise spam'
    UK anti-spam law goes live
    UK Govt fouls up anti-spam plans, say experts
    Microsoft aims to 'shift the tide' in war on spam
    The economics of spam

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
China hacked US Army transport orgs TWENTY TIMES in ONE YEAR
FBI et al knew of nine hacks - but didn't tell TRANSCOM
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.