Feeds

CAN-SPAM means we can spam

'No effect' on junk mail

  • alert
  • submit to reddit

Top 5 reasons to deploy VMware with Tegile

A miniscule proportion of unsolicited commercial email complies with US Federal anti-spam laws introduced this month, according to a survey published yesterday.

Email security firm MX Logic found that of a random sample of over 1,000 unsolicited commercial emails received during the first week this year only THREE of the messages complied with the CAN-SPAM Act. The CAN-SPAM (Controlling the Assault of Non-Solicited Pornography and Marketing) Act went into effect on January 1.

"Calling this a high rate of non-compliance would be a gross understatement," said Scott Chasin, MX Logic’s chief technology officer. "It is no surprise that rogue spammers would fail to comply, but the non-compliant messages we saw appeared to be from all types of companies.

“There appears to be an unstated, unofficial grace period for companies to comply, but if this high level of illegal spam continues, I think it will be interesting to see how enforcement of the new legislation will unfold."

MX Logic notes that companies have had little time to digest the new law, signed onto the statute book by President Bush on December 16, let alone bring their marketing practices in line with the new legislation. That's a more forgiving line than other critics such as anti-spam group Spamhaus which argues that the US laws will make the spam problem even worse.

The CAN-SPAM Act set up an opt-out regime for the regulation of commercial email. The Act contains the following provisions:

  • Permissions for certain forms of unsolicited commercial email as long as it is clearly marked as an advertisement and allows consumers to unsubscribe from future unsolicited commercial email from the sender.
  • Prohibition of sending commercial email containing sexually oriented material unless labelled as such.
  • The Outlawing of the use of false email headers or the use of a mail server or open relay to deceive recipients about the origin of a commercial email message.
  • Allows the FTC, state attorneys general and Internet providers (but not the public) to sue companies who violate the law.
  • Provision for the establishment by the FTC of a "Do-Not-SPAM" registry.

    More than fifty per cent of Internet email is spam creating problems of lost productivity, communication bandwidth consumption, increased storage costs, IT resource drain and increased corporate liability.

    Legislation needs to be supplemented with robust technology, industry cooperation and consumer education if the spam tsunami is to be stopped, the MX says. ®

    Related Stories

    Spammers not deterred by Can Spam Act
    US anti-spam laws 'will legalise spam'
    UK anti-spam law goes live
    UK Govt fouls up anti-spam plans, say experts
    Microsoft aims to 'shift the tide' in war on spam
    The economics of spam

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.