Important legal matters concerning the introduction of sender authentication at the receiving side by an ISP

Size: px
Start display at page:

Download "Important legal matters concerning the introduction of sender authentication at the receiving side by an ISP"

Transcription

1 Important legal matters concerning the introduction of sender authentication at the receiving side by an ISP Telecommunications Consumer Policy Division, Telecommunications Bureau, Ministry of Internal Affairs and Communications

2 Filtering process by means of sender authentication technology ISP s mail server (receiving side) Sender Authenticating sender s domain Inserting the result of the authen- -tication in the mail Filtering according to the results of the authenti- -cation Mail server (sending side) Receiver 1

3 Points at issue The legal definition of sender authentication Sender authentication technologies, both DKIM and SPF, are legally interpreted as checking a sender s domain for mail receipt and taking certain measures despite technical differences. We now need to examine, in terms of the Telecommunication Business Law, whether there is a problem with an action by which a mail server administrator mechanically authenticates the sender s domain for mail receipt and inserts the results of authentication contrary to the will of the person concerned with communication for the purpose of filtering (hereinafter referred to in this report as domain authenticating and result inserting ). More specifically, the points at issue are whether domain authenticating and result inserting corresponds to a violation of the secrecy of communications stipulated in article 4 of the law, and whether domain authenticating and result inserting corresponds to unfair discrimination in providing telecommunications services stipulated in article 6 of the law. 2

4 What constitutes a violation of communications secrecy? Telecommunication Business Law Article 4. (Protection of Secrecy) (1) The secrecy of communications being handled by a telecommunications carrier shall not be violated. 1.What constitutes secrecy of communications? Secrecy of communications consists of not only 1) the content of individual communications, but also 2) components of individual communications such as where the persons concerned with communications live, who they are, when they communicated, where they communicated. The sender s domain for each mail is a communicative channel for information and then, it falls within the individual communications category and has to be protected as part of the secrecy of communications. 2.What constitutes a violation? A violation of the secrecy of communications includes using individual communications contrary to the intention of the sender or the receiver. Again, sender authentication technologies are legally interpreted as checking a sender s domain for mail receipt and taking certain measures Undertaking domain authenticating and result inserting violates the secrecy of communications. 3

5 Assessment of whether circumstances warrant action being taken to preclude wrong-doing. (1) Point at issue Although undertaking domain authenticating and result inserting violates the secrecy of communications, it could be justified if certain factors are considered such as selfprotection, emergency actions depending on necessity, and actions committed in the pursuit of lawful business. 1) Self-protection or Emergency Action depending on necessity Sender authentication is generally undertaken to prevent mail service disruptions caused by huge amounts of mail being sent. This however does not necessarily meet the criteria for imminent formation of self-protection or urgency for formation of emergency actions depending on necessity. Generally self-protection or emergency actions depending on necessity would not be warranted. 4

6 Assessment of whether circumstances warrant action being taken to preclude wrong-doing. (2) 2) Action committed in the pursuit of lawful business Requirements for action committed in the pursuit of lawful business are (1) necessity and justification in taking such actions, and (2) validity of the measures taken. (1) Necessity and justification for domain authenticating and result inserting Considering: Almost all mails with the sender s information camouflaged are spam mails. Almost all spam mails are sent with the sender s information camouflaged. As spam mails are sent for advertising purposes, they are reasonably assumed to be sent to numerous addresses simultaneously. Then, mails with the sender s domain camouflaged are presumed to be sent to numerous addresses simultaneously. Domain authenticating and result inserting can be seen as an action to prevent such failure of the mail service as delay in mail service caused by large amounts of mail being sent, which means that the necessity and justification for domain authentication and result inserting can be accepted. 5

7 Assessment of whether circumstances warrant action being taken to preclude wrong-doing. (3) (2) Validity of means Necessary minimum violation: The component of communications violated by authenticating sender s domain is simply the channel of telecommunication, so domain authenticating and result inserting does not overstep the action required for the purpose (filtering with the result of the authentication) of achievement. Non-existence of alternative measures: Even if other anti-spam measures such as outbound port 25 blocking and S/MIME were introduced, these technologies would not necessarily be valid in preventing the transmission of mail with the sender s domain camouflaged. The validity of means can be accepted in domain authenticating and result inserting. Domain authenticating and result inserting can be judged to be an action committed in the pursuit of lawful business. (=> Circumstances precluding wrong-doing) 6

8 What constitutes unfair discrimination in providing telecommunication services Telecommunication Business Law Article 6. (Fairness in Use) Any telecommunications carrier shall not discriminate unfairly in providing telecommunications services. Is domain authenticating and result inserting equated with unfair discrimination in providing telecommunications services? Because domain authenticating and result inserting is judged to be a justified business action in relation a the violation of the secrecy of communication, it is not seen as being unfair to use. Undertaking domain authenticating and result inserting is not seen as being a violation of article 6 of the Telecommunications Business Law. 7

9 Filtering process by means of sender authentication technology ISP s mail server (receiving side) Sender Mail server (sending side) Authenticating sender s domain Inserting the result of the authen- -tication in the mail Filtering according to the results of the authenti- -cation Receive r Receiver s agreement or circumstances precluding wrong-doing Receiver s agreement is demanded 8

10 Does anti-spam filtering violate the secrecy of communications? Telecommunications Business Law Article 4. (Protection of Secrecy) (1) The secrecy of communications being handled by a telecommunications carrier shall not be violated. Is the secrecy of communications violated by carrying out filtering off received mail according to data such as sender authentication result inserted to the mail (hereinafter referred to in this report as filtering )? Filtering is an action by which the mail server administrator assesses the secrecy of certain communications due to a spam-judging standard decided in advance and takes such measures as blocking or isolating spam mails regardless of the intention of the person concerned with the communication. By carrying out filtering, the secrecy of communications is generally violated contrary to the intentions of the person concerned with the communication. Unless the receiver agrees to introduce the filtering service, undertaking filtering violates the secrecy of communications. 9

11 How ISPs should obtain the consent of users to introduce the filtering service A) Introduction of filtering service following user s application The consent of users to introduce the filtering service is given. B) Introduction of filtering service without user s application Having users abandon the advantages of secrecy of communication by a prior comprehensive agreement in an article, etc. is not permitted, because such agreement is not suitable in an article and the range of such an agreement is obscure. However, under the conditions set out below, ISPs are considered to have obtained the user s consent for the introduction of filtering service without the user s application. 1. Users are allowed to freely withdraw from the filtering service at any time. 2. Regardless of the existence of an agreement for introduction of the filtering service, other provision conditions are the same.(*1) 3. The object and the range of "the secrecy of communication" violated by the filtering service are clearly defined. 4. Ordinary people are presumed to have consented to the introduction. (Corroboration by reliable data is required. (*2)) 5. Sufficient explanation on the filtering service for users to be provided in advance. (in accordance with the important matter explanation specified in Article 26 of the Telecommunications Business Law) *1 Providing the filtering service with a reasonable charge is acceptable. *2 For example, questionnaire by random sampling of users. 10

12 Conclusion Sender authentication technology is regarded as an effective countermeasure against spam. On the contrary, undertaking sender authentication on the receiving side violates the Telecommunications Business Law, especially, secrecy of communications and prohibition of unfair discrimination in providing telecommunications services. However, considered as actions committed in the pursuit of lawful business, undertaking sender authentication on the receiving side is legally acceptable.( ) Therefore, sender authentication is recommended, and its promotion is advisable. ( ) To introduce filtering according to the results of the authentication, each user s consent is legally demanded. (See page 9, page 10.) 11

The Japanese Experience Countering Spam ITU TELECOM WORLD 2006

The Japanese Experience Countering Spam ITU TELECOM WORLD 2006 The Japanese Experience Countering Spam ITU TELECOM WORLD 2006 8th December 2006 Shuji Sakuraba Copyright 2006 Present condition of spam in Japan - I 2004 Media Sent to mobiles 66 % Sent to PCs 34 % 2005

More information

Japan s Countermeasures against Spam

Japan s Countermeasures against Spam Apr. 10, 2007 Japan s Countermeasures against Spam Hiroyo HIRAMATSU, Deputy Director, Telecommunications Consumer Policy Division, Telecommunications Bureau, Ministry of Internal Affairs and Communications,

More information

Testimony of Eric Menhart. Re: District of Columbia Spam Deterrence Act of 2007. Council of the District of Columbia

Testimony of Eric Menhart. Re: District of Columbia Spam Deterrence Act of 2007. Council of the District of Columbia Testimony of Eric Menhart Re: District of Columbia Spam Deterrence Act of 2007 Council of the District of Columbia Committee on Public Services and Consumer Affairs March 11, 2008 My name is Eric Menhart.

More information

THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA

THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA Communications and Information Technology Commission THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA Final Version 23/02/2008 Submitted to: Submitted By: Acceptance of Deliverable

More information

4 Messaging Technology

4 Messaging Technology 4 Messaging Technology Previously this was published as the Email Technical Report. From this volume we have changed the name to Messaging Technology. Messaging Technology 4.1 Introduction Messaging Technology

More information

GUIDELINES FOR THE PROVISION OF INTERNET SERVICE PUBLISHED BY THE NIGERIAN COMMUNICATIONS COMMISSION

GUIDELINES FOR THE PROVISION OF INTERNET SERVICE PUBLISHED BY THE NIGERIAN COMMUNICATIONS COMMISSION GUIDELINES FOR THE PROVISION OF INTERNET SERVICE PUBLISHED BY THE NIGERIAN COMMUNICATIONS COMMISSION These Guidelines apply to all Licensees providing Internet access services or any other Internet Protocol

More information

Emails and anti-spam Page 1

Emails and anti-spam Page 1 Emails and anti-spam Page 1 As the spammers become increasing aggressive more and more legit emails get banned as spam. When you send emails from your webcrm system, we use the webcrm servers to send emails

More information

How Do We Discourage Asia from Continuing to be a Source of Spam? 2.1 Introduction. 2.2 Spam Trends. 2. Messaging Technology

How Do We Discourage Asia from Continuing to be a Source of Spam? 2.1 Introduction. 2.2 Spam Trends. 2. Messaging Technology 2. How Do We Discourage Asia from Continuing to be a Source of Spam? In this report, we will offer our analysis of trends in the ratio of spam and regional sources of spam detected over the period between

More information

Network neutrality. Guidelines for Internet neutrality. Version 1.0 24 February 2009

Network neutrality. Guidelines for Internet neutrality. Version 1.0 24 February 2009 Network neutrality Guidelines for Internet neutrality Version 1.0 24 February 2009 The guidelines in general These network neutrality guidelines have been drawn up by the Norwegian Post and Telecommunications

More information

Anti-Spam Measures Survey 2009. Pascal Manzano ENISA

Anti-Spam Measures Survey 2009. Pascal Manzano ENISA Anti-Spam Measures Survey 2009 Pascal Manzano ENISA Do you remember what happen on June 25 th? Methodology Online questionnaire open from May until July 2009 Questionnaire used providers best practices

More information

Anti-SPAM Policy v.3 06-01-2011

Anti-SPAM Policy v.3 06-01-2011 Anti-SPAM Policy v.3 06-01-2011 Each user must agree to this policy. comf5 has a no tolerance policy for the sending of spam and unsolicited email, and we prohibit the use of third-party, purchased, rented,

More information

Virtual Private Cloud. Service Level Agreement. Terms and Abbreviations

Virtual Private Cloud. Service Level Agreement. Terms and Abbreviations Virtual Private Cloud. Service Level Agreement Terms and Abbreviations Customer's Control Panel the web page intended for managing the Services rendered by the Executor, retaining the Customer's actual

More information

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers

More information

Hosted CanIt. Roaring Penguin Software Inc. 26 April 2011

Hosted CanIt. Roaring Penguin Software Inc. 26 April 2011 Hosted CanIt Roaring Penguin Software Inc. 26 April 2011 1 1 Introduction Thank you for selecting Hosted CanIt. This document explains how Hosted CanIt works and how you should configure your network to

More information

Email Migration Project Plan for Cisco Cloud Email Security

Email Migration Project Plan for Cisco Cloud Email Security Sales Tool Email Migration Project Plan for Cisco Cloud Email Security 2014 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Conf idential. For Channel Partner use only. Not f

More information

If you contact us orally, we may require that you send us your complaint or question in writing within 10 business days.

If you contact us orally, we may require that you send us your complaint or question in writing within 10 business days. Please read the 1 st Equity Bank Online Banking Service Agreement and Disclosure. It includes disclaimers of liability and other matters of interest to users. By pressing the ''I Agree'' button, you agree

More information

region16.net Acceptable Use Policy ( AUP )

region16.net Acceptable Use Policy ( AUP ) region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply

More information

Barracuda Email Security Service User Guide

Barracuda Email Security Service User Guide Barracuda Email Security Service User Guide The Barracuda Email Security Service is a cloud-based email security service that protects both inbound and outbound email against the latest spam, viruses,

More information

MEMORANDUM. Characterisation of actions to combat spam. Analysis of responses to questionnaire

MEMORANDUM. Characterisation of actions to combat spam. Analysis of responses to questionnaire MEMORANDUM Characterisation of actions to combat spam Analysis of responses to questionnaire INDEX 1. Background to questionnaire... 3 2. Analysis of responses to questionnaire... 4 2.1 Question 1 - What

More information

Questionnaire for bulk mailers

Questionnaire for bulk mailers Questionnaire for bulk mailers for the central white list for accredited senders, Certified Senders Alliance (CSA) 2014-12-19 Page 1 of 12 Version 5.01 Please complete this form an send it to eco via fax

More information

Act on Regulation of Transmission of Specified Electronic Mail ( Act No. 26 of April 17, 2002)

Act on Regulation of Transmission of Specified Electronic Mail ( Act No. 26 of April 17, 2002) この 特 定 電 子 メールの 送 信 の 適 正 化 等 に 関 する 法 律 の 翻 訳 は 平 成 十 七 年 法 律 第 八 十 七 号 まで の 改 正 ( 平 成 18 年 5 月 1 日 施 行 )について 法 令 用 語 日 英 標 準 対 訳 辞 書 ( 平 成 18 年 3 月 版 )に 準 拠 して 作 成 したものです なお この 法 令 の 翻 訳 は 公 定 訳 ではありません

More information

Admission Criteria. Pertaining to the participation of bulk mailers in the Certified Senders Alliance (CSA) 2014-03-19 Page 1 of 9 Version 1.

Admission Criteria. Pertaining to the participation of bulk mailers in the Certified Senders Alliance (CSA) 2014-03-19 Page 1 of 9 Version 1. Admission Criteria Pertaining to the participation of bulk mailers in the Certified Senders Alliance (CSA) 2014-03-19 Page 1 of 9 Version 1.09 1 Preamble This document describes the criteria for adding

More information

China s Anti-Spam Works

China s Anti-Spam Works China s Anti-Spam Works Jingguang FU Ministry of Information Industry, China Geneva 7-9 July 2004 China s current situation of spam problem China is a serious victim of spam problem. A survey shows that

More information

Email Quick Reference. Administrator Guide

Email Quick Reference. Administrator Guide Email Quick Reference Administrator Guide Email Services Quick Reference Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Information leakage from PC by P2P file-sharing application, Phishing and Spy ware

Information leakage from PC by P2P file-sharing application, Phishing and Spy ware Information leakage from PC by P2P file-sharing application, Phishing and Spy ware Koji Muto Institute of Systems & Information Technologies/KYUSHU 2 nd Laboratory Contents Introduction P2P file-sharing

More information

Act on Promotion of Information and Communication Network Utilization and Information Protection

Act on Promotion of Information and Communication Network Utilization and Information Protection Act on Promotion of Information and Communication Network Utilization and Information Protection CHAPTER I GENERAL PROVISIONS Article 1 (Purpose) This Act s purpose is to promote the use of information

More information

Blackbaud Communication Services Overview of Email Delivery and FAQs

Blackbaud Communication Services Overview of Email Delivery and FAQs Blackbaud Communication Services Blackbaud Communication Services Overview of Email Delivery and FAQs Email Delivery through your Blackbaud Solutions Blackbaud Communication Services can send large numbers

More information

Get to the Inbox Ten Top Tips to Maximize Your Email Deliverability

Get to the Inbox Ten Top Tips to Maximize Your Email Deliverability Get to the Inbox Ten Top Tips to Maximize Your Email Deliverability Introduction It s estimated that 70%* of all email is spam - not just unwelcome promotional messages, but phishing scams, hoaxes and

More information

Overview An Evolution. Improving Trust, Confidence & Safety working together to fight the e-mail beast. Microsoft's online safety strategy

Overview An Evolution. Improving Trust, Confidence & Safety working together to fight the e-mail beast. Microsoft's online safety strategy Overview An Evolution Improving Trust, Confidence & Safety working together to fight the e-mail beast Holistic strategy Prescriptive guidance and user education, collaboration & technology Evolution of

More information

General Terms and Conditions

General Terms and Conditions Cloud Computing and Internet Services General Terms and Conditions 1 Definitions In this agreement: "The company" Triple C Cloud Computing Ltd.; "The customer" the receiver of services from the company;

More information

e-shot Unique Deliverability

e-shot Unique Deliverability e-shot Unique Deliverability Email Deliverability What is Email Deliverability? Email deliverability s aim is to maximise the number of email messages that reach the intended recipients inboxes. It is

More information

Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY. Commercial-in-Confidence. Issue Number 1.5, 20 November 2012

Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY. Commercial-in-Confidence. Issue Number 1.5, 20 November 2012 Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY Commercial-in-Confidence Issue Number 1.5, 20 November 2012 ACCEPTABLE USE POLICY The following is the Telstra Wholesale Acceptable Use

More information

Management Standards for Information Security Measures for the Central Government Computer Systems

Management Standards for Information Security Measures for the Central Government Computer Systems Management Standards for Information Security Measures for the Central Government Computer Systems April 26, 2012 Established by the Information Security Policy Council Table of Contents Chapter 1.1 General...

More information

Collateral Damage. Consequences of Spam and Virus Filtering for the E-Mail System. Peter Eisentraut 22C3. credativ GmbH.

Collateral Damage. Consequences of Spam and Virus Filtering for the E-Mail System. Peter Eisentraut 22C3. credativ GmbH. Consequences of Spam and Virus Filtering for the E-Mail System 22C3 Introduction 12 years of spam... 24 years of SMTP... Things have changed: SMTP is no longer enough. Spam filters, virus filters are part

More information

The What, Why, and How of Email Authentication

The What, Why, and How of Email Authentication The What, Why, and How of Email Authentication by Ellen Siegel: Director of Technology and Standards, Constant Contact There has been much discussion lately in the media, in blogs, and at trade conferences

More information

Mailworks Anti-Spam Policy

Mailworks Anti-Spam Policy Mailworks Anti-Spam Policy September 24, 2014 Guidelines Before adding new recipients to your contact list, you need to ensure that you have the proper permission for each and every recipient on your list.

More information

Direct Language Hub - www.dlhub.eu

Direct Language Hub - www.dlhub.eu Terms and conditions of providing services by electronic means page 1 TERMS AND CONDITIONS OF PROVIDING SERVICES BY ELECTRONIC MEANS 1 The present terms and conditions (hereinafter referred to as Terms

More information

Updates from France. Migration of the CRU federation Setting up a national anti-spam service. 4 th December 2008 1

Updates from France. Migration of the CRU federation Setting up a national anti-spam service. 4 th December 2008 1 Updates from France Migration of the CRU federation Setting up a national anti-spam service 4 th December 2008 1 Migration of the CRU federation The CRU federation Running since January 2006 Successful

More information

UNMIK REGULATION NO. 2003/37 ON THE PROMULGATION OF THE LAW ON POSTAL SERVICES ADOPTED BY THE ASSEMBLY OF KOSOVO

UNMIK REGULATION NO. 2003/37 ON THE PROMULGATION OF THE LAW ON POSTAL SERVICES ADOPTED BY THE ASSEMBLY OF KOSOVO UNITED NATIONS United Nations Interim Administration Mission in Kosovo UNMIK NATIONS UNIES Mission d Administration Intérimaire des Nations Unies au Kosovo UNMIK/REG/2003/37 17 December 2003 REGULATION

More information

GENERAL TERMS AND CONDITIONS FOR SERVICES OF VERSION 1.0

GENERAL TERMS AND CONDITIONS FOR SERVICES OF VERSION 1.0 GENERAL TERMS AND CONDITIONS FOR SERVICES OF SWITCH, WERDSTRASSE 2, 8021 ZURICH VERSION 1.0 These General Terms and Conditions replace the previous General User Regulations for the Services of SWITCH of

More information

The DMA s Analysis of Can Spam Act of 2003

The DMA s Analysis of Can Spam Act of 2003 The DMA s Analysis of Can Spam Act of 2003 December 11, 2003 The following is a Direct Marketing Association analysis of the Can Spam Act of 2003 (S. 877), which Congress sent to the President for signing

More information

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers

More information

Guide to Pro Spam Remove

Guide to Pro Spam Remove Guide to Pro Spam Remove 1) SUMMARY 2) BASIC INSTRUCTIONS 3) CONFIGURATION 4) FILTER 5) E-MAIL ARCHIVE 6) FINAL NOTES 1) SUMMARY Pro Spam Remove is a software product that locks out all the spam received

More information

Messaging Service (SMS) Terms and Conditions

Messaging Service (SMS) Terms and Conditions Messaging Service (SMS) Terms and Conditions This document provides the Terms and Conditions for the bestbet Messaging Service (SMS) (hereafter, the "Service"). By using the Service in any way, you are

More information

to hide away details from prying eyes. Pretty Good Privacy (PGP) utilizes many

to hide away details from prying eyes. Pretty Good Privacy (PGP) utilizes many In the world of secure email, there are many options from which to choose from to hide away details from prying eyes. Pretty Good Privacy (PGP) utilizes many cryptographical concepts to achieve a supposedly

More information

ELECTRONIC COMMERCE AND ELECTRONIC SIGNATURE ACT (ZEPEP-UPB1) (Official consolidated text)

ELECTRONIC COMMERCE AND ELECTRONIC SIGNATURE ACT (ZEPEP-UPB1) (Official consolidated text) ELECTRONIC COMMERCE AND ELECTRONIC SIGNATURE ACT (ZEPEP-UPB1) (Official consolidated text) On basis of article 153 of the National Assembly of Slovenia Rules of Procedure the National Assembly of the Republic

More information

SESA Securing Email with Cisco Email Security Appliance Parts 1 and 2

SESA Securing Email with Cisco Email Security Appliance Parts 1 and 2 Course Overview Securing Email with Cisco Email Security Appliance (SESA) combines Parts 1 and 2 (SESA1, SESA2) into a single three day course. Students learn to use Cisco Email Security Appliances (ESA's)

More information

Seamless ICT Infrastructure Security.

Seamless ICT Infrastructure Security. Seamless ICT Infrastructure Security. Integrated solutions from a single source. Effective protection requires comprehensive measures. Global networking has practically removed all borders in the exchange

More information

Visendo Email Suite a reliable solution for SMBs

Visendo Email Suite a reliable solution for SMBs Visendo Email Suite a reliable solution for SMBs Visendo offers a range of Email solutions to assist companies in meeting complex e-mail requirements Visendo Security for Email Servers Multi-engine spam

More information

1st June 2005. Internet Access Service Provider (IASP) Sub-Code for the Communications and Multimedia Industry Malaysia

1st June 2005. Internet Access Service Provider (IASP) Sub-Code for the Communications and Multimedia Industry Malaysia 1st June 2005 for the Communications and Multimedia Industry Malaysia TABLE OF CONTENTS PART 1 - INTRODUCTION...2 PART 2- GENERAL RULES OF THE CODE FOR INTERNET ACCESS SERVICE PROVIDERS...6 PART 3- REVIEW

More information

DMA s E-Mail Authentication Requirement: FAQs and Best Practices

DMA s E-Mail Authentication Requirement: FAQs and Best Practices DMA s E-Mail Authentication Requirement: FAQs and Best Practices DMA s Board of Directors approved a new guideline for ethical marketing practices in October 2005, with the new member requirement going

More information

SonicWALL Email Security Quick Start Guide. Version 4.6

SonicWALL Email Security Quick Start Guide. Version 4.6 SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more

More information

How to complete and submit an expert application

How to complete and submit an expert application How to complete and submit an expert application General information All applications must be completed and submitted online. The application form can only be completed in English, French or German. When

More information

OHA BACKGROUNDER Canada s Anti-Spam Legislation (CASL)

OHA BACKGROUNDER Canada s Anti-Spam Legislation (CASL) OHA BACKGROUNDER Canada s Anti-Spam Legislation (CASL) May 2014 In December 2010, the federal government passed Bill C-28, the Fighting Internet and Wireless Spam bill, referred to as Canada s Anti-Spam

More information

Intercept Anti-Spam Quick Start Guide

Intercept Anti-Spam Quick Start Guide Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5

More information

PRINCIPLES OF CORPORATE GOVERNANCE FOR SUPERVISED INSTITUTIONS

PRINCIPLES OF CORPORATE GOVERNANCE FOR SUPERVISED INSTITUTIONS PRINCIPLES OF CORPORATE GOVERNANCE FOR SUPERVISED INSTITUTIONS Content of principles I. ORGANISATION AND ORGANISATIONAL STRUCTURE 1. 1 The organisation of a supervised institution should enable meeting

More information

Protecting your business from spam

Protecting your business from spam Protecting your business from spam What is spam? Spam is the common term for electronic junk mail unwanted messages sent to a person s email account or mobile phone. Spam messages vary: some simply promote

More information

Service Schedule for BT Business Lite Web Hosting and Business Email Lite powered by Microsoft Office 365

Service Schedule for BT Business Lite Web Hosting and Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION 1.1 The Service enables the Customer to: set up a web site(s); create a sub-domain name associated with the web site; create email addresses. 1.2 The email element of the Service

More information

This English translation of the Act on Regulation of the Transmission of Specified

This English translation of the Act on Regulation of the Transmission of Specified This English translation of the Act on Regulation of the Transmission of Specified Electronic Mail ( Act No. 26 of April 17, 2002) has been prepared in compliance with the Standard Bilingual Dictionary

More information

Service Protection Under The Provider's Acceptable Use Policy

Service Protection Under The Provider's Acceptable Use Policy Acceptable Use Policy As a provider of Internet access, Internet email, web site hosting, and other Internet related services, Pottawatomie Telephone Company and MBO.net herein after referred to as "the

More information

Anti Spam Best Practices

Anti Spam Best Practices 39 Anti Spam Best Practices Anti Spam Engine: Time-Tested Scanning An IceWarp White Paper October 2008 www.icewarp.com 40 Background The proliferation of spam will increase. That is a fact. Secure Computing

More information

Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam e-mail.

Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam e-mail. Collax Spam Filter Howto This howto describes the configuration of the spam filter on a Collax server. Requirements Collax Business Server Collax Groupware Suite Collax Security Gateway Collax Platform

More information

Terms and Conditions of CREDIT SUISSE (LUXEMBOURG) S.A. for CREDIT SUISSE MasterCard Credit Cards

Terms and Conditions of CREDIT SUISSE (LUXEMBOURG) S.A. for CREDIT SUISSE MasterCard Credit Cards Terms and Conditions of CREDIT SUISSE (LUXEMBOURG) S.A. for CREDIT SUISSE MasterCard Credit Cards These Terms and Conditions for the use of CREDIT SUISSE MasterCard Credit Cards ("GTCMC") govern the legal

More information

RULES OF THE ALTERNATIVE DOMAIN NAME DISPUTE RESOLUTION PROCEDURE FOR.SI TOP-LEVEL DOMAINS (ARDS Rules)

RULES OF THE ALTERNATIVE DOMAIN NAME DISPUTE RESOLUTION PROCEDURE FOR.SI TOP-LEVEL DOMAINS (ARDS Rules) RULES OF THE ALTERNATIVE DOMAIN NAME DISPUTE RESOLUTION PROCEDURE FOR.SI TOP-LEVEL DOMAINS (ARDS Rules) Preamble Version 1.1 1. The ARDS Rules form part of the General terms and conditions for registration

More information

DoSPOT (Free Internet Connection Service) - Terms of Use

DoSPOT (Free Internet Connection Service) - Terms of Use DoSPOT (Free Internet Connection Service) - Terms of Use (Purpose) Article 1 The DoSPOT Terms of Use (hereinafter referred to as the "Rules") define the conditions of use that apply to users of DoSPOT

More information

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection

More information

Deliverability Counts

Deliverability Counts Deliverability Counts 10 Factors That Impact Email Deliverability Deliverability Counts 2015 Harland Clarke Digital www.hcdigital.com 1 20% of legitimate commercial email is not being delivered to inboxes.

More information

Implementing Regulations under the Benelux Convention on Intellectual Property (Trademarks and Designs) *

Implementing Regulations under the Benelux Convention on Intellectual Property (Trademarks and Designs) * Implementing Regulations under the Benelux Convention on Intellectual Property (Trademarks and Designs) * The Executive Board of the Benelux Trademark Office and the Executive Board of the Benelux Designs

More information

Anti-Phishing Best Practices for ISPs and Mailbox Providers

Anti-Phishing Best Practices for ISPs and Mailbox Providers Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 2.01, June 2015 A document jointly produced by the Messaging, Malware and Mobile Anti-Abuse Working Group (M 3 AAWG) and the Anti-Phishing

More information

SPAM, VIRUSES AND PHISHING, OH MY! Michael Starks, CISSP, CISA ISSA Fellow 10/08/2015

SPAM, VIRUSES AND PHISHING, OH MY! Michael Starks, CISSP, CISA ISSA Fellow 10/08/2015 SPAM, VIRUSES AND PHISHING, OH MY! Michael Starks, CISSP, CISA ISSA Fellow 10/08/2015 The Usual Players Indebtedness for driving on toll road Transaction receipts Notice to appear Major and Emerging Trends

More information

THE CROATIAN PARLIAMENT. Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby issue the DECISION

THE CROATIAN PARLIAMENT. Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby issue the DECISION THE CROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby issue the 2729 DECISION ON PROMULGATING THE SECURITY VETTING ACT I hereby promulgate the Security

More information

Evaluation of Anti-spam Method Combining Bayesian Filtering and Strong Challenge and Response

Evaluation of Anti-spam Method Combining Bayesian Filtering and Strong Challenge and Response Evaluation of Anti-spam Method Combining Bayesian Filtering and Strong Challenge and Response Abstract Manabu IWANAGA, Toshihiro TABATA, and Kouichi SAKURAI Kyushu University Graduate School of Information

More information

Email AntiSpam. Administrator Guide and Spam Manager Deployment Guide

Email AntiSpam. Administrator Guide and Spam Manager Deployment Guide Email AntiSpam Administrator Guide and Spam Manager Deployment Guide AntiSpam Administration and Spam Manager Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec

More information

How to set up a multifunction device or application to send email using Office 365

How to set up a multifunction device or application to send email using Office 365 How to set up a multifunction device or application to send email using Office 365 Exchange Online 232 out of 424 rated this helpful Applies to: Exchange Online Topic Last Modified: 2015 10 14 You can

More information

Microsoft Exchange 2003

Microsoft Exchange 2003 Microsoft Exchange 2003 Configuration Guide Microsoft Exchange 2003 Configuration Guide Page 1 Table of Contents Introduction... 2 Document and naming conventions... 2 Outbound email protection... 3 SMTP

More information

An Email Delivery Report for 2012: Yahoo, Gmail, Hotmail & AOL

An Email Delivery Report for 2012: Yahoo, Gmail, Hotmail & AOL EmailDirect is an email marketing solution provider (ESP) which serves hundreds of today s top online marketers by providing all the functionality and expertise required to send and track effective email

More information

SUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003

SUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003 SUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003 On December 16, 2003, President Bush signed into law the CAN-SPAM Act of 2003. CAN-SPAM stands for "Controlling the Assault of Non-Solicited Pornography

More information

NC General Statutes - Chapter 66 Article 42 1

NC General Statutes - Chapter 66 Article 42 1 Article 42. State Franchise for Cable Television Service. 66-350. Definitions. The following definitions apply in this Article: (1) Cable service. - Defined in G.S. 105-164.3. (2) Cable system. - Defined

More information

English Translation of SecurityGateway for Exchange/SMTP Servers

English Translation of SecurityGateway for Exchange/SMTP Servers Testing: Alt N Technologies SecurityGateway by Sandra Lucifora Administrators spend a considerable amount of their time on the job on eliminating unwanted messages. Viruses, Phishing, and Spoofing pose

More information

Collax Mail Server. Howto. This howto describes the setup of a Collax server as mail server.

Collax Mail Server. Howto. This howto describes the setup of a Collax server as mail server. Collax Mail Server Howto This howto describes the setup of a Collax server as mail server. Requirements Collax Business Server Collax Groupware Suite Collax Platform Server including Collax Communication

More information

Service Schedule for Business Email Lite powered by Microsoft Office 365

Service Schedule for Business Email Lite powered by Microsoft Office 365 Service Schedule for Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION Service Overview 1.1 The Service is a hosted messaging service that delivers the capabilities of Microsoft

More information

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

More information

Bulk Emailing Basics for Hilton Head Island Organizations

Bulk Emailing Basics for Hilton Head Island Organizations Bulk Emailing Basics for Hilton Head Island Organizations November 2007 Bob Rathke, Technical Director BACKGROUND: Over the past several years, e-mail spam has grown to be the single biggest problem with

More information

ABERDARE COMMUNITY SCHOOL. Email Policy. Drafted June 2014 Revised on ... (Chair of Interim Governing Body)

ABERDARE COMMUNITY SCHOOL. Email Policy. Drafted June 2014 Revised on ... (Chair of Interim Governing Body) ABERDARE COMMUNITY SCHOOL Email Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) E-MAIL POLICY Review This policy has been approved

More information

Next Generation Email Security. Jamie de Guerre Chief Technology Officer, Cloudmark Inc.

Next Generation Email Security. Jamie de Guerre Chief Technology Officer, Cloudmark Inc. Next Generation Email Security Jamie de Guerre Chief Technology Officer, Cloudmark Inc. Effective Carrier Grade Messaging Security Leadership: Key Markets: Market Strength: Market Share: Anti-Spam, Anti-Phishing,

More information

FAX-TO-EMAIL END-USER LICENSE AGREEMENT

FAX-TO-EMAIL END-USER LICENSE AGREEMENT FAX-TO-EMAIL END-USER LICENSE AGREEMENT This Agreement, which governs the terms and conditions of your use of the Fax-to-Email Services, is between you ("you" or "End-User") and ( we, us, our or Company

More information

Implementation Rules of the China Internet Network Information Center for Domain Name Registration (2012)

Implementation Rules of the China Internet Network Information Center for Domain Name Registration (2012) Article 3 The domain name systems involved in the rules shall meet the requirements of the announcement by Ministry of Industry and Information Technology on China s Internet domain name systems. Chapter

More information

DIGITAL MARKETING & COMMUNICATIONS LEGAL TERMS. The www.moethennessy.nl website (the Site ) is edited by Moët Hennessy Nederland BV

DIGITAL MARKETING & COMMUNICATIONS LEGAL TERMS. The www.moethennessy.nl website (the Site ) is edited by Moët Hennessy Nederland BV DIGITAL MARKETING & COMMUNICATIONS 1. Editor Contact LEGAL TERMS The www.moethennessy.nl website (the Site ) is edited by Moët Hennessy Nederland BV share capital: 45.378,02 registration number with Trade

More information

Email Delivery Simplified White Paper

Email Delivery Simplified White Paper Email Delivery Simplified White Paper April 28, 2005 Prepared by StrongMail Systems, Inc. 1300 Island Drive, Suite 200 Redwood Shores, CA 94065 t. (650) 421-4200 f. (650) 421-4201 info@strongmailsystems.com

More information

UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON AT SEATTLE I. INTRODUCTION

UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON AT SEATTLE I. INTRODUCTION UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON AT SEATTLE 1 1 BENNETT HASELTON, et al., Plaintiffs, v. QUICKEN LOANS, INC., et al., Defendants. Case No. C0-RSL FOR PARTIAL SUMMARY JUDGMENT

More information

Protect your brand from phishing emails by implementing DMARC 1

Protect your brand from phishing emails by implementing DMARC 1 Protect your brand from phishing emails by implementing DMARC 1 Message from the Certified Senders Alliance supported by AOL, Microsoft and Google In the following article we want to clarify why marketers

More information

Quick Heal Exchange Protection 4.0

Quick Heal Exchange Protection 4.0 Quick Heal Exchange Protection 4.0 Customizable Spam Filter. Uninterrupted Antivirus Security. Product Highlights Built-in defense keeps your business communications and sensitive information secure from

More information

Improving Email Deliverability

Improving Email Deliverability Improving Email Deliverability A focus on what happens after you hit the send button and the role of a SMTP Relay Service Provider April 2010 1 Introduction Email deliverability has become one of the hot

More information

Zubi Advertising Privacy Policy

Zubi Advertising Privacy Policy Zubi Advertising Privacy Policy This privacy policy applies to information collected by Zubi Advertising Services, Inc. ( Company, we or us ), on our Latino Emoji mobile application or via our Latino Emoji

More information

Crawford Chondon &Partners LLP. Is your Business Ready for Canada s Anti Spam Law?

Crawford Chondon &Partners LLP. Is your Business Ready for Canada s Anti Spam Law? Crawford Chondon &Partners LLP Present Is your Business Ready for Canada s Anti Spam Law? By: Michael MacLellan Overview 1. What is Canada s Anti-Spam Legislation, and how will it apply? 2. What does CASL

More information

USER GUIDE. Mailjet in webcrm

USER GUIDE. Mailjet in webcrm USER GUIDE Mailjet in webcrm Table of contents 1. Mailjet (mailjet.com); good news for high deliverability and excellent tracking... 2 2. Email On Behalf Of... 2 3. SPF records... 3 4. DKIM-feature for

More information

Services Description IBM Managed Security Services (Cloud Computing) - hosted e-mail and Web security - express managed e-mail security

Services Description IBM Managed Security Services (Cloud Computing) - hosted e-mail and Web security - express managed e-mail security IBM United Kingdom Limited Registered in England: 741598 Registered Office: PO Box 41, North Harbour, Portsmouth, PO6 3AU (hereinafter IBM ) Services Description IBM Managed Security Services (Cloud Computing)

More information

Quality Certificate for Kaspersky DDoS Prevention Software

Quality Certificate for Kaspersky DDoS Prevention Software Quality Certificate for Kaspersky DDoS Prevention Software Quality Certificate for Kaspersky DDoS Prevention Software Table of Contents Definitions 3 1. Conditions of software operability 4 2. General

More information

USAGE GUIDELINES FOR CLOUD SERVICES

USAGE GUIDELINES FOR CLOUD SERVICES USAGE GUIDELINES FOR CLOUD SERVICES These Usage Guidelines for cloud services (hereafter "Usage Guidelines") shall apply to all cloud services offered by innofield AG ("innofield"). By using our cloud

More information

Case 2:15-cv-00420-DB Document 2 Filed 06/12/15 Page 1 of 10

Case 2:15-cv-00420-DB Document 2 Filed 06/12/15 Page 1 of 10 Case 2:15-cv-00420-DB Document 2 Filed 06/12/15 Page 1 of 10 Evan A. Schmutz (3860) eschmutz@djplaw.com Jordan K. Cameron (12051) jcameron@djplaw.com DURHAM JONES & PINEGAR, P.C. 3301 N Thanksgiving Way,

More information