Industry Canada ic.gc.ca

Size: px
Start display at page:

Download "Industry Canada ic.gc.ca"

Transcription

1 Industry Canada ic.gc.ca Questions and Answers Bill C-28: Canada's Anti-Spam Legislation What is spam? Spam can be defined as any electronic commercial message sent without the express or implied consent of the recipient(s). Spam is also used as the vehicle for the delivery of other online threats such as spyware, phishing and malware. What is the intent of the legislation? The intent of the legislation is to deter the most damaging and deceptive forms of spam from occurring in Canada, creating a more secure online environment. It does this by addressing the sending of spam, the undesired installation of spyware and malware on the computers of businesses and individuals, and the alteration of transmission data. The bill also extends the provisions of the Competition Act concerning false and misleading marketing to electronic messages, and restricts the scope of certain exceptions under the Personal Information Protection and Electronic Documents Act. Spam is a nuisance, but how is it harmful? Spam includes more than unsolicited commercial messages. It has become the vehicle for a wide range of threats to online commerce affecting individuals, businesses and network providers. For individuals, spam can lead to the theft of personal data to rob bank and credit card accounts (identity theft); online fraud luring individuals to counterfeit websites (phishing); the collection of personal information through illicit access to computer systems (spyware); and false or misleading representations in the online marketplace. Businesses are victimized by the counterfeiting of business websites to defraud individuals and businesses (spoofing). Recognizing that spam represents nearly 90 percent of worldwide traffic, network providers are forced to invest ever-increasing resources to prevent spam from entering their networks. Once established, spam slows networks down, and spam-borne viruses and other malicious software (malware) are used to operate networks of "zombie" computers

2 (botnets) without their owners' knowledge. These network attacks threaten the stability of the Internet and online services as well as the confidence of Canadians to participate in the digital economy by conducting commerce online. Can you expand on the threats that the bill addresses? While spam is harmful in itself, it has become the primary vehicle for the delivery of other online threats, such as spyware, malware and phishing. Spyware is software that collects information about a user and/or modifies the operation of a user's computer without the user's knowledge or consent. Malware is a general term for all forms of harmful and malicious content, especially hostile software such as viruses, worms and Trojan horses. Phishing involves impersonating a trusted person or organization in order to steal someone's personal information, generally for the purpose of identity theft. Collectively, these online threats disrupt online commerce and reduce business and consumer confidence in the online marketplace, congest networks, impose heavy costs on network operators and users, threaten network reliability and security, and undermine personal privacy. What can individuals and businesses do to protect themselves against spam and related online threats? Education and awareness are key to ensuring that individuals and businesses are taking the right steps in proactively combating spam. Network security programs, spam filters and anti-virus software are also helpful in this regard. To serve Canadians, this legislation will provide for a national coordinating body, which will coordinate public education and awareness efforts and lead policy oversight and coordination. This initiative will also facilitate the establishment of a non-government agency, a spam reporting centre, which will receive reports of spam and related threats, allowing it to collect evidence and gather intelligence to assist the three enforcement agencies (the Canadian Radio-television and Telecommunications Commission, Competition Bureau Canada and the Office of the Privacy Commissioner) with investigations. The spam reporting centre will track and analyze statistics and trends in spam and other related online threats. How long will it take before Canadians can expect to see a real difference in the amount of spam received? Based on the experience of other countries with similar legislation, noticeable results are expected to occur quickly. The year after Australia passed similar legislation in 2004, it dropped out of the world's top 10 spam originating countries. Will the new legislation eliminate spam in Canada? If not, by how much will it be reduced? While it is not expected that the new legislation will eliminate spam altogether, businesses and consumers will see a reduction in the amount of spam received. The intent of the law is to deter the most damaging and deceptive forms of spam from occurring in Canada and help drive spammers out of Canada. Has anti-spam legislation been effective in other countries?

3 Several of Canada's global partners, such as Australia, the U.K. and the U.S., have passed strong domestic laws to combat spam and related online threats. After the Australian Spam Act came into effect, the proportion of global spam originating from Australia was greatly reduced. Some major spammers, particularly pornographic spammers, closed their Australian operations altogether. I am a legitimate business owner who uses bulk to reach my customers. How will I be affected by these new anti-spam measures? Legitimate businesses that use to market their products to Canadians should not be negatively impacted by this legislation. The consent regime is based on existing marketplace best practices and uses a consumer opt-in approach, which stipulates that businesses must get express consent or implied consent prior to sending commercial electronic messages. Apart from express consent, consent to receive commercial messages is implied: a. where an existing business relationship exists with a customer or client, or b. the electronic messages are relevant to the recipient's business, role, function or duties, and the electronic address has been conspicuously published or disclosed, without a statement that the person does not wish to receive unsolicited commercial electronic messages. What about text messages or "cellphone spam"? Is it covered? Yes. The legislation takes a technology-neutral approach, so that all forms of commercial electronic messages can be treated the same way. That means that unsolicited text messages, or cellphone spam, is addressed. What if I buy lists? How will I be affected by these measures? The Act does not prohibit the legitimate collection and compiling of lists of addresses, provided the activity follows the rules regarding consent in the legislation and other principles that apply within federal and provincial privacy laws. Federal privacy legislation, the Personal Information Protection and Electronic Documents Act (PIPEDA), sets out the rules for the collection, use and disclosure of such personal information, and these continue to apply under the new Act. Under PIPEDA, an organization may not collect personal information without the knowledge or consent of an individual unless the information is publicly available (according to regulations). In addition, the organization must state the purpose of the collection of that information. Are there exceptions, as with the National Do Not Call List (DNCL), for political parties and charities? The legislation does not apply to non-commercial activity. Political parties and charities that engage Canadians through are not subject to the legislation if these communications do not involve selling or promoting a product. There are also further exemptions for situations where such organizations engage in commercial activities with people who have made a donation or gift in the last 24 months, volunteered or performed volunteer work in the last 24 months, or were a member of the organization in the last 24 months. These exceptions apply to registered charities, political parties and candidates in federal, provincial, territorial or municipal elections.

4 If you are raising funds for charitable or other non-profit purposes, you must ensure that your messages are truthful and accurate in order to avoid potential concerns under the Competition Act. Why is there a transitional or "grandfather" clause for existing business relationships in effect prior to the Act coming into force? The government understands that some small businesses and not-for-profit organizations do not have the technological sophistication to automate their lists, for example. This clause gives these entities a 36-month transition period, so they are not caught off-guard by the legislation. Why is the government not exempting surveys and market research? Those doing surveys and market research are not affected by the legislation as long as they are not trying to sell something, so the electronic message is not considered to be a commercial message. The government is concerned that an explicit exemption for surveys and marketing research would easily be abused. What purpose is served by the clause governing product updates? This clause was included to allow for automatic updates and program upgrades to be installed without requiring the installer of the computer program to seek express consent for each subsequent installation. This would allow for daily or weekly updates to anti-virus, anti-spam and other computer programs as long as they fall within the original express consent that was given when the program was initially purchased or installed. What impact will this legislation have on self-governing professions? Self-regulating industries should not be affected by the legislation if they are not trying to sell something, since their electronic messages would not be considered as commercial messages. If a self-governing profession wishes to contact its clients or members regarding a commercial matter, it is not unreasonable for them to get express consent from their membership in advance. Once that consent is obtained, it remains valid until it is explicitly withdrawn. How does this bill address the collection of personal information by accessing a computer system or by causing a computer system to be accessed without authorization? The bill includes an amendment to PIPEDA that will enhance privacy protections in some circumstances. PIPEDA generally requires knowledge and consent for the collection and use of personal information. PIPEDA includes a list of exemptions from this requirement in certain circumstances, including where the information is publicly available, for journalistic purposes, or the purposes of private investigations. In these circumstances, it is not necessary under PIPEDA to get consent for the collection of personal information, regardless of whether access to the computer system holding that personal information was otherwise legal or illegal. The legislation includes an amendment that will make these exemptions unavailable when a computer system is accessed in contravention of an Act of Parliament in order to collect personal information. To enforce this protection against collection without consent, the legislation attaches a private right of action to such privacy violations.

5 In Bill C 27, tabled in the last session of Parliament, this provision applied where access to a computer system was "without authorization". Industry associations raised concerns with the uncertainty of this language, pointing out that, as drafted, persons could post a "Terms of Use" page on a website stating that the collection of information from that site was "unauthorized" under PIPEDA. To address these concerns, the provision now applies where access to a computer system is "in contravention of an Act of Parliament." This clarifies the intended scope of the provision, addresses the uncertainty that concerned industry associations, and yet elevates privacy protections to levels consistent with the intent and purpose of the legislation. What other amendments have been made? A number of technical and coordinating amendments were made to ensure the smooth functioning of the legislation. These amendments will ensure effective coordination with other Acts of Parliament.

Canada s New Anti-Spam Legislation: Overview and Implications for Businesses

Canada s New Anti-Spam Legislation: Overview and Implications for Businesses dentons.com Focus on Communications Canada s New Anti-Spam Legislation: Overview and Implications for Businesses January, 2011 Contact Margot Patterson Dentons Canada LLP Counsel, Ottawa margot.patterson@dentons.com

More information

Miller Thomson Legal Alert on Canada s Upcoming Anti-Spam Legislation. Canada s Anti-Spam Legislation (CASL) Are You Ready?

Miller Thomson Legal Alert on Canada s Upcoming Anti-Spam Legislation. Canada s Anti-Spam Legislation (CASL) Are You Ready? Miller Thomson Legal Alert on Canada s Upcoming Anti-Spam Legislation Canada s Anti-Spam Legislation (CASL) Are You Ready? 2 No One Falls For These Scams, Do They? Nigerian 419 scam lead to Australians

More information

Crawford Chondon &Partners LLP. Is your Business Ready for Canada s Anti Spam Law?

Crawford Chondon &Partners LLP. Is your Business Ready for Canada s Anti Spam Law? Crawford Chondon &Partners LLP Present Is your Business Ready for Canada s Anti Spam Law? By: Michael MacLellan Overview 1. What is Canada s Anti-Spam Legislation, and how will it apply? 2. What does CASL

More information

AN OVERVIEW OF CANADA S ANTI-SPAM LEGISLATION

AN OVERVIEW OF CANADA S ANTI-SPAM LEGISLATION AN OVERVIEW OF CANADA S ANTI-SPAM LEGISLATION These materials are provided for general information only and do not constitute legal advice. Readers are encouraged to seek legal advice for any particular

More information

Draft WGIG Issues Paper on Spam

Draft WGIG Issues Paper on Spam Draft WGIG Issues Paper on Spam 1. Issue Spam directly engages a very wide range of stakeholders that includes individual consumers, all organizations of whatever size in the private and public sectors

More information

Canada Anti-Spam Legislation: Obligations and Opportunity. Presenters: Matthew Wansink Chris Bakker

Canada Anti-Spam Legislation: Obligations and Opportunity. Presenters: Matthew Wansink Chris Bakker Canada Anti-Spam Legislation: Obligations and Opportunity Presenters: Matthew Wansink Chris Bakker Agenda Introduction CASL Overview CASL Nuts and Bolts CASL What is compliance? Building your business

More information

OHA BACKGROUNDER Canada s Anti-Spam Legislation (CASL)

OHA BACKGROUNDER Canada s Anti-Spam Legislation (CASL) OHA BACKGROUNDER Canada s Anti-Spam Legislation (CASL) May 2014 In December 2010, the federal government passed Bill C-28, the Fighting Internet and Wireless Spam bill, referred to as Canada s Anti-Spam

More information

Guidance on Canada s Anti-Spam Legislation (CASL) for REALTOR Members

Guidance on Canada s Anti-Spam Legislation (CASL) for REALTOR Members Guidance on Canada s Anti-Spam Legislation (CASL) for REALTOR Members Introduction This resource has been developed by The Canadian Real Estate Association (CREA) as a service to REALTOR members to make

More information

Privacy Law in Canada

Privacy Law in Canada Privacy Law in Canada Federal and provincial privacy legislation has a profound impact on the way virtually all organizations carry on business across the country. Canada s privacy laws, while likely the

More information

@@@@@@@@@@@@@@@@@@ STOPPING SPAM CREATING A STRONGER, SAFER INTERNET

@@@@@@@@@@@@@@@@@@ STOPPING SPAM CREATING A STRONGER, SAFER INTERNET SPAM @@ STOPPING @@ CREATING A STRONGER, SAFER @@ INTERNET Report of the Task Force on Spam May 2005 @ @ @ SPAM @@ STOPPING @@ CREATING A STRONGER, SAFER @@ INTERNET Report of the Task Force on Spam May

More information

Managing the message Canada s new anti-spam law sets a high bar

Managing the message Canada s new anti-spam law sets a high bar Managing the message Canada s new anti-spam law sets a high bar According to a recent Deloitte poll, only 13% of organizations say they understand CASL requirements and have begun to apply them to their

More information

ACCEPTABLE USE AND TAKEDOWN POLICY

ACCEPTABLE USE AND TAKEDOWN POLICY ACCEPTABLE USE AND TAKEDOWN POLICY This Acceptable Use and Takedown Policy ( Acceptable Use Policy ) of Wedding TLD2, LLC (the Registry ), is to be read together with the Registration Agreement and words

More information

SPAM AND PRIVACY ISSUES. Spam for Breakfast, Lunch and Dinner: What will the Unsolicited Electronic Messages Bill do for Privacy?

SPAM AND PRIVACY ISSUES. Spam for Breakfast, Lunch and Dinner: What will the Unsolicited Electronic Messages Bill do for Privacy? SPAM AND PRIVACY ISSUES Spam for Breakfast, Lunch and Dinner: What will the Unsolicited Electronic Messages Bill do for Privacy? 30 March 2006 Graeme Crombie Senior Associate Minter Ellison Rudd Watts

More information

An Anti-Spam Action Plan for Canada. Industry Canada

An Anti-Spam Action Plan for Canada. Industry Canada An Anti-Spam Action Plan for Canada Industry Canada May 2004 The Problem An Anti-Spam Action Plan for Canada In just a few years, unsolicited commercial e-mail -- now generally known as spam 1 -- has gone

More information

Doing Business. A Practical Guide. casselsbrock.com. Canada. Dispute Resolution. Foreign Investment. Aboriginal. Securities and Corporate Finance

Doing Business. A Practical Guide. casselsbrock.com. Canada. Dispute Resolution. Foreign Investment. Aboriginal. Securities and Corporate Finance About Canada Dispute Resolution Forms of Business Organization Aboriginal Law Competition Law Real Estate Securities and Corporate Finance Foreign Investment Public- Private Partnerships Restructuring

More information

THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA

THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA Communications and Information Technology Commission THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA Final Version 23/02/2008 Submitted to: Submitted By: Acceptance of Deliverable

More information

Voter Contact Registry

Voter Contact Registry Voter Contact Registry How to contact Canadians the right way This Guidebook is for general information only. You should always seek independent legal advice for any specific problem or issue. Respecting

More information

A SIMPLIFIED EXPLANATION OF CANADA S NEW LAW ON SPAM

A SIMPLIFIED EXPLANATION OF CANADA S NEW LAW ON SPAM A SIMPLIFIED EXPLANATION OF CANADA S NEW LAW ON SPAM IED WEB MARKETING DEVRY SMITH FRANK LLP CANADA S NEW LAW ON SPAM Businesses and governments have been making significant strides in their never-ending

More information

Willem Wiechers 3 rd March 2015

Willem Wiechers 3 rd March 2015 Willem Wiechers 3 rd March 2015 1 Why do we want Malware & Virus Protection? To make our computers save Wish to keep our data private Wish to have a safe environment to do our online banking, shopping,

More information

TERMS OF SERVICE TELEPORT REQUEST RECEIVERS

TERMS OF SERVICE TELEPORT REQUEST RECEIVERS TERMS OF SERVICE These terms of service and the documents referred to in them ( Terms ) govern your access to and use of our services, including our website teleportapp.co ( our site ), applications, buttons,

More information

Anti-SPAM Policy v.3 06-01-2011

Anti-SPAM Policy v.3 06-01-2011 Anti-SPAM Policy v.3 06-01-2011 Each user must agree to this policy. comf5 has a no tolerance policy for the sending of spam and unsolicited email, and we prohibit the use of third-party, purchased, rented,

More information

Public Consultation On Draft Resolution to Issue Anti-SPAM Regulations

Public Consultation On Draft Resolution to Issue Anti-SPAM Regulations Public Consultation On Draft Resolution to Issue Anti-SPAM Regulations Contents Chapter One Introduction Chapter Two Consultation Process Chapter Three Key Principles for Anti-SPAM Draft Regulations Chapter

More information

Recurrent Patterns Detection Technology. White Paper

Recurrent Patterns Detection Technology. White Paper SeCure your Network Recurrent Patterns Detection Technology White Paper January, 2007 Powered by RPD Technology Network Based Protection against Email-Borne Threats Spam, Phishing and email-borne Malware

More information

Anti-Spam Toolkit February 2014

Anti-Spam Toolkit February 2014 Anti-Spam Toolkit February 2014 Table of Contents Introduction 1 Sending Commercial Electronic Messages 4 Obtaining Consents 12 Message Formalities 15 Updating Messaging Systems 17 Transitional Provisions

More information

Privacy Law in Canada

Privacy Law in Canada by PATRICIA WILSON & MICHAEL FEKETE Protection of personal information remains at the forefront of public policy debate in. Federal and provincial privacy legislation has a profound impact on the way virtually

More information

Preparing for Canada s Anti-Spam Legislation (CASL)

Preparing for Canada s Anti-Spam Legislation (CASL) Preparing for Canada s Anti-Spam Legislation (CASL) Sylvia Kingsmill, Senior Manager, Deloitte Financial Executives International June 18, 2014 Discussion items 1. Introducing CASL: background 2. Understanding

More information

CASL Canada s Anti-Spam Law. Webinar One - Consent

CASL Canada s Anti-Spam Law. Webinar One - Consent CASL Canada s Anti-Spam Law Webinar One - Consent 1 Disclaimer The information included in this presentation may not reflect the views of Industry Canada, or the Canadian Radio-television and Telecommunications

More information

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...

More information

THE PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT (PIPEDA) PERSONAL INFORMATION POLICY & PROCEDURE HANDBOOK

THE PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT (PIPEDA) PERSONAL INFORMATION POLICY & PROCEDURE HANDBOOK THE PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT (PIPEDA) PERSONAL INFORMATION POLICY & PROCEDURE HANDBOOK REVISED August 2004 PERSONAL INFORMATION POLICY & PROCEDURE HANDBOOK Introduction

More information

Cablelynx Acceptable Use Policy

Cablelynx Acceptable Use Policy Cablelynx provides a variety of Internet Services (the Services) to both residential and business customers (the Customer). Below, you will find the terms and conditions that you agree to by subscribing

More information

DISCUSSION PAPER LEGISLATING AGAINST SPAM

DISCUSSION PAPER LEGISLATING AGAINST SPAM DISCUSSION PAPER LEGISLATING AGAINST SPAM IT & Telecommunications Policy Group Resources and Networks Branch Ministry of Economic Development WELLINGTON ISBN 0-478-26373-2 May 2004 Contents Minister s

More information

Privacy, Data Collection and Information Management Practice Team November 13, 2003

Privacy, Data Collection and Information Management Practice Team November 13, 2003 Overview of Current Anti-Spam Regulations Privacy, Data Collection and Information Management Practice Team The proliferation of unsolicited commercial e-mail, more commonly known as spam, has prompted

More information

Abused Internet Domain Registration Analysis for Calculating Risk and Mitigating Malicious Activity

Abused Internet Domain Registration Analysis for Calculating Risk and Mitigating Malicious Activity 2012 Abused Internet Domain Registration Analysis for Calculating Risk and Mitigating Malicious Activity KnujOn.com LLC Brief Version 2/18/2012 Promising Research KnujOn.com LLC is proud to release this

More information

Protecting your business from spam

Protecting your business from spam Protecting your business from spam What is spam? Spam is the common term for electronic junk mail unwanted messages sent to a person s email account or mobile phone. Spam messages vary: some simply promote

More information

The DMA s Analysis of Can Spam Act of 2003

The DMA s Analysis of Can Spam Act of 2003 The DMA s Analysis of Can Spam Act of 2003 December 11, 2003 The following is a Direct Marketing Association analysis of the Can Spam Act of 2003 (S. 877), which Congress sent to the President for signing

More information

AXIS12 DRUPAL IN A BOX ON THE CLOUD

AXIS12 DRUPAL IN A BOX ON THE CLOUD SERVICE LEVEL AGREEMENT AXIS12 DRUPAL IN A BOX ON THE CLOUD version 1.0 Page 1 of 6 This Axis12 Drupal in a box on the cloud Service Level Agreement ( SLA ) is a policy governing the use of the Axis12

More information

Top tips for improved network security

Top tips for improved network security Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a

More information

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012 Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History

More information

FLORIDA A&M UNIVERSITY BOARD OF TRUSTEES NOTICE OF PROPOSED AMENDED REGULATION

FLORIDA A&M UNIVERSITY BOARD OF TRUSTEES NOTICE OF PROPOSED AMENDED REGULATION FLORIDA A&M UNIVERSITY BOARD OF TRUSTEES NOTICE OF PROPOSED AMENDED REGULATION DATE: June 10, 2015 REGULATION CHAPTER NO.: Chapter 5 REGULATION CHAPTER TITLE: Miscellaneous REGULATION TITLE AND NUMBER:

More information

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

Acceptable Use and Publishing Policy

Acceptable Use and Publishing Policy 1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy

More information

Is There Such a Thing as Internet Privacy?

Is There Such a Thing as Internet Privacy? Is There Such a Thing as Internet Privacy? April 13, 2015 Danielle Graff & Kristél Kriel Western Canada s Law Firm Click Agenda to edit Master title style What is Internet Privacy? Why does it matter?

More information

Email Marketing Workshop

Email Marketing Workshop Email Marketing Workshop Part V Deliverability, Compliance & Trust Agenda Getting To The Inbox Protecting Your Brand Email Laws & Regulations 1 Laurence Rothman Nationwide Senior Consultant, Brand Reputation

More information

PRIVACY, ANTI-SPAM AND YOUR BUSINESS: WHERE DO WE STAND? Presented by: Cameron Mitchell B.A., LL.B.

PRIVACY, ANTI-SPAM AND YOUR BUSINESS: WHERE DO WE STAND? Presented by: Cameron Mitchell B.A., LL.B. PRIVACY, ANTI-SPAM AND YOUR BUSINESS: WHERE DO WE STAND? Presented by: Cameron Mitchell B.A., LL.B. Privacy The focus of my presentation will be on two thing that have made marketing and contacting clients

More information

Evaluating the Perceptions of People towards Online Security

Evaluating the Perceptions of People towards Online Security Section 2 Information Systems Security & Web Technologies and Security Evaluating the Perceptions of People towards Online Security Abstract N.K.Jayakumar and A.D.Phippen Network Research Group, University

More information

Ipswitch IMail Server with Integrated Technology

Ipswitch IMail Server with Integrated Technology Ipswitch IMail Server with Integrated Technology As spammers grow in their cleverness, their means of inundating your life with spam continues to grow very ingeniously. The majority of spam messages these

More information

1. General Rules & Regulations

1. General Rules & Regulations cosmeticsurgerycounselling.com is owned and operated by Cosmeticsupport.com, operating as a private agency. This information archive and support site is therefore governed under the laws of UK, the EU.!

More information

COMMENTARY. Hong Kong Strengthens Its Personal Data. on Direct Marketing JONES DAY

COMMENTARY. Hong Kong Strengthens Its Personal Data. on Direct Marketing JONES DAY May 2013 JONES DAY COMMENTARY Hong Kong Strengthens Its Personal Data Privacy Laws and Imposes Criminal Penalties on Direct Marketing In 2012 Hong Kong introduced the Personal Data (Privacy) (Amendment)

More information

FMGateway by FMWebschool

FMGateway by FMWebschool FMGateway by FMWebschool Hosting Service Agreement 1. OVERVIEW This Hosting Service Agreement (this Agreement ) is entered into by and between FMWebschool, LLC, a/an Delaware limited liability company

More information

Acceptable Use (Anti-Abuse) Policy

Acceptable Use (Anti-Abuse) Policy Acceptable Use (Anti-Abuse) Policy This document describes the Acceptable Use Policy for the Rightside registry. Copyright 2014 Rightside Registry Copyright 2014 Rightside Domains Europe Ltd. Rightside

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive

More information

Acceptable Usage Policy

Acceptable Usage Policy Contents 1. INTRODUCTION... 2 2. PURPOSE... 2 3. APPLICATION... 2 4. YOUR OBLIGATIONS AND PROHIBITED USE... 2 5. SPAM... 3 6. EXCESSIVE USE... 3 7. SECURITY... 4 8. COPYRIGHT... 4 9. CONTENT... 4 10. REGULARTORY

More information

Mass Marketing Fraud Affecting Canadian Businesses 2015-10-30

Mass Marketing Fraud Affecting Canadian Businesses 2015-10-30 Mass Marketing Fraud Affecting Canadian Businesses 2015-10-30 About The CAFC The Canadian Anti-Fraud Centre (CAFC) is an international call centre specializing in central sourcing complaints on mass marketing

More information

DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise

DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How

More information

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft) 1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction

More information

FKCC AUP/LOCAL AUTHORITY

FKCC AUP/LOCAL AUTHORITY FKCC AUP/LOCAL AUTHORITY The information contained in this section has its basis in Public Law 93.380. It is further enhanced however, by Florida State Board of Education Administrative Rule 6A-14.51 and

More information

LETABA WIRELESS INTERNET CC ACCEPTABLE USE POLICY

LETABA WIRELESS INTERNET CC ACCEPTABLE USE POLICY LETABA WIRELESS INTERNET CC ACCEPTABLE USE POLICY 1. Introduction LETABA WIRELESS INTERNET CC is committed to complying with legislation and ensuring that all its customers have the ability to use its

More information

Service Monitoring Discrimination. Prohibited Uses and Activities Spamming Intellectual Property Violations 5

Service Monitoring Discrimination. Prohibited Uses and Activities Spamming Intellectual Property Violations 5 WIN reserves the right to prioritize traffic based on real time and non-real time applications during heavy congestion periods, based on generally accepted technical measures. WIN sets speed thresholds

More information

Broadband Acceptable Use Policy

Broadband Acceptable Use Policy Broadband Acceptable Use Policy Contents General... 3 Your Responsibilities... 3 Use of Email with particular regards to SPAM... 4 Bulk Email... 5 Denial of Service... 5 Administration of Policy... 6 2

More information

Appendix I. The City University of New York Policy on Acceptable Use of Computer Resources

Appendix I. The City University of New York Policy on Acceptable Use of Computer Resources Appendix I The City University of New York Policy on Acceptable Use of Computer Resources Introduction CUNY s computer resources are dedicated to the support of the university s mission of education, research

More information

TelecityGroup IP Services. Acceptable Use Policy

TelecityGroup IP Services. Acceptable Use Policy TelecityGroup IP Services Acceptable Use Policy Document Control Any updates or modifications to this document should be made in this copy of the document and summarised here. The Security Officer will

More information

BBB Wise Giving Alliance & The International Committee of Fundraising Organizations Advancing Trust in the Charitable Sector Federal Trade

BBB Wise Giving Alliance & The International Committee of Fundraising Organizations Advancing Trust in the Charitable Sector Federal Trade BBB Wise Giving Alliance & The International Committee of Fundraising Organizations Advancing Trust in the Charitable Sector Federal Trade Commission, Bureau of Consumer Protection Allison M. Lefrak, Attorney,

More information

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500 INFO 1500 9. Information Assurance and Security, Protecting Information Resources 11. ecommerce and ebusiness Janeela Maraj Tutorial 9 21/11/2014 9. Information Assurance and Security, Protecting Information

More information

Sample Employee Network and Internet Usage and Monitoring Policy

Sample Employee Network and Internet Usage and Monitoring Policy CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members

More information

You must be at least 18 years of age to use our website. By using our website you warrant and represent that you are at least 18 years of age.

You must be at least 18 years of age to use our website. By using our website you warrant and represent that you are at least 18 years of age. TERMS AND CONDITIONS Terms of Website Use 1 Introduction These terms and conditions govern your use of the One Counselling (also referred to in these Terms & Conditions as us, we and our ), website; by

More information

Responsible Use of Technology and Information Resources

Responsible Use of Technology and Information Resources Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni

More information

Acceptable Use Policy Revision date: 26/08/2013

Acceptable Use Policy Revision date: 26/08/2013 Acceptable Use Policy Revision date: 26/08/2013 Acceptable usage Policy for all Services As a provider of web site hosting and other Internet-related services, Corgi Tech Limited offers its customer (also

More information

T-CY Guidance Note #4 Identity theft and phishing in relation to fraud

T-CY Guidance Note #4 Identity theft and phishing in relation to fraud www.coe.int/tcy Strasbourg, 5 June 2013 T-CY (2013)8E Rev Cybercrime Convention Committee (T-CY) T-CY Guidance Note #4 Identity theft and phishing in relation to fraud Adopted by the 9 th Plenary of the

More information

DEPARTMENT OF COMMUNITY AND GOVERNMENT SERVICES (CGS) ACCEPTABLE EMAIL & INTERNET USAGE POLICY POLICY STATEMENT

DEPARTMENT OF COMMUNITY AND GOVERNMENT SERVICES (CGS) ACCEPTABLE EMAIL & INTERNET USAGE POLICY POLICY STATEMENT POLICY STATEMENT The purpose of this Policy is to establish the rules of acceptable use of Government of Nunavut networks and Internet services including E-mail, web-browsing, remote access, file transfer,

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

Acceptable Usage Policy

Acceptable Usage Policy Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...

More information

Acceptable Use Policy of UNWIRED Ltd.

Acceptable Use Policy of UNWIRED Ltd. Acceptable Use Policy of UNWIRED Ltd. Acceptance of Terms Through Use This site provides you the ability to learn about UNWIRED and its products and services as well as the ability to access our network

More information

AN INTRO TO. Privacy Laws. An introductory guide to Canadian Privacy Laws and how to be in compliance. Laura Brown

AN INTRO TO. Privacy Laws. An introductory guide to Canadian Privacy Laws and how to be in compliance. Laura Brown AN INTRO TO Privacy Laws An introductory guide to Canadian Privacy Laws and how to be in compliance Laura Brown Air Interactive Media Senior DMS Advisor A Publication of 1 TABLE OF CONTENTS Introduction

More information

Your Content refers to the information that you wish to transfer using our Services.

Your Content refers to the information that you wish to transfer using our Services. Philips Secure Data Transfer Terms of Service th Revised: May 10, 2012 Thank you for using Philips Secure Data Transfer. These terms of service (the Terms ) govern your access to and use of Philips Secure

More information

Virgin Media Business Acceptable Use Policy (Internet)

Virgin Media Business Acceptable Use Policy (Internet) Virgin Media Business Acceptable Use Policy (Internet) 1 Introduction 1.1 This Acceptable Use Policy ( AUP ) specifies actions prohibited by Virgin Media Business to users of the Internet Services (in

More information

Terms and conditions of use

Terms and conditions of use Terms and conditions of use 1. Introduction 1.1 These terms and conditions govern your use of our website. 1.2 By using our website, you accept these terms and conditions in full; accordingly, if you disagree

More information

Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY. Commercial-in-Confidence. Issue Number 1.5, 20 November 2012

Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY. Commercial-in-Confidence. Issue Number 1.5, 20 November 2012 Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY Commercial-in-Confidence Issue Number 1.5, 20 November 2012 ACCEPTABLE USE POLICY The following is the Telstra Wholesale Acceptable Use

More information

OLYMPIC COLLEGE POLICY

OLYMPIC COLLEGE POLICY TITLE: Acceptable Use Policy POLICY NUMBER: OCP 200-17 REFERENCE: RCW 42.52.160, RCW 42.52.180, RCW 42.17, WAC 292-110-010, http://isb.wa.gov/policies/security.aspx, http://www.governor.wa.gov/execorders/archive.asp,

More information

Kingdom of Saudi Arabia Communication and Information Technology Commission. Public Consultation Document On the Anti-SPAM Policy Framework

Kingdom of Saudi Arabia Communication and Information Technology Commission. Public Consultation Document On the Anti-SPAM Policy Framework Kingdom of Saudi Arabia Communication and Information Technology Commission Public Consultation Document On the Anti-SPAM Policy Framework Rajab 1428 H (July 2007) 1. Introduction SPAM 1 represents a major

More information

Email Security Guide

Email Security Guide Email Security Guide Introduction No organization can afford to operate without an email security strategy. The risk landscape is constantly changing with new threats surfacing every day. This white paper

More information

SINGAPORE TELECOMMUNICATIONS LIMITED SUBMISSION TO IDA AND AGC ON PROPOSED LEGISLATIVE FRAMEWORK FOR THE CONTROL OF SPAM

SINGAPORE TELECOMMUNICATIONS LIMITED SUBMISSION TO IDA AND AGC ON PROPOSED LEGISLATIVE FRAMEWORK FOR THE CONTROL OF  SPAM SINGAPORE TELECOMMUNICATIONS LIMITED SUBMISSION TO IDA AND AGC ON PROPOSED LEGISLATIVE FRAMEWORK FOR THE CONTROL OF E-MAIL SPAM 1. STATEMENT OF INTEREST 1.1 1.2 1.3 SingTel is licensed to provide telecommunications

More information

CITRUS COMMUNITY COLLEGE DISTRICT GENERAL INSTITUTION ELECTRONIC MAIL AND BULK ELECTRONIC DISTRIBUTION

CITRUS COMMUNITY COLLEGE DISTRICT GENERAL INSTITUTION ELECTRONIC MAIL AND BULK ELECTRONIC DISTRIBUTION CITRUS COMMUNITY COLLEGE DISTRICT GENERAL INSTITUTION AP 3723 ELECTRONIC MAIL AND BULK ELECTRONIC DISTRIBUTION 1.0 Purpose Citrus Community College District electronic mail (email) services support the

More information

AAUW Site-Resources Website Services Agreement. Contact Information. Website Information

AAUW Site-Resources Website Services Agreement. Contact Information. Website Information AAUW Site-Resources Website Services Agreement Branch / State / Affiliated Entity Name: Member Number: Phone Number: Email Address: Contact Information Website Information We will maintain our own website

More information

Introduction The Case Study Technical Background The Underground Economy The Economic Model Discussion

Introduction The Case Study Technical Background The Underground Economy The Economic Model Discussion Internet Security Seminar 2013 Introduction The Case Study Technical Background The Underground Economy The Economic Model Discussion An overview of the paper In-depth analysis of fake Antivirus companies

More information

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 All contents are Copyright 1992 2012 Cisco Systems, Inc. All rights reserved. This document

More information

region16.net Acceptable Use Policy ( AUP )

region16.net Acceptable Use Policy ( AUP ) region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply

More information

ACCEPTABLE USAGE PLOICY

ACCEPTABLE USAGE PLOICY ACCEPTABLE USAGE PLOICY Business Terms - February 2012 ACCEPTABLE USAGE POLICY Business Terms Version February 2012 Acceptable Usage Policy Feb12.Docx 1 Contents 1. INTRODUCTION... 3 2. PURPOSE... 3 3.

More information

www.yourchoicecounselling.co.uk (the "Website") is provided by Your Choice Counselling.

www.yourchoicecounselling.co.uk (the Website) is provided by Your Choice Counselling. Your Choice Counselling. Website Legal Notice Important - this is a legal agreement between you and Your Choice Counselling. Registered office: 2 Seaford Close, Burseldon, Southampton, Hampshire SO31 8GL

More information

How To Understand The Terms Of The Agreement Between Wilkes And Its Customers

How To Understand The Terms Of The Agreement Between Wilkes And Its Customers Wilkes Telecommunications ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES Wilkes Telecommunications ( Wilkes ) has adopted this Acceptable Use Policy ( AUP ) to outline the acceptable use of Wilkes

More information

By writing to: Cougar Wireless, Attention: Customer Service, 4526 S. Regal St., Suite A, Spokane, WA., 99224

By writing to: Cougar Wireless, Attention: Customer Service, 4526 S. Regal St., Suite A, Spokane, WA., 99224 COUGAR WIRELESS ACCEPTABLE USE POLICY I. INTRODUCTION Cougar Wireless and its various affiliates and subsidiaries (collectively we, us, our ) are committed to being responsible network citizens. To assist

More information

STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES

STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES Star has adopted this Acceptable Use Policy ( AUP ) to outline the acceptable use of Star s Broadband Internet

More information

Brief to the House of Commons Standing Committee on Access to Information, Privacy and Ethics on the subject of Identity Theft

Brief to the House of Commons Standing Committee on Access to Information, Privacy and Ethics on the subject of Identity Theft Canadian Internet Policy and Public Interest Clinic Clinique d intérêt public et de politique d internet du Canada Brief to the House of Commons Standing Committee on Access to Information, Privacy and

More information

Terms of Use. Please Read Carefully Before Using This Website and Provided Services and Products:

Terms of Use. Please Read Carefully Before Using This Website and Provided Services and Products: Terms of Use Please Read Carefully Before Using This Website and Provided Services and Products: Pilvi Computing Incorporated ( Pilvi Computing ) maintains this site for information and communication purposes,

More information

Internet basics 2.3 Protecting your computer

Internet basics 2.3 Protecting your computer Basics Use this document with the glossary Beginner s guide to Internet basics 2.3 Protecting your computer How can I protect my computer? This activity will show you how to protect your computer from

More information

Canada s New Anti-Spam Regime: Guidance for Your Organization

Canada s New Anti-Spam Regime: Guidance for Your Organization Canada s New Anti-Spam Regime: Practical Compliance Tips and Guidance for Your Organization Eloïse Gratton, Partner Janine MacNeil, Partner February 6, 2014 Overview 1) Introduction 2) CASL Requirements

More information

Consultation Paper on Legislative Proposals to Contain the Problem of Unsolicited Electronic Messages

Consultation Paper on Legislative Proposals to Contain the Problem of Unsolicited Electronic Messages Consultation Paper on Legislative Proposals to Contain the Problem of Unsolicited Electronic Messages Commerce, Industry and Technology Bureau January 2006 Contents Page Foreword 3 Executive Summary 4

More information

APPROPRIATE USE OF DIGITAL COMMUNICATIONS AND TECHNOLOGIES POLICY

APPROPRIATE USE OF DIGITAL COMMUNICATIONS AND TECHNOLOGIES POLICY REGISTER OF POLICIES, PROCEDURES AND BY-LAWS APPROPRIATE USE OF DIGITAL COMMUNICATIONS AND TECHNOLOGIES POLICY Code: Policy 2.11 Date of Coming into Force: June 27, 2011 Number of Pages: 6 Origin: Education/

More information

CREATIVE OPPORTUNITIES WEBSITE TERMS OF USE RECRUITERS

CREATIVE OPPORTUNITIES WEBSITE TERMS OF USE RECRUITERS CREATIVE OPPORTUNITIES WEBSITE TERMS OF USE RECRUITERS These terms and conditions ("Terms") apply to you if you use of the Website (as defined below) as an Employer or Recruiter (as defined below) If you

More information

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers

More information

Department of Communications. Enhancing Online Safety for Children Discussion Paper. Submission by the Australian Federal Police

Department of Communications. Enhancing Online Safety for Children Discussion Paper. Submission by the Australian Federal Police Department of Communications Enhancing Online Safety for Children Discussion Paper Submission by the Australian Federal Police March 2014 1 Introduction The AFP welcomes the opportunity to make a submission

More information