ISACC Task Force on Spam. Assessment of Certification

Size: px
Start display at page:

Download "ISACC-05-33203. Task Force on Spam. Assessment of Email Certification"

Transcription

1 ISACC Task Force on Spam Assessment of Certification Industry Canada May 2005

2 Executive Summary has become one of the most important tools for Internet users both at home and at the office. It has also become an important tool for companies conducting their business. is fast, reliable and easy to use. The cost of sending an is very low. All of this has lead to s popularity increasing dramatically. With the increase in the number of accounts, businesses have realized that they can communicate with many of their clients through , which lowers the costs of this communication. The popularity, ease, and low cost of , have, unfortunately, fostered the growth of spam. certification is a tool that has the potential to prevent legitimate (i.e. solicited) commercial from being filtered out by spam filters. The end user of certification is anyone who sends solicited commercial (SCE) to a recipient. The sender may be ing a marketing product, a newsletter, or any other commercial that the recipient has asked to receive. The goal is to improve the deliverability of this . This document is intended to describe the principles and methodologies of certification. Further study is required to investigate whether certification is a viable option for controlling spam on a national and international level. The development of standards in this area should be led by the groups that have vested interests in combating spam. Some concerned parties, such as marketers or commercial ers, have a vested interest in having their SCE arrive in a recipient s . Other concerned parties, such as service providers, have an interest in reducing the amount of spam complaints from their clients and reducing spam s effect on their network infrastructure. Government s role is to monitor the development of anti-spam standards, in order to ensure that the public is well represented when standards are being developed by these interested parties. The Working Group on Validating Commercial believes that certification is worthy of further study as an evolving approach to improve the deliverability of legitimate . Further investigation is required into the potential costs of a certification regime. Canadian industry will have to further investigate the various methodologies to determine which, if any, would be most suitable. Coordination with international standards-development organizations would be beneficial in the international implementation of a certification regime. This document is divided into two sections: Commercial Certification Principles and Certification Methodologies. 2

3 Commercial Certification Principles Introduction This section is intended to describe the principles of certification. It puts forward a series of broad principles that should make up the framework of any certification methodology. Study is required to determine the related feasibility and implementation issues, including costs. Understanding the Problem Because of its volume and its sometimes offensive nature, spam, also known as unsolicited commercial (UCE), has become a major problem for both Internet users and companies that provide Internet services. UCE can be anything from annoying to destructive. For individual recipients, spam can be overwhelming and, depending on the sender s intent, deceptive, fraudulent, obscene, or illegal. For those companies involved in facilitating the sending, delivery and receipt of , the costs of handling enormous quantities of unwanted are potentially crippling. If left unchallenged, spam will also continue to undermine public confidence in the reliability and value of communications and the Internet. While for commercial purposes can be highly effective and cost-efficient, some organizations are concerned about the continued efficacy of the channel because of deliverability issues. The current volume of spam is creating direct or indirect extra costs for all players in the chain of Internet communications. For this reason, a certification regime may be one option worth exploring as a way of ensuring the unimpeded delivery of legitimate . Goal of Certification As a side effect of the large volume of spam, a significant amount of SCE is being filtered out by service providers spam filters. The goal of using certification is to improve the deliverability of legitimate . Certification will provide a way by which messages can be identified as legitimate. The spam filter would recognize SCE by a certification assertion, and allow it to pass through to its intended recipient. All other would be processed as it normally would by the service provider. In this way, sender-certified would bypass the spam filtering process and have a greater likelihood of being delivered. Certification is intended to increase the deliverability of legitimate . It should not block or impede legitimate -marketing communications; it should not unduly 3

4 increase direct or indirect costs for organizations or consumers; and it should be easy to adapt to the requirements of diverse organizations and individuals. International interoperability between certification assertions would be desirable. Note that these principles only deal with certification, not authentication. Authentication is currently being discussed within other international standards bodies, such as the Internet Engineering Task Force. Basic Principles The basic principles of a certification process are as follows: 1) A certified message should be distinguishable from a non-certified message, or a message should contain a certification assertion as proof of its certification. 2) A certification assertion should affirm the legitimacy of the message, i.e. that the sender has undergone the necessary process to substantiate the message. 3) The issuer of a certification assertion should be capable of validating that the assertion is in good standing. 4) A certification assertion should be secured against fraudulent use. 5) The certificate issuer should be able to revoke a certification assertion. 4

5 Certification Methodologies Introduction The purpose of this section is to describe some of the common certification methodologies that could enable an service provider to recognize SCE and pass it on to its intended recipient, bypassing the spam filter. The methodologies described are not exhaustive, but are commonly referenced. Since the intended audience of this document is both technical and non-technical, the methodologies will be described in general and non-technical terms. Unfortunately, some individuals and enterprises have gathered addresses without users permission. s sent to these addresses are, therefore, considered unsolicited. A process called harvesting automatically collects these addresses by scanning websites for addresses. Some enterprises then sell these lists of unsolicited addresses. Because of the low cost of sending an , it has become cost-effective for enterprises to buy these lists and send to these addresses. Since the addresses on the list have not been solicited, sent to them would be UCE, commonly known as spam. service providers have started to use spam filters to block that is deemed to be UCE. This has created the problem of some legitimate SCE also being filtered out. Note that some of the following certification methodologies dealing with this problem have applications that are commercially available, while others are only theoretical. Methodologies White Lists / Black Lists This is by far the most widely used system in the certification field, although not all white lists fall into the certification category. A white list is a list of senders who only send to recipients who have requested it, but several different variations of white lists exist. The basic premise behind white lists is quite simple. A list of known legitimate senders network addresses is maintained by an service provider. When a new arrives, the sender s network address is compared to the list. If there is a match, then the is deemed legitimate. The is then rerouted to bypass the spam filter and is passed on to the intended recipient. If the check fails, then the is sent to the spam filter for further analysis. The filter then makes a determination as to the status of the , which is either rejected as spam, or accepted as legitimate and passed on to the recipient. A black list is made up of senders that are known to send UCE. Generally, from senders on these lists is blocked or rejected by the recipient s service provider. The black list is the opposite of the white list, in that it records illegitimate 5

6 senders. Known network addresses of computers that send spam are put on a black list, and sent from these addresses is usually blocked. There are several variations on these methods, including reputation systems. Reputation Systems A reputation system is a rating of a sender s ing practices. The details of what specifications are included in a reputation system depend on the particular company implementing the system. Normal rated attributes could include a history of reported UCE over a period of time, best practices implemented by the sender, and the certification or authentication practices they use. service providers maintain reputation lists made up of valid network addresses from which they have previously received s. When an service provider receives s from a new sender, it creates a reputation profile. If the service provider doesn t receive many complaints of UCE, then the sender s reputation improves and its network address is put on the white list. If complaints are received that the incoming s from the sender are spam, then the sender s reputation deteriorates. When its reputation drops below a certain level, a sender is deemed to be sending excessive amounts of UCE and is placed on the black list. Product Examples Habeas Habeas offers a white list-certification service. The certification process generally involves researching senders to ensure that they are not known to send spam, and verifying that senders are legitimate. Habeas then certifies that originating from the particular sender is not spam, and adds the sender s network address to its white list. The white list is then distributed to service providers. The sender can then add a Habeas Warrant Mark to the header of its . When an contains this Warrant Mark, the sender is warranting that this is a Habeascompliant message. The Warrant Mark also contains a haiku (poem) that is copyrighted by Habeas. As a result, if a sender puts a Habeas Warrant Mark into an that is not Habeas-compliant, then they will be subject to both copyright and trademark violations. When service providers receive an , the sender s network address is compared to the white list; if it matches, then it bypasses the spam filters and is delivered directly to its recipient. Users who believe they have received UCE can complain to their service providers, which will forward the complaint to Habeas. Bonded Sender Program Another variation on the white list involves senders putting up financial bonds ensuring the they are sending is legitimate. For the purposes of this document, a bond is defined as a sum of money used to protect against a claim. The bond would be held by the certification company, and the sender s network address would be added to 6

7 the certification company s white list. This white list would be made available to service providers. IronPort s Bonded Sender Program uses this method. In order to be accepted into the Bonded Sender Program, a sender undergoes an audit and is verified. Recipients who believe the they have received is UCE can submit a complaint to their service provider. The provider forwards the complaint to the Bonded Sender Program. If the Bonded Sender Program receives a significant number of complaints about a sender s UCE, money is deducted from that sender s bond. The sender would also be notified that those recipients don t want to receive messages from the sender. The threshold for the number of complaints before deduction, and the reduction amount of the bond, are set out in the bond contract between the sender and the certification company. After a certain length of time, the bond is returned, less any penalties. Cloudmark Cloudmark uses a rating system feedback method that allows users to identify spam. When enough users complain about a particular message, Cloudmark filters the as spam for all users. When Cloudmark receives an , the likelihood of the message being spam is determined, and the is given a rating. The higher a message s rating, the more likely it is spam. Cloudmark also rates its users based on how accurate they are in identifying spam (versus identifying they simply don t want as spam). When a user with a higher rating identifies an as spam, more emphasis is placed on the spam report. Solicited commercial ers can register with Cloudmark to ensure delivery of their legitimate commercial . The method is based on both a white list and the Cloudmark rating system. ers can also use Cloudmark to find out how Cloudmark recipients view their . When SCE is sent, the sender can add Cloudmark to its recipients list. Cloudmark will then track, and provide statistics on, how the rating system rates the , how many users identified the as spam and the number of inboxes to which the message was delivered. This provides useful feedback for the sender. The reputation generated by the Cloudmark rating system can also be used to validate the Sender ID authentication system. Institute for Spam and Internet Public Policy The Institute for Spam and Internet Public Policy (ISIPP) maintains the ISIPP Accreditation Database (IADB). The IADB is a list of senders network addresses. The list has two types of senders listings: vouched and nonvouched. The vouched listing contains the network addresses of senders who are personally known to ISIPP and are known to have sound practices, while nonvouched listings are based on reference checks of the senders. ISIPP recommends that the IADB be used in conjunction with an authentication system to help its users make informed decisions about the validity of . 7

8 Senders participating in the IADB must abide by a strict set of rules governing their practices in order to be accepted into the program. The IADB contains a code that describes the sender s attributes, such as what antispam programs they subscribe to (e.g. Bonded Sender Program, Habeas, etc.), whether they are ISIPP-vouched, whether they use sender policy framework or Sender ID, and other anti-spam information. E-Postage Stamps The premise behind e-postage stamps is that if a sender believed a recipient would value an , then the sender would be willing to pay to send it. A sender would probably not be willing to pay for a postage stamp for ing UCE, so this spam would be eliminated from the recipient s mailbox. A sender would purchase electronic stamps and attach them to outbound s. The recipient s application would only accept messages with a stamp attached. A recipient could create a list of known senders from whom they would accept without stamps attached. s not read before a certain length of time would be returned to the sender who would be returned the value of the stamp. Stamps would have to be issued by a recognized financial institution. Stamps inserted into s would have to be secured against fraudulent use. Variations on the e-postage concept include having recipients only accept messages from a sender when the stamp is greater than a certain monetary value. The e-postage method is generally thought of as impractical, and would be extremely cost-prohibitive to roll out. Concerns surrounding this method include those about who would issue the certificate and who would receive the payments. Some proposed methods would have the recipients receiving the payments. This particular method would pose several problems, in that users could subscribe to SCE just to receive stamps. The cost of the infrastructure required to issue, maintain and verify these stamps would be prohibitive in just one country. When international borders are taken into consideration, different currencies would become an issue, and the cost of collecting and verifying stamps would increase. Computational Stamps The concept behind computational stamps is that computer, or CPU, time costs money. Computational stamps are based on the premise that a user would be willing to have their personal computer run through a certain amount of complex computations before sending an message. Since computing time costs money, anyone sending spam would have to pay more, through increased computation time, to send an . 8

9 A certification assertion would be placed in the to show what computations had been performed. The computations would have to be verifiable by the recipient. The amount of CPU time spent by a regular user receiving a nominal number of s would be minimal. A sender that s thousands of UCEs, however, would have to spend a great amount of resources to compute the stamp for each . The computational-stamp method has several flaws, however the first being that the computational abilities of computers are increasing quickly; what takes four seconds to compute today might only take one second next year. Senders of UCE could just buy more powerful computers to run the calculations faster. Second, computational stamps would also put senders of SCE at a disadvantage, by raising their costs along with the spammers. Conclusion The list of methodologies mentioned in this section has been for discussion purposes only. More study would be necessary to further analyze the existing products to determine whether they fully meet the requirements of an anti-spam certification program. References AOL, Bonded Sender Program, IronPort, Peter G. Capek, Barry Leiba and Mark N. Wegman, IBM Thomas J. Watson Research Center; and Scott E. Fahlman, Computer Science Department, Carnegie Mellon University, Charity Seals, Antispam Project, Cloudmark, Habeas, Hashcash, Institute for Spam and Internet Public Policy, John Levine, Taughannock Networks, An Overview of E-Postage, June 2003 (Updated February 2004), Microsoft Corporation, 9

10 François-René Rideau, Stamps vs. Spam: Postage as a method to eliminate Unsolicited Commercial , 10

Blackbaud Communication Services Overview of Email Delivery and FAQs

Blackbaud Communication Services Overview of Email Delivery and FAQs Blackbaud Communication Services Blackbaud Communication Services Overview of Email Delivery and FAQs Email Delivery through your Blackbaud Solutions Blackbaud Communication Services can send large numbers

More information

Enterprise Email Marketing: The 8 Essential Success Factors

Enterprise Email Marketing: The 8 Essential Success Factors Enterprise Email Marketing: The 8 Essential Success Factors How to Create High-Impact Email Marketing Campaigns When Managing Over 1 Million Sends per Month By John H. Sellers Certified Email Marketing

More information

MXSweep Hosted Email Protection

MXSweep Hosted Email Protection ANTI SPAM SOLUTIONS TECHNOLOGY REPORT MXSweep Hosted Email Protection JANUARY 2007 www.westcoastlabs.org 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS MXSweep www.mxsweep.com Tel: +44 (0)870 389 2740

More information

The Economics of Spam

The Economics of Spam The Economics of Spam by Stephen Cobb, CISSP Senior Vice President Research & Education eprivacy Group Date: February, 2003 S. Cobb, The Economics of Spam Page 1 of 7 eprivacy Group, 2003. The Economics

More information

An Anti-Spam Action Plan for Canada. Industry Canada

An Anti-Spam Action Plan for Canada. Industry Canada An Anti-Spam Action Plan for Canada Industry Canada May 2004 The Problem An Anti-Spam Action Plan for Canada In just a few years, unsolicited commercial e-mail -- now generally known as spam 1 -- has gone

More information

Email Best Practices A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER

Email Best Practices A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER Email Best Practices A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER 2 Introduction Discussions of best practices for email marketing can be a confusing array of one- size- fits- all suggestions

More information

An Overview of Spam Blocking Techniques

An Overview of Spam Blocking Techniques An Overview of Spam Blocking Techniques Recent analyst estimates indicate that over 60 percent of the world s email is unsolicited email, or spam. Spam is no longer just a simple annoyance. Spam has now

More information

Spam DNA Filtering System

Spam DNA Filtering System The Excedent Spam DNA Filtering System provides webmail.us customers with premium and effective junk email protection. Threats to email services are rising rapidly. A Growing Problem As of November 2002,

More information

Top 40 Email Marketing Terms You Should Know

Top 40 Email Marketing Terms You Should Know 1601 Trapelo Road Phone 781-472-8100 Suite 246 Fax 781-472-8101 Waltham, MA 02451 www.constantcontact.com Top 40 Email Marketing Terms You Should Know If you have ever felt out of your depth in a discussion

More information

Introduction:... 3. What is Spam?... 3 How to Bypass Spam Filters... 5. Common Mistakes... 7

Introduction:... 3. What is Spam?... 3 How to Bypass Spam Filters... 5. Common Mistakes... 7 Table of Contents Introduction:... 3 What is Spam?... 3 How to Bypass Spam Filters... 5 Common Mistakes... 7 How Spam Filters Work... 8 Testing Your Email Campaign... 8 Preventing False Abuse Reports...

More information

Broadband Acceptable Use Policy

Broadband Acceptable Use Policy Broadband Acceptable Use Policy Contents General... 3 Your Responsibilities... 3 Use of Email with particular regards to SPAM... 4 Bulk Email... 5 Denial of Service... 5 Administration of Policy... 6 2

More information

5 tips to improve your email database. An Experian Data Quality white paper

5 tips to improve your email database. An Experian Data Quality white paper 5 tips to improve your email database An Experian Data Quality white paper While many marketers spend significant time and effort optimizing content and debating the timing of each campaign, marketers

More information

DMA s E-Mail Authentication Requirement: FAQs and Best Practices

DMA s E-Mail Authentication Requirement: FAQs and Best Practices DMA s E-Mail Authentication Requirement: FAQs and Best Practices DMA s Board of Directors approved a new guideline for ethical marketing practices in October 2005, with the new member requirement going

More information

How To Report Spam On An Ipo For A County

How To Report Spam On An Ipo For A County SPAM FILTER ISSUES REPORTING INSTRUCTIONS Provided by the Messaging Services unit at DTS For CWS/CMS Dedicated Counties Version 2.2 Updated: 04-05-07 INTENTION It is the intention of this document to provide

More information

Top 25 Email Marketing Terms You Should Know. Email Marketing from Constant Contact

Top 25 Email Marketing Terms You Should Know. Email Marketing from Constant Contact Email Marketing from Constant Contact Top 25 Email Marketing Terms You Should Know Constant Contact, Inc. 1601 Trapelo Road, Suite 329 Waltham, MA 02451 www.constantcontact.com If you have ever felt out

More information

Stop Spam Now! By John Buckman. John Buckman is President of Lyris Technologies, Inc. and programming architect behind Lyris list server.

Stop Spam Now! By John Buckman. John Buckman is President of Lyris Technologies, Inc. and programming architect behind Lyris list server. Stop Spam Now! By John Buckman John Buckman is President of Lyris Technologies, Inc. and programming architect behind Lyris list server. Copyright 1999 Lyris Technologies, Inc. Stop Spam Now! 1 Introduction

More information

Antispam Security Best Practices

Antispam Security Best Practices Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers

More information

A SIMPLIFIED EXPLANATION OF CANADA S NEW LAW ON SPAM

A SIMPLIFIED EXPLANATION OF CANADA S NEW LAW ON SPAM A SIMPLIFIED EXPLANATION OF CANADA S NEW LAW ON SPAM IED WEB MARKETING DEVRY SMITH FRANK LLP CANADA S NEW LAW ON SPAM Businesses and governments have been making significant strides in their never-ending

More information

Email Delivery Simplified White Paper

Email Delivery Simplified White Paper Email Delivery Simplified White Paper April 28, 2005 Prepared by StrongMail Systems, Inc. 1300 Island Drive, Suite 200 Redwood Shores, CA 94065 t. (650) 421-4200 f. (650) 421-4201 info@strongmailsystems.com

More information

Spam: What Consumers Really Think

Spam: What Consumers Really Think From First Click to Lifetime Customer WHITE PAPER Spam: What Consumers Really Think Survey Finds Growing Anger; Advice for Avoiding Recipients Wrath SPAM: WHAT CONSUMERS REALLY THINK Survey finds growing

More information

Handling Unsolicited Commercial Email (UCE) or spam using Microsoft Outlook at Staffordshire University

Handling Unsolicited Commercial Email (UCE) or spam using Microsoft Outlook at Staffordshire University Reference : USER 190 Issue date : January 2004 Revised : November 2007 Classification : Staff Originator : Richard Rogers Handling Unsolicited Commercial Email (UCE) or spam using Microsoft Outlook at

More information

Improving Email Deliverability

Improving Email Deliverability Improving Email Deliverability A focus on what happens after you hit the send button and the role of a SMTP Relay Service Provider April 2010 1 Introduction Email deliverability has become one of the hot

More information

Email Spam Filtering Sophos

Email Spam Filtering Sophos SPAM FILTERING Spam, or unsolicited bulk email, is problem many email users encounter. Niagara College is no exception. Some estimates report that the volume of spam doubles every four to eight months.

More information

Knowledge Guide: Deliverability. Your Reputation Holds the Key to Deliverability. virtualroi May 2009. by: Return Path

Knowledge Guide: Deliverability. Your Reputation Holds the Key to Deliverability. virtualroi May 2009. by: Return Path Knowledge Guide: Deliverability Your Reputation Holds the Key to Deliverability virtualroi May 2009 by: Return Path Your Reputation Holds the Key to Deliverability Twenty percent of legitimate email never

More information

INBOX. How to make sure more emails reach your subscribers

INBOX. How to make sure more emails reach your subscribers INBOX How to make sure more emails reach your subscribers White Paper 2011 Contents 1. Email and delivery challenge 2 2. Delivery or deliverability? 3 3. Getting email delivered 3 4. Getting into inboxes

More information

The Essential Email Marketing Glossary

The Essential Email Marketing Glossary By Ryan P. M. Allis ASP - Application Service Provider. ASP s provide internet based software. Access - Database software. Part of the Microsoft Office Suite. Organizations often store customer data in

More information

Adjust Webmail Spam Settings

Adjust Webmail Spam Settings Adjust Webmail Spam Settings An unsolicited bulk email message is known as "spam." Spam, which usually contains some sort of commercial advertising or proposition, is sent to a large number of recipients

More information

MCH Channel_e Email Best Practices for Marketers

MCH Channel_e Email Best Practices for Marketers MCH Channel_e Email Best Practices for Marketers Best Practices for Marketers Communicating with your prospects and customers through email is a popular channel that provides almost immediate response.

More information

REPUTATION-BASED MAIL FLOW CONTROL

REPUTATION-BASED MAIL FLOW CONTROL WHITE PAPER REPUTATION-BASED MAIL FLOW CONTROL Blocking Extreme Spam and Reducing False Positives Blocking unsolicited commercial email or spam is an increasingly important but difficult task for IT staff.

More information

Filtering E-mail for Spam: Macintosh

Filtering E-mail for Spam: Macintosh Filtering E-mail for Spam: Macintosh Last Revised: April 2003 Table of Contents Introduction... 1 Objectives... 1 Filtering E-mail for Spam... 2 What Is Spam?... 2 What Is UT Doing About Spam?... 2 What

More information

Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages in your

Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages in your Overview of the Junk E-mail Filter in Outlook (Much of this text is extracted from the Outlook Help files.) Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages

More information

E-mail Marketing ABSTRACT

E-mail Marketing ABSTRACT E-mail Marketing * Mr. R. Vasudevan ABSTRACT E-MAIL MARKETING is a form of direct marketing which uses electronic mail as a means of communicating commercial or fundraising messages to an audience. E-Mail

More information

A GUIDE TO TRANSACTIONAL EMAIL. v 2.0

A GUIDE TO TRANSACTIONAL EMAIL. v 2.0 A GUIDE TO TRANSACTIONAL EMAIL v 2.0 Table of Contents / 3 Intro To Transactional Email / 4 Transactional v. Bulk Email / 5 Why Is Transactional Email Important? / 6 What Are The Downfalls? / 7 How To

More information

Deliverability Counts

Deliverability Counts Deliverability Counts 10 Factors That Impact Email Deliverability Deliverability Counts 2015 Harland Clarke Digital www.hcdigital.com 1 20% of legitimate commercial email is not being delivered to inboxes.

More information

An Email Delivery Report for 2012: Yahoo, Gmail, Hotmail & AOL

An Email Delivery Report for 2012: Yahoo, Gmail, Hotmail & AOL EmailDirect is an email marketing solution provider (ESP) which serves hundreds of today s top online marketers by providing all the functionality and expertise required to send and track effective email

More information

How To Block Ndr Spam

How To Block Ndr Spam How to block NDR spam Spam generates an enormous amount of traffic that is both time-consuming to handle and resource intensive. Apart from that, a large number of organizations have been victims of NDR

More information

Smart E-Marketer s Guide

Smart E-Marketer s Guide 30 insider tips to maximise your email deliverability rate 30 insider tips Step 1. Ensure the domain you use for sending emails is configured to enable authentication (SPF / Sender ID/ DomainKeys). Step

More information

Email deliverability: The good, the bad and the ugly

Email deliverability: The good, the bad and the ugly Email deliverability: The good, the bad and the ugly An Experian Data Quality White Paper March 2015 CONTENTS Introduction...1 The good...2 Open rate...2 Click-through rate...3 Authentication...4 The bad...4

More information

OHA BACKGROUNDER Canada s Anti-Spam Legislation (CASL)

OHA BACKGROUNDER Canada s Anti-Spam Legislation (CASL) OHA BACKGROUNDER Canada s Anti-Spam Legislation (CASL) May 2014 In December 2010, the federal government passed Bill C-28, the Fighting Internet and Wireless Spam bill, referred to as Canada s Anti-Spam

More information

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection

More information

Who will win the battle - Spammers or Service Providers?

Who will win the battle - Spammers or Service Providers? Who will win the battle - Spammers or Service Providers? Pranaya Krishna. E* Spam Analyst and Digital Evidence Analyst, TATA Consultancy Services Ltd. (pranaya.enugulapally@tcs.com) Abstract Spam is abuse

More information

A quick guide to... Permission: Single or Double Opt-in?

A quick guide to... Permission: Single or Double Opt-in? A quick guide to... Permission: Single or Double Opt-in? In this guide... Learn how to improve campaign results by sending new contacts a confirmation email to verify their intention to join. Table of

More information

Software Engineering 4C03 SPAM

Software Engineering 4C03 SPAM Software Engineering 4C03 SPAM Introduction As the commercialization of the Internet continues, unsolicited bulk email has reached epidemic proportions as more and more marketers turn to bulk email as

More information

Service Protection Under The Provider's Acceptable Use Policy

Service Protection Under The Provider's Acceptable Use Policy Acceptable Use Policy As a provider of Internet access, Internet email, web site hosting, and other Internet related services, Pottawatomie Telephone Company and MBO.net herein after referred to as "the

More information

Trend Micro Hosted Email Security Stop Spam. Save Time.

Trend Micro Hosted Email Security Stop Spam. Save Time. Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading

More information

SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing

SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing EMAIL MARKETING SCORECARD Find Out How Much You Are Really Getting Out of Your Email Marketing This guide is designed to help you self-assess your email sending activities. There are two ways to render

More information

(Acceptable Use Policy or "AUP")

(Acceptable Use Policy or AUP) (Acceptable Use Policy or "AUP") By using our web hosting services and/or email listserv programs, you agree to comply with our acceptable usage policy. We expect you to possess a basic knowledge of the

More information

(For purposes of this Agreement, "You", " users", and "account holders" are used interchangeably, and where applicable).

(For purposes of this Agreement, You,  users, and account holders are used interchangeably, and where applicable). Key 2 Communications Inc. Acceptable Use Policy Please read carefully before accessing and/or using the Key 2 Communications Inc. Web site and/or before opening an account with Key 2 Communications Inc..

More information

Copyright Information. Confidentiality Notice. Anti-Spam Evaluation Guide Confidential November 2009 Page 2 of 16

Copyright Information. Confidentiality Notice. Anti-Spam Evaluation Guide Confidential November 2009 Page 2 of 16 Copyright Information Kaspersky is a registered trademark of Kaspersky Lab. Other trademarks found in this publication have been used for identification purposes only and may be the trademarks of their

More information

Stop Spam. Save Time.

Stop Spam. Save Time. Stop Spam. Save Time. A Trend Micro White Paper I January 2015 Stop Spam. Save Time. Hosted Email Security: How It Works» A Trend Micro White Paper January 2015 TABLE OF CONTENTS Introduction 3 Solution

More information

Filtering E-mail for Spam: PC

Filtering E-mail for Spam: PC Filtering E-mail for Spam: PC Last Revised: April 2003 Table of Contents Introduction... 1 Objectives... 1 Filtering E-mail for Spam... 2 What Is Spam?... 2 What Is UT Doing About Spam?... 2 What Can You

More information

OIS. Update on the anti spam system at CERN. Pawel Grzywaczewski, CERN IT/OIS HEPIX fall 2010

OIS. Update on the anti spam system at CERN. Pawel Grzywaczewski, CERN IT/OIS HEPIX fall 2010 OIS Update on the anti spam system at CERN Pawel Grzywaczewski, CERN IT/OIS HEPIX fall 2010 OIS Current mail infrastructure Mail service in numbers: ~18 000 mailboxes ~ 18 000 mailing lists (e-groups)

More information

Messaging Policy Management

Messaging Policy Management Introduction Topic Definition & Scope Risk Analysis Primary Obstacles Task Breakdown Inbound Drew Burdsall President - Espion International Outbound Closing Solution Road Map Our Area Q&A Definition &

More information

COLUMBIA UNIVERSITY EMAIL USAGE POLICY

COLUMBIA UNIVERSITY EMAIL USAGE POLICY COLUMBIA UNIVERSITY EMAIL USAGE POLICY Published: October 2013 I. Introduction Email is an expedient communication vehicle to send messages to the Columbia University community. The University recognizes

More information

e-shot Unique Deliverability

e-shot Unique Deliverability e-shot Unique Deliverability Email Deliverability What is Email Deliverability? Email deliverability s aim is to maximise the number of email messages that reach the intended recipients inboxes. It is

More information

Typical spam characteristics

Typical spam characteristics Typical spam characteristics How to effectively block spam and junk mail By Mike Spykerman CEO Red Earth Software This article discusses how spam messages can be distinguished from legitimate messages

More information

Acceptable Usage Policy

Acceptable Usage Policy Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...

More information

Guardian Digital Secure Mail Suite Quick Start Guide

Guardian Digital Secure Mail Suite Quick Start Guide Guardian Digital Secure Mail Suite Quick Start Guide Copyright c 2004 Guardian Digital, Inc. Contents 1 Introduction 1 2 Contacting Guardian Digital 2 3 Purpose of This Document 3 3.1 Terminology...............................

More information

The Growing Problem of Outbound Spam

The Growing Problem of Outbound Spam y The Growing Problem of Outbound Spam An Osterman Research Survey Report Published June 2010 SPONSORED BY! #$!#%&'()*(!!!!"#$!#%&'()*( Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058

More information

Why Content Filters Can t Eradicate spam

Why Content Filters Can t Eradicate spam WHITEPAPER Why Content Filters Can t Eradicate spam About Mimecast Mimecast () delivers cloud-based email management for Microsoft Exchange, including archiving, continuity and security. By unifying disparate

More information

How To Ensure Your Email Is Delivered

How To Ensure Your Email Is Delivered Everything You Need to Know About Delivering Email through Your Web Application SECTION 1 The Most Important Fact about Email: Delivery is Never Guaranteed Email is the backbone of the social web, making

More information

GET THE MESSAGE? Best Practices in Email Marketing

GET THE MESSAGE? Best Practices in Email Marketing WHITE PAPER GET THE MESSAGE? Email marketing has proven its value, delivering higher customer responses at 1/20th of the cost of traditional direct marketing channels. As a result most major marketers

More information

Being labeled as a spammer will drive your customers way, ruin your business, and can even get you a big fine or a jail sentence!

Being labeled as a spammer will drive your customers way, ruin your business, and can even get you a big fine or a jail sentence! Getting Your Email Delivered Beware: If you send out spam mail (unsolicited emails), whether it be knowingly or not, you will put your business and your reputation at risk. Consequences for spamming have

More information

Antispam Evaluation Guide. White Paper

Antispam Evaluation Guide. White Paper Antispam Evaluation Guide White Paper Table of Contents 1 Testing antispam products within an organization: 10 steps...3 2 What is spam?...4 3 What is a detection rate?...4 4 What is a false positive rate?...4

More information

SPAM AND PRIVACY ISSUES. Spam for Breakfast, Lunch and Dinner: What will the Unsolicited Electronic Messages Bill do for Privacy?

SPAM AND PRIVACY ISSUES. Spam for Breakfast, Lunch and Dinner: What will the Unsolicited Electronic Messages Bill do for Privacy? SPAM AND PRIVACY ISSUES Spam for Breakfast, Lunch and Dinner: What will the Unsolicited Electronic Messages Bill do for Privacy? 30 March 2006 Graeme Crombie Senior Associate Minter Ellison Rudd Watts

More information

The DMA s Analysis of Can Spam Act of 2003

The DMA s Analysis of Can Spam Act of 2003 The DMA s Analysis of Can Spam Act of 2003 December 11, 2003 The following is a Direct Marketing Association analysis of the Can Spam Act of 2003 (S. 877), which Congress sent to the President for signing

More information

BUILDING A PERMISSION- BASED EMAIL MARKETING LIST

BUILDING A PERMISSION- BASED EMAIL MARKETING LIST BUILDING A PERMISSION- BASED EMAIL MARKETING LIST Say Please Before Hitting Send InfoUSA wants email marketers to know that you have two choices: You can either send unsolicited email or send email to

More information

Medina County Policy Manual

Medina County Policy Manual Medina County Policy Manual Policy: Computer & Network Usage Section: Work Rules Number: 7.015 Issued: 09/17/07 Reviewed/Revised: Page #: 1 of 5 A. It is the intent of Medina County to provide local, network,

More information

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers

More information

Acceptable Use Policy Revision date: 26/08/2013

Acceptable Use Policy Revision date: 26/08/2013 Acceptable Use Policy Revision date: 26/08/2013 Acceptable usage Policy for all Services As a provider of web site hosting and other Internet-related services, Corgi Tech Limited offers its customer (also

More information

Three pillars of successful email deliverability

Three pillars of successful email deliverability Three pillars of successful email deliverability Ensuring safe arrival and optimum placement in the inbox An Experian Marketing Services white paper Contents Introduction...1 Data integrity...2 Relevance...3

More information

Email Marketing. Send beautiful email campaigns, track the results and manage your subscribers. For further information, call 01202 232839 or email

Email Marketing. Send beautiful email campaigns, track the results and manage your subscribers. For further information, call 01202 232839 or email Email Marketing Send beautiful email campaigns, track the results and manage your subscribers. For further information, call 01202 232839 or email info@europastudio.co.uk Copyright 2004-2012 Europa Studio.

More information

FAX-TO-EMAIL END-USER LICENSE AGREEMENT

FAX-TO-EMAIL END-USER LICENSE AGREEMENT FAX-TO-EMAIL END-USER LICENSE AGREEMENT This Agreement, which governs the terms and conditions of your use of the Fax-to-Email Services, is between you ("you" or "End-User") and ( we, us, our or Company

More information

Acceptable Usage Policy

Acceptable Usage Policy Contents 1. INTRODUCTION... 2 2. PURPOSE... 2 3. APPLICATION... 2 4. YOUR OBLIGATIONS AND PROHIBITED USE... 2 5. SPAM... 3 6. EXCESSIVE USE... 3 7. SECURITY... 4 8. COPYRIGHT... 4 9. CONTENT... 4 10. REGULARTORY

More information

http://connectwise.reflexion.net/login?domain=connectwise.net

http://connectwise.reflexion.net/login?domain=connectwise.net ConnectWise Total Control: Managed Email Threat Protection Version: 1.5 Creation Date: 11-September-2009 Last Updated: 24-August-2012 LOGGING IN An e-mail will be or has sent with your username and password.

More information

Savita Teli 1, Santoshkumar Biradar 2

Savita Teli 1, Santoshkumar Biradar 2 Effective Spam Detection Method for Email Savita Teli 1, Santoshkumar Biradar 2 1 (Student, Dept of Computer Engg, Dr. D. Y. Patil College of Engg, Ambi, University of Pune, M.S, India) 2 (Asst. Proff,

More information

How to Keep Marketing Email Out of the Spam Folder A guide for marketing managers and developers

How to Keep Marketing Email Out of the Spam Folder A guide for marketing managers and developers How to Keep Marketing Email Out of the Spam Folder A guide for marketing managers and developers Sarah Longfors Web Developer marketing + technology 701.235.5525 888.9.sundog fax: 701.235.8941 2000 44th

More information

WHITEPAPER. SendGrid Deliverability Guide V2. Everything You Need to Know About Delivering Email through Your Web Application

WHITEPAPER. SendGrid Deliverability Guide V2. Everything You Need to Know About Delivering Email through Your Web Application WHITEPAPER SendGrid Deliverability Guide V2 Everything You Need to Know About Delivering Email through Your Web Application The Most Important Fact about Email: Delivery is Never Guaranteed Email is the

More information

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each

More information

ACE Internet Services - Terms and Conditions

ACE Internet Services - Terms and Conditions ACE Internet Services - Terms and Conditions Index General Terms and Conditions While Ace Internet Services does it's best to provide the highest quality service, due to circumstances beyond our control

More information

How To Filter Email From A Spam Filter

How To Filter Email From A Spam Filter Spam Filtering A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER 2 Introduction Spam filtering is a catch- all term that describes the steps that happen to an email between a sender and a receiver

More information

Anti-SPAM Policy v.3 06-01-2011

Anti-SPAM Policy v.3 06-01-2011 Anti-SPAM Policy v.3 06-01-2011 Each user must agree to this policy. comf5 has a no tolerance policy for the sending of spam and unsolicited email, and we prohibit the use of third-party, purchased, rented,

More information

Understanding and Maximizing Deliverability Strategies for Success in Permission-Based Email Marketing

Understanding and Maximizing Deliverability Strategies for Success in Permission-Based Email Marketing Understanding and Maximizing Deliverability Strategies for Success in Permission-Based Email Marketing Executive Summary Permission-based email has matured as a communication channel. It has become a cost

More information

Eiteasy s Enterprise Email Filter

Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer

More information

Email AntiSpam. Administrator Guide and Spam Manager Deployment Guide

Email AntiSpam. Administrator Guide and Spam Manager Deployment Guide Email AntiSpam Administrator Guide and Spam Manager Deployment Guide AntiSpam Administration and Spam Manager Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec

More information

SAS TRUSTEE CORPORATION ( STC )

SAS TRUSTEE CORPORATION ( STC ) SAS TRUSTEE CORPORATION ( STC ) POLICY ON USE OF EMPLOYER COMMUNICATION DEVICES AND WORKPLACE SURVEILLANCE under the Workplace Surveillance Act 2005 File: B915 May 2011 Version 3 INDEX Policy Statement...

More information

No filter is perfect. But with your help, MailCleaner may aim at perfection. Case Description Solution

No filter is perfect. But with your help, MailCleaner may aim at perfection. Case Description Solution A Filter inaccuracies No filter is perfect. But with your help, MailCleaner may aim at perfection. The filtering system implemented by MailCleaner relies on automated and systematic controls that cannot

More information

A White Paper. VerticalResponse, Email Delivery and You A Handy Guide. VerticalResponse,Inc. 501 2nd Street, Suite 700 San Francisco, CA 94107

A White Paper. VerticalResponse, Email Delivery and You A Handy Guide. VerticalResponse,Inc. 501 2nd Street, Suite 700 San Francisco, CA 94107 A White Paper VerticalResponse, Email Delivery and You Delivering email seems pretty straightforward, right? You upload a mailing list, create an email, hit send, and then mighty wizards transport that

More information

Commtouch RPD Technology. Network Based Protection Against Email-Borne Threats

Commtouch RPD Technology. Network Based Protection Against Email-Borne Threats Network Based Protection Against Email-Borne Threats Fighting Spam, Phishing and Malware Spam, phishing and email-borne malware such as viruses and worms are most often released in large quantities in

More information

COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007

COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007 COMBATING SPAM Best Practices March 2007 OVERVIEW Spam, Spam, More Spam and Now Spyware, Fraud and Forgery Spam used to be just annoying, but today its impact on an organization can be costly in many different

More information

Emerging Trends in Fighting Spam

Emerging Trends in Fighting Spam An Osterman Research White Paper sponsored by Published June 2007 SPONSORED BY sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 Phone: +1 253 630 5839 Fax: +1 866

More information

Protecting your business from spam

Protecting your business from spam Protecting your business from spam What is spam? Spam is the common term for electronic junk mail unwanted messages sent to a person s email account or mobile phone. Spam messages vary: some simply promote

More information

SIMPLE STEPS TO AVOID SPAM FILTERS EMAIL DELIVERABILITY SUCCESS GUIDE

SIMPLE STEPS TO AVOID SPAM FILTERS EMAIL DELIVERABILITY SUCCESS GUIDE SIMPLE STEPS TO AVOID SPAM FILTERS SECTION 1 UNDERSTANDING THE BASICS Marketing emails account for most this is spam complaints, 70% in fact, which explains the scrutiny some marketers see applied to their

More information

Professional Diploma in Digital Marketing Module 4: Email Marketing Version 5.0 Lecturer: David Maher

Professional Diploma in Digital Marketing Module 4: Email Marketing Version 5.0 Lecturer: David Maher Professional Diploma in Digital Marketing Module 4: Email Marketing Version 5.0 Lecturer: David Maher David Maher Product & ecommerce Manager with Scope Ophthalmics 10+ Years experience in Digital Marketing

More information

Email Data Management Best Practices

Email Data Management Best Practices Email Data Management Best Practices September 17, 2008 These Best Practices have been developed by the IAB Email Committee. About the IAB Email Committee: The Email Committee is dedicated to removing

More information

Web Drive Limited STANDARD TERMS AND CONDITIONS FOR THE SUPPLY OF SERVICES

Web Drive Limited STANDARD TERMS AND CONDITIONS FOR THE SUPPLY OF SERVICES Web Drive Limited STANDARD TERMS AND CONDITIONS FOR THE SUPPLY OF SERVICES Web Drive Limited trading is herein referred to as "Web Drive". 1. Definitions a) Web Drive includes its employees and directors.

More information

Campaigner SMTP Relay

Campaigner SMTP Relay Improve Your Transactional Email With Campaigner SMTP Relay Think of the last message you sent out to a segment of your email list. Do you know if it was a commercial or transactional message, as defined

More information

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109 K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete

More information

Chicago State University Computer Usage Policy

Chicago State University Computer Usage Policy Chicago State University Computer Usage Policy Introduction This document provides guidelines for appropriate use by students, faculty and staff of computers, and other technological facilities and services

More information

Return Path Email Intelligence Report Q3 2012

Return Path Email Intelligence Report Q3 2012 Return Path Email Intelligence Report Q3 2012 HELO and Welcome Welcome to the first edition of the Return Path Email Intelligence Report. Our goal is to provide a quarterly look at email trends and performance

More information