The Japanese Experience Countering Spam ITU TELECOM WORLD 2006

Size: px
Start display at page:

Download "The Japanese Experience Countering Spam ITU TELECOM WORLD 2006"

Transcription

1 The Japanese Experience Countering Spam ITU TELECOM WORLD th December 2006 Shuji Sakuraba Copyright 2006

2 Present condition of spam in Japan - I 2004 Media Sent to mobiles 66 % Sent to PCs 34 % 2005 Sent to mobiles 23 % Sent to PCs 77 % Content of spam Advertisements for matchmaking (dating) sites 78 % Adult sites Others 9 13% % Adult sites Others Advertisements for matchmaking (dating) sites 90 % 6 % 4 % Source: Survey by Japan Computer Communications Association, Copyright

3 Present condition of spam in Japan - II Sent to PCs 2004 July-Dec Jan-June June Sent from Japan 28.6 % Sent to mobiles 23 % Sent from Japan 43.8 % Sent from abroad 56.2 % Sent from abroad 71.4 % Sent to Mobiles 2004 July-Dec Jan-June June Sent from Japan 99.3 % Sent from Japan 98.6 % Sent from abroad 0.7% Sent from abroad 1.4% Source: Survey by Japan Computer Communications Association, Copyright

4 History of spam in Japan 2001 Spam sent to mobiles significantly increased Self-regulation by mobile operators Administrative guidance by Government to implement new measures 2002 Two Laws enacted The Law on Regulation of Transmission of Specified Electronic Mail (Anti-spam Law) & Specified Commercial Transactions Law (For PC spam as well as Mobile spam) 2003 spread of Domain-Designation Service (to Block PC spam) Spam sent from mobiles increased Self-regulating (e.g. suspension of service for spammers) by mobile operators, Promotion of self-regulating by Government ( and decreased) 2004 spam (mainly sent from PCs to mobiles) is still a serious problem Anti-Spam Law stipulates that the Government has to consider whether it should be amended or not within three years of its enforcement ( by end of June 2005) MIC set up a Study Group on a framework to handle spam on Oct. 7, Revision of Anti-Spam Law Based on the Study Group s recommendations, an amendment bill to the Anti-Spam Law including the introduction of direct penalties was submitted to the Diet in March 2005, approved on May 15, and enforced on November 1, 2005 Copyright

5 Five points of MIC s anti-spam strategy 1. Legal enforcement by Government 2. Self-regulation by the private sector 3. Developing technologies 4. Enhancing awareness 5. Seeking international cooperation MIC: Ministry of Internal Affairs and Communications Copyright

6 Outline of The Law on Regulation of Transmission of Specified Electronic Mail (Anti-spam Law) Opt- out Transmission Transmission of of specified specified electronic electronic mail mail (unsolicited (unsolicited advertisement advertisement mail) mail) to to a a person person who who has has indicated indicated he/she he/she does does not not wish wish to to receive receive such such mail mail is is prohibited. prohibited. Labeling Labeling Labeling obligations obligations for for senders senders of of specified specified electronic electronic mail mail 1 Identified Identified as as specified specified electronic electronic mail(label mail(label 未 承 諾 広 告 ) ) 2 Sender s Sender s Name/address Name/address 3 Sender s Sender s Address Address 4 Opt-out Opt-out Address Address Penalties Administrative Administrative Order Order from from the the Minister Minister Fines Fines of of up up to to 500, ,000 yen yen ($4,200) ($4,200) assessed assessed can can be be imposed imposed if if the the Administrative Administrative Order Order is is not not followed. followed. Others Prohibition Prohibition of of mail mail transmission transmission utilizing utilizing any any program program that that generates generates random random fictitious fictitious e- e- mail mail addresses addresses Telecommunications Telecommunications carriers carriers are are authorized authorized not not to to provide provide transmission transmission services services if if the the s s include include random random fictitious fictitious addresses. addresses. Copyright

7 2005 Revision of the Anti-spam Law Introducing direct penalties for malicious spammers (*) Direct penalties for malicious spammers who disguise their information such as addresses are introduced where we had only a two-step punishment: the first is an administrative order by the Minister and the second is the imposition of a fine. Expanding the areas covered by the Anti-spam Law Adding to private-use addresses, s sent to business-use addresses are included Widening the scope of prohibited areas to fictitious address Adding to apparent advertisement s to fictitious addresses, blank s and s apparently from friends that are sent for advertisement are also banned. Widening the scope of legitimate refusal of service by ISPs The number of the cases ISPs could refuse mail services was limited, but it is widened where there are legitimate reasons such as causing a long jam of other s due to the extraordinary large amount of s sent. (*) We have 2 cases to which newly introduced direct penalties are applied. Copyright

8 Self-regulation by Private Sector - I Promotion of Self-regulation by Mobile Carriers MIC started to explore the countermeasures against spam together with mobile carriers in Nov.2005, and requested them to adopt uniform countermeasures. Suspension of service to spammers Mobile carriers NTT DoCoMo KDDI (au) Softbank Mobile Ceiling on the umber of s that can be sent from mobiles Mobile carriers NTT DoCoMo KDDI (au) Softbank Mobile Number of lines suspended 4,501 as of 30 September, ,000 as of 31 August, ,800 as of 5 July, 2006 Exchange of Information on Spammers Number of s that can be sent from mobiles Less than 200 s per line per day Less than 1,000 s per line per day Less than 120 s per line every three hours In order to stop spammers making contracts from one mobile carrier to another, it is important to exchange spammers information among mobile carriers to identify spammers quickly and utilize the information to screen new subscribers. MIC enacted this exchange scheme in Oct.2005 and it has been launched since Mar.2006 Copyright

9 Self-regulation by Private Sector - II Spam-Blocking Support Project MIC launched Spam-Blocking Project together with METI in Feb In this project, MIC confirms illegality of spam and providers information on illegal spam to ISPs. The ISPs can then easily shut out spammers via suspension based on their contracts. Japan Computer Communications Association ISPs spam spammer 5. Suspension Monitors 1. Analyzes headers of spam received by monitor terminals and detects ISPs that spammers used. 2. Report 4. Provide information on illegal spam Copyright 2006 MIC Confirm illegality 9

10 Self-regulation by Private Sector - III 800 Trend in amount of spam sent from mobiles Remarkably decreased due to the cooperation of mobile carriers and Government Jul May Jun Aug Sep Oct Nov Dec Jan Feb Mar Jul Apr May Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr May Jun Copyright 2006 Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr May Jun Source: Survey by Japan Computer Communications Association (Sample based survey using monitoring terminals) Aug Sep 10

11 Development of Technologies for Anti-spam Effective Technologies for Anti-spam Filtering Services Sender Authentication Technology Port 25 Blocking Legal Matters concerning these technologies Telecommunications Business Law stipulates: Secrecy of Communications Prohibition of Unfair Discrimination in Providing Telecommunications Business Whether these technologies run counter to the Law? MIC s s Actions Clarification of the legality of these technologies Promotion of these technologies Copyright

12 JEAG Recommendations Outbound Port 25 Blocking JEAG recommends that ISPs introduce Outbound Port 25 Blocking by March Authentication Technology JEAG recommends that ISPs introduce sender authentication technology at the sender side, specifically declaration of their authentication information (SPF recode or DKIM related information) on the domain name server. Mobile JEAG recommends that mobile operators and ISPs introduce some effective anti-spam measures such as mobile filtering service, suspension of usage for spammers, and a limit placed on the number of s that can be sent in a certain period. JEAG: Japan Anti-Abuse Group JEAG recommendations published on Feb. 23, 2006 Copyright

13 OP25B effectives Spammers move to another ISPs Spammers are looking for a whole of OP25B Spam from overseas are increasing Copyright

14 Seeking International Cooperation International cooperation is is necessary to to combat spam, a borderless problem. Multilateral LAP (London Action Plan) ITU (WSIS, workshops, etc.), APEC, OECD Seoul-Melbourne Multilateral MOU (first step to international cooperation on spam) Bilateral MIC holds several bilateral meetings with UK, EU, France, Germany, Italy, Canada, Australia, etc. MIC signed Joint Statements with France (May 2006), UK (September 2006), and Canada (October 2006) Copyright

Japan s Countermeasures against Spam

Japan s Countermeasures against Spam Apr. 10, 2007 Japan s Countermeasures against Spam Hiroyo HIRAMATSU, Deputy Director, Telecommunications Consumer Policy Division, Telecommunications Bureau, Ministry of Internal Affairs and Communications,

More information

Important legal matters concerning the introduction of sender authentication at the receiving side by an ISP

Important legal matters concerning the introduction of sender authentication at the receiving side by an ISP Important legal matters concerning the introduction of sender authentication at the receiving side by an ISP Telecommunications Consumer Policy Division, Telecommunications Bureau, Ministry of Internal

More information

How Do We Discourage Asia from Continuing to be a Source of Spam? 2.1 Introduction. 2.2 Spam Trends. 2. Messaging Technology

How Do We Discourage Asia from Continuing to be a Source of Spam? 2.1 Introduction. 2.2 Spam Trends. 2. Messaging Technology 2. How Do We Discourage Asia from Continuing to be a Source of Spam? In this report, we will offer our analysis of trends in the ratio of spam and regional sources of spam detected over the period between

More information

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network

More information

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS* COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun

More information

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS* COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun

More information

4 Messaging Technology

4 Messaging Technology 4 Messaging Technology Previously this was published as the Email Technical Report. From this volume we have changed the name to Messaging Technology. Messaging Technology 4.1 Introduction Messaging Technology

More information

Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8

Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138 Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 2 of 138 Domain Name: CELLULARVERISON.COM Updated Date: 12-dec-2007

More information

Analysis One Code Desc. Transaction Amount. Fiscal Period

Analysis One Code Desc. Transaction Amount. Fiscal Period Analysis One Code Desc Transaction Amount Fiscal Period 57.63 Oct-12 12.13 Oct-12-38.90 Oct-12-773.00 Oct-12-800.00 Oct-12-187.00 Oct-12-82.00 Oct-12-82.00 Oct-12-110.00 Oct-12-1115.25 Oct-12-71.00 Oct-12-41.00

More information

THE FUTURE OF WIRELESS SPAM

THE FUTURE OF WIRELESS SPAM THE FUTURE OF WIRELESS SPAM Though US cellular networks currently lack the capacity for widespread distribution of unsolicited wireless advertising (wireless spam), these advertisements are already well

More information

Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017

Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017 From -JAN- To -JUN- -JAN- VIRP Page Period Period Period -JAN- 8 -JAN- 8 9 -JAN- 8 8 -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -FEB- : days

More information

Draft WGIG Issues Paper on Spam

Draft WGIG Issues Paper on Spam Draft WGIG Issues Paper on Spam 1. Issue Spam directly engages a very wide range of stakeholders that includes individual consumers, all organizations of whatever size in the private and public sectors

More information

Can Spam Be Legislated?

Can Spam Be Legislated? Journal of Applied Business and Economics Can Spam Be Legislated? Karen L. Hamilton Columbus State University Robert A. Fleck, Jr. Columbus State University Spam, the unsolicited email that shows up in

More information

Ashley Institute of Training Schedule of VET Tuition Fees 2015

Ashley Institute of Training Schedule of VET Tuition Fees 2015 Ashley Institute of Training Schedule of VET Fees Year of Study Group ID:DECE15G1 Total Course Fees $ 12,000 29-Aug- 17-Oct- 50 14-Sep- 0.167 blended various $2,000 CHC02 Best practice 24-Oct- 12-Dec-

More information

Act on Regulation of Transmission of Specified Electronic Mail ( Act No. 26 of April 17, 2002)

Act on Regulation of Transmission of Specified Electronic Mail ( Act No. 26 of April 17, 2002) この 特 定 電 子 メールの 送 信 の 適 正 化 等 に 関 する 法 律 の 翻 訳 は 平 成 十 七 年 法 律 第 八 十 七 号 まで の 改 正 ( 平 成 18 年 5 月 1 日 施 行 )について 法 令 用 語 日 英 標 準 対 訳 辞 書 ( 平 成 18 年 3 月 版 )に 準 拠 して 作 成 したものです なお この 法 令 の 翻 訳 は 公 定 訳 ではありません

More information

For Sound Development of Internet Services - Guideline for codes of practices for Internet Service Providers -

For Sound Development of Internet Services - Guideline for codes of practices for Internet Service Providers - TELESA Guidelines For Sound Development of Internet Services - Guideline for codes of practices for Internet Service Providers - March, 1998 Kazuko Otani TELECOM SERVICES ASSOCIATION TELESA TELESA Guidelines

More information

Japan s s Best Practice for Telecommunications Market

Japan s s Best Practice for Telecommunications Market Japan s s Best Practice for Telecommunications Market WTO Basic Telecommunications Agreement 10 th Anniversary Symposium Panel C: Regulatory Challenges/Best Practices February 20, 2008 Shun SAKURAI Director-General

More information

How To Stop Spam

How To Stop Spam Combating Spam: Policy, Technical and Industry Approaches INTRODUCTION Spam continues to be a significant problem for Internet users and operators, even as email filtering and blocking efforts by network

More information

Anti-SPAM Policy v.3 06-01-2011

Anti-SPAM Policy v.3 06-01-2011 Anti-SPAM Policy v.3 06-01-2011 Each user must agree to this policy. comf5 has a no tolerance policy for the sending of spam and unsolicited email, and we prohibit the use of third-party, purchased, rented,

More information

THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA

THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA Communications and Information Technology Commission THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA Final Version 23/02/2008 Submitted to: Submitted By: Acceptance of Deliverable

More information

Kingdom of Saudi Arabia Communication and Information Technology Commission. Public Consultation Document On the Anti-SPAM Policy Framework

Kingdom of Saudi Arabia Communication and Information Technology Commission. Public Consultation Document On the Anti-SPAM Policy Framework Kingdom of Saudi Arabia Communication and Information Technology Commission Public Consultation Document On the Anti-SPAM Policy Framework Rajab 1428 H (July 2007) 1. Introduction SPAM 1 represents a major

More information

This English translation of the Act on Regulation of the Transmission of Specified

This English translation of the Act on Regulation of the Transmission of Specified This English translation of the Act on Regulation of the Transmission of Specified Electronic Mail ( Act No. 26 of April 17, 2002) has been prepared in compliance with the Standard Bilingual Dictionary

More information

Anti-Spam Measures Survey 2009. Pascal Manzano ENISA

Anti-Spam Measures Survey 2009. Pascal Manzano ENISA Anti-Spam Measures Survey 2009 Pascal Manzano ENISA Do you remember what happen on June 25 th? Methodology Online questionnaire open from May until July 2009 Questionnaire used providers best practices

More information

International Telecommunication Union. ITU Internet Report 2006 SUMMARY

International Telecommunication Union. ITU Internet Report 2006 SUMMARY International Telecommunication Union digital.lifelife ITU Internet Report 2006 SUMMARY This ITU Internet Report, the eighth in the series, has been produced by a team from the ITU Strategy and Policy

More information

How To Get Rid Of A Phish Locker On A Computer (For A Bank)

How To Get Rid Of A Phish Locker On A Computer (For A Bank) PHISH LOCKERS OUT IN THE WILD August 2013 RSA researchers have been increasingly witnessing the activity of highly targeted Trojans, dubbed Phish Lockers, used at the hands of cybercriminals to steal credentials.

More information

Computing & Telecommunications Services Monthly Report March 2015

Computing & Telecommunications Services Monthly Report March 2015 March 215 Monthly Report Computing & Telecommunications Services Monthly Report March 215 CaTS Help Desk (937) 775-4827 1-888-775-4827 25 Library Annex helpdesk@wright.edu www.wright.edu/cats/ Last Modified

More information

CENTERPOINT ENERGY TEXARKANA SERVICE AREA GAS SUPPLY RATE (GSR) JULY 2015. Small Commercial Service (SCS-1) GSR

CENTERPOINT ENERGY TEXARKANA SERVICE AREA GAS SUPPLY RATE (GSR) JULY 2015. Small Commercial Service (SCS-1) GSR JULY 2015 Area (RS-1) GSR GSR (LCS-1) Texarkana Incorporated July-15 $0.50690/Ccf $0.45450/Ccf $0.00000/Ccf $2.85090/MMBtu $17.52070/MMBtu Texarkana Unincorporated July-15 $0.56370/Ccf $0.26110/Ccf $1.66900/Ccf

More information

CAFIS REPORT 2015.10

CAFIS REPORT 2015.10 CAFIS REPORT 2015.10 INDEX Message CAFIS Inbound 03-06 07-08 CAFIS Arch 09-10 CAFIS Brain 11-12 CAFIS Global 13-14 What We Do 15-16 About CAFIS 17-18 Services for Member Stores 19-34 Services for Card

More information

Consumer ID Theft Total Costs

Consumer ID Theft Total Costs Billions Consumer and Business Identity Theft Statistics Business identity (ID) theft is a growing crime and is a growing concern for state filing offices. Similar to consumer ID theft, after initially

More information

Sender Authentication Technology Deployment and Authentication Identifiers

Sender Authentication Technology Deployment and Authentication Identifiers 2. Sender Authentication Technology Deployment and Authentication Identifiers In this report we will present an overview of spam trends for week 14 through week 26 of 2012. The ratio of spam has dropped

More information

Why Has Japan Been Hit So Hard by the Global Recession?

Why Has Japan Been Hit So Hard by the Global Recession? IMF STAFF POSITION NOTE March 18, 9 SPN/9/5 Why Has Been Hit So Hard by the Global Recession? Martin Sommer I N T E R N A T I O N A L M O N E T A R Y F U N D INTERNATIONAL MONETARY FUND Why Has Been Hit

More information

ANTI-SPAM LAWS IN WESTERN COUNTRIES: A COMPARISON

ANTI-SPAM LAWS IN WESTERN COUNTRIES: A COMPARISON PRB 09-24E ANTI-SPAM LAWS IN WESTERN COUNTRIES: A COMPARISON Alysia Davies Legal and Legislative Affairs Division 18 January 2010 PARLIAMENTARY INFORMATION AND RESEARCH SERVICE SERVICE D INFORMATION ET

More information

Broadband Policies in Japan

Broadband Policies in Japan Broadband Policies in Japan January, 2009 FUJINO, Masaru Counselor for Communications Policy Embassy of Japan 1 Topics I Broadband Environment in Japan II Major Policies for Broadband Deployment III Current

More information

Stanford Computer Security Lab. TrackBack Spam: Abuse and Prevention. Elie Bursztein, Peifung E. Lam, John C. Mitchell Stanford University

Stanford Computer Security Lab. TrackBack Spam: Abuse and Prevention. Elie Bursztein, Peifung E. Lam, John C. Mitchell Stanford University Abuse and Prevention Stanford University Stanford Computer Security Lab TrackBack Spam: Introduction Many users nowadays post information on cloud computing sites Sites sometimes need to link to each other

More information

Executive Summary. McAfee Labs Threats Report: Third Quarter 2013

Executive Summary. McAfee Labs Threats Report: Third Quarter 2013 Executive Summary McAfee Labs Threats Report: Third Quarter Although summer can be a relatively slow season for cybercriminal activity (even the bad guys need a break occasionally), the third quarter of

More information

Case Handling Workshop The Data Cycle Unsolicited marketing and lead generation

Case Handling Workshop The Data Cycle Unsolicited marketing and lead generation Case Handling Workshop The Data Cycle Unsolicited marketing and lead generation Adam Stevens, Team Manager Intelligence Hub (Enforcement) Daisy Higgins, Case Officer Improving Practice 7 October 2014 Unsolicited

More information

The DMA s Analysis of Can Spam Act of 2003

The DMA s Analysis of Can Spam Act of 2003 The DMA s Analysis of Can Spam Act of 2003 December 11, 2003 The following is a Direct Marketing Association analysis of the Can Spam Act of 2003 (S. 877), which Congress sent to the President for signing

More information

Working Holiday Maker visa program report 30 June 2011

Working Holiday Maker visa program report 30 June 2011 30/06/07 Working Holiday Maker visa program report 30 June 2011 Contents Page About this report 1 Enquiries 1 Definition of terms 2 Background to the Working Holiday Maker program 3 Recent developments

More information

1. Introduction. 2. User Instructions. 2.1 Set-up

1. Introduction. 2. User Instructions. 2.1 Set-up 1. Introduction The Lead Generation Plan & Budget Template allows the user to quickly generate a Lead Generation Plan and Budget. Up to 10 Lead Generation Categories, typically email, telemarketing, advertising,

More information

MEMORANDUM. Characterisation of actions to combat spam. Analysis of responses to questionnaire

MEMORANDUM. Characterisation of actions to combat spam. Analysis of responses to questionnaire MEMORANDUM Characterisation of actions to combat spam Analysis of responses to questionnaire INDEX 1. Background to questionnaire... 3 2. Analysis of responses to questionnaire... 4 2.1 Question 1 - What

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Acceptable Use Policy (AUP) ionfish Group, LLC s network and services have been designed to serve its clients, partners, and employees (each individually a User ), and to enhance

More information

China s Anti-Spam Works

China s Anti-Spam Works China s Anti-Spam Works Jingguang FU Ministry of Information Industry, China Geneva 7-9 July 2004 China s current situation of spam problem China is a serious victim of spam problem. A survey shows that

More information

Choosing a Cell Phone Plan-Verizon

Choosing a Cell Phone Plan-Verizon Choosing a Cell Phone Plan-Verizon Investigating Linear Equations I n 2008, Verizon offered the following cell phone plans to consumers. (Source: www.verizon.com) Verizon: Nationwide Basic Monthly Anytime

More information

BUGAT TROJAN JOINS THE MOBILE REVOLUTION

BUGAT TROJAN JOINS THE MOBILE REVOLUTION BUGAT TROJAN JOINS THE MOBILE REVOLUTION June 2013 RSA researchers analyzing Bugat Trojan attacks have recently learned that Bugat s developers managed to develop and deploy mobile malware designed to

More information

1st June 2005. Internet Access Service Provider (IASP) Sub-Code for the Communications and Multimedia Industry Malaysia

1st June 2005. Internet Access Service Provider (IASP) Sub-Code for the Communications and Multimedia Industry Malaysia 1st June 2005 for the Communications and Multimedia Industry Malaysia TABLE OF CONTENTS PART 1 - INTRODUCTION...2 PART 2- GENERAL RULES OF THE CODE FOR INTERNET ACCESS SERVICE PROVIDERS...6 PART 3- REVIEW

More information

SPAM AND PRIVACY ISSUES. Spam for Breakfast, Lunch and Dinner: What will the Unsolicited Electronic Messages Bill do for Privacy?

SPAM AND PRIVACY ISSUES. Spam for Breakfast, Lunch and Dinner: What will the Unsolicited Electronic Messages Bill do for Privacy? SPAM AND PRIVACY ISSUES Spam for Breakfast, Lunch and Dinner: What will the Unsolicited Electronic Messages Bill do for Privacy? 30 March 2006 Graeme Crombie Senior Associate Minter Ellison Rudd Watts

More information

Emails and anti-spam Page 1

Emails and anti-spam Page 1 Emails and anti-spam Page 1 As the spammers become increasing aggressive more and more legit emails get banned as spam. When you send emails from your webcrm system, we use the webcrm servers to send emails

More information

Employers Compliance with the Health Insurance Act Annual Report 2015

Employers Compliance with the Health Insurance Act Annual Report 2015 Employers Compliance with the Health Insurance Act Annual Report 2015 ea Health Council Health Council: Employers Compliance with the Health Insurance Act 1970 Annual Report 2015 Contact us: If you would

More information

Update on the Latest Developments of the Madrid System Madrid Working Group Roundtable

Update on the Latest Developments of the Madrid System Madrid Working Group Roundtable Update on the Latest Developments of the Madrid System Madrid Working Group Roundtable Asta Valdimarsdottir Director Operations Division Madrid Registry Geneva Ocotber 23, 2014 Main points 2013 2014 Figures

More information

BETTER INFORMATION LEADS TO BETTER PRIVATE HEALTH INSURANCE DECISIONS

BETTER INFORMATION LEADS TO BETTER PRIVATE HEALTH INSURANCE DECISIONS MEDIA RELEASE 24 November 2010 BETTER INFORMATION LEADS TO BETTER PRIVATE HEALTH INSURANCE DECISIONS Australia s leading independent source of information about private health insurance Privatehealth.gov.au,

More information

Your Credit File Explained

Your Credit File Explained Your Credit File Explained Information to guide you through your credit file August 2014 These guidelines will help you to understand your credit file. You should have a copy of your credit file on hand

More information

Blackbaud Communication Services Overview of Email Delivery and FAQs

Blackbaud Communication Services Overview of Email Delivery and FAQs Blackbaud Communication Services Blackbaud Communication Services Overview of Email Delivery and FAQs Email Delivery through your Blackbaud Solutions Blackbaud Communication Services can send large numbers

More information

SUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003

SUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003 SUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003 On December 16, 2003, President Bush signed into law the CAN-SPAM Act of 2003. CAN-SPAM stands for "Controlling the Assault of Non-Solicited Pornography

More information

Health Insurance Exchange Finance Work Group Meeting August 22, 2012 Wakely Consulting Model Table Summaries - Updated

Health Insurance Exchange Finance Work Group Meeting August 22, 2012 Wakely Consulting Model Table Summaries - Updated Table 3 Model Take up rate estimates 2014 Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Revised 25.0% 25.0% 18.0% 3.6% 3.6% 3.6% 3.6% 3.6% 3.6% 3.6% 3.6% 3.6% Fast 12.0% 18.0% 20.0% 18.0% 6.0% 4.0% 4.0%

More information

Equipping your Forecasting Toolkit to Account for Ongoing Changes

Equipping your Forecasting Toolkit to Account for Ongoing Changes Equipping your Forecasting Toolkit to Account for Ongoing Changes Presented by: Roger Parlett Supply Chain Manager January 23, 2014 Overview Forecast Set-up Objectives of Creating a Forecast Identify Critical

More information

Review of Proposed Legislative Framework For the Control of E-mail Spam

Review of Proposed Legislative Framework For the Control of E-mail Spam Review of Proposed Legislative Framework For the Control of E-mail Spam Name: Job title: Company: Steven Sim Kok Leong IT Security Specialist Infocomm Security / QA, Computer Centre, NUS C. - Comment Q.

More information

DNS POISONING, AKA PHARMING, MAKES THE HEADLINES IN NOVEMBER S NEWS

DNS POISONING, AKA PHARMING, MAKES THE HEADLINES IN NOVEMBER S NEWS DNS POISONING, AKA PHARMING, MAKES THE HEADLINES IN NOVEMBER S NEWS December 2011 November saw DNS Poisoning, aka Pharming, making the headlines on more than one occasion: To name a few, the online threat

More information

Media Planning. Marketing Communications 2002

Media Planning. Marketing Communications 2002 Media Planning Marketing Communications 2002 Media Terminology Media Planning - A series of decisions involving the delivery of messages to audiences. Media Objectives - Goals to be attained by the media

More information

SPAM: 101 Cause and Effect

SPAM: 101 Cause and Effect SPAM: 101 Cause and Effect Table of Contents Background: JARING SPAM 101 Effects Lesson Learned Challenges and Propositions 1 Part I: Background on JARING (We're the good guys.) What is JARING? The first

More information

Spam Act 2003: A practical guide for business

Spam Act 2003: A practical guide for business Spam Act 2003: A practical guide for business This guide provides practical information to businesses that send electronic messages. It explains the main requirements of the Spam Act 2003 (the Spam Act),

More information

SINGAPORE TELECOMMUNICATIONS LIMITED SUBMISSION TO IDA AND AGC ON PROPOSED LEGISLATIVE FRAMEWORK FOR THE CONTROL OF SPAM

SINGAPORE TELECOMMUNICATIONS LIMITED SUBMISSION TO IDA AND AGC ON PROPOSED LEGISLATIVE FRAMEWORK FOR THE CONTROL OF  SPAM SINGAPORE TELECOMMUNICATIONS LIMITED SUBMISSION TO IDA AND AGC ON PROPOSED LEGISLATIVE FRAMEWORK FOR THE CONTROL OF E-MAIL SPAM 1. STATEMENT OF INTEREST 1.1 1.2 1.3 SingTel is licensed to provide telecommunications

More information

Stop Spam Now! By John Buckman. John Buckman is President of Lyris Technologies, Inc. and programming architect behind Lyris list server.

Stop Spam Now! By John Buckman. John Buckman is President of Lyris Technologies, Inc. and programming architect behind Lyris list server. Stop Spam Now! By John Buckman John Buckman is President of Lyris Technologies, Inc. and programming architect behind Lyris list server. Copyright 1999 Lyris Technologies, Inc. Stop Spam Now! 1 Introduction

More information

SpinNet Service Agreement

SpinNet Service Agreement SpinNet Service Agreement Established: December 5, 1996 Revised April 1, 016 SoftBank Corp. SpinNet Service Agreement INDEX Chapter 1 General Provision... 3 Article 1 (Applicable Legal Provision)...3 Article

More information

Freedom of Information Request Reference No: I note you seek access to the following information:

Freedom of Information Request Reference No: I note you seek access to the following information: Freedom of Information Request Reference No: I note you seek access to the following information: 1. How many incidents in the UK have the police been called to because of people being drug and disorderly

More information

e-shot Unique Deliverability

e-shot Unique Deliverability e-shot Unique Deliverability Email Deliverability What is Email Deliverability? Email deliverability s aim is to maximise the number of email messages that reach the intended recipients inboxes. It is

More information

Protecting your business from spam

Protecting your business from spam Protecting your business from spam What is spam? Spam is the common term for electronic junk mail unwanted messages sent to a person s email account or mobile phone. Spam messages vary: some simply promote

More information

The Implementation of E-mail content management in a large corporation.

The Implementation of E-mail content management in a large corporation. The Implementation of E-mail content management in a large corporation. Abstract Michael Hansen & Craig Valli Edith Cowan University, Australia mhansen2@student.ecu.edu.au c.valli@ecu.edu.au It is a well

More information

Enhancing the Double Tax Deduction for Internationalisation Scheme (1 April 2012 31 March 2016) 1. Background

Enhancing the Double Tax Deduction for Internationalisation Scheme (1 April 2012 31 March 2016) 1. Background Enhancing the Double Tax Deduction for Internationalisation Scheme (1 April 2012 31 March 2016) 1. Background Currently businesses may claim up to 200% tax deduction on qualifying expenditure incurred

More information

DISCUSSION PAPER LEGISLATING AGAINST SPAM

DISCUSSION PAPER LEGISLATING AGAINST SPAM DISCUSSION PAPER LEGISLATING AGAINST SPAM IT & Telecommunications Policy Group Resources and Networks Branch Ministry of Economic Development WELLINGTON ISBN 0-478-26373-2 May 2004 Contents Minister s

More information

CAN-SPAM Policy & Data Verification Guide

CAN-SPAM Policy & Data Verification Guide BIZ SERVICE PROVIDER CAN-SPAM Compliance & Data Verification Policy Document BSP CAN-SPAM Policy & Data Verification Guide BSP Page 1 of 5 Version 8.1 Effective Date; May 2015 BIZ SERVICE PROVIDER I. Summary

More information

2015 Settlement Calendar for ASX Cash Market Products ¹ Published by ASX Settlement Pty Limited A.B.N 49 008 504 532

2015 Settlement Calendar for ASX Cash Market Products ¹ Published by ASX Settlement Pty Limited A.B.N 49 008 504 532 2015 Calendar for ASX Cash Market Products ¹ Published by ASX Pty Limited A.B.N 49 008 504 532 Calendar for ASX Cash Market Products¹ ASX Pty Limited (ASX ) operates a trade date plus three Business (T+3)

More information

Acceptable Usage Policy

Acceptable Usage Policy Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...

More information

Privacy, Data Collection and Information Management Practice Team November 13, 2003

Privacy, Data Collection and Information Management Practice Team November 13, 2003 Overview of Current Anti-Spam Regulations Privacy, Data Collection and Information Management Practice Team The proliferation of unsolicited commercial e-mail, more commonly known as spam, has prompted

More information

Penetration of Cable TV

Penetration of Cable TV MPHPT Communications ISSN 1346-5317 News July 2, 21, Vol. 12, No. 6 Please feel free to use the articles in this publication, with proper credits Fig. 1. Penetration of Cable TV The number of household

More information

DOMINICAN REPUBLIC. Cruise Passengers 3,965,055 62.4% 37.6% Cruise ship calls VISITOR PROFILE 8.9 76.9% 23.1%

DOMINICAN REPUBLIC. Cruise Passengers 3,965,055 62.4% 37.6% Cruise ship calls VISITOR PROFILE 8.9 76.9% 23.1% DOMINICAN REPUBLIC TOURISM HIGHLIGHTS FOR 2006 VISITOR ARRIVALS Tourist Air Arrivals I ( Summer ( Winter 3,965,055 62.4% 37.6% Cruise Passengers Cruise ship calls 303,489 n.a VISITOR PROFILE Average Length

More information

@@@@@@@@@@@@@@@@@@ STOPPING SPAM CREATING A STRONGER, SAFER INTERNET

@@@@@@@@@@@@@@@@@@ STOPPING SPAM CREATING A STRONGER, SAFER INTERNET SPAM @@ STOPPING @@ CREATING A STRONGER, SAFER @@ INTERNET Report of the Task Force on Spam May 2005 @ @ @ SPAM @@ STOPPING @@ CREATING A STRONGER, SAFER @@ INTERNET Report of the Task Force on Spam May

More information

Image Spam: The Email Epidemic of 2006

Image Spam: The Email Epidemic of 2006 S e c u r i t y T r e n d s Overview Image Spam: The Email Epidemic of 2006 S E C U R I T Y T R E N D S O v e r v i e w End-users around the world are reporting an increase in spam. Much of this increase

More information

An Anti-Spam Action Plan for Canada. Industry Canada

An Anti-Spam Action Plan for Canada. Industry Canada An Anti-Spam Action Plan for Canada Industry Canada May 2004 The Problem An Anti-Spam Action Plan for Canada In just a few years, unsolicited commercial e-mail -- now generally known as spam 1 -- has gone

More information

TRADE INSURANCE ACT CHAPTER I GENERAL PROVISIONS

TRADE INSURANCE ACT CHAPTER I GENERAL PROVISIONS TRADE INSURANCE ACT Act No. 2063, Dec. 31, 1968 Amended byact No. 2167, Jan. 1, 1970 Act No. 2422, Dec. 30, 1972 Act No. 2952, Dec. 31, 1976 Act No. 3107, Dec. 5, 1978 Act No. 3399, Mar. 27, 1981 Act No.

More information

Acceptable Usage Policy

Acceptable Usage Policy Contents 1. INTRODUCTION... 2 2. PURPOSE... 2 3. APPLICATION... 2 4. YOUR OBLIGATIONS AND PROHIBITED USE... 2 5. SPAM... 3 6. EXCESSIVE USE... 3 7. SECURITY... 4 8. COPYRIGHT... 4 9. CONTENT... 4 10. REGULARTORY

More information

CIPFA. Interactive Timetable. 2016 Live Online

CIPFA. Interactive Timetable. 2016 Live Online CIPFA Interactive Timetable 2016 Live Online Version 5: Information last updated 09/08/16 Please note: Information and dates in this timetable are subject to change CIPFA Information 2016 The following

More information

2015-16 BCOE Payroll Calendar. Monday Tuesday Wednesday Thursday Friday Jun 29 30 Jul 1 2 3. Full Force Calc

2015-16 BCOE Payroll Calendar. Monday Tuesday Wednesday Thursday Friday Jun 29 30 Jul 1 2 3. Full Force Calc July 2015 CM Period 1501075 July 2015 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 August 2015 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26

More information

Access to Japanese Markets

Access to Japanese Markets Access to Japanese Markets CFTC International Regulators Meeting U.S.A. March 16, 2005 Naohiko Matsuo Director for International Financial Markets Agenda Structure of the FSA and regulatory outline Access

More information

Overview of Certification System for Terminal Equipment in Japan

Overview of Certification System for Terminal Equipment in Japan Overview of Certification System for Terminal Equipment in Japan 27 February, 2013 Telecommunication Systems Division Telecommunications Bureau Ministry of Internal Affairs and Communications (MIC) Table

More information

Student visa and Temporary Graduate visa programme quarterly report

Student visa and Temporary Graduate visa programme quarterly report Student visa and Temporary Graduate visa programme quarterly report quarter ending at 30 June 2015 This page is left blank intentionally. Table of Contents Page About this report 1 Enquiries 1 Definition

More information

Overview of Mexico s Legislation to Combating Spam

Overview of Mexico s Legislation to Combating Spam Overview of Mexico s Legislation to Combating Spam By Cristos Velasco, NACPEC *, Mexico January 2005 Unlike the Unites States 1, Mexico does not have an independent anti-spam legislation to control and

More information

MIC s Efforts on Cybersecurity Human Resource Development

MIC s Efforts on Cybersecurity Human Resource Development ASEAN-Japan Cyber Security International Symposium MIC s Efforts on Cybersecurity Human Resource Development October 9 th 2014 Yuji NAKAMURA Director for the ICT Security Strategy, Ministry of Internal

More information

(For purposes of this Agreement, "You", " users", and "account holders" are used interchangeably, and where applicable).

(For purposes of this Agreement, You,  users, and account holders are used interchangeably, and where applicable). Key 2 Communications Inc. Acceptable Use Policy Please read carefully before accessing and/or using the Key 2 Communications Inc. Web site and/or before opening an account with Key 2 Communications Inc..

More information

Introduction to the Danish Gambling market. Experiences from Denmark

Introduction to the Danish Gambling market. Experiences from Denmark Introduction to the Danish Gambling market Experiences from Denmark The Danish Gambling Authority Placed within the Ministry of Taxation Ministerial counselling, administration and law interpretation Monitoring

More information

Public Consultation On Draft Resolution to Issue Anti-SPAM Regulations

Public Consultation On Draft Resolution to Issue Anti-SPAM Regulations Public Consultation On Draft Resolution to Issue Anti-SPAM Regulations Contents Chapter One Introduction Chapter Two Consultation Process Chapter Three Key Principles for Anti-SPAM Draft Regulations Chapter

More information

Tim Howkins, CEO. Steve Clutton, Finance Director

Tim Howkins, CEO. Steve Clutton, Finance Director Tim Howkins, CEO Steve Clutton, Finance Director Highlights Revenue Revenue up 36% Earnings per share up 33% All parts of business contributed to growth Benefits of increased IT spend Proposed final dividend

More information

Detailed guidance for employers

Detailed guidance for employers April 2015 3 Detailed guidance for employers Appendix A: Pay reference periods This document accompanies: Detailed guidance no. 3 Assessing the workforce Pay reference period calendars where the definition

More information

Insurance and Banking Subcommittee

Insurance and Banking Subcommittee Insurance and Banking Subcommittee Citizens Depopulation Update September 16, 2015 Christine Ashburn VP Communications, Legislative and External Affairs 2 3 Depopulation Customer Communications 1. 40 days

More information

The Latest Internet Threats to Affect Your Organisation. Tom Gillis SVP Worldwide Marketing IronPort Systems, Inc.

The Latest Internet Threats to Affect Your Organisation. Tom Gillis SVP Worldwide Marketing IronPort Systems, Inc. The Latest Internet Threats to Affect Your Organisation Tom Gillis SVP Worldwide Marketing IronPort Systems, Inc. Agenda Spam Trends Staying Ahead Blended Threats Spam Trends What Do Dick Cheney & Bill

More information

Chapter 2 Financial markets

Chapter 2 Financial markets Chapter Financial markets Hovedstyret desember,,,,,.a Exchange rates against USD Daily figures,,,,, JPY per USD (left-hand scale),, USD per euro (right-hand scale), jan jul jan jul jan jul, Source: EcoWin

More information

CentralNic Privacy Policy Last Updated: July 31, 2012 Page 1 of 12. CentralNic. Version 1.0. July 31, 2012. https://www.centralnic.

CentralNic Privacy Policy Last Updated: July 31, 2012 Page 1 of 12. CentralNic. Version 1.0. July 31, 2012. https://www.centralnic. CentralNic Privacy Policy Last Updated: July 31, 2012 Page 1 of 12 CentralNic Privacy Policy Version 1.0 July 31, 2012 https://www.centralnic.com/ CentralNic Privacy Policy Last Updated: February 6, 2012

More information

POLICY FEEDING RENEWABLE. How the Energy Bill might affect green electricity suppliers and also renewable generators

POLICY FEEDING RENEWABLE. How the Energy Bill might affect green electricity suppliers and also renewable generators FEEDING RENEWABLE POLICY How the Energy Bill might affect green electricity suppliers and also renewable generators Holly Tomlinson Regulation and Compliance Analyst for Ecotricity 18 th January 2013 Contents

More information

Insolvency Overview. Presented by Richard McCulloch October 2013

Insolvency Overview. Presented by Richard McCulloch October 2013 Insolvency Overview Presented by Richard McCulloch October 2013 Insolvency and Trustee Service Who are we? Business unit within the Ministry of Business, Innovation and Employment Primary role is to identify

More information

Email Marketing Data Protection and Privacy Guidance

Email Marketing Data Protection and Privacy Guidance Email Marketing Data Protection and Privacy Guidance An international compliance guide for UK companies April 2013 Version 2.3 Steve Henderson Contents Introduction... 3 Email Marketing Regulations...

More information

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers

More information