SlideShare uma empresa Scribd logo
1 de 29
Internet Technologies Spam – October 11, 2005
Internet Technologies USC Football How to Get An A in This Class Easy Questions Arcane Minutia
It is loved by Margaret Thatcher, Vikings and Herbal Viagra Users. A-A1
What is Spam?
Is this Spam?
Questions ,[object Object],[object Object],[object Object],[object Object],[object Object]
What Makes Spam Bad? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What Constitutes Consent? Double Opt-In Confirmed Opt-In Opt-In Confirmed Opt-Out Opt-Out Implied Consent
Online Advertising
Email Marketing
Email Marketing 101 Advertiser  Product or Service Marketer Mailing List &  Transmission Capability Marketing Network Access to Network of Marketers Consumer Consumer
Email Registration Registration Page
“ Selected Advertisers and Affiliates”
Legitimate Email Marketing  Response Rates
Spamenomics: Supply
Spamenomics: Demand ,[object Object],[object Object],[object Object],[object Object]
Spamenomics: Return ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Fighting Spam: Private Sector Responses ,[object Object],[object Object],[object Object],[object Object],[object Object]
Email Statistics ,[object Object],14.5B SPAM/Day ,[object Object],24B Emails/Day ,[object Object]
Spam Filters ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Legislative Response ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CAN-SPAM Act  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CAN-SPAM Principal Requirements From line must  identify sender Subject line must not be deceptive.  Adult Messages must provide notice . Requires Working Opt-Out Mechanism for Advertiser Postal Address for Advertiser
Penalties ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Is CAN-SPAM a Failure? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CAN-SPAM At Work
State Spam Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Foreign Spam Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank You

Mais conteúdo relacionado

Mais procurados

Meet the Firms Week - It's Your Career. Take Control.
Meet the Firms Week - It's Your Career. Take Control. Meet the Firms Week - It's Your Career. Take Control.
Meet the Firms Week - It's Your Career. Take Control. Rebekah Brown, CPA
 
Fraud Reporting, Catherine Hayes, National Fraud Authority
Fraud Reporting, Catherine Hayes, National Fraud AuthorityFraud Reporting, Catherine Hayes, National Fraud Authority
Fraud Reporting, Catherine Hayes, National Fraud AuthorityCFG
 
Understanding New Pennsylvania Volunteer Background Check Law
Understanding New Pennsylvania Volunteer Background Check LawUnderstanding New Pennsylvania Volunteer Background Check Law
Understanding New Pennsylvania Volunteer Background Check LawMike McCarty
 
Brian Dickerson. The Global Impact of the Foreign Corrup Practices 07.06.2013
Brian Dickerson. The Global Impact of the Foreign Corrup Practices 07.06.2013Brian Dickerson. The Global Impact of the Foreign Corrup Practices 07.06.2013
Brian Dickerson. The Global Impact of the Foreign Corrup Practices 07.06.2013Awara Direct Search
 
Political Strategy for Legalizing Marijuana - SXSW 2017 Panel Proposal
Political Strategy for Legalizing Marijuana - SXSW 2017 Panel ProposalPolitical Strategy for Legalizing Marijuana - SXSW 2017 Panel Proposal
Political Strategy for Legalizing Marijuana - SXSW 2017 Panel ProposalMarijuana Policy Reform
 
Health Reform Bracketology Oct 25
Health Reform Bracketology Oct 25Health Reform Bracketology Oct 25
Health Reform Bracketology Oct 25Leavitt Partners
 
Marijuana: Evolving Issues for Employers
Marijuana: Evolving Issues for EmployersMarijuana: Evolving Issues for Employers
Marijuana: Evolving Issues for EmployersParsons Behle & Latimer
 
Use a web search engine to search for local, state, and federal gove
Use a web search engine to search for local, state, and federal goveUse a web search engine to search for local, state, and federal gove
Use a web search engine to search for local, state, and federal goveojas18
 
Washington Post _ politics news & analysis
Washington Post  _ politics news & analysisWashington Post  _ politics news & analysis
Washington Post _ politics news & analysisFranco Ferrario
 
Why can’t police catch cyber criminals
Why can’t police catch cyber criminalsWhy can’t police catch cyber criminals
Why can’t police catch cyber criminalsChip Thornsburg
 

Mais procurados (13)

Meet the Firms Week - It's Your Career. Take Control.
Meet the Firms Week - It's Your Career. Take Control. Meet the Firms Week - It's Your Career. Take Control.
Meet the Firms Week - It's Your Career. Take Control.
 
Impact of Marijuana Legalization in the Workplace
Impact of Marijuana Legalization in the Workplace Impact of Marijuana Legalization in the Workplace
Impact of Marijuana Legalization in the Workplace
 
Fraud Reporting, Catherine Hayes, National Fraud Authority
Fraud Reporting, Catherine Hayes, National Fraud AuthorityFraud Reporting, Catherine Hayes, National Fraud Authority
Fraud Reporting, Catherine Hayes, National Fraud Authority
 
Understanding New Pennsylvania Volunteer Background Check Law
Understanding New Pennsylvania Volunteer Background Check LawUnderstanding New Pennsylvania Volunteer Background Check Law
Understanding New Pennsylvania Volunteer Background Check Law
 
Brian Dickerson. The Global Impact of the Foreign Corrup Practices 07.06.2013
Brian Dickerson. The Global Impact of the Foreign Corrup Practices 07.06.2013Brian Dickerson. The Global Impact of the Foreign Corrup Practices 07.06.2013
Brian Dickerson. The Global Impact of the Foreign Corrup Practices 07.06.2013
 
Political Strategy for Legalizing Marijuana - SXSW 2017 Panel Proposal
Political Strategy for Legalizing Marijuana - SXSW 2017 Panel ProposalPolitical Strategy for Legalizing Marijuana - SXSW 2017 Panel Proposal
Political Strategy for Legalizing Marijuana - SXSW 2017 Panel Proposal
 
Health Reform Bracketology Oct 25
Health Reform Bracketology Oct 25Health Reform Bracketology Oct 25
Health Reform Bracketology Oct 25
 
Marijuana: Evolving Issues for Employers
Marijuana: Evolving Issues for EmployersMarijuana: Evolving Issues for Employers
Marijuana: Evolving Issues for Employers
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Use a web search engine to search for local, state, and federal gove
Use a web search engine to search for local, state, and federal goveUse a web search engine to search for local, state, and federal gove
Use a web search engine to search for local, state, and federal gove
 
Marketing Automation's Role In Ensuring You Stay CASL Compliant - David Fowle...
Marketing Automation's Role In Ensuring You Stay CASL Compliant - David Fowle...Marketing Automation's Role In Ensuring You Stay CASL Compliant - David Fowle...
Marketing Automation's Role In Ensuring You Stay CASL Compliant - David Fowle...
 
Washington Post _ politics news & analysis
Washington Post  _ politics news & analysisWashington Post  _ politics news & analysis
Washington Post _ politics news & analysis
 
Why can’t police catch cyber criminals
Why can’t police catch cyber criminalsWhy can’t police catch cyber criminals
Why can’t police catch cyber criminals
 

Semelhante a Spam Law - USC 2005

Spam and Viral Marketing
Spam and Viral MarketingSpam and Viral Marketing
Spam and Viral Marketinghey4ndr3w
 
Email And Social Networking
Email And Social NetworkingEmail And Social Networking
Email And Social NetworkingHeather Grimes
 
Privacy Concerns in Marketing and Commercial Communications
Privacy Concerns in Marketing and Commercial CommunicationsPrivacy Concerns in Marketing and Commercial Communications
Privacy Concerns in Marketing and Commercial CommunicationsInternet Law Center
 
Spam Report Gennaio 2010
Spam Report Gennaio 2010Spam Report Gennaio 2010
Spam Report Gennaio 2010Symantec Italia
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)rayarren06
 
Wireless advertising messaging legal analysis & public policy issues, a review
Wireless advertising messaging legal analysis & public policy issues, a reviewWireless advertising messaging legal analysis & public policy issues, a review
Wireless advertising messaging legal analysis & public policy issues, a reviewAndrew Olsen
 
Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filteringChippy Thomas
 
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet RegulationEvolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet RegulationInternet Law Center
 
Spam- A Menace to Society
Spam- A Menace to SocietySpam- A Menace to Society
Spam- A Menace to Societyjsantabarbara
 
Withstanding FTC and State Scrutiny of Emerging e-Marketing Practices,
Withstanding FTC and State Scrutiny of Emerging e-Marketing Practices,Withstanding FTC and State Scrutiny of Emerging e-Marketing Practices,
Withstanding FTC and State Scrutiny of Emerging e-Marketing Practices,Internet Law Center
 
Unearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudUnearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudInternet Law Center
 

Semelhante a Spam Law - USC 2005 (20)

What is SPAM?
What is SPAM?What is SPAM?
What is SPAM?
 
CAN-SPAM at 5
CAN-SPAM at 5CAN-SPAM at 5
CAN-SPAM at 5
 
Spam and Viral Marketing
Spam and Viral MarketingSpam and Viral Marketing
Spam and Viral Marketing
 
Email And Social Networking
Email And Social NetworkingEmail And Social Networking
Email And Social Networking
 
Can Spam At 5
Can Spam At 5Can Spam At 5
Can Spam At 5
 
Privacy Concerns in Marketing and Commercial Communications
Privacy Concerns in Marketing and Commercial CommunicationsPrivacy Concerns in Marketing and Commercial Communications
Privacy Concerns in Marketing and Commercial Communications
 
Spam Report Gennaio 2010
Spam Report Gennaio 2010Spam Report Gennaio 2010
Spam Report Gennaio 2010
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
 
Wireless advertising messaging legal analysis & public policy issues, a review
Wireless advertising messaging legal analysis & public policy issues, a reviewWireless advertising messaging legal analysis & public policy issues, a review
Wireless advertising messaging legal analysis & public policy issues, a review
 
CAN-SPAM at 4
CAN-SPAM at 4CAN-SPAM at 4
CAN-SPAM at 4
 
Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filtering
 
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet RegulationEvolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
 
Spam attacks
Spam attacksSpam attacks
Spam attacks
 
spam attacks
spam attacksspam attacks
spam attacks
 
The CAN SPAM Act
The CAN SPAM ActThe CAN SPAM Act
The CAN SPAM Act
 
Spam- A Menace to Society
Spam- A Menace to SocietySpam- A Menace to Society
Spam- A Menace to Society
 
Withstanding FTC and State Scrutiny of Emerging e-Marketing Practices,
Withstanding FTC and State Scrutiny of Emerging e-Marketing Practices,Withstanding FTC and State Scrutiny of Emerging e-Marketing Practices,
Withstanding FTC and State Scrutiny of Emerging e-Marketing Practices,
 
Spam Filtering
Spam FilteringSpam Filtering
Spam Filtering
 
Ppt by
Ppt by Ppt by
Ppt by
 
Unearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudUnearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet Fraud
 

Mais de Internet Law Center

Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfBlueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfInternet Law Center
 
Blueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfBlueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfInternet Law Center
 
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...Internet Law Center
 
Oregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfOregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfInternet Law Center
 
Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Internet Law Center
 
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfBipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfInternet Law Center
 
ECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionInternet Law Center
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyInternet Law Center
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinInternet Law Center
 
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareData Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareInternet Law Center
 
Cyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsCyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsInternet Law Center
 
Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Internet Law Center
 

Mais de Internet Law Center (20)

Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfBlueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
 
Blueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfBlueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdf
 
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
 
SEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdfSEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdf
 
Oregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfOregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdf
 
Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer
 
CCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdfCCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdf
 
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfBipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
 
20200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc3111820200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc31118
 
ECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II Decision
 
The Road to Schrems II
The Road to Schrems IIThe Road to Schrems II
The Road to Schrems II
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH Economy
 
FIFA Indictment
FIFA IndictmentFIFA Indictment
FIFA Indictment
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletin
 
Data Privacy Day 2020
Data Privacy Day 2020Data Privacy Day 2020
Data Privacy Day 2020
 
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareData Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
 
Cyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsCyber Report: A New Year with New Laws
Cyber Report: A New Year with New Laws
 
Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296
 
FTC's Influencer Guide
FTC's Influencer GuideFTC's Influencer Guide
FTC's Influencer Guide
 
Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)
 

Spam Law - USC 2005

Notas do Editor

  1. To put this in perspective, 1.5 billion, start counting one number per second right now – if you keep going without sleeping, count while you’re eating, etc., you can stop in 47.5 YEARS . This is how many spams get through EVERY DAY . I think they all end up in my inbox! Starts a vicious cycle between ISPs & Spammers (Spam increases, ISP filtering increases, spam increases, filtering increases, etc.), and legitimate marketers end up being victims as well, as many legitimate messages end up as “false positives”. =========================== A billion seconds ago it was 1972. A billion minutes ago the Roman Coliseum was dedicated. A billion hours ago our ancestors were living in the Stone Age. A billion dollars ago was only 4.4 hours at the rate Washington spends it.