The CAN SPAM Act of 2003
CAN SPAM Act of 2003 permits unsolicited mailing as long as the sender practices the agreed upon requirements for commercial emails. These agreed upon requirements include clarity that the message is an advertisement, accurate header information on which the email and IP addresses of the sender can be tracked. CAN SPAM Act also requires an explicit way for opting out and stop further mailings. Whenever an email contains adult content, the sender should place a message prompt or the like in the subject line to warn the reader. A misleading subject line is discouraged.
Furthermore, commercial emails sent to addresses compiled without permission, such as by automation are prohibited. Email address generation using 'dictionary attack' (combination of names, letters and numbers into multiple permutations) is also prohibited. In addition, aggravated offense such as hijacking computers through Trojan or worms or using open mail relays for sending spam.
The content is exempted if it is purely religious, or if the content complies with the marketing mechanism specified by the law. Messages with national security content are also exempted.
To understand more about the CAN SPAM Act of 2003 - the governing bodies, the penalties, reactions and detail explanation about it, you can visit http://www.ftc.gov/bcp/conline/pubs/buspubs/canspam.htm.
Despite the measures established to fight spam, including CAN SPAM Act, most online marketers who send legitimate emails and are CAN SPAM compliant get block and thus experience low ROI.
Related Tags: marketing, content assessment, email delivery, can spam act
To further increase your understanding about email marketing and other considerations (other than those stated in the CAN SPAM Act) kindly check www.emailreach.com.
Your Article Search Directory : Find in ArticlesRecent articles in this category:
- Troubling New"spam" to Cell Phones Discovered
Troubling new"Spam" to Cell Phones Discovered In a day and age when spam is rampant on the interne - Sex Offenders - Keep Your Family Protected From Sex Offenders
As a parent, it is your responsibility to protect your family from any type of harm. Most especiall - Criminal Defense Attorney
You've seen them on TV in their black coats; the formidable forces of law, the strong and intense - Critical Analysis of Cyber Law
Critical Analysis of Information Technology Act, 2000 Till year 2000, India did not have any legis - Finding a Good Lawyer Referral
Perform An Online Attorney Search When You Need To lawyer referralHere is a common scenario: You ar - Usa Can Copy All You Have on Your Laptop
USA can copy all you have on your Laptop.American authorities has given airport security control mor - Best And Top New York Immigration Lawyer Of NY?
The term Immigration Lawyer is another very common term people are becoming aware of. But most of th - Domain Name Theft
Are you losing visitors to your domain? Are your search engine rankings still yours?Other people mi - Domain Name Dispute, What To Expect after You've Won
You file a UDRP complaint under ICANN and a panel has ordered a transfer of the stolen domain name. - Is Your Spouse Lying?
You may have noticed some unusual behavior from your significant other such as spending a lot of tim
Most viewed articles in this category:
- Malaysian Internet Marketer; The Constraints On Internet Transaction
The Problems;There is always an obstacle for everyone when dealing with internet transaction, Malays - A New Music Copyright Lawsuit Against YouTube
In the middle of November, Universal Music filed an extensive copyright lawsuit against YouTube, not - Protecting your Website's Content: Just Don't Bother
The internet is the best place if you want to steal content. It makes it really easy to copy any inf - Viacom Sues Google
Viacom, a media company, has recently sued Google for $1 billion, for the copyright infringement on - How To Use Metadata As An Examination Tool
In today's computer dependent world, the zealous advocate must be able to navigate his way through - Defamation and Slander on the Internet
As social networking sites and internet blogs continue to increase in both popularity and use, the o - Internet Law in 2007
As we start off the 2007 year, many in the web community probably have questions about what developm - A Short Synopsis Of Cybercrime
To many involved in criminal dense, cyber crime is the bane of the 21st Century. It accounts for mi - Are We Able to Completely Stop Software Piracy
Software piracy is the illegal reproduction and distribution of software applications, whether for b - Anti-Cyber Squatting Consumer Protection Act Update
Our law firm receives a lot of calls from people and companies who are being threatened with an Anti