Legal

Is Spam Illegal? Know more About Anti-Spam Laws In India

Is Spam Illegal? Check Out This Article to Know About Anti-Spam Laws In India

This article aims to investigate the ever-increasing number of email privacy challenges and find preventative measures to eliminate spam. Spam has become a serious security concern today, and social sites have become an important feature of the web.

Internet e-mail is an electronic system that transfers messages between systems on behalf of the user. This is a reliable system in that the mail server delivers the message to the recipient’s receipt confirmation.

This level of trust is a problem when anyone in the world can send an email to anyone. Individuals and organizations that send unsolicited emails (spammers) take advantage of this reliable system.

 The term “spam [1]” comes from Hormel’s Spiced Ham product of the same name. In recent years, email users around the world have noticed an ever-increasing amount of unwanted emails reaching their inboxes.

 “Spam, Spam, Spam, Spam, Spam, Spam ….” The words of  Monty Python‘s sketch still convey the feeling that spam, or annoying commercial email, is simply annoying. An inbox containing junk mail, messages sent to intruding users’ aimed at promoting products and services to generate profit.

 But today, spam is increasingly seen as a more serious messaging threat as it is used to spread worms, viruses, trojan horses, and Miyama glass of direct monetary nature. Spammers often trick even the smartest email users into opening these messages.

 For this reason, spam is considered an issue that affects all email users, and therefore all computer users. The use of email as a ubiquitous tool at the heart of the information society, and the threat to its use, undermine user confidence in the information society.

 Spam reduction technology has grown rapidly in recent years as the amount of spam has increased. We believe that the problem of spam requires a multifaceted approach that combines different filtering techniques with different infrastructure changes, changes in financial incentives for spammers, and legal approaches.

spam illegal

Related business

 The first record of email spam dates back to 1978, and although spam began in earnest in 1994, the latest history of spam “trouble” actually began around 2002. In early 2002, spam accounted for about 16% of all emails sent to the Internet. In early 2008, spam accounted for 87% to 95% of all emails.

 However, the percentage of emails presented as spam masks the bigger problem: the huge amount of spam sent daily. In 2002, only billions of spam messages were sent each day, but typically about 100 billion spam messages traverse the Internet.

In addition, the amount of spam can evolve rapidly in a very short period, such as B. A combination of repeated amounts of spam between May and November 2006 and “spikes” of spam during the New Year and other seemingly random times.

 Many studies have been conducted on current and proposed spam filtering techniques, with particular emphasis on how well they work. During our presentation, we will discuss how email spam is filtered through Microsoft email clients, as well as some anti-spam measures that will be implemented in India.

There is already a lot of research on various email clients for controlling spam using filters. In doing so, we considered the definition of spam, user requirements, and the role of spam filters according to needs and specific requirements.

Benchmarks, measurements, and methods for evaluating spam filters are still evolving, so comparisons are not easy. We will examine these efforts and their achievements. Despite the recent development of rating methods, there remains a lot of uncertainty that affects spam filtering techniques and validates them. Here we propose some common filtering techniques and work to approve them.

Whitelist/validation filter

 A pretty good spam filtering technique is what I  call whitelisting and automated validation. There are various tools to save the purpose of checking for spam.

 Distributed Adaptive Blacklist: Types of Spam

 By definition, spam is sent to a large number of recipients. And that’s a matter of practice, with little customization of spam messages to individual recipients. A distributed blacklist is a way to allow one user’s delete button to notify many other users of the spam nature of the message.

Rule-based ranking

 The most popular rule-based spam filtering tool is SpamAssassin. In addition to the above, there are several other tools that are underutilized or not actively maintained. The Spam Assassin and several other similar tools analyze a wide range of patterns, primarily regular expressions, in order to determine whether or not a recipient is spam.

Bayesian word distribution filter

 The general idea is that some words are more common in known spam and others are more common in legitimate messages. It is possible to generate a “spam index probability” for each word using known mathematics.

Bayesian trigram filter

 The downside of the word model is that there is a logical limit to the number of “words” that can be detected in the email.

 With all these types of filters, it’s completely impossible to go against all the tools, so there’s already a lot left in spam filtering technology to explain what we’re not considering. But these are specific email-based filtering techniques-as part of our research because the client works.

spam

I checked a lot of spam emails and tried to find certain keywords, letters, and symbols that would normally appear in spam emails. There aren’t many databases to filter, but it’s focused on specific words that tend to be included in the email as spam keywords. We have developed a very restrictive filtering mechanism used for well-known keywords that may appear in spam. The email client I’m using can sort incoming emails as needed, which works when needed.

 What is spam?

 What exactly is spam and why do you hate it? Spam is generally defined as sending unsolicited emails on a large scale. H. Email received by multiple recipients, regardless of the end-user (one-sided).

Before that, we received a lot of spam every day, forcing us to close our first email account.

 Spam is an unwanted email that drives your inbox to promote amazing mortgage transactions, adult sites, gambling scams and more. Most people who have an email account are “spammed” and most can agree that it is nerve-wracking and takes time to deal with. Spam is one of the things that “it’s hard to explain, but you can tell by looking at it.” However, spam has some important characteristics.

  • Sent by junk mail. Sent without recipient consent
  • Obtain customers by promoting your products or services.

It was concluded that spam should be considered junk mail). In everyday use, spam can also refer to unsolicited emails, such as chain letters from known senders or commercial emails from previously processed retailers. This document uses the term spam for junk mail.

 The current meaning of “sending a large amount of junk mail indiscriminately to promote a product or service” is an extension of the original meaning, and many people share random and junk commercial mail. I feel that it is annoying.

Why is spam bad?

There are various issues caused by spam:

Bandwidth limit

 Spam registered on your organization’s network consumes network bandwidth that can be used for legitimate purposes. As the amount of spam increases, bandwidth is consumed for fraudulent purposes, especially with new types of spam, as more bandwidth per message. In many cases, you need to use larger data pipes just to maintain acceptable performance.

Storage requirements

 The more spam your organization registers, the more content you need to send in spam isolation for review. Spam is usually stored for at least 30 days so that employees can see false positives for content, so more spam invading your organization will inevitably lead to higher storage requirements.

Loss of employee productivity

 While some consider employee productivity loss to be a serious problem for most businesses, Oysterman Research says that in the overall context of the spam problem, this is a relatively small problem. discovered. However, it is a problem for some organizations that do not properly filter spam on their servers or gateways, especially small ones.

spam

Other issues

 There are various other issues related to spam. For example, it claims that phishing is from a valid source, such as a bank, but instead tells the recipient to enter confidential information on the phishing website. Some employees spend time reading the products and services offered by spam. Links in spam messages can redirect users to harmful or inappropriate websites. And the same.

Why are you worried about spam?

Spam is accepted as a nuisance, but it is a real-life that is rejected. Users can simply delete the spam emails regularly and continue working. However, companies with this attitude do leave themselves open to wasted time, money, resources, as well as legal risks. 

Why are spammers spammed? 

The Spammers transmitted their messages in the millions in the hope that some people respond. A percentage commission is earned on products sold, or from actual products sold. Respondents are generally low in response rates and benefit margins – but costs are also low.  The large number of messages that spammers send in a day can lead to significant income.

With illustrations, for example, a profit margin of $ 1 per unit and a response rate of only 0.1%, spammers can earn $ 10,000 by sending 10 million email messages.

 All spammers are required to send spam as follows:

  • Spam software. It’s cheap and easily available on the internet
  • Email address list. These can be purchased on CD or harvested
  • Economic Opportunities as it doesn’t look like there is a shortage of opportunities for spammers. Spam emails typically include product sales, offers, and adult site membership.

An email server. Spammers typically use unsuspecting third-party mail servers to disguise their identities. These servers are used as open relay servers. You can test if your email server is an open relay by visiting www.abuse.net/relay.html.

 Spammers have several sneaky ways to get an email address. Here are some of the most common methods that spammers use to get a unique email address:

  1. Posts in user newsgroups
  2. User registration on a malicious website
  3. User chat sessions
  4. From email lists the spammer buys
  5. From spam bots that crawl the web for any @ sign
  6. Using mailing lists that subscribers subscribe to
  7. By harvesting all the email addresses on your company`s server
  8. Randomly generate domain name combinations

How is spam done?

 There are many ways to spam. The commonly used one is:

  1. Rogue ISP: Spammers with sufficient resources run the rogue ISP. This allows you to use multiple domain names. Get your network number and multiple domain names from the Inter-NIC. You can block the domain, but you cannot block the ISP provider.
  2. On-the-fly spammers: This type of spammer registers itself as multiple real users with different ISPs. They forge their identities, steal credit cards, and use them to verify their identities. Then use these accounts to start spamming. Spammers switch to another account until they realize that the ISP is hosting a spam run.

iii. Blind relay: Blind relay is possible on some improperly configured servers. H. Send a message without authentication. It is through such blind relays that spam is routed.

Spam problem

 Fighting spam comes at a price, but keeping it growing without checking it can be disastrous. Costs can be broadly divided into tangible and intangible costs.

 The impact of spam on the tangible and intangible costs of personal and business Internet users is increasing.

Intangible Costs

Companies

User trust breakdown

Distraction from core business

 

Marketer

 

Erosion of impact

Worsening environment

Clutter

Customer dissatisfaction

Recipients

Irritation and distrust

Possible fraud

Emotional upset at disturbing material

Children are particularly at risk when it comes to harmful content

ISPs/Portals

Pressure to switch ISP’s

Decline in trust

Seen as source of Problem

 

 

Tangible Costs

Companies

 

Storage space

IT Upgrades

Legal risks

Productivity

Profitability

IT security

Marketers

 

Low response rates

Increased costs

Decreasing opt-in rates

IT security

Recipients

 

Wasted time

Using bandwidth, accessing information and storing it costs

Misused resources

IT security

ISPs/Portals

 

Storage space

Hardware/Software

Customer Service

Management time

Cancelled accounts

 

 

 Other losses caused by spam are listed below:

  • Spam is received by email and can be given attractive subject lines such as free offers, lifelong opportunities and more. Always open and read your email. This is one of the things spammers want from us. If you open, read, and then delete your email, Internet access will be time-consuming and costly. Mail servers that delivered mail through a set of servers were spending money, running out of bandwidth, and delivering unwanted junk. E-mail may be prioritized over junk e-mail.
  • Few spam emails contain emails and attachments requesting them to be opened. If you do this, you run the risk of running a virus that may be hidden in your email. The costs associated with removing viruses from our system are enormous.
  • Few spam emails ask you to click a link for more information after including a compelling description of a service or product. These links may open pornographic sites or other sites that we should not visit. However, the details of the visit are stored on our server and there may be a lot to explain.
  • To promote your product via spam email, you must provide your credit card number and other personal information

Reasons to stop spam

 Spam attacks disrupt electronic messages and flows and affect a company’s business capabilities. Spam consumes system resources such as bandwidth, mail server processing cycles, and storage capacity. Spam can pass through mail servers that are not protected against forwarding. Spam consumes staff. It includes time for system administrators, help desk staff, and human resources staff, as well as time for employees to read and respond to spam. Spam can violate the company’s policies regarding non-business use of the company’s messaging system.

spam

Pornography and offensive spam can also violate the company’s anti-harassment policy. Content filtering can reduce the risk of legal disclosure in a “hostile environment” when the subject of a message is offensive to employees. Business-related messages and solicited ads from reputable marketers can be lost due to an increase in unsolicited commercial ads and other spam.

Risk of blocking spam

 False-positive messages are a risk whenever spam is filtered. False-positive messages are messages that have the characteristics of spam but are legitimate solicitation messages. False alarms can result in the loss of commerce and important information.

 Except for false positives, the greatest risk of blocking spam is that the sender or recipient of the message is acting based on censorship or invasion of privacy. You can claim that a company’s mailbox is owned by the company. Therefore, all messages are subject to company policy.

Relationship between privacy and email

 Privacy is associated with philosophical and intellectual ideas. Data protection has many definitions in many areas. Sociology of law. Therefore, defining it exactly and covering all its aspects is not an easy task.

 Privacy can be defined  as “the right to enjoy  and be left alone in life.” This definition means that privacy can be threatened in some way. Privacy information is angry and various entities have left this right at risk.

 For explanatory purposes, you can use the information to create accurate user profiles for sales and marketing purposes, as well as to contact individuals using your email address. With the introduction of the Internet, the Web, and electronic mail systems, new privacy vulnerabilities came into the picture. Information about an individual has become a good that can be sold online in some instances.

 In the cloud, very sensitive personal details, known as Personally Identifiable Information (PII), are instantly linked to the real-world identity of a real-life user. As PII, email can be considered to be a highly effective (e.g. an email delivered to the inbox will garner human attention, even if it is only for a fraction of a second) and reasonably easy (i.e. for a very low cost) way to make contact with the related individual. 

 In a rationalized way to protect privacy, the first line of defence is based on data protection legislation: going from country-specific legislation to higher-level legislation.

 Also, the United States Constitution and the Indian Constitution place greater importance on personal privacy. Amendment of the United States Constitution (Article 4) states A description of the cause, pledge or warrant, especially where it is searched and who is seized or property.

Personal freedom is the most important of all basic rights. Article 19 guarantees  the Indian people six basic freedoms:

  1. Freedom of speech and opinion
  2. Freedom of assemble
  3. Freedom of association
  4.  Freedom of exercise
  5. Freedom of residence and freedom of establishment
  6. Freedom of Occupation, Occupation, Trade or Commerce

 19 (I) is a great and fundamental right recognized as a right of nature.

spam

 Another obvious tool for data protection is technology, which interacts strongly with law, markets and social norms. The concept of online privacy involves having the ability to control the information leaving your computer while online, and being able to do so in a manner that matches your values. An example of where more control can be given to end users is the information associated with digital identities and profiles. There is also the notion of self-profiling which is relevant.

 From the technical perspective, the current solutions for privacy protection can be divided into five different categories:

  1. Awareness: The user can become aware of privacy by utilizing features that facilitate this. 
  2. Detection: As part of the detection process are commonly running in the background features that monitor for potential privacy issues.  
  3. Prevention: A function that is used as a precautionary measure and is usually performed as needed.
  4. Response: A function to take countermeasures when a problem is detected.
  5. Recovery: A feature that helps return to a “normal” state.

 Various technologies and tools are available to prevent privacy attacks when using online applications. Several tools are available to detect behaviour that violates data protection treaties.

Why it’s hard to stop spam?

 The following statement may be surprised if we have threatened computers to cheat, cheat, and categorically refuse for an hour. Make it ubiquitous like email. One of the reasons it was so popular was that it was easy for Internet service providers to implement and software developers to program and use the tools.

 Email lifelines are called Simple Mail Transport Protocol (SMTP) because they are a set of Internet Protocol and technical standards. You may have seen the word SMTP when you set up your email software. This is a technology that sends email from an Internet Service Provider (ISP) outbound email server to an inbound email server.

 Now, as the Internet grows in popularity today, email has evolved from something new to a necessity. All email currently forwarded over the Internet is sent using the agreed industry standard SMTP. A server that “speaks” SMTP can send and receive an email to and from other servers that speak SMTP. The SMTP “conversation” should be very short, as the server can handle more than 12 message connections per second.

How short is it? Before the entire email message is placed on the receiving server, only three pieces of information are received before the email is delivered: the sending server ID, the sender’s address, and the recipient’s address.

How to stop spam in Outlook Express:

 If you’re tired of removing unwanted emails from your inbox, you can now use a smart anti-spam filter to remove spam from your favourite email clients. B. Delete Outlook Express. I’m sure you have the same problem as I do. Here you design a filter that prevents spam from the same types of lottery tickets and words that you used in the filter database.

These words contain all the suspicious words related to the lottery. Whether we are business or private users, we can control email spam and stop it with anti-spam filters. Store important emails in your inbox to stop spam. Following is the detailed introduction of the Anti-spam filter for Outlook Express.

Outlook Express’s anti-spam filter kicks in when I open it. Luckily it was not as tough as I was thinking before setting the rules on our filter and even the most computerese students can make the message rules or apply them according to their needs and requirement.

In the below steps, I will describe how it is possible could without taking any intervention from any side. Once we understand how it works then it will be very easy for one who wants to use the filter without taking any hardware and hard measure components. In this little howto, I am going to give a brief introduction of how to set up a filter using Outlook Express.

spam

The filter can be used in two parts: conditions and actions. When a  condition occurs, click on a specific set of actions, depending on the situation that triggers the action. The action depends entirely on what happens if the conditions described in the condition are met.

 Now let’s create a simple filter in Outlook Express to prevent junk mail containing the words used in the message rules.

 Step 1: Double-click the laptop icon to open Outlook Express.

Step 2: A list of folders in the Outlook Express interface. Click the Inbox folder and select Options to create a new folder named “Spam”.

 Step 3: Click OK to create a new folder “Spam”.

 Creating a filter to scan  SPAM:

 You have now created a special location (spam folder) for placing all unwanted emails. The next task is to create a “filter” or mechanism that displays your work according to your requirements and send all these useless emails to a folder called “SPAM”.

The idea I’m going to use is to capture all the words or phrases that spammers commonly use when composing and delivering spam emails. For example, spammers can use the word “lottery” or the phrase “win a prize !!!”.

Filter out all emails containing these words by creating a filter and locating them in the “SPAM” folder so that later on you can find all emails containing these words. The reason for classifying all these emails as separate spam folder is to reduce the chance of false positives.

After a detailed check, you may find important emails later. After doing the above, you need to press mail under the message rule under the option name tool.

 Click the New> New Mail Rule dialogue menu.

The dialogue menu is used to customize and manage spam filters. The mechanism we are going to use is a powerful one.

 Divide this dialogue menu into three parts.

  1. The first section creates a “SPAM” trap. The main focus is on the second and third “conditions” associated with the words contained in the “subject” and “message body”.
  2. The next section describes how to use this mechanism to intercept email spam. Here, click the “Move to the specified folder” setting and make some more settings.
  3. Within the third section, you can add specific keywords and phrases and specify specific folders for moving the spam. First, click the “Contains Specific Words” link and select the specific words or phrases that will catch “SPAM” as needed.

 Click to display a new dialogue box where you can add as many words and phrases as you need. When you receive a “SPAM” email, it’s a good idea to read it and select words that are unique to the “SPAM” message that is unlikely to be included in your email. Don’t always be too wide. Click OK when you are finished.

A new dialogue box will appear where you can select the folder where you want to move “SPAM”. Click the SPAM folder and click OK to instruct the filter to delete all previously defined emails. A word or phrase to the “SPAM” folder. You can perform this task before or after you start the procedure. We’ve already talked about “SPAM” under your inbox.

spam

 Now you need to create the specific rule you created. I named the rule “SPAM SHOOTER” to catch “SPAM” using the keywords and phrases in the subject line of the email. Click OK to return to the main menu options.

 Then I created a rule to filter the messages. Now you have two options.

  1. After this process, email messages will be filtered. Messages containing keywords or phrases defined in the subject will be automatically moved to the SPAM folder.
  2. Select the rule SPAMSUBJECT and click Apply Now to start the entire filtering process for all emails in your inbox.
  3. When the filter has been created, a dialogue box appears indicating that the rule has been applied. Click OK to move to your inbox.
  4. That’s it. I have created a “SPAM” filter in the subject line of a message. You can also repeat this process, depending on your requirements. Over the next few months or years, you’ll need to add or remove keywords and phrases to change your rules. The longer it takes to “pull” a filter rule, the better the “SPAM” filter will be.
  5. Whenever you just need to change a rule, you can do it without obstacles. Technology is not the only answer

 The unfortunate reality of spam is that spam technology is evolving faster than technology that stops it. In reality, the competition between spam technology and anti-spam technology is a fraudulent game.

 The success of email is primarily due to the flexibility of email technology and the basic assumptions on which it is built. It’s about making it easy for anyone to send anything to anyone. The inventor of today’s email protocol has done a good job.

 In the fight against spam, spammers ironically prove that email is as powerful and resilient as it should be. To prove this, spammers not only use email but also abuse it obscenely and elegantly.

 Spam fighters struggle to develop new technical ways to “break” email from the flexibility that spammers use to prevent it from collapsing under the weight of spammer abuse. Is doubly ironic. It’s like burning a forest to stop a forest fire.

Therefore the regulation assists all that is to behave like an impartial, impartial referee. If the sport is rigged in prefer of spammers, the regulation can step in and circulate the ball ten yards towards the intention line.

Laws can do stuff that generation can`t

A regulation is capable of determining that what may also be “criminal” in line with the guidelines of email software programs is in reality now no longer criminal withinside the eyes of the regulation.

And, to the first rate of our knowledge, no software program obtainable can throw you in prison for ignoring a programming command.

 And the legal guidelines of junk mail additionally make matters less complicated for the sufferer of junk mail to keep their abusers responsible in approaches that generation can`t.

spam

 Illustration, in bringing a conventional lawsuit, we regularly must display damages. How good deal harm does an unmarried junk mail message cause?

 In the current year, many nations on this international surpassed anti-junk mail legal guidelines to guard the privateness of internet users.

Is Spam Already Illegal?

Many elements of junk mail are illegal and different purchaser safety statutes manage unfair and misleading commercial enterprise practices. Many products and services promoted thru junk mail, like get-rich-brief schemes and quack scientific remedies, are already unlawful below current legal guidelines.

Spammers use many technical hints to hijack email servers are illegal. Internet provider providers (ISPs) have additionally efficaciously sued spammers below legal guidelines regarding trademark misuse and the private-belongings rights of community owners.

Laws dealing with anti-spam in India and their position in India

We trust that junk mail emails come quite near the ones worrying about telemarketing telecellsmartphone calls. It is truly now no longer amusing to have the telecellsmartphone ring at breakfast time and to pay attention to the voice on the alternative give up asking us approximately a brand new credit scorecard. That is the identical factor with junk mail email. We do now no longer need to must undergo our inbox deleting each different message simply to get to the valid ones which can be ones from our buddies and own circle of relatives members.

Email become imagined to be a far greater clean and handy manner to preserve in touch with buddies and own circle of relatives. Unfortunately, spammers noticed this as a super possibility to preserve our strain tiers high.

 A running organization that includes a member from the IT industry, privateness protector and IT secretary ought to be installed to invent a draft primarily based totally on which a modification to the IT Act can be finalized on junk mail. E-mail customers recognise that no quantity of filters can guard privateness against sending undesirable mails.

 The present generation is called generation and India does now no longer have any regulation to prevent the spammers who typically overcrowded our online world through time and again sending undesirable messages.

 Spammers are violating the privateness of mail account holders by forcing them to get hold of vain mails.

 Developed nations have already enacted anti-junk mail LAW which includes the USA and EUROPIAN COUNTRIES however the nations of 0.33 international which include INDIA do now no longer have any anti-junk mail LAW.

 That regulation is being visible as a victory of the effective advertising and marketing and marketing industries that needs to apply the blessings of junk mail over bona fide purchaser interests.

 The United States enforced its 1st federal regulation on junk mail. That regulation is called, The Can-Spam Act, 2003. This regulation is an Act to manipulate inter-country trade through enforcing boundaries and consequences at the transmission of unsolicited business email thru the internet. It attempts to offer numerous dos and don’ts for the spammer who aspires to be valid. This regulation is primarily based totally on the “decide-out “option.

 Ensuring the assault of advertising and non-solicited pornography pastime, the e-mail messages ought to be nicely labelled if any unsolicited pastime occurs. That regulation is being visible as a victory of the effective advertising and marketing and marketing industries that needs to apply the blessings of junk mail over bona fide purchaser interests.

Proposal of Anti-Spam Act in 2000 IT Act to Protect Personal Privacy:

  • Today, over 50% of all email traffic around the world is spam.
  • India’s problems are exacerbated at a great cost to businesses and consumers. 50% of all emails in the world are spam, a whopping 3% are from India itself, and an additional 2040% are from other Asian sources.
  • Internet-related companies and associations need to ally to help consumers and businesses fight spam in India.
  • You must obtain permission to send emails to strangers, and with such permission, it is strictly forbidden to send only reminders. By making every mail detail identification of the sender mandatory, the identification of the sender may be tracked
  • Sending mail containing false information should be considered a serious offence
  • Any vague mail should not be sent to anyone; in case a person acts upon the belief that a vague mail has been sent, he should be compensated for his actions, keeping in mind the common understanding of the average citizen.
  • Any greedy or tempting mail should not be sent to any person by making it an offence
  • Discussion and development of industry best practices for commercial email
  • Evaluation of the extent of the spam problem in India through both longer and short term projects
  • In India, we can identify the effectiveness of antispam legislation through a wide survey
  • The sharing of information would help to take implementation action against high volume spammers
  • Legislation related to antispam must apply to companies as well as an individual who intend to use false subject lines in their Email. Criminal and civil penalties should be imposed for fraudulent emails.
  • We should conduct thorough assessments to prevent reaping and dictionary attacks and prohibit the use of scripts to establish large numbers of email accounts from which to send spam.
  • To control the spam email government is also making his involvement in a wide range of actors, including:
  1. Developers and suppliers of antispam technologies Internet service providers (ISPs); commercial emailers;
  2. Various policy departments, regulatory agencies and law enforcement agencies of governments.
  3. Intergovernmental and other international organizations involved in policy coordination and development of technical standards.
  4. Civil society organizations that represent the interests of consumers and businesses. Monitor and report spam from active end users.
  5. Anti-spam laws should be applied not only to organizations and individuals whose products are advertised in spam emails but also to others who knowingly support the transfer of illegal spam.

spam

 Conclusion

 Unfortunately, spam is becoming a large, complex and serious international cross-sectoral problem. H. Not only is it expanding in scale, but it is also changing in character, and it is urgently necessary to deal with it through the collaborative efforts of all parties interested in the information society.

 Spam is offensive or annoying to consumers and can cause a variety of additional costs, especially for those who access the network via paid or low bandwidth connections, which can hinder the development of Internet access. I have.

 Spam may protect against cybercrime such as B. Online fraud and theft of personal information by “phishing” that harms individual consumers and imposes costs on businesses and government agencies.

 As a result, if left unchecked, spam becomes a serious barrier to  consumers and users’ use of the Internet, a significant barrier to e-commerce, e-government, and the development of  online public services, thereby “the Internet society.”

It will “reduce” the target value. Therefore, policymakers in both developing and developed countries need to pay special attention to spam and enact policies/laws that can curb the spread of spam.

Edited and published by Ashlyn

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button