7 Rules Spammers are Breaking

Computer Spam

Do you still get emails from people, companies and websites that you have no interest in and that you never asked for? If yes, then you’re still being hounded by one of the Internet’s oldest problems: spam.

You’d think that by now spam would have been outlawed or something. And you’re right: Because it is against the law for companies and advertisers to send out their emails to people whom they don’t know or have a relationship with. And beyond that, advertisers that you do have a relationship are still obliged to follow some rules.

But, where did these rules come from, what do they say and do they work?

Canning the other spam.

Who knew the U.S. government had a sense of humor? President George W. Bush signed into legislation the CAN-SPAM Act of 2003. It established the national standards for sending emails, specifically for commercial enterprises. The Act tasked the Federal Trade Commission with enforcing the guidelines. CAN-SPAM stands for Controlling the Assault of Non-Solicited Pornography And Marketing Act of 2003. As you can tell by the title, you can see where the problem started.

(The real SPAM in a can, the precooked ham-like meat, was around in WWII, is sold in stores worldwide today and is a mainstay in many cultures. Who knew?)

1. They must have your permission to send you their emails.

No one should send you email unless they asked your permission first and you said yes. That can be as simple as you checking a box that says yes on a sign-up form on their website. That process is called opting in (as in, you say yes to the option of receiving emails). Saying no or saying “no more emails, please,” is referred to as opting out.

2. They can’t use misleading headlines

Advertiser’s aren’t supposed to mislead you. The “from” and “to headers should be accurate and not lead you think it’s from someone other than the true sender. The reply address they use must represent their company or a person who represents the company. (Think about all the bogus emails you receive that break these rules!)

3. They can’t trick you with their deceptive messages.

The subject line—what the email is about (supposedly)—should be accurate. Spammers will use all kinds of tricks to get you to open their emails. The worst kind of spam uses lies or deception to get you to open the email…and of course there are the “riches” or “hot sex” teasers as well. But even if an email is from a trusted source (and even if you opted in to receive emails), they can’t use deceptive or misleading subject lines.

4. They can’t disguise a product ad as an important message.

Advertisers will use every tactic to sell merchandise and services in an email. However, they are not allowed to disguise an ad as a general message or helpful recommendation of some kind. They can’t advertise a product without announcing that the email is an actual ad.

5. They have to give you a physical address where you can reach them.

You should be able to trust someone who is sending you email messages. Part of that trust includes you being able to contact the company by regular mail, as old fashioned as that sounds. Any email messages you receive must include a valid, regular mail address associated with the advertiser and established with the United States Post Service. That information should always be at the bottom somewhere.

6. They need to provide you choices when they bring up email marketing.

The rules and regulations favor your right to choose if, how, and when to receive emails from advertisers on a case-by-case basis. So, let’s say an advertiser asked permission to send you email communications—and you gave permission. With every email they send after that, the message must include a reminder that you can opt out and end all messages. Also, they must offer simple instructions on how do that. They can’t hide or bury it in tiny, unreadable print or bury it in the middle of a long message.

7. They have to remove you fast when you opt out.

This is one rule advertisers fudge on the most, it seems. Once you formally opt out of receiving emails from an online service (be it a bank, magazine or charity organization), they must honor your request within 10 business days; so, if you opted out on a Monday, for example, two Mondays later the emails from the source should end. But unfortunately, we all know how often that’s not the case.

On top of that, a company can’t hassle you while you’re opting out. Advertisers cannot charge you to opt out or require any other personal verification, other than your stated request and your email address, which they already have. They also cannot sell or give your email address to some other company or another one of their divisions.

They are responsible for following the rules.

Many advertisers hire other companies and services (third-party vendors) to send emails to their customers and prospects. That doesn’t let the company off the hook if their vendors don’t follow the established guidelines regarding spam. The advertiser itself is ultimately responsible for adhering to the law. If you were to complain about their email practices, the advertiser cannot use the excuse that “one of our vendors broke the rules.”

Picture of <span>About The Author</span>Chris Parker

About The AuthorChris Parker

Chris Parker is the founder of WhatIsMyIPAddress.com, one of the world’s most popular websites for online privacy and security with over 13 million monthly visitors. He is also the host of the Easy Prey podcast, where he interviews experts and survivors to uncover the tactics behind scams, fraud, and digital manipulation. Chris is the author of Privacy Crisis: How to Maintain Your Privacy Without Becoming a Hermit, a practical guide to protecting personal information in today’s surveillance-driven world. His work has been featured on ABC News and numerous podcasts, making him a trusted voice on how to stay safe, secure, and private online.
Share Post:

INSIGHTS YOU

MAY ALSO LIKE

You play a role in preventing social engineering. So, just what is social engineering? It’s a vague term that’s used for online shenanigans and…

If you think that only your Internet Service Provider (ISP), such as Cox Cable or Verizon, knows your IP address, think again. (Your IP…

This post was moved over from an old blog of mine that I’ve since taken down. Several years ago I purchased an APC AP9630…

WHAT PEOPLE SAY

ABOUT CHRIS

DOWNLOAD CHRIS’ BOOK

PRIVACY CRISIS

DOWNLOAD YOUR FREE PDF, MP3, and workbook by entering your details below.

We respect your privacy. 

Don’t want to share your email?

Privacy Policy

This following document sets forth the Privacy Policy for this website.

Collection of your personal information

We collect Non-Personally Identifiable Information from visitors to this Website. Non-Personally Identifiable Information is information that cannot by itself be used to identify a particular person or entity, and may include your IP host address, pages viewed, browser type, Internet browsing and usage habits, advertisements that you click on, Internet Service Provider, domain name, the time/date of your visit to this Website, the referring URL and your computer’s operating system.

Free offers & opt-ins

Participation in providing your email address in return for an offer from this site is completely voluntary and the user therefore has a choice whether or not to disclose your information. You may unsubscribe at any time so that you will not receive future emails.

Sharing of your personal information

Your personal information that we collect as a result of you purchasing our products & services, will NOT be shared with any third party, nor will it be used for unsolicited email marketing or spam. We may send you occasional marketing material in relation to our design services.

What Information Do We Collect?

If you choose to correspond with us through email, we may retain the content of your email messages together with your email address and our responses.

Cookie Based Marketing

Some of our advertising campaigns may track users across different websites for the purpose of displaying advertising. We do not know which specific website are used in these campaigns, but you should assume tracking occurs, and if this is an issue you should turn-off third party cookies in your web browser.

How Do We Use Information We Collect from Cookies?

As you visit and browse Our Website, the Our Website uses cookies to differentiate you from other users. In some cases, we also use cookies to prevent you from having to log in more than is necessary for security. Cookies, in conjunction with our web server log files or pixels, allow us to calculate the aggregate number of people visiting Our Website and which parts of the site are most popular.

This helps us gather feedback to constantly improve Our Website and better serve our clients. Cookies and pixels do not allow us to gather any personal information about you and we do not intentionally store any personal information that your browser provided to us in your cookies.

IP Addresses

P addresses are used by your computer every time you are connected to the Internet. Your IP address is a number that is used by computers on the network to identify your computer. IP addresses are automatically collected by our web server as part of demographic and profile data known as traffic data so that data (such as the Web pages you request) can be sent to you.

Sharing and Selling Information

We do not share, sell, lend or lease any of the information that uniquely identify a subscriber (such as email addresses or personal details) with anyone except to the extent it is necessary to process transactions or provide Services that you have requested.

How Can You Access and Correct Your Information?

You may request access to all your personally identifiable information that we collect online and maintain in our database by using our contact page form.

Changes to this Privacy Policy

We reserve the right to make amendments to this Privacy Policy at any time. If you have objections to the Privacy Policy, you should not access or use this website. You may contact us at any time with regards to this privacy policy.