3

 
 
By Cameron Sturdevant  |  Posted 2004-02-02 Email Print this article Print
 
 
 
 
 
 
 


However, IT managers—not outsourced companies—should ultimately maintain the master opt-out list to avoid the possibility of sending commercial e-mail to an opt-out address.

The opt-out list must be compared against any e-mail-based marketing list that is generated from either internal or external sources. This way, IT managers can help marketing efforts stay in compliance with the law.

Aside from requiring specific information in the body of an e-mail message, CAN-SPAM covers how e-mail addresses may be collected and who may be held responsible for sending commercial e-mail to a user who has requested to be removed from a list.

CAN-SPAM holds that the company that initiated the commercial e-mail is primarily responsible for any mail sent on its behalf. This means that e-mail service providers can offer protection from CAN-SPAM fines, but they are not required to do so.

In fact, it is important to note that nearly all the provisions of the law apply to the company that ultimately makes the service or product being advertised as well as actions taken by an e-mail sending service hired by that company.

IT managers should work with the marketing staff to carefully track when commercial e-mail is sent and to which names, as well as the precautions taken to ensure that opt-out requests are honored. If legal action is mounted against a company, its the company IT managers job to ensure that records exist that show the company took the correct precautions to comply with CAN-SPAM.

The Federal Trade Commission can make rules under CAN-SPAM, and IT managers should watch for the FTC report mandated by the CAN-SPAM Act regarding the creation of a national do-not-e-mail registry. The initial plan must be given to the U.S. Senate and House of Representatives by July, although many experts we interviewed think the creation of the do-not-e-mail list faces serious legal hurdles.


CAN-SPAM requirements

Here’s what a company must do to meet the message transmission requirements of the CAN-SPAM Act:

  • Header information must be correct and accurate. The originating e-mail address, domain name and IP address must be legitimate.
  • The subject line must be accurate.
  • The return e-mail address must be functional so recipients can opt out of the mailing. The return address must function for no less than 30 days after the transmission of the original message.
  • Recipients who opt out must be off the list within 10 business days.
  • Advertisement or solicitation e-mail must contain a conspicuous identifier.
  • The postal address of the sender must be included in commercial e-mail.
  • IT managers wont need to make technical changes to databases or CRM systems even by the July deadline because the report will only outline the do-not-e-mail registry requirements. However, if the law survives the expected legal challenges, these requirements will pose technical difficulties for IT managers no matter what recommendations are put forward.

    For example, the do-not-e-mail registry will be nationwide, and IT managers will need to ensure compatibility of CRM and other database systems with the national registry. In addition, the national do-not-e-mail registry will require special handling to ensure that children with e-mail accounts do not receive spam.

    IT managers should work with marketing executives to track other rules that will be made by the FTC.

    At some point during the year, the commission will develop a mark or notice that must be attached to any commercial e-mail that contains sexually oriented material. Pornography is a slippery regulation subject in any media, so IT managers should keep track of the requirements for this material if there is even a possibility that products being described in e-mail could be considered sexually oriented.

    IT managers should also keep an eye on case law that is sure to develop around e-mail distribution.

    Senior Analyst Cameron Sturdevant can be reached at cameron_sturdevant@ziffdavis.com.



     
     
     
     
    Cameron Sturdevant Cameron Sturdevant has been with the Labs since 1997, and before that paid his IT management dues at a software publishing firm working with several Fortune 100 companies. Cameron also spent two years with a database development firm, integrating applications with mainframe legacy programs. Cameron's areas of expertise include virtual and physical IT infrastructure, cloud computing, enterprise networking and mobility, with a focus on Android in the enterprise. In addition to reviews, Cameron has covered monolithic enterprise management systems throughout their lifecycles, providing the eWEEK reader with all-important history and context. Cameron takes special care in cultivating his IT manager contacts, to ensure that his reviews and analysis are grounded in real-world concern. Cameron is a regular speaker at Ziff-Davis Enterprise online and face-to-face events. Follow Cameron on Twitter at csturdevant, or reach him by email at csturdevant@eweek.com.
     
     
     
     
     
     
     

    Submit a Comment

    Loading Comments...
     
    Manage your Newsletters: Login   Register My Newsletters























     
     
     
     
     
     
     
     
     
     
     
    Thanks for your registration, follow us on our social networks to keep up-to-date
    Rocket Fuel