Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications

    Stop Anti-Spam Laws

    By
    Jim Rapoza
    -
    August 11, 2003
    Share
    Facebook
    Twitter
    Linkedin

      Stopping spam has become the cause du jour of politicians and government bodies that need to express righteous indignation and show constituents that they can do something to solve their problems. Schemes to blot out spam range from the creation of a national do-not-spam list, proposed by New York Sen. Charles Schumer, to Australias plan to outlaw unsolicited e-mail.

      We need to do everything in our power to stop these and other bills from ever getting passed.

      Ive seen plenty of problems brought on IT workers and technology developers by the unintended consequences of bad legislation. From the DMCA turning security workers into criminals to the Patriot Act forcing companies to spy on their customers, poorly designed laws have created many problems. The inadvertent byproducts of these bills would likely pale in comparison with the trouble some of these so-called solutions to spam could cause.

      Probably the biggest difficulty in each of these proposals is the definition of spam. In many ways, its similar to the quandary that Supreme Court Justice Potter Stewart had with pornography: He said he couldnt define it, but he knew it when he saw it.

      A common way that spam is defined in anti-spam bills and regulations is this: unsolicited commercial e-mail where no pre-existing business/customer relationship exists. On the surface, this sounds OK. If Ive done business with you, then you may send me stuff; if we havent done business before, then your e-mail to me is spam.

      This definition, however, threatens a host of legitimate commercial communications that no one would typically call spam. Just what constitutes a pre-existing relationship? Could it be with any unit of a company? Do you want to spend your time going over everything your sales and marketing department sends out to make sure it couldnt be interpreted as spam by a potential customer whos in a bad mood?

      Many of the other legislative solutions have glaring weaknesses as well. For example, some require ISPs to filter spam. This means ISPs will inevitably block some legitimate e-mail, which will, in turn, lead to lawsuits when recipients do not receive important messages. Some measures require accuracy in mail headers and the deployment of challenge-response systems, which will remove anonymity and make things that much harder on activists in oppressive countries or whistle-blowers in corrupt companies.

      Imagine trying to run your messaging infrastructure in a world where these bills are law. Do you think filtering for viruses and spam is tough now? Wait till you have to make sure every outgoing mail isnt spam. Wait till your company gets sued or fined for legitimate commercial communications that recipients decided they didnt want. Wait till disgruntled ex-employees sign people up for newsletters and mailing lists. It almost makes going back to telephones and faxes sound attractive.

      Spam is caused by technology, and technology should be used to handle it. For my personal e-mail account, I use a Mozilla e-mail client that uses Bayesian technology to learn which messages I receive are spam and which are messages that I want to receive. The best thing is that I can check the message it has marked as spam to fix mistakes. With enforced blacklists, white lists and opt-in/opt-out directories, this isnt an option.

      There is a long list of corporate spam-killing products, including our Analysts Choice, Frontbridge Technologies TrueProtect Message Management Suite and SpamShark service. Others include SpamActive from Clearswift and products and services from Elron Software, Proofpoint and Brightmail.

      So lets thank our government representatives for their concern, but lets let them know that technology—not law—should be used to stop spam. And when spam crosses into already-illegal areas, such as fraud, there are plenty of legal solutions available.

      Lets not burn the house to kill the termites. I dont want to have to write another column in a year or two about the chaos that anti-spam laws are creating and how our only recourse is to repeal ill-conceived and hastily enacted legislation.

      Jim Rapoza can be contacted at [email protected].

      Avatar
      Jim Rapoza
      Jim Rapoza, Chief Technology Analyst, eWEEK.For nearly fifteen years, Jim Rapoza has evaluated products and technologies in almost every technology category for eWEEK. Mr Rapoza's current technology focus is on all categories of emerging information technology though he continues to focus on core technology areas that include: content management systems, portal applications, Web publishing tools and security. Mr. Rapoza has coordinated several evaluations at enterprise organizations, including USA Today and The Prudential, to measure the capability of products and services under real-world conditions and against real-world criteria. Jim Rapoza's award-winning weekly column, Tech Directions, delves into all areas of technologies and the challenges of managing and deploying technology today.

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×