[51394] in North American Network Operators' Group
RE: Paul's Mailfrom (Was: IETF SMTP Working Group Proposal at
daemon@ATHENA.MIT.EDU (JC Dill)
Mon Aug 26 20:20:05 2002
Date: Mon, 26 Aug 2002 17:18:38 -0700
To: nanog@merit.edu
From: JC Dill <nanog@vo.cnchost.com>
In-Reply-To: <15722.42674.873831.754791@world.std.com>
Errors-To: owner-nanog-outgoing@merit.edu
On 03:07 PM 8/26/02, Barry Shein wrote:
>Let me throw out the following to show how blind the technical
>community has been:
>
> There is no RFC or other public standards document which even attempts
> to define spam or explain, in a careful and professional manner,
> why it is a bad thing.
>
>(before you say the obvious, that's not what RFCs are for, read, e.g.,
>RFC 2964)
I guess you haven't read RFC 3098 yet then.
http://www.geektools.com/rfc/rfc3098.txt
How to Advertise Responsibly Using E-Mail and Newsgroups
or - how NOT to
$$$$$ MAKE ENEMIES FAST! $$$$$
Table of Contents
1. Introduction .............................................. 2
2. Image and Perception of the Advertiser..................... 4
3. Collateral Damage ......................................... 5
4. Caveat Mercator ........................................... 5
5. Targeting the Audience .................................... 7
6. Reaching the audience ..................................... 8
A. Dedicated website or web page ........................ 8
B. "Shared" Advertising website ......................... 9
C. Netnews and E-Mailing list group postings ............ 10
D. Compiled E-Mail Lists ................................ 11
7. Opt-In Mailing Lists ...................................... 12
A. Privacy ................................................ 13
B. Integrity .............................................. 13
C. Protection ............................................. 16
8. Irresponsible Behavior .................................... 16
9. Responsible Behavior ...................................... 17
10. Security Considerations ................................... 19
Appendices .................................................... 20
A.1 The classic Pyramid .................................... 20
A.2 What about Ponzi? ...................................... 22
A.3 So all multi-levels are evil? .......................... 22
B.1 Why Web Privacy? ....................................... 23