
CSA Host Verification
According to item 2.13 of the CSA criteria, an email sender must have sole control over the outbound email servers/hosts. In the new version of […]
According to item 2.13 of the CSA criteria, an email sender must have sole control over the outbound email servers/hosts. In the new version of […]
Everyone knows it, but not everyone has it: The legal notice in a newsletter! A missing or wrong legal notice be very costly. Time and […]
Due to a recent increase in questions about this issue, we would like to shed some light on advertising so-called “secondary lotteries”, a type of […]
What companies now have to consider when communicating by email with their customers Shops have closed, restaurants too, hotels are empty – the Corona pandemic […]
A feedback loop is a technical service provided by mailbox providers that reports back spam clicks from email recipients to the sender. This function is […]
This document deals with the encrypted transport of messages between two email servers. Encryption during transport is crucial for a basic level of security for […]
A good reputation, relevant content, and consistent list hygiene are the basis Resolutions belong to the New Year like fireworks and cava, but most of […]
It’s not always the case that everything runs smoothly on the Internet. Spam, phishing,Man-in-the-Middle attacks, spoofing; the list of sophisticated methods villains of theInternet utilize, […]
BIMI is an acronym of Brand Indicators for Message Identification. It is an open standardcreated jointly by several big players in the email market, such […]
Since the new CSA Rules of Procedure came into effect on 1 July 2019, One-Click Unsubscribe (RFC8058) is now a mandatory CSA criteria for newsletters. […]
According to item 2.13 of the CSA criteria, an email sender must have sole control over the outbound email servers/hosts. In the new version of the CSA criteria which apply from 2022, Certified Senders must also prove this using a unique token for each host – the CSA Host Verification.
Due to a recent increase in questions about this issue, we would like to shed some light on advertising so-called “secondary lotteries”, a type of unlicensed lottery. This type of lotteries offer bets on the outcome of regular (“primary”) lotteries, sometimes implying that they are selling real participation in said lotteries. As these types of “secondary” lotteries (as well as any unlicensed gambling service like online casinos) are illegal in many European Countries, advertising them is also considered illegal (for Germany, see Sections 4 and 5 of the Interstate Treaty on Gambling, GlüStV). Moreover, depending on the jurisdiction, this might also have criminal consequences, as participating in illegal gambling can be considered a criminal offence and, thus, advertising it might be considered instigating a crime. Lastly, this type of content might also break youth protection laws in some countries. Hence, advertising illegal gambling services also violates the CSA Criteria as it constitutes unlawful email content (Section 4.1). CSA certified senders are therefore strongly advised to raise awareness with their customers about this issue. Please note that, of course, not all advertising for lotteries is illegal – e.g. in Germany, legal and licensed lotteries can quite easily be identified via public information such as this list by the State Gambling Supervisory Authorities (https://innen.hessen.de/sites/default/files/media/hmdis/white_list.pdf).
A feedback loop is a technical service provided by mailbox providers that reports back spam clicks from email recipients to the sender. This function is used when a recipient clicks on the “spam button” in the interface of his or her email account to complain about receiving an email from the mailbox provider.
This document deals with the encrypted transport of messages between two email servers. Encryption during transport is crucial for a basic level of security for the exchange of messages.The exchange of messages between an email client and a server or the end-to-end encryption of messages are not covered in this article. If the aim is to create a secure overall system, these aspects should be considered in addition to the recommendations in this article.
It’s not always the case that everything runs smoothly on the Internet. Spam, phishing,Man-in-the-Middle attacks, spoofing; the list of sophisticated methods villains of theInternet utilize, is long. In almost all cases a medium is involved which we all use on dailybasis: Email. For obvious reasons, cyber-criminals do not use their own identities. Rather, they like to make use of well-known companies and brands; often paymentservices, banks, online shops, or delivery companies. Basically, every brand can beaffected.
BIMI is an acronym of Brand Indicators for Message Identification. It is an open standardcreated jointly by several big players in the email market, such as Google, VerizonMedia/Yahoo, and Linkedin. In the past, several mailbox providers (MBP) developed individual techniques to get abrand’s logo into the recipient’s inbox. This approach has several disadvantages:
Since the new CSA Rules of Procedure came into effect on 1 July 2019, One-Click Unsubscribe (RFC8058) is now a mandatory CSA criteria for newsletters. Senders are legally required to offer newsletter recipients a cost-neutral possibility to unsubscribe without requiring knowledge of log-in data. For a long time, this has been solved with unsubscribe links or buttons in the newsletter. The one-click unsubscribe link unsubscribes the recipient immediately from the newsletter. Making subscribers login or additionally confirm the cancellation of subscription is not permitted.