A few weeks ago, we released the latest version of the Certification Monitor. This update includes the following points: Benchmark – Deviation Inbox Placement – allows you to compare the deviatio...
Search Results for: Spam
It all starts with the DKIM With the rise of domain reputation, DKIM has become the most important element of email authentication and is fundamental to additional protocols such as DMARC and BIMI. ...
Why email is worth protecting Email is currently used by over four billion people worldwide and is the most important means of communication for companies. As its design and features have evolved ove...
Yahoo and Google recently made a significant announcement in the world of email by teaming up to combat spam and enhance email security for their users. This common announcement is a milestone in t...
We have often pointed out that the sending of commercial emails generally requires consent. Now there's an interesting ruling by the Higher Regional Court of Berlin (Kammergericht Berlin), which co...
I have recently been reminded that our CSA domains are not fully DMARC-enabled. So, I started my very first DMARC journey ever. Let me take you on this journey about theory vs. reality! Your benefits...
6. Special aspects in other countries 6.1 Scope of application of the GDPR According to Art. 3 of the General Data Protection Regulation (GDPR), the GDPR applies to all companies that have their r...
2. Permission What does the term “permission” actually mean in connection with the lawful sending of commercial emails? The term “permission” means that there is a legally defined state of per...
1. Foreword Law and trust “You are talking to the devil,” the representative of an Internet service provider told us when we presented our plans to launch the Certified Senders Alliance (CSA) at a...
.codeblock{ display: block; background-color:transparent; width:100%;} .codeblock div{ text-indent:-2em;padding-left:2em;word-break:break-all;background-color: lightgrey; color: black; width...