4. Processing by service providers If service providers are deployed to send mailings or for the storage and/or processing of the email advertisement, their integration must also be designed in a...
Search Results for: data exchange
2. Permission What does the term “permission” actually mean in connection with the lawful sending of commercial emails? The term “permission” means that there is a legally defined state of per...
1. Foreword Law and trust “You are talking to the devil,” the representative of an Internet service provider told us when we presented our plans to launch the Certified Senders Alliance (CSA) at a...
The CSA certifies senders of commercial email who adhere to high quality standards. CSA certification gives you deliverability advantages with international mailbox and spam filter providers...
How can commercial senders of email get the most out of email as a marketing tool? What do commercial senders of email need to know in order to get the most out of email as a communication and market...
A short historical review Since email exists, it has been the goal to get it delivered to the recipient and destination – today we just call it “the inbox”. With the ongoing evolution of email, it...
The question you may have been asked a lot over the past few years or you asked this question yourself: “What is Spam?” Simple question but a very complex answer based on a variety of dependenci...
1. Background DKIM is a widely used method for the authentication of emails. But when DKIM is not used correctly, it is not effective and can offer a false sense of security. For this reason, here we...
In the first place, what is phishing? Phishing is an invented word cobbled out of the two words “password” and “fishing”. Criminals use fake emails to try to obtain personal data – in particular logi...