North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

RE: Paul's Mailfrom (Was: IETF SMTP Working Group Proposal at smtpng.org)

  • From: JC Dill
  • Date: Mon Aug 26 20:21:33 2002

On 03:07 PM 8/26/02, Barry Shein wrote:
>Let me throw out the following to show how blind the technical
>community has been:
>
>  There is no RFC or other public standards document which even attempts
>  to define spam or explain, in a careful and professional manner,
>  why it is a bad thing.
>
>(before you say the obvious, that's not what RFCs are for, read, e.g.,
>RFC 2964)

I guess you haven't read RFC 3098 yet then.

http://www.geektools.com/rfc/rfc3098.txt

        How to Advertise Responsibly Using E-Mail and Newsgroups
                            or - how NOT to
                    $$$$$  MAKE ENEMIES FAST!  $$$$$

Table of Contents

   1.  Introduction ..............................................  2
   2.  Image and Perception of the Advertiser.....................  4
   3.  Collateral Damage .........................................  5
   4.  Caveat Mercator ...........................................  5
   5.  Targeting the Audience ....................................  7
   6.  Reaching the audience .....................................  8
       A.   Dedicated website or web page ........................  8
       B.   "Shared" Advertising website .........................  9
       C.   Netnews and E-Mailing list group postings ............ 10
       D.   Compiled E-Mail Lists ................................ 11
   7.  Opt-In Mailing Lists ...................................... 12
       A. Privacy ................................................ 13
       B. Integrity .............................................. 13
       C. Protection ............................................. 16
   8.  Irresponsible Behavior .................................... 16
   9.  Responsible Behavior ...................................... 17
   10. Security Considerations ................................... 19
   Appendices .................................................... 20
     A.1  The classic Pyramid .................................... 20
     A.2  What about Ponzi? ...................................... 22
     A.3  So all multi-levels are evil? .......................... 22
     B.1  Why Web Privacy? ....................................... 23