Definitions and Frequently asked Questions

1. General Overview

This is where the overview for the terms and/or definitions begin. In the following paragraphs you will find general and specified terms and procedures we will insist on you following prior to your business being listed on the White List.

1.1. What exactly are Best Practices?

The are the standards to which a business will conduct itself if they wish to be listed in the White List.

1.2. What exactly do you mean by “spam”?

1.2 Email spam quite simply put is;

1.2.1. sending email unsolicited to individuals you have no personal relationship with.

1.2.2. sending email unsolicited to individuals you have no business relationship with.

1.2.3. sending email unsolicited to companies you have no business relationship with.

1.3. False Positives

1.3.1. With respect to email, a “False Positive” occurs when solicited or legitimate email is misidentified as spam. The occurrences of this are relatively a small percentage usually less then a single percentage point.

1.4. How can you use the white list?

1.4.1. As a Service Provider you can use the list to supercede your various block list.

1.4.1.1. This will reduce or eliminate any false positives due to content based filters.

1.5. What exactly do you mean by “Confirmed OPT-IN”?

1.5.1. The initial contact from the end user requesting to be placed on your mailing or subscription list.

1.5.2. You must then send a confirmation notice acknowledging the receipt of the request to be placed on the mailing or subscription list.

1.5.2.1. This confirmation request must contain a unique token, other then the email address of the recipient.

1.5.3. The recipient must then reply to your confirmation request with the token within the reply.

1.5.3.1. Any failure to respond to your request should be deemed as a forgery or an attempt to sign somebody up against their will and will be discarded as an attempt to sign somebody on to your list against his or her will and without his or her permission.

1.5.3.2. Any response that does not contain the unique token will be discarded as an attempt to sign somebody on to your list against his or her will and without his or her permission.

1.6. Why are email standards different then other types of marketing?

Electronic mail differs from any other form of marketing in that a regular dialup account can be used to send millions of spam and the spammer would pay no more the the cost of any other individual user even though the spammer consumed one million times the bandwidth. The spammer’s expenses will then need to be paid and the Service provider has no choice but to pass this on to each and every user they have with higher prices.

With all other forms of advertising, you have the option of not receiving the advertisement.
With regular postal mail you can merely mark the junk mail as refused and place it back in your receptacle.
With Telephones, you can just not pick up the telephone, if you are willing to pay for caller ID.
With Television, you can simply turn the channel, mute the sound or heaven forbid turn the television off.

With Electronic Mail, you have none of these options. If you fail to download the junk email, it will still be there the next time you fetch your mail. If your family, friends, business acquaintances or anybody else sends you an email you must first download the spam before you can retrieve the legitimate email.

This is the very essence of, “Forced Advertising” and is wrong

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>