Skip to main content

What is spam?

 



Any unsolicited voice and data communication received without consent irrespective of its usefulness and intent can be considered as spam. Most common forms of spams are unsolicited email, text messages, phone calls and software downloads which happens at application layer.

Various countries around the world including Canada had made certain legislation and laws to prevent spams referred as Canadian Anti-Spam Law (CASL).  More information about CASL can be found at https://www.fightspam.gc.ca/eic/site/030.nsf/eng/home

 



According to CASL spams can include

  • -  unauthorized alteration transmitted data  which means any modification which was sent electronically should not be altered before it arrived to destined user.
  • -       the installation of computer programs without consent while providing IT support or hitchhiking with other software download and installation
  • -   false or misleading electronic representations as scam artist in form of phone call or website landing page.
  • -      the harvesting of addresses  which could include collecting and/or using email or other electronic addresses without permission or knowledge of the user or company whose data is being collected
  • -    the collection of personal information by accessing a computer system or electronic device illegally

 



What it means for businesses?

-         

Business has to be more disciplined in managing their electronic marketing programs and follow provided guidelines for consent and provide unsubscribe options for receiving users.

-          Collect information and data from public platforms where users have provided their consent to be used and accessed by third party and open public for use

-          Avoid data harvesting using prohibited means and allow users to provide consent on what data is being collected and what is purpose of data collection as well as who will have access to that collected data.

-          Sharing of collected data must  be limited to what users have provided consent for and cannot be used for reselling or other unauthorized means which can affect users negatively by any direct or indirect means

 

 

Learn more about how not to spam users and what best practises to follow to stay within guidelines of CASL by email at estiopi.cybersafe@solnetcanada.com

Comments

Popular posts from this blog

CYBERSECURITY BASIC TIPS - How to protect yourself from hacking ?

Work from Home and Remote Access for Small Business

  Work from Home and Remote Access for Small Business   This pandemic has taught us many things and one of those things includes being flexible and adaptable in business. Not all business has opportunities to be completely flexible and adaptable according to business situations but all business has certain avenues to do so. Adaptability can be seen as being lean in operations, reduce overhead costs, revisiting technology and recurring expenses, offering employee flexibility, entering into online marketplace, creating digital presence and marketing, reducing maintenance costs are to name a few. If researched properly, many businesses needs just few small steps can help cover the basics and make business more flexible to be adaptable. Every business is different with varying scope of changes. Many businesses which are office based, who share common space and technology to perform day to day tasks. A work from home setup is very fruitful for those businesses as it allows to be lea

Business Phone System ( Managed VOIP PBX)

  Business Phone System ( Managed VOIP PBX) Phone systems for business is no longer just  a tool for making and receiving calls. It's an important tool to connect and collaborate with team members and customers using audio, video, text, file sharing, conference calls and more with flexibility to be able to communicate while at office, working from home or off-site or at away location. For most businesses, their phone is their primary point of contact with their customers. Any disconnection or call drops or issues with the phone system  means your business is missing out  from current and potential customers, and you are at the complete  mercy of the traditional  telecom service provider while you wait for your service to be restored. Typically, businesses implement  a phone system in the work environment  to connect and collaborate. For the longest time businesses have been choosing what's available or been referred or been approached  at that given time and once a working syst