New FTC Rule Requires Warning On Sexually Explicit E-Mail
An FTC rule that will take effect next month will mandate that such material includes a warning to inform recipients and ease filtering.
The Federal Trade Commission on Tuesday announced the adoption of a rule that requires sexually oriented material to include the warning "sexually explicit" to inform recipients and to facilitate filtering. The rule takes effect May 19 and keeps up with the requirements of the Can-Spam Act. This warning must be included in both the subject line of any E-mail that contains sexually oriented material and in the electronic equivalent of a "brown paper wrapper" in the body of the message.
According to the FTC, the "brown paper wrapper" is what the recipient initially will see when opening a message containing sexually oriented material. It will include the prescribed mark or notice, certain other specified information, and no other information or images. Such information or images may still be present in a message but not initially viewable in a preview pane or upon first opening the E-mail.
Jonathan Kraden of FTC's Bureau of Consumer Protection says the rule will allow E-mail recipients to better choose whether to view potentially objectionable content. Despite reports that Can-Spam has been ineffective in reducing the amount of spam, E-mail marketers fear the law will effectively reduce profits.
Three online marketing organizations--the Email Service Provider Coalition (ESPC), Interactive Advertising Bureau, and Truste--came out in opposition to what's expected to be the FTC's next regulatory salvo against spam: the establishment of a Do Not E-mail Registry. The FTC is preparing a report on the subject for Congress, as directed by the law.
Margaret Olson, chief technology officer at Roving Software Inc., an E-marketing ASP, and technology chair for the ESPC, contends that such a registry would be ineffective. "The problem with a Do Not E-mail Registry is that it won't do anything to stop spam and it will impose significant costs on businesses," she says.
Coalition members contend that those on the list would still get spam from criminal spammers--and that such a list would make a tempting target for hackers. Olson says the technology community would be better left on its own to focus on authentication, reputation, and identity solutions.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
2017 State of IT ReportIn today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.