Messaging Pipeline | Blog
Free Newsletter GlossaryContact UsAbout Us
One To One Collaboration Servers & Security Business


August 11, 2005
Strange Bedfellows

You might think that Individualized Lifecycle Marketing, phishing and other fraud schemes, and a court case that allowed the University of Texas to block unsolicited marketing messages from entering the campus e-mail system, make for strange bedfellows, but you shouldn't. They're connected by a broad, sticky cord of despicable human beings ranging in class from pranksters all the way down to gangsters. Whatever they are, they're slime and nothing more -- all of them!

When Responsys came to me and said the company was updating and modernizing the individualized e-mail marketing strategy available to its customers, I was relieved to have something besides fraud and viruses and spam to cover (see A Quick Intro To Individualized Lifecycle Marketing). But at the same time the University of Texas decision came down (see Court OKs Blocking of Unsolicited E-Mails) which said, in effect, that even though the messages being sent to students were legitimate marketing messages and did not violate the CAN-SPAM act or any other anti-spam laws, the university could block them simply because they were unsolicited.

Maybe you think that's a good thing, and in a different era, I might too. But the almost knee-jerk reaction we all have against e-mail messages that come without our control or permission is the result of the terrifying amount of spam, virus, and phishing attacks that come to us on a daily, nay on a minute-by-minute, basis.

It's a shame. E-mail marketing is a source of commerce, and not at all a bad thing, but it is cast in the shadow of malicious behavior that has overwhelmed the e-mail paradigm. That's a damned shame.

Posted by John Dickinson at 11:18 AM | Permalink

Comment on this blog entry



 


March 2006
Sun Mon Tue Wed Thu Fri Sat
      1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31  

Monthly Archives













Messaging Pipeline










Get the latest Messaging news, product info, and trends every week.



  Get The Messaging Pipeline Blog RSS Feed




Editorial and vendor perspectives








  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  


Editor's Picks
The Six Flavors Of Windows Vista
Microsoft plans to release a full six-pack of Vista versions, one for every taste. Which Vista will be right for you?

Hope is Not Enough When It Comes To Compliance

Three Ways To Authenticate E-Mail And Stop Spam

Wikis In The Workplace

Review: Google Desktop 3
MESSAGING PIPELINE MARKETPLACE (sponsored links)

Digital Warehouse buys, sells, & rents used Cisco networking hardware such as routers & switches, as well as Juniper, Extreme & Foundry at 50-80% off list price. One year warrantee and fast delivery.


Stop spam on your terms with CanIt-PRO, the most flexible and customizable anti-spam solution available for the mail server. Offers per-user or per-group controls and is available as software or hardware appliance.


Use your Intranet to manage Software Licenses, plan for Windows XP/2000 upgrades, do Security Audits and more. Click to try and ask for our white paper - PC Management for the Internet Age.


Analysts at the Tolly Group put a leading Branch Office IT services solution to the test, measuring performance, security and data reliability. Download the results, detailed in this free report, now.


Whether you need temporary or permanent access to remote PCs, LogMeIn has your solution: LogMeIn IT Reach for automatic maintenance of remote and mobile systems, and LogMeIn Rescue for instant, web-based remote access without pre-installing software.






Sponsored Links:      
 |   |   |   |   |   | 
 |   |   |   | 
 |   |   |   |   | 
Messaging Pipeline  |   |   |   | 
 |   |   |   |   | 
© 2006 | MESSAGING PIPELINE All rights reserved. | |