Electronic mail | e-mail | Part 4

Electronic mail | e-mail | Part 4

Electronic Mail or e-mail – Abuse

The SMTP protocol has no means to prevent abuse of the mail system, in particular there are no simple and effective tools to control which messages are delivered in box of a user (authorization), and also reported no sender authentication by a message . This includes the possibility of different types of abuse.

The main improper use of email is spam, many users sending massive amounts of spam, usually advertising commercial nature. According to some sources, the impact of these messages would reach two-thirds of overall e-mail.

Another negative phenomenon is from chain letters, messages that contain alarming information, promises of quick profits or outright hoaxes, and invite you to forward the message to their friends, sometimes finishing move for months or years.

It is also possible to falsify the name and return address displayed in the client program of the recipient, causing the user to assume a reliable message entirely false. This vulnerability is being used to build real scams or jokes that rely on trust that most people mistakenly puts the “sender” of an email message. Even worms that replicate by mail using this mechanism in order to induce you to try to pay interest or confidence in a message, so that the open and install any infected attachments.

E-mail privacy

For various reasons, email addresses are often available on the Internet:

  • Knows who receives an e-mail addresses of the sender and all recipients “clear” (To: and Cc:). If the mail is forwarded, these addresses are often visible to the recipient in this way.
  • Many mailing lists have a public archive accessible via the Web, where you can find the addresses of those who sent a message to the mailing list. A similar phenomenon occurs with Usenet
  • Sometimes you publish your e-mail on your home page, or contact for specific purposes.

All these addresses are at risk of being harvested by automated tools to create mailing lists used to send spam.

If you protest with the companies who have sent e-mails often see you say that his address had been found on the Internet and this is considered in effect the public domain, and that there was therefore no violation of privacy.

Intervention by Supervisor

The Guarantor of privacy and declares that email should have the same protection of the ordinary. Even if the network allows a wide knowability of e-mail addresses, is considered illegal to use such personal data for purposes other than those for which there are on-line (including the sending of commercial messages, advertising, etc.) It is therefore mandatory to avoid violating the privacy of users, make their consent before using their e-mail for any purpose.

E-mail privacy in the workplace

The problem is one part that the employer wants to make available the tools (internet, e-mail, etc.) are used only for strictly business purposes and other legitimate protection of personal data of the employee . The authority ruled that the employer may monitor employees’ e-mail only in rare cases. Have defined the rules for using email at work, it is for the same employer to fix the ways permitted within the company for use of the Internet and e-mail and especially on whether the controls are carried out. So, ultimately the most effective solution is the adoption by the holding of an internal regulation, involving the trade unions.

Problems also occur when an employee is absent and the employer or a supervisor assumes that the address have been sent messages work where access is necessary for the operation of the company. These situations can be prevented by creating mailboxes associated with particular offices or persons beyond those individuals, and using these boxes for work that can be handled by more people.

Privacy of communications

Another problematic aspect is the treatment of the contents of a message is received. Generally, each message is to be considered for persons to whom it is addressed, and then forward it would not be legitimate or at least have it read by others. Like any other type of information exchange mail or telephone, however, the protection of privacy is limited to the transfer between the sender and recipient, but is free to use the message as he believes, of course, assuming all the responsibility front of the sender and the law.

Certified electronic mail

The Certified E-Mail is an email service that allows you to obtain a guarantee of receiving the message from the recipient and integrity of the received message.

In Italy today, for example, to send a certified e-mail in the forms established by law (in particular the Decree 68/2005 and Decree no. 82/2005 Digital Administration Code), shall be treated for all purposes of law to the posting of a recommended paper with receipt. For the purposes of the Act, the message is considered delivered when the recipient is available in your mailbox.

The mechanism is that the operator of certified electronic mail, when they assume responsibility for the email sender, it sends a receipt of acceptance, which certifies that it has sent. At a time where instead the operator deposits the message in the box of the recipient, the sender sends a delivery receipt certifying receipt. Both the receipt of acceptance accept that the receipt is in electronic format, and they are digitally signed by the operator.

If the operator of the certified mail sender is different from the transmission recipient, has an additional step: the operator of the recipient, when receiving mail from the sender’s operator, issue a receipt of funding, in electronic format , which affix its signature. If the electronic mail manager is unable to file the recipient’s mail box, send an acknowledgment of failure to deliver. Managers of certified mail have an obligation not to accept mails containing viruses.

Managers of certified mail are individuals who must possess a number of requirements established by law (must, for example, possess the same integrity requirements for the business banking, and having a share capital of not less than 1 million ), and can operate only if authorized by CNIPA, the National Centre for IT in Public Administration.

Governments can managers be certified electronic mail, but in this case addresses issued are valid only limited to exchanges of mail between the owner and the Administration to address the issue.

Study: From Wikipedia, the free encyclopedia. The text is available under the Creative Commons.

Sharing