Web Hosting Articles

  Home arrow Web Hosting Articles arrow Page 4 - Protecting Your Customers from Spam
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
Support 
 USERNAME
 
 PASSWORD
 
 
  >>> SIGN UP!  
  Lost Password? 
WEB HOSTING ARTICLES

Protecting Your Customers from Spam
By: Terri Wells
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 2
    2006-07-19

    Table of Contents:
  • Protecting Your Customers from Spam
  • Know Your Customers
  • Technical Preparation
  • Have an AUP

  • Rate this Article: Poor Best 
      ADD THIS ARTICLE TO:
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article
     
     

    SEARCH WEB HOSTERS

    TOOLS YOU CAN USE

    advertisement

    Protecting Your Customers from Spam - Have an AUP


    (Page 4 of 4 )

    Another big step you can take to help prevent your web hosting business from becoming a victim of spammers is to have an Acceptable Use Policy (AUP). You could include a stiff penalty for spamming, although it may be questionable whether that will bother a truly hard-core spammer. Still, such a policy will help you keep your customers honest.

    If you don't yet have an AUP, Spamhaus has a resource that will let you generate one automatically (http://www.spamhaus.org/isp/create_aup.lasso). It also has a number of examples of good AUPs on its web site (http://www.spamhaus.org/aups.html). With these tools, you should be well on your way to writing a good policy

    Not only do you need to have a good AUP; you need to make sure your customers are aware of it. For example, Shaefer notes that iPost confirms its "solicited mail only" policy verbally with every customer before completing a service agreement. If you choose to include any special clauses directed at preventing specific abuses, you might want to verbally confirm those as well. For example, one company's AUP bans the use of its systems for "drop boxes" in spam sent somewhere else.

    Finally, you need to enforce your AUP. That means you need to be proactive. "This does not mean instantly terminating a customers because of a complaint, because forgery is so common in spam that many complaints are misdirected," according to Shaefer. "However, it does mean evaluating the accuracy of every complaint, investigating those that appear legitimate, and taking action if a pattern of abuse emerges."

    Dealing with spam is not an easy task. It isn't going to go away overnight. But by taking these steps, you can reduce the problem for you and your customers to something more manageable.


    DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware.

    WEB HOSTING ARTICLES ARTICLES

    - Top Wordpress Plugins for SEO
    - Top Drupal Evaluation and Rating Modules
    - Free Network Monitoring Programs for Max Per...
    - E-store Hosting: Free Options for Beginners
    - Dropbox: The Ultimate File-Sharing and Synci...
    - Reviewing the Best Free Web Hosting Sites
    - Businesses Turn to Reseller Web Hosting for ...
    - Multiple Data Center Hosting
    - Web Hosting Goes Green
    - Web Hosting Technology Overview
    - Collaborate: An Examination of Tools for Gro...
    - Social Networking Security
    - Domain Names 101
    - Top Software to Help Manage Your Websites
    - The Evolution of Phishing

    Developer Shed Affiliates

     




    © 2003-2017 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap