Spam Act 2003 Consumer Education and Awareness. About the ACA Independent government regulator Ensures industry compliance with legislation (Telecommunications.

Slides:



Advertisements
Similar presentations
What Are Scams? Scams are designed to trick you into giving away your money or your personal details. Scams come to you in many forms – by mail, ,
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Developed by Technology Services 1:1 Laptop Initiative
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
Today’s Agenda… Knowledge Check What is Cyber Crime? Identity Theft Phishing Common Scams inc. online and mobile phone scams Prevention Methods.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
The Internet.
What is identity theft, and how can you protect yourself from it?
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
The Do Not Call Register Act 2006 and The Spam Act 2003 Jane Cole Manager, Telemarketing Investigations Section Julia Cornwell McKean Manager, Anti Spam.
ONLINE SAFETY Online safety Money Works: Level 1 Topic 3.
What do I need to know?.   Instant Messages  Social Networking.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN OLDER AMERICANS PRESENTATION.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
1 Unsolicited Electronic Messages Ordinance An Overview of Implementation and Enforcement 28 May 2007.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Protecting Our Personal Space Security in a Virtual World.
ICT Essential Skills. (electronic mail) Snail Mail.
ICASAS206A Detect and protect from spam and destructive software Identify and Stop Spam Warren Toomey North Coast TAFE Port Macquarie campus.
Marketing - Best Practice from a Legal Point of View Yvonne Cunnane - Information Technology Law Group 30 November 2006.
Protecting Our Personal Space Security in a Virtual World by David Hines - Information Security Officer
Security Issues: Phishing, Pharming, and Spam
Spam and E-Security Bruce Matthews Manager, Anti-Spam Team International Training Program 11 September 2006.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
FRAUD, ONE OF THE FASTEST GROWING SEGMENTS OF OUR INDUSTRY Joseph Bajic, Chief Compliance Officer and Vice-President, Compliance.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Staying Safe Online Keep your Information Secure.
Scams & Schemes Common Sense Media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
1. Self Awareness You should only access your accounts and private informations from a safe location (only at home as necessary if at all possible) where.
ACMA - regulating spam and telemarketing Dannielle Evans Senior Lawyer International Training Program Melbourne, 4 September 2006.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
Spam for Breakfast, Lunch and Dinner: What will the Unsolicited Electronic Messages Bill do for Privacy? Graeme Crombie Senior Associate Minter Ellison.
Chapter 9 Sending and Attachments. 2Practical PC 5 th Edition Chapter 9 Getting Started In this Chapter, you will learn: − How works − How.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
What is Spam? d min.
RECENT DEVELOPMENTS IN DIGITAL MEDIA ADVERTISING LAW : CANADIAN EDITION VALERIE WARNER DANIN, ESQ.
Rules of Engagement Mark Dwyer. AGENDA 1.Spam and Consent 2.Privacy 3.Advice Warnings and Notices 4.Disclosures 5.Other Matters.
Cybersecurity Essentials Lesson 1 Protecting Your Identity ICT Demonstrate an Understanding of Internet Safety and Ethics 3.08 Identify and apply.
Section 6 Theory Issues with information found on the Internet.
Phishing and online fraud What parents need to know.
Laws and Rules That Govern Internet Safety Ashley Martin.
Chapter 9 Sending and Attachments. Sending and Attachments FAQs: – How does work? – How do I use local ? – How do I use Web-based.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Unit 4 IT Security.
Cybersecurity Awareness
What is it? Why do I keep getting from Barracuda? SPAM.
ethical issues in business
Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.
Freedom Independence Transition
Presentation transcript:

Spam Act 2003 Consumer Education and Awareness

About the ACA Independent government regulator Ensures industry compliance with legislation (Telecommunications Act 1997, Spam Act 2003) and with licence conditions, codes and standards Works with communications industry to achieve active self-regulation Monitors effect of regulations to ensure they meet community’s needs Consumer protection and education role

Fighting spam 1. Legislation 2. Education (business and consumer) 3. Industry partnerships 4. Technological solutions 5. International cooperation The Australian Government’s five-part strategy:

Spam: background information Spam is now over 60% of traffic Often carries viruses Linked to crime (fraud and scam s) Offensive content Threatening viability of Less than 2% of spam comes from Australian sources

Spam Act 2003 Took effect April 2004 ‘Unsolicited commercial electronic messages’ must not be sent Covers , SMS (text messages), MMS (multi-media messages) and iM (instant messaging) Does not cover faxes, telemarketing, pop-ups A single message can be spam

Spam Act 2003 Consent (express or inferred); Identify; and Unsubscribe All commercial electronic messages require: + No address-harvesting software or harvested lists

What is consent? Two types of consent: Express and Inferred How can I give express consent? –filling in a paper or web-based form –ticking a box –consenting in person or over the phone How can my consent be inferred? –strong existing business or other relationships –‘conspicuous publication’ of a work-related electronic address (conditions apply)

When can my consent be inferred? 1. Through a strong existing business or other relationship - Must be a ‘reasonable expectation’ of receiving commercial messages from that source - Casual or one-off transactions not enough 2. When your work-related electronic address is ‘conspicuously published’ -E.g. on website, newspaper, phonebook -Message must relate directly to nature of your work

Identify and Unsubscribe As well as meeting the consent condition, all commercial electronic messages must include: Information that allows you to identify the organisation that authorised the message; and An unsubscribe facility so you can ‘opt out’ of future messages -Must be easy to use, and at low or no cost to you -Requests must be honoured within 5 working days

Exemptions Designated Commercial Electronic Messages Are exempt from the Act’s consent and unsubscribe conditions But must include accurate sender information Designated messages include: - Purely factual information - Certain messages from: charities; government; religious organisations; registered political parties; educational institutions (past and present students + their families)

Spam reduction tips Protect your address from spammers: Try not to reveal your address when online Use different addresses for specific purposes Protect your mobile phone number too Read sign-up and privacy conditions carefully If you have a website: -List a non-personal address; and -Omit symbol; or -Post the address as a image, not text

Spam reduction tips Boost your internet security: Use filtering software to reduce incoming spam Don’t be an ‘accidental spammer’: ensure spammers can’t send spam through your computer or server. Protect yourself with… -Anti-virus software -Firewalls -Security patches -Long and random passwords -Treat attachments with caution

Unsubscribing from spam Check the subject line to judge the risk… Legitimate Australian businesses: -Goods or services usually genuine -Safe to unsubscribe -Should honour request within 5 working days Professional spammers: -Dubious content: Viagra, porn, get-rich schemes etc. -Risky to unsubscribe (tells spammer you exist!) -Best to delete message without opening it

scams and fraud Growing link between spam and crime Remember: if an offer sounds too good to be true… it probably is! Protect your personal information online Ignore s touting ‘get-rich-quick’ schemes Beware of phishing scams: - s that pretend to be from your bank, asking you to click a link to the bank’s website and enter your account details and password. Don’t be fooled!

Reporting spam You can report spam, or make a complaint about spam, through the ACMA’s website… Click on: ‘Reporting spam’