rfc3098.txt

来自「RFC 的详细文档!」· 文本 代码 · 共 1,537 行 · 第 1/5 页

TXT
1,537
字号






Network Working Group                                           T. Gavin
Request for Comments: 3098                       Nachman Hays Consulting
FYI: 38                                                  D. Eastlake 3rd
Category: Informational                                         Motorola
                                                            S. Hambridge
                                                                   Intel
                                                              April 2001


        How to Advertise Responsibly Using E-Mail and Newsgroups
                            or - how NOT to
                    $$$$$  MAKE ENEMIES FAST!  $$$$$

Status of this Memo

   This memo provides information for the Internet community.  It does
   not specify an Internet standard of any kind.  Distribution of this
   memo is unlimited.

Copyright Notice

   Copyright (C) The Internet Society (2001).  All Rights Reserved.

Abstract

   This memo offers useful suggestions for responsible advertising
   techniques that can be used via the internet in an environment where
   the advertiser, recipients, and the Internet Community can coexist in
   a productive and mutually respectful fashion.  Some measure of
   clarity will also be added to the definitions, dangers, and details
   inherent to Internet Marketing.

Table of Contents

   1.  Introduction ..............................................  2
   2.  Image and Perception of the Advertiser.....................  4
   3.  Collateral Damage .........................................  5
   4.  Caveat Mercator ...........................................  5
   5.  Targeting the Audience ....................................  7
   6.  Reaching the audience .....................................  8
       A.   Dedicated website or web page ........................  8
       B.   "Shared" Advertising website .........................  9
       C.   Netnews and E-Mailing list group postings ............ 10
       D.   Compiled E-Mail Lists ................................ 11
   7.  Opt-In Mailing Lists ...................................... 12
       A. Privacy ................................................ 13
       B. Integrity .............................................. 13
       C. Protection ............................................. 16



Gavin, et al.                Informational                      [Page 1]

RFC 3098                Advertising Responsibly               April 2001


   8.  Irresponsible Behavior .................................... 16
   9.  Responsible Behavior ...................................... 17
   10. Security Considerations ................................... 19
   Appendices .................................................... 20
     A.1  The classic Pyramid .................................... 20
     A.2  What about Ponzi? ...................................... 22
     A.3  So all multi-levels are evil? .......................... 22
     B.1  Why Web Privacy? ....................................... 23
   References .................................................... 25
   Authors' Addresses ............................................ 26
   Acknowledgments and Significant Contributors .................  27
   Full Copyright Statement ...................................... 28

1. Introduction

   The Internet is not a free resource.  Access to and a presence on the
   'Net comes at a cost to the participants, the service provider, and
   the recipients of those services made available by the Internet.  The
   more readily available internet has allowed users access to an
   unprecedented number of people.  Due to the rapid growth and
   "mainstream" acceptance of the 'Net, new opportunities have been
   found for the distribution of information to the vast and ever-
   growing community of Internet users.  There are groups and
   individuals who choose to use the 'Net for purposes for which it was
   not intended, thus defying the consensus among both the practitioners
   and the unwilling recipients.  The aforementioned practice, of
   course, is the sending of Unsolicited Commercial and Bulk E-Mail
   messages, posts to Netnews groups, or other unsolicited electronic
   communication.  This condition has caused an awakening on the part of
   the Internet community-at-large.

   There are stereotypes that must be broken before continuing.  Not all
   persons who are new to the Internet are ignorant of the 'Net's
   history and evolution, or its proper and ethical uses.  Nor are all
   experienced, long-term Netizens against the use of the Internet for
   advertising, marketing, or other business purposes.  Where these two
   groups can find commonality is in their opposition to the use of the
   Internet in irresponsible ways.  Some of these irresponsible uses
   include, but are not limited to, the sending of Unsolicited Bulk or
   Commercial E-Mail to mailing lists, individuals, or netnews groups.
   In the vernacular, this activity is called "spamming" (the sending of
   "spam" [1]).  To understand why such activities are irresponsible,
   one must first understand the true cost and ramifications of such
   actions.

   The protocols and architecture upon which the 'Net is built, which
   are recognized and adhered to as standards, provide for an openness
   and availability which foster and encourage easy communication.



Gavin, et al.                Informational                      [Page 2]

RFC 3098                Advertising Responsibly               April 2001


   These standards were developed at a time when there was no need to
   consider the concept of "rejecting" information.  While those
   standards have evolved, they continue to emphasize open
   communication.  As such, they do not associate costs or impact with
   the user-initiated activities which may occur.  Because of this
   openness, persons can and do send large volumes of E-Mail, with
   little-to-no cost or financial impact for the volume of messages
   sent.  Needless to say, this presents the attractive option (to those
   who would consider such activity) of multiplying the recipients of
   their marketing material, and presumably, increasing their success-
   rate.  However, and to reiterate an earlier statement in this text,
   there is a cost to be incurred at some point in this communication
   relationship.  In the case of E-Mail advertising, since the cost of
   operation does not increase on the part of the sender, it must
   therefore increase on the side of the recipient.

   And it does.  Every recipient of every E-Mail message bears a cost,
   either direct (cost per message received, an incremental increase in
   connection charges) or indirect (higher service fees to recoup
   infrastructural costs associated with the additional 'Net traffic
   which such mass-mailings create).  In addition, other resources, such
   as the disk space and time of the recipient, are consumed.

   Because the recipients have no control over whether or not they will
   receive such messages, the aforementioned costs are realized
   involuntarily, and without consent.  It is this condition (the
   absence of consent to bear the costs of receipt of a mass-
   distributed message) that has shaped the Internet Community's
   viewpoint - that the act of sending spam constitutes a willful theft
   of service, money, and/or resources.  Those who choose to ignore the
   financial impact, and instead focus on the consumption of indirect
   resources, have been known to label spam "Internet Pollution".

   The Internet provides a tremendous opportunity for businesses, both
   large and small.  There is certainly money to be made using the 'Net
   as a resource.  This paper recommends practices and ways to use the
   Internet in manners which are not parasitic; which will not, by their
   mere existence, engender predetermined opposition, litigation, or
   other negative conditions.  This paper does not guarantee freedom
   from those, or other negative responses - rather, it provides the
   reader with a framework through which the marketer/advertiser and the
   'Net community (and more importantly, the seller's target market) can
   coexist as well as possible.








Gavin, et al.                Informational                      [Page 3]

RFC 3098                Advertising Responsibly               April 2001


2. Image and Perception of the Advertiser

   While it may appear to be financially attractive to advertise via the
   use of Mass-Messaging ("spam"), as a responsible Internet user,
   ADVERTISERS SHOULD AVOID THIS OPTION.  The possibility of income
   generation and market or business expansion are minuscule when
   compared to some of the risks:

        -   The alienation of the vast majority of the recipients
            of an advertising message [2][3]

        -   The damage or loss of credibility in the advertisers
            market [2]

        -   Loss in advertiser's and/or seller's Internet
            connectivity (most service providers have strict
            "zero tolerance" policies which prohibit the use
            of their systems for the sending of spam, or
            for encouraging or enabling such activities)

        -   Civil and Criminal litigation.  In the United States,
            (and progressively in other sovereign states), it has
            become accepted as fact that the theft-of-service
            associated with spamming often constitutes an
            unlawful use of private property and is actionable
            as trespass to chattels (a civil law term
            tantamount to "theft") in civil court [4][5][6][7]
            [8].

   It is a fundamental tenet to any Internet presence that a party will
   be responsible for their Internet "image", or the personae that they
   create.  If an advertiser sells a product which is enjoyed by many,
   and the advertiser has not alienated, offended or angered a
   disproportionately larger number of uninterested recipients, that
   advertiser could be viewed as a hero.  Conversely, an advertiser
   broadcasting their product to millions of uninterested parties, at
   the parties' cost, will earn the advertiser the moniker of "spammer",
   thief, or other less attractive names.  The advertiser will be held
   responsible for those actions, and the effects those actions have in
   the marketplace, which is to say, the 'Net community.

   "On the Internet, nobody knows you're a dog." [9]  That was the
   caption to an illustration published in the 1990's.  The message is
   clear - the Internet renders all parties anonymous.  The methods used
   to sell products in the traditional sales channels - language, image,
   relationships, eye contact or body language - no longer apply when
   measuring an Internet sale.  Reputation, reliability, honesty,
   trustworthiness, and integrity have taken the place of the more



Gavin, et al.                Informational                      [Page 4]

RFC 3098                Advertising Responsibly               April 2001


   direct sales approaches that have been previously used.  These are
   dictated by the rate at which both information and misinformation
   travel on the Internet.  And, just as an Internet user cannot control
   what messages are sent to them, neither can the Internet marketer
   control the information that is disseminated about them, or their
   activities.  Some information will circulate that is not accurate.
   Perhaps there will be cases where there will be information
   circulating which is downright incorrect.  But, a successful market
   reputation, based on ethical behavior, will render the inevitable
   piece of misinformation meaningless.  For an advertiser to exist
   responsibly on the Internet is for the advertiser and seller to take
   active responsibility for their actions.

3. Collateral Damage

   As this paper has pointed out, there is ample reason to expect that
   the sending of spam will result in a significant level of undesirable
   reactions, targeted at the advertiser and/or the seller.  Death
   threats, litigation and retaliatory actions are commonplace.  For
   these reasons, "spammers" (and in particular, those entities
   providing mass-mailing services for third-party businesses) will
   frequently take steps to ensure their anonymity.  These actions take
   various forms, and have been known to include:

        -   Forging the sender name, domain name, or IP Address
            of the sender (called "spoofing")

        -   Sending messages through any type of hardware, software
            or system which belongs to an uninvolved third-party
            (called "relaying")

   Each of these activities, as well as numerous others, are criminal
   acts in many countries.  It is unethical to use the resources of any
   other party without their express permission. To do so breaches the
   laws of numerous jurisdictions and international agreements -
   offenders have been successfully prosecuted in numerous
   jurisdictions.

4. Caveat Mercator

   "Let the Seller beware."  Advertisers and Sellers can be held
   responsible for the appropriateness (or lack thereof) of the messages
   they send when applied to the recipients to whom the advertisements
   are sent.  For this reason, all prospective advertisers must first be
   absolutely certain that the recipients of their advertising are
   appropriate.  For example, sending an advertisement which contains a
   link to a website where content of an overt sexual nature is
   displayed can have many undesirable consequences:



Gavin, et al.                Informational                      [Page 5]

RFC 3098                Advertising Responsibly               April 2001


        -   In many countries, providing such material to under-
            age minors is a crime.  As the provider of the link,
            the advertiser's position is tenuous.

        -   In some countries, such material is a crime to view,
            possess, or distribute ("trafficking").  As the website
            owner or advertiser, a party engaging in such activities
            must consider the ramifications of international law.

   To prevent such risk, advertisers should qualify the recipients of
   their advertising.  However, it must be noted that E-Mail addresses
   provide little useful information to that end.  Remember, "On the
   Internet, nobody knows you're a dog."  Advertisers will have no way
   to qualify a prospective recipient as an adult with complete
   discretionary and plenipotentiary authority.  In other words, an
   advertisement targeting a high-income population in need of property
   investment opportunities may be sent to a group of school children.
   Or a dog.

   How then, does the prospective advertiser/seller determine the
   quality of their leads?  The essential requirement is that the
   advertiser "know" their audience.

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?