Book Image

SpamAssassin: A practical guide to integration and configuration

Book Image

SpamAssassin: A practical guide to integration and configuration

Overview of this book

As a busy administrator, you know Spam is a major distraction in todays network. The effects range from inappropriate content arriving in the mailboxes up to contact email addresses placed on a website being deluged with unsolicited mail, causing valid enquiries and sales leads to be lost and wasting employee time. The perception of the problem of spam is as big as the reality. In response to the growing problem of spam, a number of free and commercial applications and services have been developed to help network administrators and email users combat spam. Its up to you to choose and then get the most out of an antispam solution. Free to use, flexible, and effective, SpamAssassin has become the most popular open source antispam application. Its unique combination of power and flexibility make it the right choice. This book will now help you set up and optimize SpamAssassin for your network.
Table of Contents (24 chapters)
SpamAssassin
Credits
About the Author
About the Reviewers
Introduction
Glossary

Employees


For a corporation, the employees can be a source of spam. They may accidentally reveal email addresses at unsafe locations on the Web in any of the ways mentioned in this chapter.

It is important, therefore, to create a policy for email usage that employees must adhere to. To minimize spam, it should cover guidelines on:

  • Limiting the usage of a corporate email address and forbidding private use

  • Publishing a corporate email address on the Internet or Usenet

  • Posting to mailing lists that are archived without protecting the email addresses

Another risk is that of a rogue employee, who may take an employee directory, a client list, or a collection of email addresses, and sell them. Often, this happens when the employee leaves the organization.

This is a crime in most countries. Unfortunately, it is difficult to detect and harder to prove. A company should protect its customer list and limit access to only those who need to use this information. Ideally, there should be a log of when email...