Free Essay

Unsolicited Emails

In:

Submitted By pschuyler
Words 559
Pages 3
Patrick Schuyler
February 22, 2015
Business Ethics
Professor Christianson

Unsolicited Emails Unsolicited emails do much more harm than good in this world. It is very unethical for online companies to send out any spam or unwanted emails to any person who makes a purchase online. Maybe a receipt email from the company you bought from is ok, but receiving emails without asking from companies with similar products is ridiculous. These unsolicited emails could always have the chance of opening up some type of virus onto the device you open it with. According to chapter four, they are considered to be an invasion of one’s privacy. Also, these unsolicited emails are wrong and unethical because society prospers through the struggle of market-places. An invasion of someone’s privacy is clearly thought of as unethical which is in essence what companies are doing when they send out unsolicited emails. What happens when you open a spam email and it crashes your computer? Would you say that the email has invaded your life in a bad way? The answer is yes. These businesses invade people’s lives by sending emails to people who never want them in the first place. Citizens have the right to their own lives and who enters them. No way should someone else force something into your life without approval. As John Locke states, “Though the earth and all inferior creatures be common to all men, yet every man has a property in his own person; this nobody has any right to but himself.”
No matter who you are you get the right to your own self and the right to have as much privacy as you please which clarifies why unsolicited emails are unethical and should be illegal for businesses to send them. From a different stand-point, companies sending emails to people without their prior permission is wrong because according to Andrew Carnegie, you are hurting society with them in terms of wealth. In chapter 4, his article “defends the pursuit of wealth by arguing that society is strengthened and improved through the struggle for survival in the market-place”. Most unsolicited emails are ways and hopes of expanding the given company’s market by reaching out to as many people as possible without permission. Thus actually affecting the wealth of the company positively as well as affecting the overall economy and society negatively. One final reason proving that unsolicited emails are unethical in today’s society comes from the philosopher Karl Max. He is a believer that devaluation of the human world increases in direct relationship with the increase in value of the world of things. Every company hopes to increase the value of their business when they send out the unwanted emails and advertisements because maybe they will gain more customers. However like Marx said, increasing value ends up increasing the devaluation of the human world, thus being unethical. Without a doubt, companies are at complete fault when they send out unsolicited emails. They may be making more and more money by doing so but it is unethical because it has a much larger effect on hurting society. Philosophers in chapter 4 would say that they are so unethical because they are an invasion of privacy, a negative effect on society, and they increase the devaluation of the human world. It really should be illegal everywhere.

Similar Documents

Free Essay

You Decide 3

...You Decide Scenario: Week 3 Detecting and preventing insider threats is its own discipline, with its own dynamics. If you put these countermeasures in place, you can reduce the threat dramatically. First, you can use an IP packet-filtering router. This type of router permits or denies the packet to either enter or leave the network through the interface on the basis of the protocol, IP address, and the port number. The protocol may be TCP, UDP, HTTP, SMTP, or FTP. The IP address under consideration would be both the source and the destination addresses of the nodes. The port numbers would correspond to the well-know port numbers (Vacca, 2009). Packet filtering lets you control data transfer based on the address the data is, the address the data is going to, and the session and application protocols being used to transfer data. The main advantage of packet filtering is leverage. It allows you to provide, in a single place, particular protections for an entire network. Consider the Telnet service. If you disallow Telnet by turning off the Telnet server on all your hosts, you still have to worry about someone in your organization installing a new machine (or reinstalling an old one) with the Telnet server turned on. On the other hand if Telnet is not allowed by your filtering router, such a new machine would be protected right from the start, regardless of whether or not its Telnet server was actually running. Another advantage of a packet filtering router is that...

Words: 622 - Pages: 3

Free Essay

Aup Definitions

...following activities: * sending multiple unsolicited electronic mail messages or "mail-bombing" - to one or more recipient; * sending unsolicited commercial e-mail, or unsolicited electronic messages directed primarily at the advertising or promotion of products or services; * sending unsolicited electronic messages with petitions for signatures or requests for charitable donations, or sending any chain mail related materials; * sending bulk electronic messages without identifying, within the message, a reasonable means of opting out from receiving additional messages from the sender; * sending electronic messages, files or other transmissions that exceed contracted for capacity or that create the potential for disruption of the AT&T network or of the networks with which AT&T interconnects, by virtue of quantity, size or otherwise; * using another site's mail server to relay mail without the express permission of that site; * using another computer, without authorization, to send multiple e-mail messages or to retransmit e-mail messages for the purpose of misleading recipients as to the origin or to conduct any of the activities prohibited by this AUP; * using IP addresses that the Customer does not have a right to use; * collecting the responses from unsolicited electronic messages; * maintaining a site that is advertised via unsolicited electronic messages, regardless of the origin of the unsolicited electronic messages; * sending messages...

Words: 1017 - Pages: 5

Free Essay

Technology and Spam

...Spam is easily defined as unsolicited emails. There is a fine line between advertising and exploitation of privacy. Spammers (a company who does sends out the spam emails) finds email address’s by looking though internet forums, message boards, blogs, and news groups. People will often leave their email addresses when posting or responding in those online communities and spammers take advantage of those emails. How does spam work? Spam is a business in itself, well know companies come into into an agreement with a spammer, who generates email advertisements to a group of unsuspecting recipients. Spammers may also obtain one’s email address by purchasing them from companies that record email addresses and sell CD's full of them. The internet is a very vulnerable place where people can have their personal information expose. Majority of spam emails people receive are either junk or viruses. Spam is nothing but an annoying internet telemarketer. Most spam emails contains fake offers that require personal information, such as postal address, so they have another way to promote business by advertising to a new location. Every time someone receives a spam email their email address is exposed and distributed to other people. Businesses use a software which sends an email message to millions of people at the same time over bare mailboxes with useless junk and unnecessary requirements from the receiver that burden the recipients. Spam may be deleted by pushing the delete key, but why...

Words: 513 - Pages: 3

Free Essay

Consultant

...1. If you receive a spam email, what should be done? a. Reply to it Incorrect: Replying to spam mail will only signal that the address is active and would only result in more spam b. Don’t reply to it Correct: Spam mails should never be replied to and should be marked as spam so that all future correspondence gets blocked. c. Forward them to friends or colleagues Incorrect: Forwarding spam mail to friends or colleagues is unethical and will only cause their inbox to occupy unnecessary space. d. Forward them to your personal email address Incorrect: Spam mail should never be sent to one’s own personal email address as it will only occupy unnecessary space. 2. Which of the options below DOES NOT point to proper management of emails? e. Planning in some time to organize emails Incorrect: - Planning and organizing points to proper management of emails. f. Archiving emails on a periodic basis Incorrect: - Archiving on regular basis indicates proper management of emails g. Forwarding work related emails not pertaining to oneself, to the relevant person Incorrect: - Forwarding work related emails to the relevant person when it does not pertain to you is ethical and points to proper management of emails h. Using your official organizational email ID to correspond to friends and relatives Correct: - Your organizational email should never be used for friends and relatives as this is unethical and clear improper...

Words: 1293 - Pages: 6

Free Essay

It255 Unit 4 Aup

...purposes assigned to them, etc. These rules basically state that the computers are not to be used improperly or illegally during or after work hours at job sites. Verizon wireless “acceptable use policy” states that there should be no illegal use of their personal internet meaning that their services should only be used for lawful purposes only. This includes any unauthorized actions to illegal sites or violation of control laws. Their email use is prohibited for users to use illegally. NO commercial advertising or informational announcements are allowed. AT&T “acceptable use policy” prohibits any use of their services in any way illegally, unlawful, or harmful in any way to their company or any other company. Their AUP also doesn’t want any unauthorized access to pornography sites, inappropriate interaction with minors or threatening of material or contents. AT&T email services are not to be used for inappropriate emails or messages. Cox Communication email prohibits sending any unsolicited mail messages. Commercial advertising and informational email is spamming and prohibited as well. Their services are not to be used illegally for any purposes by users or employees. All three of these companies basically have the same laws/rules which from reading up on other companies are all the same but just worded differently. Acceptable use policy for Richman investment: Illegal Use The use of Richman...

Words: 430 - Pages: 2

Premium Essay

Policy

...Acceptable email use policy - sample template Use of email by employees of [business name] is permitted and encouraged where such use supports the goals and objectives of the business. However, [business name] has a policy for the use of email whereby the employee must ensure that they: • comply with current legislation • use email in an acceptable way • do not create unnecessary business risk to the company by their misuse of the internet Unacceptable behaviour The following behaviour by an employee is considered unacceptable: • use of company communications systems to set up personal businesses or send chain letters • forwarding of company confidential messages to external locations • distributing, disseminating or storing images, text or materials that might be considered indecent, pornographic, obscene or illegal • distributing, disseminating or storing images, text or materials that might be considered discriminatory, offensive or abusive, in that the context is a personal attack, sexist or racist, or might be considered as harassment • accessing copyrighted information in a way that violates the copyright • breaking into the company’s or another organisation’s system or unauthorised use of a password/mailbox • broadcasting unsolicited personal views on social, political, religious or other non-business related matters • transmitting unsolicited commercial or advertising material • undertaking deliberate activities that waste staff effort or networked resources ...

Words: 466 - Pages: 2

Premium Essay

Week 1 Assignment 1

...IS4550 Unit 1 Assignment 1 Internet-use policy for ABC Credit Union Purpose The purpose of this Acceptable Use Policy is to provide guidelines which will be applied in determining acceptable use of this Web site, and to notify you of the terms of this service. As a user of this service, you agree to comply with this policy, the stated acceptable uses and the terms of service. A signed Acceptable Use Policy must be signed by each faculty and staff. Online Conduct The intent of this policy is to make clear certain uses, which are and are not appropriate. ABC Credit Union will not monitor or judge all the content of information transmitted over this service, but will investigate complaints of possible inappropriate use. ABC Credit Union may at any time make determinations that particular uses are or are not appropriate with or without notice to you, according to the following guidelines. You must respect the privacy of others; for example: you shall not intentionally seek information on, obtain copies of, or modify files, other data, or passwords belonging to others, or represent themselves as another user unless explicitly authorized to do so by that user. You must respect the legal protection provided by copyright and license to programs and data. You must respect the integrity of computing and network systems; for example, you shall not intentionally develop or use programs that harass other users or infiltrate a computer, computing system or network and/or damage...

Words: 1035 - Pages: 5

Premium Essay

Acceptable Use Policy

...Acceptable Use Policy System and Network Activities The following activities are strictly prohibited, with no exceptions: Email and Communications Activities 1. Sending unsolicited mail messages, including, without limitation, commercial advertising and informational announcements, is explicitly prohibited. A user shall not use another site's mail server to relay mail without the express permission of the site. 2. Any form of harassment via email, telephone or paging, whether through language, frequency, or size of messages. 3. Unauthorized use, or forging, of email header information. 4. Solicitation of email for any other email address, other than that of the poster's account, with the intent to harass or to collect replies. 5. Creating or forwarding "chain letters", "Ponzi" or other "pyramid" schemes of any type. 6. Use of unsolicited email originating from within networks of other Internet/Intranet/Extranet service providers on behalf of, or to advertise any service. 7. Posting the same or similar non-business-related messages to large numbers of Usenet newsgroups (newsgroup spam). 8. Violate any applicable law or regulation; or Encourage or enable any other individual to do any of the activities prohibited in this Acceptable Use Policy. 9. Blogging by employees, whether using Richman Investments property and systems or personal computer systems, is also subject to the terms and restrictions set forth in this Policy. 10. Richman Investments Confidential...

Words: 354 - Pages: 2

Premium Essay

Persuasive Essay

...Assignment 1.2: Procedural Message - Revised Version Stacey Clark ENG 315 Professional Communications To: Horsham Staff CC: Mt. Laurel Staff, IT Staff Subject: CORPORATE POLICY – EMAIL & TEXTING Greetings Gateway Staff, As many of you are aware, recent events have led upper management to reiterate the importance of the email and texting policy here at Gateway. The nature of our work requires processing sensitive consumer information. It is imperative that you are mindful of what information is to be included in emailing and texting in order to protect consumer information. Below is the new Corporate Policy regarding emailing and texting. Read carefully and reply to this email. This will serve as your confirmation of receipt of this correspondence and your understanding and acceptance of the new policy. If you should have any questions or concerns, feel free to contact mikewarren@gatewayfunding.com. Acceptable email use policy Use of email by employees of Gateway Funding is permitted and encouraged where such use supports the goals and objectives of the business. However, Gateway Funding has a policy for the use of email whereby the employee must ensure that they: * comply with current legislation * use email in an acceptable way * do not create unnecessary business risk to the company by their misuse of the internet Unacceptable behaviour The following behaviour by an employee is considered unacceptable: * use of company communications...

Words: 602 - Pages: 3

Free Essay

Info Warfare Unit 3(Chapter 5 and Chapter 6)

...by extremists and military groups like KKK, Nazi’s, ISIS, as well as conspiracy theories and defamation about famous people. - Harassment is unwanted messages that threaten death or injury. - Advertising – uses perception management to compete for attention ad money of buyers - Censorship – It can be defensive or offensive. With the access to technologies people have in the [resent, it will be very hard to achieve. 3. Define “Spam Wars” and provide 3 historical examples. Junk email or Spam is a term denoting the unsolicited sending of typically commercial email, which can clog the receiver’s email box and can interfere with the delivery of desirable messages. It wastes resources and time. Sanford Wallace (a.k.a. Spam King) formed one of the first junk emailers companies Cyber Promotions. He was put out of business in March 1998 after agreeing to pay $2 million lawsuit brought by EarthLink Network inc. In 1998, Joseph Melle was held liable to AOL for sending over 60 million unsolicited e-mail advertisements to AOL members. The defendant was found guilty 4. Define the 6 acquisition...

Words: 318 - Pages: 2

Free Essay

Itt225

...new links, reposts, or referrals in the Service through the use of any engine, software, tool, agent, device or mechanism (including automated scripts, spiders, robots, crawlers, data mining tools or the like) other than the software and/or search agents provided by Richman or other generally available third party web browsers; •Send any unsolicited or unauthorized spam and spam comments on posts, advertising messages, promotional materials, email, junk mail, chain letters or other form of solicitation; •Send any unsolicited or unauthorized spam and spam comments on posts, advertising messages, promotional materials, email, junk mail, chain letters or other form of solicitation; •Use Richman user information to forge any TCP/IP packet header or any part of the header information in any email or newsgroup posting, or in any way use the Services to send altered, deceptive or false source-identifying information; •Attempt to decipher, decompile, disassemble or reverse engineer any of the software used to provide the Services; •Use Richman user information to forge any TCP/IP packet header or any part of the header information in any email or newsgroup posting, or in any way use the Services to send altered, deceptive or false source-identifying information; •Attempt to...

Words: 370 - Pages: 2

Premium Essay

Unit2

...or transmit information. This policy also applies to information resources owned by others, such as vendors or contractors of R.I., in cases where R.I. has a legal obligation to protect resources while in R.I. possession. This policy covers all of R.I. network systems which are comprised of various hardware, software, communication equipment and other devices designed to assist the R.I. in the creation, storage, processing, and transmission of information. This definition includes equipment connected to any R.I. domain or VLAN, either hardwired or wirelessly, and includes all stand-alone equipment that is deployed by the R.I.at its office locations or at remote locations. Acceptable Use Policy The use of the company network, internet, and email services by Richmond Investments employees is...

Words: 598 - Pages: 3

Free Essay

Markting Based Smart Phone

...Rettie, Brum COTIM-2001 Proceedings From E-Commerce to M-Commerce Editors: R .R. Dholakia, L. Kolbe, A. Venkatesh, & P. Zoche Kingston, RI: RITIM, University of Rhode Island, 2001. ISBN: 0-965440-2-6 M-COMMERCE: THE ROLE OF SMS TEXT MESSAGES Ruth Rettie, School of Marketing, Kingston University, United Kingdom Matthew Brum, MBA student, Kingston University, United Kingdom Email contact: R.Rettie@Kingston.ac.uk ABSTRACT This paper explores the marketing role of SMS text messages. While Internet based m-commerce has been disappointing, commercial applications for SMS are developing rapidly. The conceptual framework compares SMS to telemarketing and email marketing, and describes the key features of this new medium. Five distinct SMS business models are identified and discussed. We used quantitative research among mobile users to assess attitudes to SMS marketing. Most respondents were concerned about junk messages and wanted to control incoming messages. Initial attitudes to advertising in text messages were negative, but many were prepared to accept advertising in exchange for discounts or promotional offers. INTRODUCTION The development of Internet based m-commerce has been disappointing: restricted sites, slow download, small screens, and the limited number of handsets, currently constrain commercial development. At the same time companies are beginning to recognize the potential of SMS (Short Message Service) text messages, as a low cost, high impact ...

Words: 3717 - Pages: 15

Premium Essay

Social Engineering

...companies would assume if they setup authentication processes, firewalls, virtual private networks, and network-monitoring the software their network would be safe. Social Engineering bypasses the technical security measures and targets the human element in the organization. SOCIAL ENGINEERING ATTACK Social engineering attacks are personal. Hackers understand that employees are often the weakest link in a security system. One of the greatest dangers of social engineering is that attacks need not to work against everyone. A single successful victim can provide enough information to trigger an attack that can affect entire organization. There are numerous types of social engineering attacks including but not limited to Trojan and phishing email messages, impersonation, persuasion, bribery, shoulder surfing,...

Words: 948 - Pages: 4

Free Essay

Security Attack

...Information Systems Security By: Jessica Burnheimer, Kathleen Cline, Brian Weiss Outline for Group paper I. Introduction II. Issues concerning Information Systems Security A. Define IS security B. Why IS security is necessary? C. History and Back round of IS security D. Current issues concerning IS security 1.) Spamming 2.) Hacking 3.) Jamming 4.) Malicious software 5.) Sniffing 6.) Spoofing 7.) Identity Theft III. Solutions to contemporary IS security issues A. Solutions for “Spamming” B. Solutions for “Hacking” C. Solutions for “Jamming” D. Solutions for “Malicious Software” E. Solutions for “Sniffing” F. Solutions for “Spoofing” G. Solutions for “Identity Theft” IV. The Future of Information Systems Security A. New technologies and techniques effecting the future of Information Systems Security B. Tips and information regarding maintaining a Secure Information System C. How security issues will continue to shape Information Systems Management V. Conclusion Abstract The purpose of this paper is to discuss the pressing issues pertaining to Information Systems security. We will be covering the history of Information Systems Security, the current security issues, and why it is important to be knowledgeable in Information Systems security. Also, we will cover some solutions to the issues that...

Words: 4780 - Pages: 20