Understanding the CAN-SPAM Act
Learning Objectives and Outcomes
· Describe the requirements of the CAN-SPAM Act in regards to a given scenario.
· Create a draft marketing email that complies with the CAN-SPAM Act.
Assignment Requirements Company X, a cloud data storage provider, wants to send a mass email message to former customers announcing that it now offers managed IT services. That means Company X can remotely monitor and manage a client’s virtual computers and servers 24/7.
For this assignment:
Briefly describe the stipulations of the CAN-SPAM Act with regards to Company X. In other words, what must Company X do to adhere to the act? Address the following:
. Header information
. Subject line
. Company location
. Opting out
. Monitoring third parties
Create a draft email that complies with the CAN-SPAM Act.
Required Resources
· Course textbook
· Internet access
Self-Assessment Checklist
· I described requirements of the CAN-SPAM Act in regards to planning a mass marketing email.
· I create a draft of a marketing email that complies with the CAN-SPAM Act.
· I followed the submission guidelines.
Assignment 2: Email Presentation
Learning Objectives and Outcomes
· Design a PowerPoint presentation appropriate for middle school students.
· Describe how email works.
· Identify the kinds of email related information that a forensic specialist can uncover.
Assignment Requirements You are an employee of the DigiFirm Investigation Company. As part of its community outreach effort, the company is preparing a series of short presentations for local middle school students on computer-related topics. You have been asked to contribute a presentation that focuses on email.
For this assignment, create a PowerPoint presentation that includes:
· A graphic depiction of how email works
· The types of information forensic email investigations attempt to uncover.
Self-Assessment Checklist
· I designed a PowerPoint presentation that’s appropriate for middle school students.
· I described how email works and included graphics that support the process.
· I included the types of email-related information that a forensic specialist can uncover.