ISPA publishes anti-spam standard

The Internet Services Providers’ Association (ISPA) has published new recommendations for ISPs regarding spam.

The Internet Services Providers’ Association (ISPA) has published new recommendations for ISPs regarding spam.

ISPA believes that in order to combat spam effectively action is required from the internet industry, the government, law enforcement agencies and end-users. 

The self-regulatory measures set out in the recommendations should be backed-up by effective laws enabling action to be taken against persistent spammers, said ISPA.

Jessica Hendrie-Liaño, chair of the ISPA council, said, “ISPs hate spam. It saps valuable bandwidth, can compromise the integrity of a network and affects the performance of mail servers. Combating spam costs ISPs and their customers very significant amounts of time and money.”

ISPA advises consumers to protect their PCs with firewalls. This prevents them from being turned into zombie PCs by spammers, creating an open relay which allows the computer to be hijacked and used to mail
spam and send out viruses.

A recent study showed spammers use zombie PCs to distribute over 80% of spam across the internet.

Hendrie-Liaño said ISPs should reduce spam by ensuring that their email systems will not relay e-mail for unauthorised third parties, and that all e-mail generated within their network can be traced back to its source. 

Effective abuse procedures should also be in place to make reporting of spam easier, and users should be informed of other services provided by their ISPs to help keep spam to a minimum, she said.

Many users however would be surprised to find out if such measures weren’t already in place at their ISP.

More details on the recommendations can be viewed at:

Comment on this article:



Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT risk management



Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:




  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...