Good rules. Proper engagement tools.

Spam Unwanted Messages

Rocking out headphones laptop smartphone desktop cross leg on bed

Get Permission

Unwanted messages are annoying. Contact and communication has to be acceptable. We are free to consume information that we want. Advertising that we do not consent to is imposing without good reason.

It is proper netiquette to get permission before messaging. No spam.

Permission is acceptance. It is unclear to some what type of communication is acceptable. Advertisement must be welcomed for acceptance. Asking permission is the best way to gain it.

No Unwanted Contact

Published on April 12, 2015 0:32 Minutes

For the most part, permission to advertise is granted by using free web apps. A website is an HTML application. Mobile apps are similar. Providing an email address enables advertising as well.

Spam is an unsolicited message. A solicitation is a request. An unsolicited message is received without request.

Unapproved messages interfere with approved messages. They can be delivered to the same address. We use multiple emails and aliases to organize and protect our data. For example, personal interest newsletters are not appropriate for delivery to a professional email address.

No Spam

Published on October 29, 2011 1:58 Minutes

Sara and Terrance discuss spam. Do not spam. Answers the question, what is spam? Or more specifically, what is spam email?

Contacts lose contact when they get spammed. Many ignore unsolicited messages. Unsolicited messages are asking for money because it takes time to read them and time is money.

Hackers use malware, scare ware, and virus’s to steal information from computers up to and including every keystroke. Spam may include malware, scare ware, and virus programs. Often it takes a download to activate them.

Receiving unwanted communication may have many unforseen consequences. It is bad business. It can be annoying, data destroying, and or a waste of time. Granting permission is to be expected based on certain activities. Unexpected communication should be verified before opening because of the many hoaxes and hacks.


Get approval before sending and ignore unsolicited messages because it is a costly security risk.

30 day risk free trial. No credit card required.
Woman sitting smartphone on table

Core Rules