The use made of nominative or personal data on the internet and their transfer for trading purposes

AuthorGaraiman Daniela
Pages111-119
THE USE MADE OF NOMINATIVE OR PERSONAL DATA ON THE
INTERNET AND THEIR TRANSFER FOR TRADING PURPOSES
Ph. D. Associate Professor Daniela Gărăiman
Abstract: The paper analysis the use made of nominative or personal data on the Internet
and their transfer for trading purposes. The term spam does define electronically messages of
trading nature, which and user could receive, in his own e-mail box, in massive quantities and with
no request made for them. The cookies are local data files, passive, encrypted and personalized,
which are inserted by the sites on a computer, through the surfing browser, at the moment when
they would be accessed by the surfer. In recent years, the use of e-mail inside of companies has
hugely amplified, this mean of communication becoming unavoidable. More and more companies
place at the disposal of their employees computers with access to Internet and one or many e-mail
addresses.
Key words: spam, cookies, internet transfer.
1. The spamming. Definition and functioning
The term spam does define electronically messages of trading nature, which and user could
receive, in his own e-mail box, in massive quantities and with no request made for them. They
belong to the category of unrequested messages of whatever nature (economical, political, cultural,
religious, etc.) received, with no request, in massive quantities, by an user, in his own e-mail box. In
this category might be included the following types of messages:
- concatenated letters;
- pyramidal schemes;
- marketing made upon several levels;
- schemes with instructions about a quick welfare to be obtained through the network;
- offers made for pornographically sites;
- offers made for pirate software’s; etc.
The sending of unrequested messages might be realized as a result of previously collecting
e-mail addresses. This collection might be realized in various ways:
- due to the user's wilful registration on a certain website;
- from a list of e-mail addresses provided to the spammer by third sides;
- through automatically collection of e-mail addresses from the public space of Internet
(webs, forums, etc.).
For the forwarder, the use of spam does not involve high financial investments or a lot of
time to spend on it as he makes no effort in order to verify the addresses that he has collected by
fraud. Generally, to launch such messages are employed automatically programs for collecting the
addresses and accounts from free servers to release the messages.
There are three main modalities possibly used for sending spams:
1. to use your own e-mail servers;
2. to use servers provided by suppliers specialized in the domain of e-mail;
3. To use the e-mail servers of other Internet users, which have no protection system in this
regard, or are not sufficiently protected.
Among the collecting methods, the most controversial in regard to the protection of personal
data is the automatically collection of e-mail addresses from the public space of Internet. In the case
of the other two methods, it is known that the user has wilfully agreed to provide his own address
for registration. On the other hand, though the forwarder makes almost no investments for
spamming, it might become expensive for their recipient to cope with such e-mails. So, the recipient
might waste some time to erase them, either as simple messages from his e-mail box, or by
following the method indicated by the message itself in order to erase his own e-mail address from
the forwarder's list. The problems might not end yet, since the previously indicated erasing method

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT