2
VOLUME XI ISSUE 3 MARCH 2020 OTTAWA ON TECHLORE “Insider Tips to Make Your Business Run Faster, Easier and More Profitable” INSIDE THIS ISSUE: Canadian Anti-Spam Legislation, What You Need to Know Page 1 Gadget of the Month Page 1 Best Antivirus Software You Should Know About Page 2 Using Virtual Reality in Business Page 2 What is AWS and Why has it Attained so Much Success? Page 2 Tech Tip of the Month Page 2 Benefits of 5G Connectivity Over 4G Connectivity Page 2 Call to Action Page 2 "As a business owner, you don't have time to waste on technical and operational issues. That's where we shine! Call us and put an end to your IT problems finally and forever!" -Jim Stackhouse NeoLore Networks Canadian Anti-Spam Legislation, What You Need to Know The Canadian Anti-Spam Legislation CASL, came into effect on July 1st, 2014. Full implementation was, however, postponed for three years to allow organizations to prepare for the changes. CASL sanctions the transmission of unsolicited mail and the illicit harvesting of addresses. The anti- scam legislation, one of the world’s most stringent, aims to prevent fraud, spam and malware. Who must comply with CASL? The law applies to all businesses and individuals who send electronic messages which encourage any kind of commercial activity. Electronic messages that contain adverts or promotions all fit into this category. Implied consent Implied consent comes about through a set of circumstances or personal actions. Consent may be implied under the following conditions: If the person or business has an existing business relationship with the sender. If customers give you their email address without explicitly informing you that they don’t want unsolicited messages, they are deemed to have consented to the receipt of CEM’s. Likewise, if you broadcast your email address on the Internet without specifically saying that you don’t want unsolicited mail, you have given consent to such mails by implication. Express consent Express consent requires actions from both parties. Unlike implied consent, express consent has no expiry date. Your request must include the following information: The reasons for the request The Identity of the person or business seeking consent and if that consent is for a third party the identity of the person for whom it is sought Contact information of the parties involved Information on how to revoke consent The recipient must manually opt- in. There can be no pre-checked opt-in boxes. Proof of consent When it comes to proving consent, the burden of proof lies with the organization sending the CEM. Documented proof should include: Date, time and IP address, electronic forms or signed consent Company policies and procedures in respect of CASL Consent methods used Opt-out requests and actions. Sending commercial electronic messages All CEMs must identify the sender along with their contact information. They must also contain a link through which the recipient can unsubscribe. The link must be quick, simple and easy to use, fully functional and the link must be obvious, easy to see, and it must be valid for 60 days. It must allow companies to have 10 days to action the unsubscribe request. Penalties CASL makes provision for severe penalties. These include provisions for criminal charges, civil charges and, in the case of directors or officers of the organization, personal liability. The Canadian Radio-television and Telecommunications Commission CRTC is responsible for policing the laws and applying penalties. They take contraventions of the law seriously. Learn More The Canadian Anti-Spam Legislation contains some of the most stringent anti-spam laws in the world. To avoid penalties and the bad publicity that will follow legal action, it is essential that organizations take steps to ensure that they don’t break the law. Download the CASL Guide here: www.neolore.com/casl August Smart Lock Never worry about losing or forgetting your keys. Never have a second thought if you remembered to lock the door. Let those guests in who showed up early while you were out. Unlock your door with the press of a button, from anywhere! The August Smart lock easily fits over your existing deadbolt. With the optional Wi-Fi bridge, you can have full control of your door from anywhere for the most convenient, secure, and smart to get in and out of your home. https://august.com www.neolore.com 2781 Lancaster Rd, Ottawa, ON K1B 1A7 (613) 594-9199 | [email protected] PAGE 1

Canadian Anti-Spam Legislation, What You Need to Know

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Canadian Anti-Spam Legislation, What You Need to Know

VOLUME XI ISSUE 3MARCH 2020OTTAWA ON

TECHLORE “Insider Tips to Make Your Business RunFaster, Easier and More Profitable”

INSIDE THIS ISSUE:Canadian Anti-Spam Legislation,What You Need to Know

Page 1

Gadget of the Month Page 1

Best Antivirus Software You ShouldKnow About

Page 2

Using Virtual Reality in Business Page 2

What is AWS and Why has it Attainedso Much Success?

Page 2

Tech Tip of the Month Page 2

Benefits of 5G Connectivity Over 4GConnectivity

Page 2

Call to Action Page 2

"As a business owner,you don't have time towaste on technical andoperational issues.That's where we shine!Call us and put an endto your IT problemsfinally and forever!"-Jim StackhouseNeoLore Networks

Canadian Anti-Spam Legislation, What You Need to Know

The Canadian Anti-SpamLegislation CASL, came into effecton July 1st, 2014. Fullimplementation was, however,postponed for three years to alloworganizations to prepare for thechanges.

CASL sanctions the transmission ofunsolicited mail and the illicitharvesting of addresses. The anti-scam legislation, one of the world’smost stringent, aims to preventfraud, spam and malware.

Who must complywith CASL?

The law applies to all businessesand individuals who sendelectronic messages whichencourage any kind of commercialactivity. Electronic messages thatcontain adverts or promotions allfit into this category.

Implied consentImplied consent comes aboutthrough a set of circumstances orpersonal actions. Consent may beimplied under the followingconditions:

• If the person or business has anexisting business relationship withthe sender.

• If customers give you their emailaddress without explicitlyinforming you that they don’t wantunsolicited messages, they aredeemed to have consented to thereceipt of CEM’s.

• Likewise, if you broadcast youremail address on the Internetwithout specifically saying that youdon’t want unsolicited mail, youhave given consent to such mailsby implication.

Express consentExpress consent requires actionsfrom both parties. Unlike impliedconsent, express consent has noexpiry date. Your request mustinclude the following information:

• The reasons for the request

• The Identity of the person orbusiness seeking consent and ifthat consent is for a third party theidentity of the person for whom itis sought

• Contact information of the partiesinvolved

• Information on how to revokeconsent

• The recipient must manually opt-in. There can be no pre-checkedopt-in boxes.

Proof of consentWhen it comes to proving consent,the burden of proof lies with theorganization sending the CEM.Documented proof should include:

• Date, time and IP address,electronic forms or signed consent

• Company policies and proceduresin respect of CASL

• Consent methods used

• Opt-out requests and actions.

Sending commercialelectronic messages

All CEMs must identify the senderalong with their contactinformation. They must alsocontain a link through which therecipient can unsubscribe. The linkmust be quick, simple and easy touse, fully functional and the linkmust be obvious, easy to see, andit must be valid for 60 days. Itmust allow companies to have 10days to action the unsubscriberequest.

PenaltiesCASL makes provision for severepenalties. These include provisionsfor criminal charges, civil chargesand, in the case of directors or

officers of the organization,personal liability. The CanadianRadio-television andTelecommunications CommissionCRTC is responsible for policingthe laws and applying penalties.They take contraventions of thelaw seriously.

Learn MoreThe Canadian Anti-SpamLegislation contains some of themost stringent anti-spam laws inthe world. To avoid penalties andthe bad publicity that will followlegal action, it is essential thatorganizations take steps to ensurethat they don’t break the law.

Download the CASL Guide here:

www.neolore.com/casl

August Smart LockNever worry about losing orforgetting your keys. Never havea second thought if youremembered to lock the door. Letthose guests in who showed upearly while you were out. Unlockyour door with the press of abutton, from anywhere!

The August Smart lock easily fitsover your existing deadbolt. Withthe optional Wi-Fi bridge, you canhave full control of your doorfrom anywhere for the mostconvenient, secure, and smart toget in and out of your home.https://august.com

www.neolore.com2781 Lancaster Rd, Ottawa, ON K1B 1A7

(613) 594-9199 | [email protected]

PAGE 1

Page 2: Canadian Anti-Spam Legislation, What You Need to Know

VOLUME XI ISSUE 3MARCH 2020OTTAWA ON

Best Antivirus Software You Should Know AboutMaking the best choice of antivirussoftware can be a dauntingchallenge in the current crowdedantivirus market. Keep reading tolearn about the best antivirussoftware that you should knowabout.

Norton Antivirus Plus

Norton Antivirus Plus boastsseveral customization options andimpressive features galore. One ofthe splendid features includes aURL blocker that safeguards usersfrom malware by obstructing visitsto known harmful websites.This antivirus runs continuouslyand provides the full scanningoption whenever the user wants.

The Norton Antivirus Plus alsofeatures a Norton Identity Safe.This is essentially a passwordmanager for the web browser. Ithelps you to manage and secure

your personal information andpasswords that you rely on foryour important online activities.The Safety Dashboard shows thehealth of the passwords and loginswhich are stored in the cloudvault.

ESET NOD32 Antivirus

The ESET NOD32 Antivirus is oneof the most effective andadvanced protection you can findto counter today’s large volumesof internet threats that include butare not limited to Trojans, viruses,spyware, worms and ransomware.

This antivirus program is anincredibly useful security suite thatencompasses the features ofadvanced heuristic detection, real-time malware protection, an anti-ransomware layer and URLfiltering to block access to harmfulwebsites. It also includes modules

for thwarting attacks usingdefense against harmful scripts, ascanner for Universal Serial Busstorage devices and a UEFI(Unified Extensible Firmware)scanner to provide protectionduring boot process.

Kaspersky Antivirus

The Kaspersky Antivirus providessound security for beginners andexpert users alike. This antivirussoftware is a security package thatputs the paramount focus on thecore security essentials. Theseessentials include an accurateengine that detects and erasesmalicious threats web filtering thatobstructs harmful URLs and smartmonitoring technology that tracksand reverses malicious webactions.

The standout and popular featuresof Kaspersky Antivirus are crypto

mining infection prevention,automatic scans on-demand andsimplified security management.

The Kaspersky antivirus programis very easy to use as well. Thereare plenty of on screeninstructions that explainthoroughly how everything works.

Final Word

In today’s world, the need for anantivirus program that ticks all thecheckboxes is higher than ever tocombat the rising security threatsworldwide. The above-mentionedantivirus softwares are just someof the many tools available tosafeguard yourself against onlinethreats. To make an informeddecision regarding which antivirussoftware to purchase, make sureyou do a thorough pros and consanalysis of every antivirus softwareso that you can buy the one thatbest suits your needs.

www.neolore.com2781 Lancaster Rd, Ottawa, ON K1B 1A7

(613) 594-9199 | [email protected]

PAGE 2

Using Virtual Reality in Business

RetailVirtual Reality heat mappingtechnology in brick and mortarstores tracks a consumer’s gaze inthe shop, providing a pattern ofwhich products or certain areas inthe store draw their attention. Thisenables the retailers tocontinuously test and polish theirdisplays, shop layout, and signageto improve the consumerexperience and their spending.Virtual Reality also allows shoppersto explore the various products in avery realistic and lifelike way.

ManufacturingIndustry

Owing to its unique applications inthe prototyping and design process,Virtual Reality plays a critical role inthe manufacturing industry.Reputed aircraft manufacturerssuch as Airbus and Boeing use thisinnovative technology, which helpsto eliminate the need for full scaleand costly prototypes of theiraircraft designs.

ConstructionArchitects benefit greatly fromvirtual reality platforms. Thesepowerful tools allow them toprovide their clients with animproved interactive way to viewtheir designs and have them sharevaluable ideas and feedback withease.

Furthermore, examining buildingdesigns via Virtual Reality aidsclients to get a betterunderstanding of an architect’swork.

What is AWSand Why has it

Attained soMuch Success?

Amazon Web Services (AWS)provides on-demand ApplicationProgramming Interfaces and cloudcomputing platforms togovernments, organizations, andindividuals on a pay-as-you-go basis.The key to AWS’s success is based onits payment system as organizationscan simply adjust their servicepackage to fit their needs andbudget. Furthermore, Amazon WebServices is more secure than anorganization hosting its own storage.Presently, Amazon Web Services hasnumerous data centers worldwidewith proper and constantmaintenance and monitoring.

How To DeleteGmail Emails

in BulkMost of us have hundreds of emailsthat we’ve never opened and neverwill. Nevertheless, these emails takeup our Gmail storage space. So, todelete them all in one go, type‘is:unread’ in Gmail’s search bar – itwill show you all the unread emailsin your inbox. Since one page onlyshows 50 emails, you’ll have to clickon the ‘Select all conversations thatmatch this search’ option.

Click on the trash icon and all theemails will be transferred to thetrash bin, where they will bepermanently deleted after 30 days.

Similarly, you can set differentparameters like, ‘Size:10M’ or‘older_than:2y’ if you want to delete alarge number of specific emails.

Benefits of 5G Connectivity Over 4GConnectivity

5G connectivity speeds areConsiderably SuperiorThe 5G network’s theoreticalmaximum speed is a staggering 20Gigabits per second which isaround 20 times faster than that ofGoogle Fiber. Moreover, an HDmovie that would take less than 15minutes to download on the 4Gnetwork, would finish downloadingin less than 15 seconds if you hadaccess to 5G!

Less Latency

Apart from its blazing speeds, 5Galso solves the latency

predicament. This is the delaybetween responses and commandsin the server. Compared to 4G’slatency, the 5G network usersexperience shorter delays.

Greater connectivity

Cell towers that are equipped withthe fifth generation of wirelesscommunication will have morecapacity than the fourth-generationtechnology. What this means isthat more users and devices will beable to communicate with eachother at the same time.

The Top 10 Ways Hackers Get Around YourFirewall And Anti-Virus To Rob You Blind

Cybercrime is at an all-time high,and hackers are setting theirsights on small and mediumbusinesses who are easy prey.Don’t be their next victim! Thisreport reveals the most commonways that hackers get in and howto protect yourself today.

In this report, we cover: The #1threat to your business that eventhe BEST firewalls and anti-virussoftware can’t protect against, acommon misconception aboutemployee devices on your officenetwork and exactly what youneed to do now to shut this downimmediately, and more!