{"id":1649,"date":"2006-04-04T00:00:00","date_gmt":"2006-04-04T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/04\/04\/new-china-spam-regulations\/"},"modified":"2021-12-30T11:39:44","modified_gmt":"2021-12-30T11:39:44","slug":"new-china-spam-regulations","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/04\/04\/new-china-spam-regulations\/","title":{"rendered":"New China Spam Regulations"},"content":{"rendered":"<p>China&#8217;s Ministry of Information Industry has adopted the Measures for the Administration of Internet E-mails. The regulations, which took effect from 30 March 2006.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>China\u0092s Ministry of Information Industry has adopted the Measures for the Administration of Internet E-mails. The regulations, which took effect from 30 March 2006, are designed to apply to email service providers and apply to any person operating an email service for Internet users in Mainland China. <\/p>\n<p>The regulations are as follows: <\/p>\n<p>A provider is defined as any person in the service supply chain involved in delivering or helping users to receive email;<br \/>\nService providers must register with the government and obtain a license before providing email services;<br \/>\nViolators face warnings or penalties of up to 30,000 yuan (approx. $3,700 US) and risk losing their license;<br \/>\nFirms are barred from sending unsolicited commercial messages without prior consent from recipients;<br \/>\nAll commercial email must have a subject header of \u0093AD\u0094 or the Chinese character for advertisement;<br \/>\nThe rules only apply to email containing commercial advertisements;<br \/>\nThe rules state that providers must stop delivery of any messages containing commercial advertisements even if a recipient first consents, but later changes his or her mind. <\/p>\n<p>http:\/\/www.tid.gov.hk\/english\/aboutus\/tradecircular\/cic\/asia\/2006\/files\/ci200681a.pdf<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-1649","post","type-post","status-publish","format-standard","hentry","category-regulations"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1649","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1649"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1649\/revisions"}],"predecessor-version":[{"id":4136,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1649\/revisions\/4136"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1649"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1649"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1649"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}