ABSTRACT
When it has found its way into the company’s network,
bulk e-mail consumes computing and network resources.
Users within the company must spend time sorting out and
deleting unwanted messages. Not only does this take time
and increase the level of frustration of workers, but legit-
imate messages can also become confused with spam and
be deleted accidentally. Many businesses institute anti-
spam policies and procedures to counteract the costs and
lost productivity resulting from unsolicited bulk e-mail.