ABSTRACT

When it has found its way into the company’s network,

bulk e-mail consumes computing and network resources.

Users within the company must spend time sorting out and

deleting unwanted messages. Not only does this take time

and increase the level of frustration of workers, but legit-

imate messages can also become confused with spam and

be deleted accidentally. Many businesses institute anti-

spam policies and procedures to counteract the costs and

lost productivity resulting from unsolicited bulk e-mail.