Abstract of research
In this paper, I address the issue of protecting people from unwanted email messages. This approach began by defining these messages as messages that are widely and frequently sent for commercial and non-commercial purposes, with the identity of their sender often anonymous. These messages are sent by many technical means, the most prominent of which is people's e-mail. These messages are distinguished by many characteristics, the most important of which are: that they are carried out via an electronic means, their forcible nature, their collective nature, the lack of desirability of people for them, the multiplicity of their goals, and their belonging to the malware class.
And then came up with a statement of legal protection for people from unwanted e-mails. As I began this exposure to how this protection is achieved through the need for people to agree that these messages are sent to them, and pictures that achieve this protection, whether through the requirement of prior approval or the method of subsequent refusal, and the position of the Egyptian legislator on that.
It was also subjected to the technical protection of people from unwanted e-mails, as it was in support of legal protection. This protection is done through some technical means, such as filtering messages, creating websites that fight these messages, and protection by implementing the encryption feature.
Finally, it has been put into general protection for people from unwanted emails. I was exposed to this protection from two perspectives, one technical and the other legal. Protection from a technical perspective requires the availability of many technical matters to preserve the e-mail, such as choosing a strong password, checking the message sender, checking the message itself before opening it, and not displaying the e-mail address to the public or disclosing it. While protection from the legal perspective is represented in the necessity for advertising companies to adhere to contractual terms, try to enact international legislation, and the need to educate people about unwanted e-mails.
I concluded my exposure to this study, with a statement of the results of the research that I reached after presenting its content, as well as the recommendations of the study, then a list of the references that I used in completing the study, and an index that includes the research topics.