Question :
Have you received emails like these?
What actions, if any, have you taken to limit the permissions of the sender? Why or why not?
In your chapter reading, you learned about the CAN-SPAM law
From your perspective, is the CAN-SPAM law working? ? Why or why not?