What does IU do to protect users from spam and virus-infected email?
On this page:
IU limits each host to sending only several hundred messages per minute. If someone is trying to send email to you from a non-IU host that has exceeded its message limit, then that email may very likely not get through to you.
As the high volume of spam on the Internet continues to increase, servers belonging to some popular email hosts are sending IU thousands of messages per minute, and the vast majority of those messages are undeliverable (i.e., from domains that don't exist). These hosts quickly and repeatedly exceed their bandwidth thresholds with illegitimate mail, much to the detriment of their customers who are trying to send legitimate mail to IU users.
IU email system architecture separates its internal university mail flow from the rest of the Internet. This provides a layer of protection that allows IU email to flow reliably between its students, faculty, and staff members. For this reason, it is expected that all official university email is sent via the IU system, and not through external, non-IU hosts. For more, see At IU, what is the policy about official communications from the university to students?
UITS is continuing to explore other systems that can block spam and email harvesting without disrupting legitimate use of IU systems. The following are some current ways that IU helps reduce the amount of spam you receive:
- On Exchange, UITS limits the number of visible addresses (i.e., those on the "To:" and "Cc:" lines) and the number of individual recipients for each email message.
- All email coming into IU is scanned multiple times by different systems for spam, viruses and malware, to reduce the amount of malicious mail delivered to users.
- To search the online IU Address Book, the searcher must enter at least two characters of the last name, and search results are limited to 50.
IU computer users commonly wonder why an email address on a web page is spam-inducing, while an email address in the online IU Address Book is not. This is true because it is relatively simple to create a program that harvests email addresses from static web pages and then program it to browse sites for hours or even days, gathering email addresses. To harvest addresses from form-based address books, such as the IU Address Book, the programmer would have to create something smart enough to interact with different search engines on each address book.
Policies for IU internal mail
This is document aele in the Knowledge Base.
Last modified on 2015-10-06.
- Fill out this form to submit your issue to the UITS Support Center.
- Please note that you must be affiliated with Indiana University to receive support.
- All fields are required.