The document discusses spam filtering techniques. It begins by defining spam and its purposes. It then discusses the problems caused by spam and some statistics about its prevalence and costs. The document outlines federal regulations regarding spam and how spammers harvest email addresses. It describes different types of spam filters and how Bayesian filtering uses probabilities to classify emails as spam or not spam. The document discusses how data mining can be used for spam filtering and concludes that while no technique is perfect, data mining approaches show promise.