Acceptable Use Policy Acceptable Use Policy

1. About Spam
2. Who is Responsible?
3.’s Spam Policy
4. What to do?


1. About Spam

Spam is not merely annoying: it is also a serious drain on the resources of ISPs, other organizations, and Internet users. Sending Spam mail may seem like a cheap and convenient way to amplify marketing efforts, yet honest businesses rarely employ this questionable marketing tool. Firstly, nobody wishes to receive unsolicited junk mail. Secondly, it is considered both an annoyance and an intrusion of privacy. Thirdly, each sent e-mail message contributes to Internet traffic and uses up bandwidth. An e-mail message does not reach its recipient instantaneously; instead, it is relayed by any number of systems en route until it reaches its final destination. Spam mail is often sent out in thousands or hundreds of thousands of copies, to huge numbers of unwitting recipients. This large load of messages often causes network problems and congestion, meaning that third parties as well as message recipients are suffering because some inconsiderate person or company has pumped half a million copies of a message through the Internet. Unfortunately, there are many such worthless members of society.
Go to Top


2. Who is Responsible

This is a difficult issue. Spammers rarely use their regular e-mail addresses for the following reasons, among others:

Spammers therefore rely on anonymous e-mail addresses such as those available from free e-mail providers. Sometimes the addresses you see on Spam messages are invalid (faked). It is important to realize where the responsibility for Spam lies. Make no mistake: Spammers are often reasonably skilled frauds and thieves as well as highly annoying. Many Spammers have developed specific strategies of Spamming in order to avoid responsibility for their actions, or to avoid mail blocking and filtering:

Go to Top

3.’s Spam Policy policy specially prohibits its members from using to generate spam and we take a “zero tolerance” approach against spam. By subscribing to you acknowledge, warrant and agree to the following: will terminate any account that has been determined to have used the service in connection with any spamming activities or have otherwise breached these Spamming policies. We also reserve the right to terminate your account if your emails result in high bounce rates or if we receive complaints of spamming.
Go to Top

4. What to Do

The most important thing is to examine your full message headers to determine where the message really came from. The “From:” header that is commonly shown in basic message header displays can be easily faked! It is harder to fake the complete message header, which can provide useful information about the message. technology allows users to see the full message headers of all e-mail messages.

Any users that are suspected of Spamming from our site, or of using our site for drop boxing or spoofing, should be reported immediately. We will investigate the user and take action if we determine that he/she is guilty.

You may contact, regarding any suspected spamming activities.

Spoofing and drop boxing are usually beyond the absolute control and responsibility of will do the utmost to prevent Spam, but we ask the recipients of junk mail to understand that very often is not the originator of such messages, but one of the victims! The solutions to spoofing and drop boxing are complex and involve co-operation between a number of Web sites and ISPs. Refer to the links below for more information.
Go to Top