Acceptable Use Policy Acceptable Use Policy

Effective July 01, 2022

1. About Spam

Spam is not merely annoying: it is also a serious drain on the resources of ISPs, other organizations, and Internet users. Sending Spam mail may seem like a cheap and convenient way to amplify marketing efforts, yet honest businesses rarely employ this questionable marketing tool. Firstly, nobody wishes to receive unsolicited junk mail. Secondly, it is considered both an annoyance and an intrusion of privacy. Thirdly, each sent e-mail message contributes to Internet traffic and uses up bandwidth. An e-mail message does not reach its recipient instantaneously; instead, it is relayed by any number of systems en route until it reaches its final destination. Spam mail is often sent out in thousands or hundreds of thousands of copies, to huge numbers of unwitting recipients. This large load of messages often causes network problems and congestion, meaning that third parties as well as message recipients are suffering because some inconsiderate person or company has pumped half a million copies of a message through the Internet. Unfortunately, there are many such worthless members of society.

2. Who is Responsible

This is a difficult issue. Spammers rarely use their regular e-mail addresses for the following reasons, among others:

  • Their Internet Service Providers will realize they are Spamming, and will take steps to prevent future Spam (for example, by deleting Spammer’s e-mail accounts)
  • Spammers could become the victims of mail-bombing, as thousands of irate Spam recipients strike back with messages of their own

Spammers therefore rely on anonymous e-mail addresses such as those available from free e-mail providers. Sometimes the addresses you see on Spam messages are invalid (faked). It is important to realize where the responsibility for Spam lies. Make no mistake: Spammers are often reasonably skilled frauds and thieves as well as highly annoying. Many Spammers have developed specific strategies of Spamming in order to avoid responsibility for their actions, or to avoid mail blocking and filtering:

  • They relay Spam messages off the mail server of an innocent third party, in which case even more damage is incurred by the on-line population in general. This technique requires an “open relay”. It is policy to avoid open relays entirely.
  • They use the “drop box” strategy. This consists of sending mail out from an account that allows Spam, but putting another address in the “Reply to:” message header, so that anyone replying to the message is actually sending mail to an account that did not originate the Spam. Many Spammers want to send out ads or sales info and do not expect a reply. By drop boxing they are forging their e-mail addresses and relieving themselves of accountability. Recipients of Spam should always check the full message headers to determine the origin of the Spam.
  • Spoofing. This fairly complex technique makes a message appear as if it is coming from an address that did not originate the message.
  • Including a paragraph claiming that the law sanctions Spam as long as there is a “remove from list” address in the Spam message, or similar variations of this obtuse argument. Do not fall for this trick, as the “remove from list” address is almost always a sham. Not only do you generate useless traffic if you try to remove yourself from a large number of “lists”, but in some cases Spammers will be delighted to put an “active”; mark next to your name on their address databases upon receipt of your complaint. Spammers are dishonest people employing dishonest tactics. Don’t trust them, report them.
3.’s Spam Policy policy specially prohibits its members from using to generate spam and we take a “zero tolerance” approach against spam. By subscribing to you acknowledge, warrant and agree to the following:

  • You will not engage in any spamming activities with your use of the service.
  • provides the service as a “survey host” and does not send out surveys and that you are solely responsible for your emailing activities using the service.
  • You warrant that you have an ongoing business or personal relationship with or you have obtained consents to send out email invitations to participate in a survey from your own email list or from any email list you have acquired from a third party.
  • We have the right to request from you confirmation that you have agreements from your email recipients to receive emails from you.
  • Your use of the site will not violate any U.S. or foreign spamming, junk email or other related laws or regulations prohibiting or discouraging unsolicited email.
  • If you engage in any unlawful spamming activity, will report such conduct to the appropriate authorities and provide them with all relevant information including your personal information. will terminate any account that has been determined to have used the service in connection with any spamming activities or have otherwise breached these Spamming policies. We also reserve the right to terminate your account if your emails result in high bounce rates or if we receive complaints of spamming.

4. What to Do

The most important thing is to examine your full message headers to determine where the message really came from. The “From:” header that is commonly shown in basic message header displays can be easily faked! It is harder to fake the complete message header, which can provide useful information about the message. technology allows users to see the full message headers of all e-mail messages.

Any users that are suspected of Spamming from our site, or of using our site for drop boxing or spoofing, should be reported immediately. We will investigate the user and take action if we determine that he/she is guilty.

You may contact, regarding any suspected spamming activities.

Spoofing and drop boxing are usually beyond the absolute control and responsibility of will do the utmost to prevent Spam, but we ask the recipients of junk mail to understand that very often is not the originator of such messages, but one of the victims! The solutions to spoofing and drop boxing are complex and involve co-operation between a number of Web sites and ISPs. Refer to the links below for more information.