Anti-Spam Policy
Where stands on spam!

Our mail server has been UPGRADED and we now have a Blacklist Policy in place. If you have tried to send us email and we have not responded please send an Email to and we will review your request and remove you. Thank you for your time and understanding.

The Anti-Spam Policy does not tolerate the transmission of spam. We monitor all traffic to and from our Web servers for indications of spamming and maintain a spam abuse compliant center to register allegations of spam abuse. Customers suspected to be using products and services for the purpose of sending spam are fully investigated. Once determines there is a problem with spam, will take the appropriate action to resolve the situation. Our spam abuse compliant center can be reached by email at .

The company policy is that does not send spam.

Posting of spam using the e-mail address of an employee is fraud. Any misuse of addresses is considered fraud, and will be addressed accordingly.

What is UCE / spam?

Unsolicited Commercial E-mail, also known as spam, is the mass electronic distribution of unsolicited e-mail to individual e-mail accounts, aliases, or mailing lists and archives. These messages are considered to be a nuisance and their contents can be offensive, illegal, or simply misdirected advertising.

Why adopt a UCE / spam policy?

The problem of spam costs money and wastes resources. With conventional junk mail the sender must pay for delivery to recipients. Enormous amounts of unsolicited e-mail and spam are paid for by the recipients in the form of wasted bandwidth and system resources!

Fighting UCE / spam

At, we use multiple methods to fight spam to protect's computer network and's Staff:

- server-side spam filtering software
- a compiled list of known spammers/abusers
- client-side spam filtering software

How do I know if my messages are being blocked?

If you received a message which contains the following, or similar:

----- The following addresses had permanent fatal errors -----
(reason: 550 : Client host rejected: Access denied)

then your message was blocked because your e-mail address was found in's list of known spammers/abusers. This list is compiled based on spam received at There are cases that we know you are spamming and abusing addresses in other ways - BUT we will not take the time to notify you of those cases, we will just simply delete any spam caused by such actions. If your email is legit then read below if you do not receive a response to your emails.

If you wish to be removed from's list of known spammers/abusers, please email .

How We Define Spam

We define spam as the sending of Unsolicited Commercial Email (UCE), Unsolicited Bulk Email (UBE) or Unsolicited Facsimiles (Fax), which is email or facsimile sent to recipients as an advertisement or otherwise, without first obtaining prior confirmed consent to receive these communications from the sender. This can include, but is not limited to, the following:

  1. Email Messages
  2. Newsgroup postings
  3. Windows system messages
  4. Pop-up messages (aka "adware" or "spyware" messages)
  5. Instant messages (using AOL, MSN, Yahoo or other instant messenger programs)
  6. Online chat room advertisements
  7. Guestbook or Website Forum postings
  8. Facsimile Solicitations

What We Allow and Don't Allow

We will not allow our servers and services to be used for the purposes described above. In order to use our products and services, you must not only abide by all applicable laws and regulations, which include the Can-Spam Act of 2003 and the Telephone Consumer Protection Act, but you must also abide by's no spam policies. Commercial advertising and/or bulk emails or faxes may only be sent to recipients who have already "opted-in" to receive messages from the sender specifically. They must include a legitimate return address and reply-to address, the sender's physical address, and an opt-out method in the footer of the email or fax. Upon request by, conclusive proof of opt-in may be required for an email address or fax number.

What We Do

If determines that the services in question are being used in association with spam, will re-direct, suspend, or cancel any web site hosting, domain registration, email boxes or other applicable services for a period of no less than 2 days. The registrant or customer will be required to respond by email to stating that they will cease to send spam and/or have spam sent on their behalf. will require a non-refundable reactivation fee to be paid before the site, email boxes and/or services are reactivated. In the event that determines the abuse has not stopped after services have been restored the first time, may terminate the hosting and email boxes associated with domain name in question.

To Report Spam Abuse:

We encourage all customers and recipients of email generated from our products and services to report suspected spam. Suspected abuse can be reported by email.


I received spam from an address!

If you receive spam from, please report the violation to

Spammers and viruses/worms sometimes send messages with forged from: addresses, called spoofing. To verify the actual origin of a message, analyze the full headers of the e-mail. Any e-mail headers can be forged with the exception of the received from:. If this field is inconsistent with the from: address, it's spoofed!

For more information about e-mail header analysis, see CERT's Spoofed/Forged Email overview.

Policy - is committed to making the Internet a safer place

In furtherance of this commitment, we have joined forces with the Anti-Phishing Working Group (APWG). APWG is an industry association dedicated to the elimination of the identity theft and fraud associated with phishing and email spoofing. APWG currently has more than 600 members consisting of law enforcement, financial institutions and technology vendors. APWG focuses on education of the consumer and development of industry and legal solutions to the growing problem of phishing and email spoofing. We are proud to join this group and hope that together, we can end the threat that phishing and email spoofing poses.

Copyright © by All Right Reserved.