|The abuse and misuse of e-mail is a serious
problem, and JMG
Enterprises™ will not tolerate it. If you have been the victim of
SPAM sent by one of our customers, please Copy and Paste the e-mail, including
its COMPLETE headers, in the comments section of our
Likewise, we also block
reported Spam servers from sending e-mail to our clients. YOU can
also FIGHT SPAM by reporting it to the
support the efforts of the following SPAM fighting organizations (A Partial
The bulk of this policy is directed at the Shared and Dedicated Hosting Clients of JMG
DEFINITION of UCE (Unsolicited Commercial E-mail), or SPAM:
- The Following is considered SPAM:
- The bulk Unsolicited Commercial E-mail (UCE), promotional
material, or other forms of solicitation. This includes . .
- any e-mail that advertises any IP address belonging to JMG
Enterprises™ or any URL (domain) that is
hosted by JMG Enterprises™.
- unsolicited postings to newsgroups advertising any IP or URL
hosted by JMG Enterprises™.
That is, if the purpose of the newsgroup is NOT designed for
- The use of webpages set up on ISPs that allow SPAM-ing (also
known as "ghost sites") that directly or indirectly
reference customers to domains or IP addresses hosted by JMG
Enterprises™. This includes participation in:
- POP-up Advertising. Windows
that pop up when you visit another site that display your website.
- Mass Email marketing services.
- Advertising, transmitting, or otherwise making available any
software, program, product, or service that is designed to
facilitate a means to SPAM.
- Forging or misrepresenting message headers, whether in whole or
in part, to mask the true origin of the message.
- The following is NOT SPAM:
- Any E-mail sent to anyone that has requested information through direct correspondence
with the sender: E-mail, phone, verbal, or other communication.
They Opt-In to get email from the sender, however, this does not include
email marketing list services which falls into the definition of spam.
- E-mail to any Membership/Group lists that you are a member that
promote such activity. We
understand that some Group Lists are dedicated to such information
to the group, but the content of the message must not violate
accepted practices of the group. If you are not sure that
your message will be considered SPAM, then we suggest that you
contact the List moderator for approval.
REPERCUSSIONS OF SPAM:
Across the Web, it is generally accepted that SPAM (Unsolicited Commercial
E-mail) is an inconsiderate and improper business practice.
- JMG Enterprises™ : SPAM is not only
harmful because of its negative impact on consumer attitudes toward JMG
Enterprises™, but also because it can overload JMG
Enterprises™ network and resources, especially on our
shared server environments.
- Our Providers: Since SPAM is unsolicited,
users who receive SPAM often become angry and send complaints to our
upstream providers. This upsets our providers who abhor SPAM for the
same reasons that JMG Enterprises™ does -
it causes negative consumer attitudes and drains resources. We strive
to maintain favorable business relationships in the Web community and
obviously will not allow any practice that threatens these
- PUNISHMENT FOR SPAM: (Directed towards our hosting clients)
JMG Enterprises™ reserves the right to
terminate or suspend, without warning, any account that violates this
policy. Usage of JMG Enterprises™
services constitutes acceptance and understanding of this policy. JMG
Enterprises™ reserves the right to decide what it
considers "SPAM", "UCE", "mail bombing",
or "bulk e-mail", and to determine from all of the evidence
whether or not the e-mail recipients were from an "opt-in"
Should you choose to e-mail from the Servers at JMG
Enterprises™, especially if you use mailing lists, you must read
and adhere to the following guidelines, which are offered as a statement
of Internet standards and best current practices for proper mailing list
management and preventing e-mail abuse.
Basic Mailing List Management Principles for Preventing Abuse
Mailing lists are an excellent vehicle for distributing focused, targeted
information to an interested, receptive audience. Consequently, mailing
lists have been used successfully as a highly effective direct marketing
tool. Unfortunately, some marketers misuse mailing lists through a lack of
understanding of Internet customs and rules of the forum pertaining to
e-mail. Others fail to take adequate precautions to prevent the lists they
manage from being used in an abusive manner.
- The e-mail addresses of new subscribers must be confirmed or
verified before mailings commence. This is usually accomplished by
means of an e-mail message sent to the subscriber to which s/he must
reply, or containing a URL which s/he must visit, in order to complete
the subscription. However it is implemented, a fundamental requirement
of all lists is the verification of all new subscriptions.
- Mailing list administrators must provide a simple method for
subscribers to terminate their subscriptions, and administrators
should provide clear and effective instructions for un-subscribing
from a mailing list. Mailings from a list must cease promptly once a
subscription is terminated.
- Mailing list administrators should make an "out of band"
procedure (e.g., a means of contact by which messages may be sent for
further correspondence via e-mail or telephone) available for those
who wish to terminate their mailing list subscriptions but are unable
or unwilling to follow standard automated procedures.
- Mailing list administrators must ensure that the impact of their
mailings on the networks and hosts of others is minimized by proper
list management procedures such as pruning of invalid or undeliverable
addresses, or taking steps to ensure that mailings do not overwhelm
less robust hosts or networks.
- Mailing list administrators must take adequate steps to ensure that
their lists are not used for abusive purposes. For example,
administrators can maintain a "suppression list" of e-mail
addresses from which all subscription requests are rejected. Addresses
would be added to the suppression list upon request by the parties
entitled to use the addresses at issue. The purpose of the suppression
list would be to prevent subscription of addresses appearing on the
suppression list by unauthorized third parties. Such suppression lists
should also give properly authorized domain administrators the option
to suppress all mailings to the domains for which they are
- Mailing list administrators must make adequate disclosures about how
subscriber addresses will be used, including whether or not addresses
are subject to sale or trade with other parties. Once a mailing list
is traded or sold, it may no longer be an opt-in mailing list.
Therefore, those who are acquiring "opt-in" lists from
others must examine the terms and conditions under which the addresses
were originally compiled and determine that all recipients have in
fact opted-in specifically to the mailing lists to which they are
being traded or sold.
- Mailing list administrators should make adequate disclosures about
the nature of their mailing lists, including the subject matter of the
lists and anticipated frequency of messages. A substantive change in
either the subject matter or frequency of messages may constitute a
new and separate mailing list requiring a separate subscription. List
administrators should create a new mailing list when there is a
substantive change in either the subject matter or frequency of
messages. A notification about the new mailing list may be appropriate
on the existing mailing list, but existing subscribers should never be
subscribed automatically to the new list. For example, if Company A
acquires Company B, and Company B has compiled opt-in mailing lists,
Company A should not summarily incorporate Company B's mailing lists
into its own.
*This SPAM (UCE) Accepted Use Policy and all other JMG Enterprises™
policies are subject to change by JMG Enterprises™ without notice. Continued usage of
the services after a change to this policy is implemented and posted on
the JMG Enterprises™
site constitutes your acceptance of such change or policy. We encourage
you to regularly check the JMG Enterprises™ site for any changes or additions. Visit our Terms And Conditions for further information regarding our