Terug naar de home pagina Algemene informatie Contact formulier Pagina afdrukken
Check hier uw domein:Check hier uw domein
Kerkstraat 26
8471 CD Wolvega
T: 0561-617905
E: info@tedoc.nl

UCE / SPAM Policy

The abuse and misuse of e-mail is a serious problem, and Tedoc will never tolerate it.

Definition of UCE (Unsolicited Commercial E-mail), or SPAM:

  • The bulk UCE, promotional material, or other forms of solicitation sent via e-mail that advertise any IP address belonging to Tedoc or any URL (domain) that is hosted by Tedoc.
  • Unsolicited postings to newsgroups advertising any IP or URL hosted by Tedoc.
  • The use of webpages set up on ISPs that allow SPAM-ing (also known as "ghost sites") that directly or indirectly reference customers to domains or IP addresses hosted by Tedoc.
  • Advertising, transmitting, or otherwise making available any software, program, product, or service that is designed to facilitate a means to SPAM.
  • Forging or misrepresenting message headers, whether in whole or in part, to mask the true origin of the message.

For further information on mail abuse, please visit the Mail Abuse Prevention System (MAPS) website, Spamvrij.nl or the website van de OPTA, spamklacht.nl

Repercussions of SPAM:

Across the Web, it is generally accepted that SPAM is an inconsiderate and improper business practice.


SPAM is not only harmful because of its negative impact on consumer attitudes toward Tedoc, but also because it can overload Tedoc's network and resources, especially on our shared (virtual) server environments.

Our Providers:

Since it is unsolicited, users who receive SPAM often become angry and send complaints to our upstream providers. This upsets our providers who abhor SPAM for the same reasons that Tedoc does - it causes negative consumer attitudes and drains resources. We strive to maintain favorable business relationships in the Web community and obviously will not allow any practice that threatens these relationships.

Should you choose to e-mail from Tedoc servers, especially if you use mailing lists, you must read and adhere to the following guidelines, which are offered as a statement of Internet standards and best current practices for proper mailing list management and preventing e-mail abuse.

Basic Mailing List Management Principles for Preventing Abuse

Mailing lists are an excellent vehicle for distributing focused, targeted information to an interested, receptive audience. Consequently, mailing lists have been used successfully as a highly effective direct marketing tool. Unfortunately, some marketers misuse mailing lists through a lack of understanding of Internet customs and rules of the forum pertaining to e-mail. Others fail to take adequate precautions to prevent the lists they manage from being used in an abusive manner.
  • The e-mail addresses of new subscribers must be confirmed or verified before mailings commence. This is usually accomplished by means of an e-mail message sent to the subscriber to which s/he must reply, or containing a URL which s/he must visit, in order to complete the subscription. However it is implemented, a fundamental requirement of all lists is the verification of all new subscriptions.
  • Mailing list administrators must provide a simple method for subscribers to terminate their subscriptions, and administrators should provide clear and effective instructions for unsubscribing from a mailing list. Mailings from a list must cease promptly once a subscription is terminated.
  • Mailing list administrators should make an "out of band" procedure (e.g., a means of contact by which messages may be sent for further correspondence via e-mail or telephone) available for those who wish to terminate their mailing list subscriptions but are unable or unwilling to follow standard automated procedures.
  • Mailing list administrators must ensure that the impact of their mailings on the networks and hosts of others is minimized by proper list management procedures such as pruning of invalid or undeliverable addresses, or taking steps to ensure that mailings do not overwhelm less robust hosts or networks.
  • Mailing list administrators must take adequate steps to ensure that their lists are not used for abusive purposes. For example, administrators can maintain a "suppression list" of e-mail addresses from which all subscription requests are rejected. Addresses would be added to the suppression list upon request by the parties entitled to use the addresses at issue. The purpose of the suppression list would be to prevent subscription of addresses appearing on the suppression list by unauthorized third parties. Such suppression lists should also give properly authorized domain administrators the option to suppress all mailings to the domains for which they are responsible.
  • Mailing list administrators must make adequate disclosures about how subscriber addresses will be used, including whether or not addresses are subject to sale or trade with other parties. Once a mailing list is traded or sold, it may no longer be an opt-in mailing list. Therefore, those who are acquiring "opt-in" lists from others must examine the terms and conditions under which the addresses were originally compiled and determine that all recipients have in fact opted-in specifically to the mailing lists to which they are being traded or sold.
  • Mailing list administrators should make adequate disclosures about the nature of their mailing lists, including the subject matter of the lists and anticipated frequency of messages. A substantive change in either the subject matter or frequency of messages may constitute a new and separate mailing list requiring a separate subscription. List administrators should create a new mailing list when there is a substantive change in either the subject matter or frequency of messages. A notification about the new mailing list may be appropriate on the existing mailing list, but existing subscribers should never be subscribed automatically to the new list. For example, if Company A acquires Company B, and Company B has compiled opt-in mailing lists, Company A should not summarily incorporate Company B's mailing lists into its own.

    *This SPAM (UCE) Accepted Use Policy and all other Tedoc policies are subject to change by Tedoc without notice. Continued usage of the services after a change to this policy is implemented and posted on the Tedoc site constitutes your acceptance of such change or policy. We encourage you to regularly check the Tedoc site for any changes or additions. Visit our Terms & Conditions for further information regarding our policies.

    As a guideline:
    You are not allowed to use our servers to send a message to more then 15 (fifteen) recipients simultaneously or within 60 seconds.
    You are not allowed to use our servers to send a message to more then 100 (one hundred) recipients per day, unless specifically permitted and documented in a written agreement.
    You are not allowed to send multiple similar messages from our netwerk and thereby referring to a URL ourside our network.
    You are not allowed to send multiple similar messages from a source outside our network referring to an URL inside our network.
    You are not allowed to send out multiple similar so called "money making" messages.

    Customer Spamming Policy

    TeDoc Web Management has ZERO tolerance for spam originating from our customers, or from our customers' customers, or for spam advertising web sites of our customers or our customers' customers. This includes spamming newsgroups and all other kind of communities. When you spam, you will be traced. Your server or website will immediately be shut down without warning. You will be held responsible for everything that follows from your behaviour.

    The Policy

    You refers to the TeDoc Web Management Customer; we refers to TeDoc Web Management.

    • TeDoc Web Management has the right to charge EUR 250,= per complaint to investigate.
    • TeDoc Web Management does not deal with your customers or their customers etc.; We hold our customers responsible for dealing with spam from or about their section of the network.
    • If we get a first complaint, we will forward it to you. If we don't receive a response indicating the complete resolution of the complaint within 24 hours, we may drop the section of IP space involved in the spam complaint until we are convinced that the problem is resolved. In particular, we are concerned with spam that not o­nly originates from your network, but also that advertises sites hosted o­n your network.
    • If we get repeated complaints and it is clear that the problem has not been resolved, we may blackhole the section of IP space involved in the spam complaint until we are convinced that the problem is resolved. If so, we will contact you as soon as is feasible.
    • We reserve the right, to drop the section of IP space involved in spam or Denial-of-Service complaints if it is clear that the offending activity is causing great harm to parties o­n the Internet. In particular, if open relays are o­n your network or a customer's network, or if denial of service attacks are originating from your network. In certain rare cases, we may have to do this before attempting to contact you. If we do this, we will contact you as soon as is feasible.

    What does this mean to me?

    • You must provide us with, and keep current, good contact information for you. E-mail, fax, and telephone contacts are used, in that order of preference.
    • You must educate your customers about spam so that it does not become a problem for you, or for us. If you sell accounts o­n your system(s), you must provide an Acceptable Use Policy (AUP) at least as restrictive as our own.
    • You must promptly investigate and deal with any spam or other abuse complaints forwarded to you.

    Why this Policy?

    We at TeDoc Web Management feel strongly that the usability of the Internet is dependent o­n the elimination of UCE (Unsolicited Commercial E-mail) from the mailboxes and newsgroups of both casual and heavy Internet users. If you host web sites, you must be particularly vigilant, as you and your other customers could be disconnected from the Internet due to o­ne customer's spamming.

    Tedoc reserves the right to decide what it considers "SPAM", "UCE", "mail bombing", or "bulk e-mail", and to determine from all of the evidence whether or not the e-mail recipients were from an "opt-in" e-mail list.