Cybercom
Internet Access

Cybercom's Spamming & Relaying Policy Statement
Spamming and Relaying are enormous and costly problems to ISP's, chewing up bandwidth, stealing system resources and misdirecting workforce time and effort. The Internet consists of many interconnected peers and it is not only expected, but also necessary that those peers act responsibly. Cybercom believes that Internet entities are responsible for their own actions, or inactions, and that allowing Spamming and Relaying is unconscionable. Email is not like postal mail, where the sender pays the full cost of delivery; rather, the recipient server (RS) pays most, if not all, of the costs of delivery. This fact gives the RS considerable say over what will be accepted for delivery, and it is why Cybercom emphasizes that all communications must be by mutual consent.

One way to exercise the right of mutual consent is for the RS to refuse traffic from another network(s), at the sole discretion of the RS, for any reason deemed sufficient or for no reason at all. Cybercom is a private Corporation, operated for its' members, and Cybercom has no obligation whatsoever to non-members to pass their data through equipment owned or operated by Cybercom. If any member (of Cybercom) is dissatisfied with any of Cybercom's policies then, as per our terms and conditions, they may request their service be discontinued and any applicable, pro-rated, refunds be applied.

Having stated the above, we acknowledge that email is important, and we want to help your ISP resolve their mail problem(s). Correcting their problem is usually a simple process, involving your ISP changing a few lines of a configuration file, or ticking a checkbox on a configuration form, or agreeing not to SPAM us any more. If you are unable to send mail to Cybercom, we have provided the following list tools for your system administrator to discover why, and take the appropriate steps to correct the situation.

Check to see if your your mail server is on additional Spam relay lists with these links: 
• ORBS.org Lookup

• RBL List Lookup

• RSS List Lookup

The above companies lists are similar in function to bad check lists, just as most companies are not interested in taking checks from those who appear on a bad check list, we are not interested in taking email from those who appear on Spamming and Relaying lists. If your mail server is on any of these lists it is because your server(s), either intentionally (or unintentionally) allow unsolicited mail through them (Relaying), and/or have a history of allowing unsolicited mail sent directly to others (SPAM). This determination is made by the respective lists and has nothing whatsoever to do with Cybercom; Cybercom merely subscribes to their service. If your mail server appears on any of the above lists, do not contact Cybercom, as we are just going to point you back to this page, visit the corresponding site and follow their instructions for removal.

If, after checking, you do not appear on any lists, and yet still cannot send mail to Cybercom, please send a message to abuse@txcyber.com. Include the refusal error message you received with your email. This can be done by forwarding the refusal message to abuse@txcyber.com. We will investigate and ascertain why, we will then contact you with the appropriate steps necessary for removal from Cybercom's list. To save everyone time, before sending the form, please spend a few minutes reviewing our terms and conditions as they relate to email. They are as follows:

1. All communications must be consensual. No one should ever have to unsubscribe from a list not intentionally join and/or subscribe to it.

2. Permission of new subscribers must be fully verified before mailings commence, it is a fundamental requirement that all lists verify all new subscriptions.

3. There must be a simple method to terminate a subscription and administrators should provide clear and effective instructions to unsubscribe from the mailing list. In addition, mailings from a list must cease promptly once a subscription is terminated.

4. There should be alternative methods for terminating a subscription. Mailing list administrators should provide a working phone number, and postal mail address to all email recipients.

5. Undeliverable addresses must be removed from future mailings. Mailing list administrators must ensure that the impact of their mailings on the networks and hosts of others is minimized. One of the ways this is accomplished is through pruning invalid or undeliverable addresses.

6. Mail volume must take Cybercom's systems into account. List administrators must take steps to ensure that mailings do not cause an undue burden to our mail server(s) and/or network. For example, if the mailing list has a great number of addresses within a particular domain, the list administrator should contact the administrator for that domain to discuss mail volume issues

7. Steps must be taken to prevent use of a mailing list for abusive purposes. The sad fact is that mailing lists are used by third parties as tools of revenge and malice. Mailing list administrators must take adequate steps to ensure that their lists cannot be used for these purposes.

8. Solicitation of Cybercom members will not be tolerated.

9. Terms and conditions of address use must be fully disclosed. Mailing list administrators must make adequate disclosures about how subscriber addresses will be used, including whether or not addresses are subject to sale or trade with other parties.

10. Acquired lists must be used for their original purpose. Those who are acquiring fully verified opt-in lists must examine the terms and conditions under which the addresses were originally compiled and determine that all recipients have in fact opted-in to the type mailing list the buyer intends to operate.

11. The nature and frequency of mailings should be fully disclosed. List administrators should make adequate disclosures about the nature of their mailing lists, including the subject matter of the lists and anticipated frequency of messages.

12. A substantive change in the frequency of mailings, or in the size of each message, may constitute a new and separate mailing list requiring a separate subscription.

13. It should never be assumed that subscribers to a list about XYZ want to be added to another XYZ list. A notification about the new mailing list, and how to join, may be appropriate on an existing mailing list, but subscribers should never be subscribed automatically to the new list


Click here to return

  Copyright 2001 Cybercom Corporation, All rights reserved.