Requirements for commercial emailers
We provide the following points for general information purposes. The list is indicative and it is the responsibility of each individual email marketer to be properly informed, seek expert advice and decide for his own practices.
- The full and valid physical postal address of the sender must be included in every email message.
- The subject line must describe the nature and the content of the email.
- Subject lines must not be deceptive.
- The "from" line should display the business name or the senders name and it should not be a marketing buzzword.
- A reply address that will be active for at least 30 days after sending the email must clearly exist.
- An unsubscribe link must be included in every email.
- Unsubscribe requests must be validated within 30 days.
Our mailing list management software is anti-spam and CAN-spam compliant
Meaning that, most-importantly, it offers opt-out mechanisms for your subscribers, double verification routines and more.
DesignerFreeSolutions does not provide "mailing services" neither lists. We offer e-newsletter campaign and mailing list management software that the customer installs at his own server and he is 100% responsible for its use.
CAN-SPAM Act of 2003
Facts for business (FTC)
FTC for the consumer
Have you been spammed?
Did you receive an email from firstname.lastname@example.org?
You will not receive an email from DesignerFreeSolutions unless you are our customer or you have inquired information about our products by willfully submitting your email to our web site. In such a case we will never share or rent your email to any other third party. If and when we email you we will always provide you the option to opt-out from future mailings.
True and original emails from DesignerFreeSolutions will only be related to our products and related developments. If you have received an email that seems to be have been sent from email@example.com kindly inform us. It is not from us. This is called spoofing where the sender of the email changes the <From-email> and <From-name> fields in order to hide his identity and use someone else's. Usually, by checking the Internet headers of such an email you can see the IP address of the sender, his real email and mail servers he used. Most of the times these will point to servers in countries where law enforcement, especially when it comes to the Internet, is practically non-existent.