Mail Requirements Clause Samples

Mail Requirements. When it is necessary for SUPPLIER to send media containing confidential information between the parties or elsewhere, it shall be sent by courier, registered mail or an internationally recognized overnight delivery service (i.e. Federal Express, ▇▇▇▇▇, etc.) Items sent by SUPPLIER shall require recipients to sign for deliveries and the information to be entered into a log by the courier, postal or delivery service.
Mail Requirements. You must comply with the laws and regulations applicable to bulk or commercial email in your jurisdiction. In addition, your bulk or commercial email must meet the following requirements: ▪ You must have a Privacy Policy posted for each domain associated with the mailing; ▪ You must have the means to track anonymous complaints; and ▪ You must not obscure the source of your e-mail in any manner. ▪ You must post an email address for complaints (such as ▇▇▇▇▇@▇▇▇▇▇▇▇▇▇▇.▇▇▇) in a conspicuous place on any website associated with the email, and you must promptly respond to messages sent to that address; ▪ Your intended recipients have given their consent to receive e-mail via some affirmative means, such as an opt-in procedure, and you can produce the evidence of such consent within 72 hours of receipt of a request by the recipient or EndLayer; ▪ You must use reasonable means to ensure that the person giving consent is the owner of the e-mail address for which the consent is given; ▪ You must include the recipient's e-mail address in the body of the message or in the "TO" line of the e-mail. ▪ You must honor revocations of consent and notify recipients of the same; These policies apply to messages sent using EndLayer services, or to messages sent from any network by you or any person on your behalf that directly or indirectly refer the recipient to a site hosted via EndLayer services. In addition, you may not use a third party e-mail service that does not practice similar procedures for all its customers. These requirements apply to distribution lists created by third parties to the same extent as if you created the list. You may not attempt to probe, scan, penetrate or test the vulnerability of an EndLayer system or network, or attempt to breach the EndLayer security or authentication measures, whether by passive or intrusive techniques. Additionally, you may not perform such testing of your own hosted system without EndLayer’s prior written consent.