Email Abuse Policy

Email Abuse Policy

Last updated May 2018

Email Abuse Policy


Blacknight: ‘refers to Blacknight Internet Solutions Limited (company no. 370845 )’

Internet: “a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.”

Mail replay IP: IP address of one of a number of servers used to forward email within Blacknight on behalf of our customers

UCE/Spam: unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc.

Across the Internet, it is generally accepted that spam is an inconsiderate and improper business practice. With GDPR regulation coming into force from May 2018, there are significant penalties for creating mailing lists where the recipients have not consented or subscribed to the list. Blacknight have no control or visibility on mailing lists you create or how you manage those mailing lists (for information on your responsibility see Matrix of Responsibilities PDF)

Spam adversely affects our network because it can result in the blacklisting of our mail relay IPs thereby affecting efficient mail delivery for other customers. Because of that we subscribe to a number of block lists and have a zero tolerance towards spam. We act on abuse reports as early as possible and this can mean an immediate suspension of your service. We will always endeavour to contact you in the event of such action, or to advise you of the email abuse report so that you can act upon it yourself.

Blacknight reserves the right to terminate, without warning, any account that violates this policy.

Usage of Blacknight services constitutes acceptance and understanding of this policy.

Blacknight may, at its option, charge € 30.00 per spam complaint we receive for both Dedicated and Virtual Server customers. Resellers will be charged for resold accounts, receiving spam complaints.

Reseller may choose to pass this charge down to their client. These are non-refundable charges and will be invoiced at the time of complaint notification.

Blacknight reserves the right to decide what it considers “spam”, “UCE”, “mail bombing”, or “bulk Email”, and to determine from all of the evidence whether or not the Email recipients were from an “opt-in Email” list.

Types of UCE (Unsolicited Commercial Email), or spam:

  • The bulk UCE, bulk promotional material, or other forms of solicitation sent via Email that advertise any IP address belonging to Blacknight Internet Solutions Ltd. or any URL (domain) that is hosted by Blacknight Internet Solutions Ltd.
  • Unsolicited postings to newsgroups advertising any IP or URL hosted by Blacknight Internet Solutions Ltd.
  • The use of web pages set up on ISPs that allow spam-ing (also known as “ghost sites”) that directly or indirectly reference customers to domains or IP addresses hosted by Blacknight Internet Solutions Ltd.
  • Advertising, transmitting, or otherwise making available any software, program, product, or service that is designed to facilitate a means to spam.
  • Forging or misrepresenting message headers, whether in whole or in part, to mask the true origin of the message.
  • For further information on mail abuse, please visit the Mail Abuse Prevention System (MAPS) website.

Basic Mailing List Management Principles for Preventing Abuse

Should you choose to email from Blacknight’s servers, especially if you use mailing lists, you must read and adhere to the following guidelines, which are offered as a statement of Internet standards and best current practices for proper mailing list management and preventing Email abuse. Where the below guidelines are not followed, Blacknight may at their sole discretion terminate your account.

Mailing lists are an excellent vehicle for distributing focused, targeted information to an interested, receptive audience. Consequently, mailing lists have been used successfully as a highly effective direct marketing tool.

Unfortunately, some marketers misuse mailing lists through a lack of understanding of Internet customs and rules of the forum pertaining to Email. Others fail to take adequate precautions to prevent the lists they manage from being used in an abusive manner.


  • The email addresses of new subscribers must be confirmed or verified before mailings commence. It is usually accomplished by means of an email message sent to the subscriber to which they must reply, or containing a URL or link which they must visit, in order to complete the subscription. No matter how it is implemented, a fundamental requirement of all lists is the verification of consent for all new subscriptions.
  • Mailing list administrators must provide a simple method for subscribers to terminate their subscriptions, and administrators should provide clear and effective instructions for unsubscribing from a mailing list. Mailings from a list must cease promptly once a subscription is terminated.
  • Mailing list administrators should make an “out of band” procedure (e.g., a means of contact by which messages may be sent for further correspondence via Email or telephone) available for those who wish to terminate their mailing list subscriptions but are unable or unwilling to follow standard automated procedures.
  • Mailing list administrators must ensure that the impact of their mailings on the networks and hosts of others is minimized by proper list management procedures such as pruning of invalid or undeliverable addresses, or taking steps to ensure that mailings do not overwhelm less robust hosts or networks.
  • Mailing list administrators must take adequate steps to ensure that their lists are not used for abusive purposes. For example, administrators can maintain a “suppression list” of Email addresses from which all subscription requests are rejected. Addresses would be added to the suppression list upon request by the parties entitled to use the addresses at issue. The purpose of the suppression list would be to prevent subscription of addresses appearing on the suppression list by unauthorized third parties. Such suppression lists should also give properly authorized domain administrators the option to suppress all mailings to the domains for which they are responsible.
  • Mailing list administrators must make adequate disclosures about how subscriber addresses will be used, including whether or not addresses are subject to sale or trade with other parties. Once a mailing list is traded or sold, it may no longer be an opt-in mailing list. Therefore, those who are acquiring “opt-in” lists from others must examine the terms and conditions under which the addresses were originally compiled and determine that all recipients have in fact opted-in specifically to the mailing lists to which they are being traded or sold.
  • Mailing list administrators should make adequate disclosures about the nature of their mailing lists, including the subject matter of the lists and anticipated frequency of messages. A substantive change in either the subject matter or frequency of messages may constitute a new and separate mailing list requiring a separate subscription. List administrators should create a new mailing list when there is a substantive change in either the subject matter or frequency of messages. A notification about the new mailing list may be appropriate on the existing mailing list, but existing subscribers should never be subscribed automatically to the new list. For example, if Company A acquires Company B, and Company B has compiled opt-in mailing lists, Company A should not summarily incorporate Company B’s mailing lists into its own.