Acceptable Use Policy
Boomerang is committed to a permission-based ethic in providing our email services.
Simply put, we don't tolerate spamming. We expect our clients to use mailing lists
based on established business relationships or an opt-in process, and we offer services
to help them build and maintain their lists.
In this section, our Acceptable Use Policy explains what we expect from clients
how we interact with clients and visitors at our web site.
Boomerang provides services that are intended to enhance the communication between
our clients and their customers, prospects and business partners. As such, we expect
our clients to follow good business practices in keeping with that intent.
The client is solely responsible for the content and the lists used in these transmissions.
When sending email to existing customers and prospects, we strongly recommend the
use of permission-based or opt-in lists. This approach is being widely adopted today
and serves to enhance the value of the communication. We offer services that allow
a company to build an opt-in list for email programs, as well as to supplement and
maintain existing lists.
Boomerang does not rent or sell mailing lists. We accept business from clients using
third-party lists, but the client is solely responsible for these lists and their
use must comply with the appropriate guidelines in this section.
For every email, we require the sender to provide each recipient with the opportunity
to opt-out, or choose not to receive similar communications in the future. Boomerang
offers various opt-out services, including a managed reply mechanism with an opt-out
acknowledgment for the recipient. Boomerang can also perform the list services needed
to ensure that the recipients who opted-out do not receive similar mailings in the
Our clients have the option to store their content and lists on our system. This
service is designed solely for use with the email services that Boomerang provides.
In keeping with standard practices to safeguard data, we strongly encourage clients
to keep current backup copies of these files themselves. We can also provide backup
services if desired.
Boomerang's email services may be used for any legal activity that does not conflict
with any of the Unacceptable Uses described below.
The following is a non-exclusive list of content and behaviors that constitute unacceptable
- The sending of unsolicited email (spamming) including without limitation the sending
of advertisements or solicitations that do not clearly and conspicuously identify
the message as an advertisement or solicitation, or do not include a valid physical
postal address of Boomerang's client. Users who utilize Boomerang's services for
spam are subject to prosecution to the fullest extent of the law.
- Content that commits acts of copyright, trademark, patent, trade secret or other
intellectual property infringement.
- Content that is offensive to others, including content which aggravates, harasses,
threatens, defames, or abuses others.
- Content that contains or links to nudity, pornography, adult content, sex, extreme
violence, or foul language.
- Content that contains, links to, or participates in pyramid schemes, gambling, raffles,
lotteries, and so forth.
- Content that posts or discloses personal identification information or private information
of individuals under the age of 13, or in connection with materials directed toward
individuals under the age of 13 without verifiable parental consent.
- Content that provides, sells, or offers to sell the following: controlled substances,
illegal drugs and drug contraband, alcohol, weapons, pirated materials, pornography
or sexual products, programs to attack others, illegal goods, escort services, instructions
on making, assembling, or obtaining illegal goods or weapons, information used to
break copyright or trademark violations, to destroy others' property, or to harm
any people or animals.
- Content that takes part in, or allows any third party to take part in, the following:
reverse engineering, reverse compiling or otherwise deriving the underlying source
code or structure or sequence of the Technology; individual passworking of Member
sites or pages; altering copyright notices and attributes (unless permitted in writing
by the author/owner); and such practices.
Compliance with Laws
It is the client's sole responsibility to ensure compliance with all applicable
laws including, but not limited to:
• The CAN-Spam Act of 2003
• The TCPA of 1991 (regarding, among other items, unsolicited facsimile traffic)
• All FCC rules and regulations - see
• All FTC rules and regulations - see
• The Digital Millennium Copyright Act of 1998
• The Children's Online Privacy Protection Act
• Child Online Protection Act
• The Michigan Children's Protection Registry Act of 2005
• The Utah Child Protection Registry Act of 2005
How to Notify Us of Spam Complaints
We work very closely with our clients to eliminate unwanted emailings. If you receive
an unwanted email that we've sent on behalf of a client and wish to lodge a complaint,
please do the following:
- With the unwanted email in your browser, select the Forward function. If possible,
include the full headers from the unwanted email in what you send us.
- Use the phrase spam complaint as the Subject line.
- Add any additional information that will help us investigate and resolve the problem,
e.g., "I opted out of this sender's mailings on their web site in March.
- Forward the email to
- You will receive an email from us confirming that we have removed your email address
from all our future mailings.
Although email and online marketing are still in their infancy, marketers, through
trial and error, have developed a significant body of knowledge about it. From that
they have distilled the so-called best email practices, which are rules and techniques
for achieving the best results and ROI from email campaigns.
There are literally dozens of email best practices, covering most major aspects
of email marketing. For example, there are practices to:
- Protect your valuable reputation as a sender (authentication and reputation practices)
- Maximize your delivery success (deliverability practices)
- Build and maintain a successful online relationship with your customers (permission
and relevance practices).
Where can you get a copy of all them?
While you may find a book or see articles on this topic, there is no single
published source that covers everything. To put together the complete list, you
would have to: participate in major industry events; continually monitor new research,
reviews and trade articles; and interview successful email marketers to learn their
That's what we do for our clients. And to all of that we add something quite unique:
our real-world experience, having worked with hundreds of top marketing clients
over the past fourteen years.
So we know the best email practices. More importantly, we can help you apply the
right ones to your own email marketing campaigns. Here are just a few of the ways
we can do it:
- We can train you and your colleagues on best email practices
- Our on-call experts can assist you in your day-to-day campaign work
- We will keep you abreast of latest best practices through our bi-monthly newsletter,
the Boomerang Return, and our best practices white papers.
Our best practices can help you get higher ROI from your email marketing campaigns.
That's just one more way we help you stand out from the marketing crowd.