![]() |
Welcome to
the |
Subscribe to E-Mail Reflectors |
TFIA E-Mail Lists
Names of lists are case-insensitive.
[email protected] for general members and executive committee
[email protected] for executive committee only
IA-DEFINITION@COMPUTER .ORG for everyone
[email protected] (postings are moderated)
Subscriptions are moderated, postings are not.
Only Subscribers May Post to the lists (Subject to Acceptable Use)
Postings will be (but are not yet) Archived and Available on the Web to Subscribers.
To Subscribe:
Send e-mail to [email protected]
with the following in the message body:
SUBSCRIBE LISTNAME YOUR-FIRSTNAME YOUR-LASTNAME
Example: SUBSCRIBE TFIA John Doe
To Un-Subscribe:
To remove yourself from a list, send a message to
[email protected] with the one of
the following in the message body:
UNSUBSCRIBE LISTNAME
Acceptable Uses Policy (AUP) See IEEE Policy
UN-ACCEPTABLE USES (partial list)
Illegal MaterialChain Letters, Pyramid Selling, and
Multi-Level Marketing Schemes
These are similar to the paper and mail-based letters that make these
claims. Typical abuse of this sort includes the "Make Money Quick"
scams. These not only waste resources, they are illegal in certain countries
and may render the poster liable to prosecution.
Unsolicited External Commercial E-mail
Unsolicited external commercial e-mail, commonly referred to as spam, is
advertising material sent without the recipient either requesting or denying
receipt of such information or otherwise expressing an interest in the
material advertised. Since many Internet users use a dial-up connection and
pay for their online time, receipt of unsolicited external commercial
advertising costs them money and is particularly unwelcome.
Electioneering
Using @computer.org mailing list aliases for the purpose of promoting an
election campaign is forbidden.
Confidential Material
It is inappropriate to send confidential information via e-mail since e-mail
is not private and it can be read by anyone with the proper tools.
Unrequested Binary Messages
The majority of e-mail users are not able to select messages based on size
and therefore such e-mails result in a significant waste of resources.
Forged Headers and/or Addresses
It is a grave abuse of the e-mail system if a message is sent that implies
the sender can be contacted at an e-mail, postal, or fax address that is not
under the direct control of the sender.
Electronic Mail Bombing
Electronic mail bombing is sending multiple e-mail messages, or one or more
large e-mail messages, with the sole intent of annoying and/or seeking
revenge on a fellow Internet user.
Resale or Commercial Use of Service
Your right to use the Service is personal to you. You may not allow any
third person to use the Service. You may not resell or make any commercial
use of the Service.
updated Tuesday, March 12,
2002
Contact Webmaster
This site and all contents
(unless otherwise noted) are Copyright
© 2002
Institute of Electrical and Electronics
Engineers, Inc.
All rights reserved.