Table of content

Bluewin Spam Protection

Spam Policy

As part of Swisscom, Bluewin, as a provider of an e-mail service in accordance with telecommunications law (Art 83 FDV), is obliged to protect its customers from receiving unfair mass advertising and to combat spam as far as current technology allows. Bluewin may bar customers who send or forward unfair mass advertising from the telecommunications network.

How does Bluewin's spam protection work?

E-mail providers use spam filters to intercept fraudulent e-mail. Spam and phishing e-mails are a growing challenge, which is why spam filters need to become increasingly intelligent. The spam filters systematically check both incoming and outgoing e-mails for spam-typical elements, e.g. hyperlinks, which are blocked due to sending without consent. If an e-mail has such suspicious characteristics it may be flagged as spam. The spam filters also evaluate the feedback of users worldwide. An e-mail may be marked as spam if many users report via the "report spam" button.

Bluewin reserves the right to refuse e-mails temporarily or permanently if the sender fails to comply with at least one of the following:

  • The legal framework must be respected in all circumstances.
  • When e-mails are sent that contain harmful, immoral or illegal content. These are in particular virus- or Trojan-infected e-mails as well as those that refer to virus- or Trojan-infected pages. Incite criminal activity, glorify violence, or e-mails with content that serves to incite the people to commit crimes, or e-mails that refer to pages with corresponding content. E-mails aimed at illegally accessing the recipient's confidential data.
  • The sending of bulk e-mails or promotional e-mails may only be sent to addressees whose consent has been explicitly given (opt-in method).
  • The recipient must be able to withdraw his consent without obstacles (opt-out method).
  • The sender must ensure that no invalid or non-existent e-mail addresses are contacted. Distribution lists must be cleaned regularly.
  • Senders of bulk or promotional e-mails must provide a legal disclosure to be submitted. This includes non-electronic contact information such as a real address and a valid phone number.
  • Operators supplying services must regularly check their servers and take measures to protect them from unlawful access.
  • Any technical information and information about the sender must not be forged. It must be clear where and by whom an e-mail was sent.
  • Senders must comply with the corresponding RFC standards such as RFC 5321 or RFC 5322.
    • Bluewin uses internal and external RBLs (Real Time Block Lists) to protect our customers and ensure high reliability to the e-mail community. These allow us to enforce strict spam and abuse management. Consignors who violate the above-mentioned points will be rejected or completely blocked. In addition, Bluewin is committed to taking legal action against senders who violate the e-mail policy if necessary.

      Authentication

      To properly verify the origin and validity of your e-mails, we recommend signing your e-mails with an SPF and/or DKIM record and specify a DMARC record on your DNS.

      SPF

      Publish an SPF (Sender Policy Framework) record for your domains on the DNS zone. SPF is a technique designed to make it more difficult to counterfeit a sender. The recipient can therefore check whether the sending server has the rights to send via this domain.

      DKIM

      Authenticate your mails with a DKIM (Domain Keys Identified Mail) signature. This signature is associated with your domain and is used for all outgoing e-mails. This technique, like SPF, is designed to prevent the sender of an e-mail from being forged.

      DMARC

      We highly recommend that you publish a DMARC (Domain-based Message Authentication, Reporting and Conformance) record on your DNS. DMARC can be created in addition to an SPF or DKIM entry. With DMARC, rules can be defined on how the recipient should handle e-mails that do not have a valid SPF record or DKIM signature. Thus, it can be determined whether deviating e-mails should be quarantined or rejected directly. In addition, an e-mail address can be defined to which evaluations should be sent.