Feeds

Is this the world's longest email disclaimer?

265 words and counting

  • alert
  • submit to reddit

Next gen security for virtualised datacentres

Thanks very much to reader James Masterton, who wanted to draw our attention to a disturbing trend:

It has been a long and strange week so I wondered if a challenge was in order. Who can provide an example of the silliest email disclaimer? You know the kind of thing, the bandwidth-wasting spiel that gets added to outgoing mail at the server level and normally takes the form of a quick legal disclaimer which seems to suggest that all people at that company are stupid and send their emails to the wrong place.

However, recently some companies have started to take the piss. I present below a genuine email tag as forwarded to me by a friend and which appears on the bottom of every mail from that company, even if the actual message itself is just a couple of lines. Has anyone ever seen anything worse?

Well, have you? An exclusive Reg t-shirt to any reader who can top this:

The eResourcing division of TMP Worldwide is a leading provider of global human capital solutions. It is one of the world's largest mid-market executive recruiters, with over 4,000 staff, in 171 offices across 25 countries. The division operates across all major industry sectors and also covers multiple disciplines with specialist teams in Finance, Sales & Marketing, Legal, Human Resources, Technology and Telecoms, as well as the Manufacturing and Engineering, Consumer, Supply Chain, Energy & Utilities, Public Sector, Financial Services and Office Support. In the modern "War for Talent", TMP eResourcing provides integrated human capital solutions to clients, leveraging the experience of its consultants and the power of Internet recruitment to deliver competitive advantage. For more information please visit our Website at www.eresourcing.tmp.com or www.monster.co.uk

This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. Any opinions expressed in the email are those of the individual and not necessarily the company. This email and any files transmitted with it are confidential and solely for the use of the intended recipient. If you are not the intended recipient or the person responsible for delivering to the intended recipient, be advised that you have received this email in error and that any use is strictly prohibited.

If you have received this email in error, or if you are concerned with the content of this email please notify the IT help desk by telephone on -----------

This footnote also confirms that this email message has been swept for the presence of computer viruses.

Quite outstanding. Email your own favourites to us here.

Build a business case: developing custom apps

More from The Register

next story
Drunkards warned: If you can't walk in a straight line, don't shop online, you fool!
Put it away boys. Cover them up ladies. Your credit cards, we mean
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
Murder accused DIDN'T ask Siri 'how to hide my roommate'
US court hears of cached browser image - not actual request
Cops baffled by riddle of CHICKEN who crossed ROAD
'Officers were unable to determine Chicken's intent'
Why your mum was WRONG about whiffy tattooed people
They're a future source of RENEWABLE ENERGY
Chomp that sausage: Brits just LOVE scoffing a Full Monty
Sales of traditional brekkie foods soar as hungry folk get their mitts greasy
Nuts to your poncey hipster coffees, I want a TESLA ELECTRO-CAFE
Examining the frothy disconnect in indie cafe culture
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
BYOD's dark side: Data protection
An endpoint data protection solution that adds value to the user and the organization so it can protect itself from data loss as well as leverage corporate data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?