Feeds

Is this the world's longest email disclaimer?

265 words and counting

  • alert
  • submit to reddit

Eight steps to building an HP BladeSystem

Thanks very much to reader James Masterton, who wanted to draw our attention to a disturbing trend:

It has been a long and strange week so I wondered if a challenge was in order. Who can provide an example of the silliest email disclaimer? You know the kind of thing, the bandwidth-wasting spiel that gets added to outgoing mail at the server level and normally takes the form of a quick legal disclaimer which seems to suggest that all people at that company are stupid and send their emails to the wrong place.

However, recently some companies have started to take the piss. I present below a genuine email tag as forwarded to me by a friend and which appears on the bottom of every mail from that company, even if the actual message itself is just a couple of lines. Has anyone ever seen anything worse?

Well, have you? An exclusive Reg t-shirt to any reader who can top this:

The eResourcing division of TMP Worldwide is a leading provider of global human capital solutions. It is one of the world's largest mid-market executive recruiters, with over 4,000 staff, in 171 offices across 25 countries. The division operates across all major industry sectors and also covers multiple disciplines with specialist teams in Finance, Sales & Marketing, Legal, Human Resources, Technology and Telecoms, as well as the Manufacturing and Engineering, Consumer, Supply Chain, Energy & Utilities, Public Sector, Financial Services and Office Support. In the modern "War for Talent", TMP eResourcing provides integrated human capital solutions to clients, leveraging the experience of its consultants and the power of Internet recruitment to deliver competitive advantage. For more information please visit our Website at www.eresourcing.tmp.com or www.monster.co.uk

This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. Any opinions expressed in the email are those of the individual and not necessarily the company. This email and any files transmitted with it are confidential and solely for the use of the intended recipient. If you are not the intended recipient or the person responsible for delivering to the intended recipient, be advised that you have received this email in error and that any use is strictly prohibited.

If you have received this email in error, or if you are concerned with the content of this email please notify the IT help desk by telephone on -----------

This footnote also confirms that this email message has been swept for the presence of computer viruses.

Quite outstanding. Email your own favourites to us here.

Boost IT visibility and business value

More from The Register

next story
Motorist 'thought car had caught fire' as Adele track came on stereo
'FIRE' caption on dashboard prompts dunderheaded hard shoulder halt
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Yahoo! Japan! launches! service! for! the! dead!
If you're reading this email, I am no longer alive
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.