Feeds

Is this the world's longest email disclaimer?

265 words and counting

  • alert
  • submit to reddit

Combat fraud and increase customer satisfaction

Thanks very much to reader James Masterton, who wanted to draw our attention to a disturbing trend:

It has been a long and strange week so I wondered if a challenge was in order. Who can provide an example of the silliest email disclaimer? You know the kind of thing, the bandwidth-wasting spiel that gets added to outgoing mail at the server level and normally takes the form of a quick legal disclaimer which seems to suggest that all people at that company are stupid and send their emails to the wrong place.

However, recently some companies have started to take the piss. I present below a genuine email tag as forwarded to me by a friend and which appears on the bottom of every mail from that company, even if the actual message itself is just a couple of lines. Has anyone ever seen anything worse?

Well, have you? An exclusive Reg t-shirt to any reader who can top this:

The eResourcing division of TMP Worldwide is a leading provider of global human capital solutions. It is one of the world's largest mid-market executive recruiters, with over 4,000 staff, in 171 offices across 25 countries. The division operates across all major industry sectors and also covers multiple disciplines with specialist teams in Finance, Sales & Marketing, Legal, Human Resources, Technology and Telecoms, as well as the Manufacturing and Engineering, Consumer, Supply Chain, Energy & Utilities, Public Sector, Financial Services and Office Support. In the modern "War for Talent", TMP eResourcing provides integrated human capital solutions to clients, leveraging the experience of its consultants and the power of Internet recruitment to deliver competitive advantage. For more information please visit our Website at www.eresourcing.tmp.com or www.monster.co.uk

This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. Any opinions expressed in the email are those of the individual and not necessarily the company. This email and any files transmitted with it are confidential and solely for the use of the intended recipient. If you are not the intended recipient or the person responsible for delivering to the intended recipient, be advised that you have received this email in error and that any use is strictly prohibited.

If you have received this email in error, or if you are concerned with the content of this email please notify the IT help desk by telephone on -----------

This footnote also confirms that this email message has been swept for the presence of computer viruses.

Quite outstanding. Email your own favourites to us here.

3 Big data security analytics techniques

More from The Register

next story
Forget the beach 'n' boardwalk, check out the Santa Cruz STEVE JOBS FOUNTAIN
Reg reader snaps shot of touching tribute to Apple icon
Oz bank in comedy Heartbleed blog FAIL
Bank: 'We are now safely patched.' Customers: 'You were using OpenSSL?'
Happy 40th Playmobil: Reg looks back at small, rude world of our favourite tiny toys
Little men straddle LOHAN, attend tiny G20 Summit... ah, sweet memories...
Spanish village called 'Kill the Jews' mulls rebranding exercise
Not exactly attractive to the Israeli tourist demographic
Lego is the TOOL OF SATAN, thunders Polish priest
New minifigs like Monster Fighters are turning kids to the dark side
Dark SITH LORD 'Darth Vader' joins battle to rule, er, Ukraine
Only I can 'make an empire out of a republic' intones presidential candidate
Chinese company counters pollution by importing fresh air
Citizens line up for bags of that sweet, sweet mountain air
Google asks April Fools: Want a job? Be our 'Pokemon Master'
Mountain View is prankin' like it's 1999...
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.