I work on a simple principle with email.  If I can prove that my server has 
passed the message to the next hop, it's not my problem.

That may sound unhelpful but it's the reality of the situation - if you have 
logs that show the message left the systems under your control and you know 
where it went to, it becomes the owner of that systems problem.
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to