TDS offers the convenience of Single Sign-On (SSO) for several online applications. TDS Cable customers still need separate login credentials to access Online Bill Pay and Email (tdsmail.com, beyondbb.com, bajabb.com).
At this time, TDS Single Sign-On credentials can be used to access the following TDS applications:
- TV Everywhere*
- Account Access (this site)
- Your tds.net customer portal
- Voicemail CommPortal*
*Subject to availability based on your subscription.
With a single username and password, an authorized user can access multiple applications, without the hassle of creating (and remembering) separate credentials for each. This site allows account holders to manage these online credentials and permissions. Individual users can manage their username, password and security questions. Account administrators can do all of the above, and also add/remove users and manage user permissions.
The following applications are not yet accessible using your Single Sign-On credentials:
- Online Bill Pay
- TDS Email (tdsmail.com, beyondbb.com, bajabb.com)
To access these applications, please continue to use the individual username/password combination you had previously established for each. TDS will notify you when new applications are included within Single Sign-On.
With Web Mail, you can check your E-mail when you are away from your home computer.
Contact Tech Support for assistance with creating your primary email account and for creating your My Account Login credentials.
Select Email Access from the My Account / Login link at the top of the HelloTDS.com website or click the "Manage Email Accounts" button in this answer section. Click Manage Accounts from the Email Center menu. For more detailed instructions, use this step-by-step guide.
When attempting to prevent spam, users should use several different strategies to protect him or herself.
Keep the computer's anti-virus software up-to-date and install a firewall. When signing up for a mailing list, read the terms and policies. Do not post the primary email address on a web site.
Give the primary email address to friends and family only. Do not post the primary email address in newsgroups, bulletin boards, or chat rooms. Do not reply to unsolicited emails. Consider using an alternate email address when signing up for services, filling out forms, or taking surveys on the Internet. Make sure the email address is difficult to guess. Check "sent mail" for suspicious messages.
In an effort to fight spam and prevent abuse, we have set the following limitation on sending E-mails:
You can send to 500 recipients per email. Maximum of 500 email recipients in a 24 hour rolling period. Example: User can send 1 email to 500 different email addresses in a 24 hour period.
Email Client/POP User:
You can send to 100 recipients per email. Maximum of 500 email recipients in a 24 hour rolling period. Example: User can send an email with 50 recipients on the TO field and 50 recipients on the CC field, totaling 100 recipients. The system will allow the user to send this email 5 times (5 x 100 = 500 emails) throughout a rolling 24 hour period.
What if I need to send to more than 500 people at a time? Google has functionality called Google Groups. That allows you to create distribution type groups. Create multiple user accounts to send mail. For example, 'Admin1' and 'Admin2' can each send 500 messages to reach 1000 unique recipients. Stagger mass communications over the course of two days. For example, send messages to the allotted number of recipients on day one, wait for 24 hours, and send messages to another group of recipients on day two.
What happens if I send to more than 500 people in a 24 hour period?
In an effort to fight spam and prevent abuse, Google will temporarily disable your account if you send messages to more than 500 recipients or if you send a large number of undeliverable messages. Your account should be re-enabled within 24 hours. If you have further questions please contact our Tech Support for assistance.
There are several ways spammers can obtain a person’s email address either directly or indirectly. A spammer will commonly sell or trade lists of email addresses. So once an email address is on one list, it may be merged with other lists and might be nearly impossible to remove. To reduce spam, control the email address and how it is used. Here are the most common ways spammers obtain your email addresses: From a post to a newsgroup, bulletin board or chat room. Spammers use software programs, often referred to as “spidering” programs, to search for email addresses on these public forums.
From a personal web page. Any email addresses listed on those pages may be located and added to a spammers email list.
By replying to a fake request to be removed from an unwanted email. Often when this is done, he or she is confirming that the email address is valid and is being monitored. This is something a spammer wants in an email address. This can result in even MORE spam. This practice still continues, despite the passage of a federal anti-spam law called The CanSpamAct, that went into effect January 1, 2004, requiring a functioning “opt out” link or a legitimate “reply to unsubscribe” email address.
By signing up for a mailing list without checking their policies first. Hopefully, the person will receive only the emails he or she wants and not spam also.
Hit or Miss. Spammers can also obtain the email address without the person’s help, simply by guessing it. Surprisingly, this is a common process, and can be quite effective. Here’s how it is done: A spammer may start with a list of valid email addresses, then extract the user name portion of the email address, (everything before the @ sign) and try to use it with different providers, e.g., firstname.lastname@example.org, email@example.com, firstname.lastname@example.org, etc. This is a hit-or-miss approach to increase their existing mailing list that is often very successful. Spammers also use software programs to generate random user names from common names and words in the dictionary. Again, once they generate their list of user names, they just add a popular domain name to the end.
Ever received an email message that appears to be addressed to someone else? Chances are very good that it wasn’t by mistake. This is a form of spamming. Spammers often use the Bcc: (blind carbon copy) function of email when sending Spam. The “To:” field contains an address that is not the customer’s email address. The “Bcc:” field contains two other email addresses. All three of those email addresses will receive the email, but it will appear as though the message was sent to just the person whose email address is in the “To:” field.
To retrieve the missing email Username or Password, please contact our Technical Support. In most cases, the email address will be provided to the customer, and/or the email password will be reset.
The first time you access your voice mail, you must call from your home telephone. The system prompts you to create a personalized pass code, record your own voice signature, and record a personal greeting.
To access your voice mail from your home telephone, dial your ten-digit TN and enter your passcode if prompted. To access your voice mail away from home, dial your ten-digit TN and press the * (star) key during the outgoing greeting. The system asks you to enter your passcode to access your voice mail.
To listen to your voice mail messages, Press 1. From this point, you can perform the following tasks.
- To back up to the previous message, press 5.
- To erase the message, press 7.
- To save the message, press 9.
- For more options, press 0.
- To go to the Main menu, press the star key.
- To send a message reply, press 2.
- To replay this message, press 4.
You can store up to 30 voice mail messages for a total of 120 minutes. Single messages can be up to four minutes in length.
New messages are stored for 30 days, unless you mark them as saved. The system keeps saved messages for an additional 30 days.
Once you access your voice mail by entering your passcode, you can change your passcode as often as you like. Passcodes are a minimum of four digits and a maximum of ten digits. For more information about how to change your passcode, refer to section 7.5: Personal Options.
You have three attempts to enter your passcode for voice mail authentication. After three invalid attempts, the system hangs up. Each time you call in, you can try three more times.
To reach a Telecommunications Relay Services (TRS) center for the hearing impaired dial 711. TRS permits persons with a hearing or speech disability to use the telephone system via a text telephone (TTY) or other device to call persons with or without such disabilities. Specially trained relay agents complete calls and stay on-line to relay messages either by TTY, or verbally to hearing parties. This service is available 24 hours a day with no restrictions to the length or number of calls placed.
In an effort to reduce the number of unwanted telemarketing calls, the federal government and some states provide telephone subscribers the opportunity to register their telephone numbers for inclusion on a Do Not Call (DNC) registry. You must renew your DNC registry every five years. If you are currently on a federal or a state DNC registry, you may need to reregister if:
- You change your telephone number.
- Your telephone number has been transferred to/from another provider.
- Your phone service is disconnected for any reason and then reconnected.
- You move to another address.
For additional information about the federal registry, or to register, re-register or revoke registration of your number for free, visit the Federal Trade Commission’s website at donotcall.gov or call 1-888-382-1222.
Music Choice TV Everywhere (TVE) is the online companion to Music Choice, the digital music provider you currently enjoy on your TV. Free for all TV subscribers in select markets, Music Choice TVE gives you access to 75 commercial-free streaming music channels AND 25 commercial-free streaming video channels. All on the device of your choice.
Music Choice channels are available to customers in: Cedar City and St. George, Utah; Cortez, Estes Park, and Ft. Carson, Colo.; Mesquite, Nevada; and Ruidoso and Truth or Consequences, New Mexico.
Customers in other markets receive music channels from other providers.
Go to MusicChoice.com and you’ll be prompted to sign in with your TV provider’s credentials. Find TDS and login with your TDS online account. Please note that your TDS online account username and password may be different than your Email Access or Online Billing usernames and passwords. If you do not have a TDS online Account, visit https://login.tds.net/register/ to create one.
Anything and everything. From punk, rap and metal to music from the 1960s, ‘70s and ‘80s, Music Choice TVE offers something for everyone, including seasonal-specific and kid-friendly channels.
Currently Music Choice TVE supports Apple devices that run on iOS 8 or newer, Android devices with 4.1 (Jelly Bean) or newer and Kindle devices with Fire OS 5.0 or newer.
Computers and devices need to use either Google Chrome, Firefox, Safari or Internet Explorer 9 (or newer) to access Music Choice TVE. Additionally, Adobe Flash Player must be installed on customers’ machines.