Admission Criteria. Pertaining to the participation of bulk mailers in the Certified Senders Alliance (CSA) Page 1 of 9 Version 1.

Size: px
Start display at page:

Download "Admission Criteria. Pertaining to the participation of bulk mailers in the Certified Senders Alliance (CSA) 2014-03-19 Page 1 of 9 Version 1."

Transcription

1 Admission Criteria Pertaining to the participation of bulk mailers in the Certified Senders Alliance (CSA) Page 1 of 9 Version 1.09

2 1 Preamble This document describes the criteria for adding bulk senders to the CSA as defined by eco Association of the Internet Industry e.v (eco). in cooperation with the Anti Spam Task Force and the Deutscher Dialogmarketing Verband (DDV - German Direct Marketing Association). Fulfilling the criteria does not guarantee delivery of s to the addressed users, as ISPs can inhibit messages and actions for reasons of network security and stability, and the s may therefore not be acknowledged. 2 Required Admission Criteria a. Names and IP addresses of all outgoing mail servers shall be provided regardless whether these are to be white-listed or not, the sender shall provide in detail which IPaddresses are to be white-listed and which are not. The use of mail servers that are not supposed to be white-listed is admissible only in the following cases: aa. New customer mailings if the number of mailings does not exceed 3 and the first mailing did not take place over 2 months ago. bb. Mailings destined exclusively for circles and markets that are not subject to the European Union laws pertaining to personal data processing and electronic communication; this shall not apply if the recipient address is assigned to one of the participating ISPs in the CSA. A mailing is the act of mailing at the same time an with essentially the same content to a previously determined group of receivers. The sender has to explain the use of mail servers that are not supposed to be whitelisted to the CSA in writing; the reasoning given by the sender is legally binding for the sender Page 2 of 9 Version 1.09

3 Consent b. s are only sent to receivers who have given their consent to receive these s according to section 7, paragraph 2, number 3 UWG (Act Against Unfair Competition) - (opt in) - or have a business relationship with the advertiser, and the conditions according to article 13 section 2 of the European Parliament and Council Directive 2002/58/EU on Privacy and Electronic Communication are met. (Direct advertising of the sender s own products or services of a similar nature; indication of the free-ofcharge possibility to disallow use of the address, both at the time of request of permission and in every usage of said address.) c. The consent to receive advertisements through has to be given separately. The receiver must either click/mark a box or otherwise give a comparatively clear declaration of consent to receive advertisements via . This declaration may not be part of other declarations (such as agreeing to terms and conditions.) d. The receivers must give their consent actively through a conscious act. Pre clicked/pre marked boxes may not be used. In the case that permission has not been clarified either in writing or electronically, a written confirmation is required from the address owner. The possibility to disallow the permission at any time must be clearly indicated at the time of requesting permission. The indication must also include information on how to disallow permission, and who to contact in order to do this. format e. The contracting entity- that means the contracting partner of the sender of an advertisement must be clearly recognizable. Every sent shall contain an easily noticeable about us ; either in the text or through a direct link. The about us section shall contain the following information: aa. name and address of the sender, for legal entities in addition to name and address the legal form of the entity, authorized representative and the Commercial Registry, Association Registry, Partnership Registry or Cooperative Society Registry they are registered with, as well the appropriate registration number. bb. contact information, at least a valid telephone number or an electronic contact form, as well as address and Page 3 of 9 Version 1.09

4 cc. if there is a value added tax identification number according to section 27a of the value added tax act or a business identification number according to section 139c of the tax code, this number shall be provided. Further reaching information obligations, for example according to section 5, paragraph 1 of the Telemedia Act (Telemediengesetz TMG) remain untouched f. Each must contain an option to withdraw permission to send any further s. Cancellation must be possible for the receiver, without having to know access data (such as login/password). Exceptions may be admissible in single cases as special cases occur in the administration of the offering party; see point 2v regarding List- Help. Cancellations must be processed promptly. g. Neither the sender nor the commercial character of the message may be obscured or concealed in the header or the subject header of the . Obscuring or concealing is taking place when the header and subject header are composed in such a way that the receiver cannot get any or can get only misleading information about the actual identity of the sender or the commercial nature of the message before the message is opened and read. h. When using addresses that the sender or his customers received from third parties, the sender or his customer is obligated to make sure before the advertisement action is taken that only receivers who have given their consent according to these criteria are ed; a consent that not only refers to mailings sent by a third party but also by the sender himself or the sender s customer. i. The retrieval of address data for third parties (such as through co sponsoring) should be transparent to the user. More so, address data retrieved in such a way should only be used for a mailing if aa. the companies for which the address data is generated were named individually, transparently, and categorized by industry, and bb. the access to the list of companies was clearly possible and easy for the users, and cc. the number of companies or persons for whom the address data was collected is reduced in a way that excludes the forwarding of user data to an unreasonably large circle of third parties and that allows the user to easily comprehend the consequences and the extent of his consent as well to easily control the legal handling of his data Page 4 of 9 Version 1.09

5 For clarification purposes we would like to point out that the companies for which the address data is generated may not forward this address data to third parties without a special consent from the user to do so. Technical Configurations j. The sender s servers must be technically secure (e.g. firewall, no open relays, no backscatters, constantly monitored server, etc.) k. Each sent (composition and configuration) as well as the sending of the (envelope communication in the SMTP dialogue) must always be in accordance with RFC standards. The following RFCs amongst others are authoritative: 821,2142,2821,2822. l. The sending IP address mail server respectively the IP address which gives an to the Internet Service Provider must be reverse-resolvable via PTR. The entry must be in the form of a FQDN (Fully Qualified Domain Name.) The used FQDN must clearly point at an A-record (ARR) to the IP Address of the MTA. The used FQDN entered in the DNS must be noted in the SMTP dialog (envelope communication) with the HELO/EHLO command. m.the whois information of the IP-address or of the related FQDN must clearly reference to the certified sender. Moreover, the IP-addresses and FQDN reachable contact addresses as well as easy to find general abuse addresses must be included in the WHOIS (see also RFC2142, RFC3013 section 2.5 and current guidelines/ best practices of the RIRs and registries). n. The sender has to set up a separate abuse/complaint or feedback loop address for the IP-addresses he uses and communicate it to the CSA (freely definable ROLE account with the purpose of receiving as the case may be automated complaints or requests from ISPs or receivers). The ability to process ARF (see RFC5965 and X- ARF 1 is required. Furthermore, a feedback loop address (sender ROLE account responsible for receiving questions from ISPs) and the phone and address of a contact person for complaints must be provided. Response time for complaints must not exceed 24 hours on business days. o. The sender must have sole control over the outgoing mail servers. 1 See for detailed information Page 5 of 9 Version 1.09

6 p. The outbound servers named by the sender may only be used for the mass mailing or respectively automated sending. Ideally, it should be possible to for instance be able to assign specific campaigns/mailings to certain dedicated systems. q. The sender must remove addresses from the mailing list after three hardbounces. 2 r. For MAIL FROM address indicated in the SMTP communication between servers an SPF From record must be kept which allows the SPF system on the receiver side to perform an SPF test (where applicable, the sender is also to implement an SRS procedure). The SPF record must end in ~all or -all. Please also follow the guidelines under the recommendations on sender ID entries under 3.g. s. An SPF-HELO entry for the FQDN of the sending server must be made and should if possible- end with -all (when ~all is not doable), equivalent with the entered information in 2l. t. Regarding the MAIL FROM address recorded in the envelope communication between servers, an additional and possibly marked lowest priority MX record and an A record must exist for its domain name part and both point to the sending server. u. The DKIM procedure (DomainKeys Identified Mail) 3 is to be implemented for all servers/ip addresses to be certified at the latest by the time of successful certification through the CSA. The domain used in the DKIM d= tag must be shown in a Whois entry either as the certified sender of a relevant customer thereof. v. The header must contain an List-Unsubscribe-Link (see RFC23692) 4. The named links must enable an easy unsubscribe at least at the list level. The unsubscribe from list header contains at least one HTTP-link. The sender can send the user a confirmation informing of the successful unsubscribe. Exceptions to this obligation can be claimed when it is not possible to unsubscribe in the above mentioned way and sending an automated is not necessary or possible due to the type of service. The complaint hotline shall decide in these exceptional cases. 2 server status codes that begin with a 5 are to be classified as hard bounces. See RFC See 4 See also and Page 6 of 9 Version 1.09

7 In the case of an exception, a List-Help link (see RFC 2369) must be added to the header. The link must lead to a help or login site which explains to the recipient how to un-subscribe from further mailings, or why this is not possible on legally binding grounds, and these grounds are to be named. w. A list ID header (see RFC2919) must be included in the sent s which makes it possible to transparently comprehend the list of receivers (receiver circle) and a clear reason for the mailing. If it is possible by the type of mailing (for instance advertising mailing), the mailing campaign should be conclusive. x. At the latest two weeks after successful certification, the sender is to add an X-CSA- Complaints header. The header line is to read: X-CSA-Complaints: whitelistcomplaints@eco.de. The fulfilment of this criteria is to be confirmed for the CSA through a test mailing to seeds@helpdesk.certified-senders.eu. y. DKIM Failure Reporting by the recipient must be enabled through entries or extensions in the relevant DNS records. DKIM Failure Reports must be received by the certified sender or the customer thereof (see RFC 6651). z. SPF Failure Reporting (for SPF-MFROM and SPF-HELO) by the recipient must be enabled through entries or extensions in the relevant DNS records. DKIM Failure Reports must be received by the certified sender or the customer thereof (see RFC 6652). 3 Recommended Admission Criteria / Double Opt-In a. It is recommended to collect user data over the internet preferably through the double-opt-in (DOI) method. The DOI as understood by the CSA agreement describes a procedure through which an that explains the consent to receive s (consent ) is sent to the recorded address and the receiver confirms his/her consent by answering the consent or clicks on a link confirming his/her consent. Only after receiving the confirmation from the recipient is the sender entitled to use the confirmed address. If the consent is not given in due time, the data connected to the address must be deleted. A DOI which only verifies the address and does not explicitly verify consent (for instance for lottery games verifying the address to send the price) would not qualify as a DOI in this sense Page 7 of 9 Version 1.09

8 The confirmation may not contain advertisements or any other contents. The CSA participants commit to only calling the procedure used by them a DOI if it fulfils these requirements. b. It is recommended to already inform the user about the sending address when they are requesting a service, for example a newsletter request, to enable the addressee to make an addition to their address book. c. It is suggested to include the date and newsletter subscription IP in the header to help the user to remember signing up. Moreover, the sign up information should be repeated in the body of the as well. This should include the signed up address, sign up date and the website on which the receiver signed up. d. It is suggested that for each from-sender-address (their domain respectively), under certain circumstances, an additional MX record for the sending IP-address with possibly the lowest priority is included in the headers. e. It is recommended not to conduct mailings to new customers exclusively through mail serves that are not white-listed. f. It is recommended to implement a sender ID record for the PRA address identified in the header of the receiver which allows a PRA sender ID test on the receiver side. When sender ID entries are made, they have to be made in a clearly defined form spf2.0/pra. g. HTML formatted s should generally be expanded with a text part (MIME). This should contain unsubscribe and newsletter information because the receivers cannot always receive HTML formatted s properly. h. It is recommended to insert a valid sender address so that the receiver can contact the sender by hitting reply. Should this not be the case, it is recommended to at least include a -reply to- address. i. The collection of address data for third parties (through co-sponsoring for example) should be transparent to the user 5. Especially address data collected in this manner should only be used for a mailing if the number of companies or person for whom address data was collected does not exceed Cf. the required admission criterion under section 2.i Page 8 of 9 Version 1.09

9 j. It is recommended to evaluate the DMARC 6 procedure and to implement the corresponding DNS records on the sender-side so that ISPs as recipients can check the received s according to the predetermined parameters. When the procedure is implemented, the reporting addresses must be specified in such a way that reports send by ISPs are processed by the certified sender or the customer thereof. 4 Legality a. The sender is responsible that the mailing is conducted legally and that the contents of sent s are not against the law. b. The sender also assumes responsibility for the legal requirements and lawful implementations of the criteria laid forth in this document to be applied to each and every , for example that the IP address of the requestor is in the header line. 5 Subject to Change eco reserves the right to change the criteria with six weeks notice. The bulk sender has the right to terminate the agreement in this case. Should that happen, already paid dues shall be prorated and refunded. 6 See Page 9 of 9 Version 1.09

Questionnaire for bulk mailers

Questionnaire for bulk mailers Questionnaire for bulk mailers for the central white list for accredited senders, Certified Senders Alliance (CSA) 2014-12-19 Page 1 of 12 Version 5.01 Please complete this form an send it to eco via fax

More information

Collax Mail Server. Howto. This howto describes the setup of a Collax server as mail server.

Collax Mail Server. Howto. This howto describes the setup of a Collax server as mail server. Collax Mail Server Howto This howto describes the setup of a Collax server as mail server. Requirements Collax Business Server Collax Groupware Suite Collax Platform Server including Collax Communication

More information

Emails and anti-spam Page 1

Emails and anti-spam Page 1 Emails and anti-spam Page 1 As the spammers become increasing aggressive more and more legit emails get banned as spam. When you send emails from your webcrm system, we use the webcrm servers to send emails

More information

Domains Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc.

Domains Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Domains All Domains System administrators can use this section

More information

Anti-SPAM Policy v.3 06-01-2011

Anti-SPAM Policy v.3 06-01-2011 Anti-SPAM Policy v.3 06-01-2011 Each user must agree to this policy. comf5 has a no tolerance policy for the sending of spam and unsolicited email, and we prohibit the use of third-party, purchased, rented,

More information

Gordon State College. Spam Firewall. User Guide

Gordon State College. Spam Firewall. User Guide Gordon State College Spam Firewall User Guide Overview The Barracuda Spam Firewall is an integrated hardware and software solution that provides powerful and scalable spam and virus-blocking capabilities

More information

Smart E-Marketer s Guide

Smart E-Marketer s Guide 30 insider tips to maximise your email deliverability rate 30 insider tips Step 1. Ensure the domain you use for sending emails is configured to enable authentication (SPF / Sender ID/ DomainKeys). Step

More information

ARTICLE 29 Data Protection Working Party

ARTICLE 29 Data Protection Working Party ARTICLE 29 Data Protection Working Party 11601/EN WP 90 Opinion 5/2004 on unsolicited communications for marketing purposes under Article 13 of Directive 2002/58/EC Adopted on 27 February 2004 This Working

More information

SME- Mail to SMS & MMS Gateway with NowSMS Quick Start Guide

SME- Mail to SMS & MMS Gateway with NowSMS Quick Start Guide SME- Mail to SMS & MMS Gateway with NowSMS Quick Start Guide One of the typical usage cases for NowSMS is as an E-Mail to SMS & MMS Gateway. E-Mail users can send an SMS or MMS message by sending an e-mail

More information

An Email Delivery Report for 2012: Yahoo, Gmail, Hotmail & AOL

An Email Delivery Report for 2012: Yahoo, Gmail, Hotmail & AOL EmailDirect is an email marketing solution provider (ESP) which serves hundreds of today s top online marketers by providing all the functionality and expertise required to send and track effective email

More information

Securepoint Security Systems

Securepoint Security Systems HowTo: Configuration of the spam filter Securepoint Security Systems Version 2007nx Release 3 Contents 1 Configuration of the spam filter with the Securepoint Security Manager... 3 2 Spam filter configuration

More information

e-shot Unique Deliverability

e-shot Unique Deliverability e-shot Unique Deliverability Email Deliverability What is Email Deliverability? Email deliverability s aim is to maximise the number of email messages that reach the intended recipients inboxes. It is

More information

API Guide v 1.6 14/11/2013

API Guide v 1.6 14/11/2013 1 About netcore netcore is a leader in digital communications space. The mission of the company is to help clients communicate effectively for marketing and business needs. We help organizations in the

More information

PARTNER EMAIL GUIDELINES

PARTNER EMAIL GUIDELINES PARTNER EMAIL GUIDELINES The guidelines listed below are required pursuant to the Agreement entered into between Criteo and the Partner. Any breach of these guidelines except the last section related to

More information

Unica OnDemand. Unica and email deliverability. Getting to the inbox. Publication Date: January 19, 2010

Unica OnDemand. Unica and email deliverability. Getting to the inbox. Publication Date: January 19, 2010 Unica OnDemand Publication Date: January 19, 2010 N10014 Getting to the inbox N40002 Sending an email is something you do every day. Even when you send a single email, occasionally the message does not

More information

Certification. Standards & Requirements

Certification. Standards & Requirements Certification Standards & Requirements Table of Contents What Are the Standards and Requirements for Becoming and Staying Certified?... 5 Why Do We Hold Senders to These Standards and Requirements?...

More information

Deliverability Best Practices by Tamara Gielen

Deliverability Best Practices by Tamara Gielen Deliverability Best Practices by Tamara Gielen Hello, my name is Tamara Gielen Blogger Community manager Speaker Independent consultant Trainer Based in Belgium 2010 Tamara Gielen BVBA all rights reserved

More information

Top 40 Email Marketing Terms You Should Know

Top 40 Email Marketing Terms You Should Know 1601 Trapelo Road Phone 781-472-8100 Suite 246 Fax 781-472-8101 Waltham, MA 02451 www.constantcontact.com Top 40 Email Marketing Terms You Should Know If you have ever felt out of your depth in a discussion

More information

SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing

SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing EMAIL MARKETING SCORECARD Find Out How Much You Are Really Getting Out of Your Email Marketing This guide is designed to help you self-assess your email sending activities. There are two ways to render

More information

Email Marketing Glossary of Terms

Email Marketing Glossary of Terms Email Marketing Glossary of Terms A/B Testing: A method of testing in which a small, random sample of an email list is split in two. One email is sent to the list A and another modified email is sent to

More information

EmailCampaigns. Product Use Guide. Copyright LeadFormix Inc. All Rights Reserved

EmailCampaigns. Product Use Guide. Copyright LeadFormix Inc. All Rights Reserved EmailCampaigns Product Use Guide Copyright LeadFormix Inc. All Rights Reserved 1 Email Campaign User Manual... 3 2 Special Features of Email Campaign... 7 3 Monitoring Email Campaigns: What our clients

More information

GET THE MESSAGE? Best Practices in Email Marketing

GET THE MESSAGE? Best Practices in Email Marketing WHITE PAPER GET THE MESSAGE? Email marketing has proven its value, delivering higher customer responses at 1/20th of the cost of traditional direct marketing channels. As a result most major marketers

More information

Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam e-mail.

Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam e-mail. Collax Spam Filter Howto This howto describes the configuration of the spam filter on a Collax server. Requirements Collax Business Server Collax Groupware Suite Collax Security Gateway Collax Platform

More information

Instructions Microsoft Outlook Express Page 1

Instructions Microsoft Outlook Express Page 1 Instructions Microsoft Outlook Express Page 1 Instructions Microsoft Outlook Express This manual is written for users who already have an e-mail account configured in Outlook Express and will therefore

More information

BULK MAIL CAMPAIGN RULES

BULK MAIL CAMPAIGN RULES BULK MAIL CAMPAIGN RULES No matter what you do, or how closely you follow the guidelines we provide, the issue of spam is an ever changing and always evolving problem it is estimated that more than 70%

More information

Paladin Computers Privacy Policy Last Updated on April 26, 2006

Paladin Computers Privacy Policy Last Updated on April 26, 2006 Paladin Computers Privacy Policy Last Updated on April 26, 2006 At Paladin Computers ( Service Provider ), we respect our Users and Clients right to privacy with regards to the use of their email and our

More information

Top 25 Email Marketing Terms You Should Know. Email Marketing from Constant Contact

Top 25 Email Marketing Terms You Should Know. Email Marketing from Constant Contact Email Marketing from Constant Contact Top 25 Email Marketing Terms You Should Know Constant Contact, Inc. 1601 Trapelo Road, Suite 329 Waltham, MA 02451 www.constantcontact.com If you have ever felt out

More information

Avira Managed Email Security (AMES) User Guide

Avira Managed Email Security (AMES) User Guide Avira Managed Email Security (AMES) User Guide 1 Product information... 3 1.1 Functionality... 3 1.2 Licensing AMES... 3 2 Getting started with AMES... 4 2.1 Adding a new domain to AMES... 4 2.2 Logging

More information

Deliverability Counts

Deliverability Counts Deliverability Counts 10 Factors That Impact Email Deliverability Deliverability Counts 2015 Harland Clarke Digital www.hcdigital.com 1 20% of legitimate commercial email is not being delivered to inboxes.

More information

WHITEPAPER. SendGrid Deliverability Guide V2. Everything You Need to Know About Delivering Email through Your Web Application

WHITEPAPER. SendGrid Deliverability Guide V2. Everything You Need to Know About Delivering Email through Your Web Application WHITEPAPER SendGrid Deliverability Guide V2 Everything You Need to Know About Delivering Email through Your Web Application The Most Important Fact about Email: Delivery is Never Guaranteed Email is the

More information

Data is at the heart of deliverability

Data is at the heart of deliverability FOR ADESTRA CLIENTS ONLY! Page 1 of 5 Data is at the heart of deliverability Introduction Following an in-depth project by Adestra into deliverability in the UK a common theme has emerged. Your data management

More information

Blackbaud Communication Services Overview of Email Delivery and FAQs

Blackbaud Communication Services Overview of Email Delivery and FAQs Blackbaud Communication Services Blackbaud Communication Services Overview of Email Delivery and FAQs Email Delivery through your Blackbaud Solutions Blackbaud Communication Services can send large numbers

More information

Unsubscribe and Bounce Management

Unsubscribe and Bounce Management JangoMail Summary and Overview Tutorial Unsubscribe and Bounce Management JangoMail provides robust and flexible unsubscribe and bounce management capabilities. Individual addresses or entire domains can

More information

Guardian Digital Secure Mail Suite Quick Start Guide

Guardian Digital Secure Mail Suite Quick Start Guide Guardian Digital Secure Mail Suite Quick Start Guide Copyright c 2004 Guardian Digital, Inc. Contents 1 Introduction 1 2 Contacting Guardian Digital 2 3 Purpose of This Document 3 3.1 Terminology...............................

More information

THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA

THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA Communications and Information Technology Commission THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA Final Version 23/02/2008 Submitted to: Submitted By: Acceptance of Deliverable

More information

WHITE PAPER SEPTEMBER 2008. Make It Into the Inbox. Co-authored by Jaren Angerbauer and Shaneli Ramratan

WHITE PAPER SEPTEMBER 2008. Make It Into the Inbox. Co-authored by Jaren Angerbauer and Shaneli Ramratan THE DIGITAL MARKETING COMPANY WHITE PAPER SEPTEMBER 2008 The 10 Commandments of Email Delivery Make It Into the Inbox Co-authored by Jaren Angerbauer and Shaneli Ramratan In the world of email marketing

More information

INinbox Start-up Pack

INinbox Start-up Pack 2 INspired Email Marketing This is what you should know about sending emails through INinbox and how to get started! Thanks for joining INinbox. choice. You ve made a great In front of you, you find the

More information

Email Migration Project Plan for Cisco Cloud Email Security

Email Migration Project Plan for Cisco Cloud Email Security Sales Tool Email Migration Project Plan for Cisco Cloud Email Security 2014 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Conf idential. For Channel Partner use only. Not f

More information

Sonian Getting Started Guide October 2008

Sonian Getting Started Guide October 2008 Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using

More information

Anti-Spam Measures Survey 2009. Pascal Manzano ENISA

Anti-Spam Measures Survey 2009. Pascal Manzano ENISA Anti-Spam Measures Survey 2009 Pascal Manzano ENISA Do you remember what happen on June 25 th? Methodology Online questionnaire open from May until July 2009 Questionnaire used providers best practices

More information

Best Practices: How To Improve Your Survey Email Invitations and Deliverability Rate

Best Practices: How To Improve Your Survey Email Invitations and Deliverability Rate Best Practices: How To Improve Your Survey Email Invitations and Deliverability Rate Below, you will find some helpful tips on improving your email invitations and the deliverability rate from a blog post

More information

Protect your brand from phishing emails by implementing DMARC 1

Protect your brand from phishing emails by implementing DMARC 1 Protect your brand from phishing emails by implementing DMARC 1 Message from the Certified Senders Alliance supported by AOL, Microsoft and Google In the following article we want to clarify why marketers

More information

CipherMail Gateway Quick Setup Guide

CipherMail Gateway Quick Setup Guide CIPHERMAIL EMAIL ENCRYPTION CipherMail Gateway Quick Setup Guide October 10, 2015, Rev: 9537 Copyright 2015, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Typical setups 4 2.1 Direct delivery............................

More information

The Essential Email Marketing Glossary

The Essential Email Marketing Glossary By Ryan P. M. Allis ASP - Application Service Provider. ASP s provide internet based software. Access - Database software. Part of the Microsoft Office Suite. Organizations often store customer data in

More information

Software Solutions Digital Marketing Business Services. Email Marketing. What you need to know

Software Solutions Digital Marketing Business Services. Email Marketing. What you need to know Software Solutions Digital Marketing Business Services Email Marketing What you need to know Contents Building Your Email List 1 Managing Your Email List. 2 Designing Your Emails 3 Branding Your Emails.....

More information

Email Delivery Simplified White Paper

Email Delivery Simplified White Paper Email Delivery Simplified White Paper April 28, 2005 Prepared by StrongMail Systems, Inc. 1300 Island Drive, Suite 200 Redwood Shores, CA 94065 t. (650) 421-4200 f. (650) 421-4201 info@strongmailsystems.com

More information

How To Ensure Your Email Is Delivered

How To Ensure Your Email Is Delivered Everything You Need to Know About Delivering Email through Your Web Application SECTION 1 The Most Important Fact about Email: Delivery is Never Guaranteed Email is the backbone of the social web, making

More information

Questions or a need for further clarification should be directed to your College or department email administrator.

Questions or a need for further clarification should be directed to your College or department email administrator. Spam Email Advisory Continuing increases in the volume and sophistication of spam email have, in some cases, impacted the performance of our email systems causing nondelivery or delayed delivery of email.

More information

Email AntiSpam. Administrator Guide and Spam Manager Deployment Guide

Email AntiSpam. Administrator Guide and Spam Manager Deployment Guide Email AntiSpam Administrator Guide and Spam Manager Deployment Guide AntiSpam Administration and Spam Manager Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec

More information

MANAGING YOUR EMAIL LIST

MANAGING YOUR EMAIL LIST MANAGING YOUR EMAIL LIST Ensuring you reach the right people at the right time with a relevant message. 866.915.9465 www.delivra.com 2013 Delivra Professional Email Marketing Software and Consulting 2

More information

You ve got. Best practices for email deliverability. Microsoft Dynamics Marketing

You ve got. Best practices for email deliverability. Microsoft Dynamics Marketing You ve got Best practices for email deliverability Microsoft Dynamics Marketing Table of Contents Summary & author introduction Getting into the inbox with grace If you don t know, now you know: terms

More information

SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel

SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel Table of Contents Domains... 1 Add Domain... 2 MX verification Tool... 4 Overview... 5 Incoming... 6 Incoming Bandwidth Overview...

More information

ANTI-SPAM POLICY JANUARY 2014

ANTI-SPAM POLICY JANUARY 2014 ANTI-SPAM POLICY JANUARY 2014 CONTENTS Introduction... 3 What happens if the anti-spam policy is not followed?... 3 Legal responsibilities and requirements... 3 Spam Definition... 4 Multinational campaigns...

More information

KUMC Spam Firewall: Barracuda Instructions

KUMC Spam Firewall: Barracuda Instructions KUMC Spam Firewall: Barracuda Instructions Receiving Messages from the KUMC Spam Firewall Greeting Message The first time the KUMC Spam Firewall quarantines an email intended for you, the system sends

More information

DMA s E-Mail Authentication Requirement: FAQs and Best Practices

DMA s E-Mail Authentication Requirement: FAQs and Best Practices DMA s E-Mail Authentication Requirement: FAQs and Best Practices DMA s Board of Directors approved a new guideline for ethical marketing practices in October 2005, with the new member requirement going

More information

Deploying Layered Email Security. What is Layered Email Security?

Deploying Layered Email Security. What is Layered Email Security? Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review

More information

How to Stop Spam Emails and Bounces

How to Stop Spam Emails and Bounces Managing Your Email Reputation For most companies and organizations, email is the most important means of business communication. The value of email today, however, has been compromised by the rampant

More information

Email Data Management Best Practices

Email Data Management Best Practices Email Data Management Best Practices September 17, 2008 These Best Practices have been developed by the IAB Email Committee. About the IAB Email Committee: The Email Committee is dedicated to removing

More information

8/4/2015 Sphere 9.4.6 Sphere Email US

8/4/2015 Sphere 9.4.6 Sphere Email US Sphere Email Guide 8/4/2015 Sphere 9.4.6 Sphere Email US 2015 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical,

More information

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network. Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components

More information

CanIt-PRO End-User s Guide Roaring Penguin Software Inc. 9 September 2005

CanIt-PRO End-User s Guide Roaring Penguin Software Inc. 9 September 2005 CanIt-PRO End-User s Guide Roaring Penguin Software Inc. 9 September 2005 2 Contents 1 Introduction 5 2 Accessing The CanIt-PRO User Interface 7 3 CanIt-PRO Simplified Interface 9 4 CanIt-PRO Expert Interface

More information

6-Part Lunch Learning Series

6-Part Lunch Learning Series Deliverability Basics Thursday, March 21, 2013 12:00pm 12:30pm EDT #asaewebinar Presented by: Jenny Lassi Professional Services, HighRoadSolution This complimentary webinar is brought to you by HighRoad

More information

MailGuard and Microsoft Exchange 2007

MailGuard and Microsoft Exchange 2007 MailGuard and Microsoft Exchange 2007 Contents: Introduction - The purpose of this document. Protecting OUTBOUND email - Send your outbound email through MailGuard. MailGuard and Sender Policy Framework

More information

Leonardo Hotels Group Page 1

Leonardo Hotels Group Page 1 Privacy Policy The Leonardo Hotels Group, represented by Sunflower Management GmbH & Co.KG, respects the right to privacy of every individual who access and navigate our website. Leonardo Hotels takes

More information

eprivacy GmbH Criteria Catalogue "eprivacyapp" June 2015

eprivacy GmbH Criteria Catalogue eprivacyapp June 2015 eprivacy GmbH Criteria Catalogue "eprivacyapp" June 2015 The eprivacyapp seal for data security and data protection from eprivacy GmbH certifies the respective requester that his/her offer is compliant

More information

eprism Email Security Suite

eprism Email Security Suite FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks

More information

Email Marketing 201. How a SPAM Filter Works. Craig Stouffer Pinpointe On-Demand cstouffer@pinpointe.com (408) 834-7577 x125

Email Marketing 201. How a SPAM Filter Works. Craig Stouffer Pinpointe On-Demand cstouffer@pinpointe.com (408) 834-7577 x125 Email Marketing 201 How a SPAM Filter Works Craig Stouffer Pinpointe On-Demand cstouffer@pinpointe.com (408) 834-7577 x125 Mark Feldman NetProspexVP Marketing mfeldman@netprospex.com (781) 290-5714 www.twitter.com/pinpointe

More information

eco Directive for Permissible e-mail Marketing

eco Directive for Permissible e-mail Marketing D A CH eco Directive for Permissible e-mail Marketing Guidelines for Practical Use 5th Edition 2014 NEW: Worldwide Opt-In / Opt-Out- List! 2 INDEX Guidelines for Practical Use 5th Edition 2014 1. Foreword

More information

Information and Communication Technologies in. Tourism

Information and Communication Technologies in. Tourism Information and Communication Technologies in Tourism ICT supported CRM in the Tourism Industry Customer Relationship Management (CRM) Case study XQueue 2 ICT in Tourism CRM - Customer Relationship Management

More information

SPAMfighter Mail Gateway

SPAMfighter Mail Gateway SPAMfighter Mail Gateway User Manual Copyright (c) 2009 SPAMfighter ApS Revised 2009-05-19 1 Table of contents 1. Introduction...3 2. Basic idea...4 2.1 Detect-and-remove...4 2.2 Power-through-simplicity...4

More information

ESPC Best Practices Guide

ESPC Best Practices Guide A division of the Network Advertising Initiative ESPC Best Practices Guide I. Introduction Email is an excellent channel for mailers to establish and maintain valuable relationships with their subscribers.

More information

The initial mail screen While there are a few changes that can be done to the look of the inbox screen, here is what it will look like to start with:

The initial mail screen While there are a few changes that can be done to the look of the inbox screen, here is what it will look like to start with: Accessing the webmail Customers can get to their email account initially via a login page that we maintain. This login is at http://www.50below.com/login. Dealers should also be able to access their mail

More information

A Whitepaper of Email Marketing Questions and Answers Email Marketing 101: Tips to Maximize Email Results

A Whitepaper of Email Marketing Questions and Answers Email Marketing 101: Tips to Maximize Email Results A Whitepaper of Email Marketing Questions and Answers Email Marketing 101: Tips to Maximize Email Results Page 0 of 8 Introduction This document summarizes the questions that were asked during the session

More information

Why should I get someone else to send my email campaign when my CRM/IT Team/web host/can do it?

Why should I get someone else to send my email campaign when my CRM/IT Team/web host/can do it? Why should I get someone else to send my email campaign when my CRM/IT Team/web host/can do it? The most important reason to outsource the delivery of your email campaign is often not what people consider

More information

FLASH DELIVERY SERVICE

FLASH DELIVERY SERVICE Privacy Policy FLASH DELIVERY SERVICE is Committed to Protecting Your Privacy Protecting our customers' privacy is an important priority at FLASH DELIVERY SERVICE and we are committed to maintaining strong

More information

Content Filters A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER

Content Filters A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER Content Filters A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER CONTENT FILTERS 2 Introduction Content- based filters are a key method for many ISPs and corporations to filter incoming email..

More information

Post-Send Vetting Techniques... 6 Methodology... 6

Post-Send Vetting Techniques... 6 Methodology... 6 Messaging Anti-Abuse Working Group (MAAWG) Vetting Best Common Practices (BCP) November 2011 Introduction... 1 Why Vet?... 2 Pre-Send Vetting Techniques... 2 Corporate Entity Formation and History... 2

More information

Panda Cloud Email Protection

Panda Cloud Email Protection Panda Cloud Email Protection 1. Introduction a) What is spam? Spam is the term used to describe unsolicited messages or messages sent from unknown senders. They are usually sent in large (even massive)

More information

Email Deliverability Demystified:

Email Deliverability Demystified: Email Deliverability Demystified: Papilia s Commitment to Optimizing Results A Whitepaper by Mark DiMaio Deliverability Expert SM Email Deliverability Demystified: Papilia s Commitment to Optimizing Results

More information

Webmail Friends & Exceptions Guide

Webmail Friends & Exceptions Guide Webmail Friends & Exceptions Guide Add email addresses to the Exceptions List and the Friends List in your Webmail account to ensure you receive email messages from family, friends, and other important

More information

Anchor s Email Marketing Glossary and Common Terms

Anchor s Email Marketing Glossary and Common Terms Anchor s Email Marketing Glossary and Common Terms A/B Split Test: A method used for testing the response of sending two different email campaigns to two equal segments of an email list. Marketers can

More information

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. 2001 2014 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered

More information

HowTo: Logging, reporting, log-analysis and log server setup Version 2007nx Release 3. Log server version 2.0

HowTo: Logging, reporting, log-analysis and log server setup Version 2007nx Release 3. Log server version 2.0 Log server version 2.0 Contents 1 Setting up the log server for the appliance... 4 1.1 Registering the log server on the appliance... 4 1.2 Entering the Syslog server to the appliance... 6 2 Log server...

More information

Using the Barracuda Spam Firewall to Filter Your Emails

Using the Barracuda Spam Firewall to Filter Your Emails Using the Barracuda Spam Firewall to Filter Your Emails This chapter describes how end users interact with the Barracuda Spam Firewall to check their quarantined messages, classify messages as spam and

More information

Table of Contents Recommendation Summary... 3 Introduction... 4 Formatting Recommendations... 5 Creative:... 7 Deliverability & Infrastructure:...

Table of Contents Recommendation Summary... 3 Introduction... 4 Formatting Recommendations... 5 Creative:... 7 Deliverability & Infrastructure:... Table of Contents Recommendation Summary... 3 Technical:... 3 Creative:... 3 Introduction... 4 Formatting Recommendations... 5 JavaScript:... 5 Forms:... 5 Background Tags and Colors:... 5 Html Text:...

More information

BSI TR-03108-1: Secure E-Mail Transport. Requirements for E-Mail Service Providers (EMSP) regarding a secure Transport of E-Mails

BSI TR-03108-1: Secure E-Mail Transport. Requirements for E-Mail Service Providers (EMSP) regarding a secure Transport of E-Mails BSI TR-03108-1: Secure E-Mail Transport Requirements for E-Mail Service Providers (EMSP) regarding a secure Transport of E-Mails Version: 1.0 Date: 05/12/2016 Document history Version Date Editor Description

More information

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5 Contents Paul Bunyan Net Email Filter 1 What is the Paul Bunyan Net Email Filter? 1 How do I get to the Email Filter? 1 How do I release a message from the Email Filter? 1 How do I delete messages listed

More information

Mailrelay The best email marketing solution for your needs

Mailrelay The best email marketing solution for your needs Mailrelay The best email marketing solution for your needs The e-mail marketing has become one of the best techniques to reduce costs on the internet. This type of marketing has established itself as the

More information

Barracuda Email Security Service

Barracuda Email Security Service Barracuda Networks Technical Documentation Barracuda Email Security Service Administrator s Guide Version 1.0 RECLAIM YOUR NETWORK Copyright Notice Copyright (c) 2004-2011, Barracuda Networks, Inc., 3175

More information

Sender Authentication Technology Deployment and Authentication Identifiers

Sender Authentication Technology Deployment and Authentication Identifiers 2. Sender Authentication Technology Deployment and Authentication Identifiers In this report we will present an overview of spam trends for week 14 through week 26 of 2012. The ratio of spam has dropped

More information

Mailing Lists. Help Documentation

Mailing Lists. Help Documentation Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Mailing Lists Mailing Lists A mailing list is a collection

More information

Cryoserver Archive Lotus Notes Configuration

Cryoserver Archive Lotus Notes Configuration Lotus Notes Configuration Version 1.0 December 2007 Forensic & Compliance Systems Ltd +44 (0)800 280 0525 info@cryoserver.com www.cryoserver.com Contents INTRODUCTION... 3 SMTP ROUTING TO CRYOSERVER...

More information

A White Paper. VerticalResponse, Email Delivery and You A Handy Guide. VerticalResponse,Inc. 501 2nd Street, Suite 700 San Francisco, CA 94107

A White Paper. VerticalResponse, Email Delivery and You A Handy Guide. VerticalResponse,Inc. 501 2nd Street, Suite 700 San Francisco, CA 94107 A White Paper VerticalResponse, Email Delivery and You Delivering email seems pretty straightforward, right? You upload a mailing list, create an email, hit send, and then mighty wizards transport that

More information

1. Introduction...3 2. Email Deliverability-Benchmarks...4 2.1. Working with Your Service Provider...4 2.2. Email sent...4 2.3. Email delivered...

1. Introduction...3 2. Email Deliverability-Benchmarks...4 2.1. Working with Your Service Provider...4 2.2. Email sent...4 2.3. Email delivered... 1. Introduction...3 2. Email Deliverability-Benchmarks...4 2.1. Working with Your Service Provider...4 2.2. Email sent...4 2.3. Email delivered...4 2.4. Bounces....4 2.5. Email unsubscribe requests....5

More information

Marketer s Field Guide to Gmail, Outlook.com, and Yahoo!

Marketer s Field Guide to Gmail, Outlook.com, and Yahoo! Marketer s Field Guide to Gmail,, and Yahoo! Thanks to better ways to filter and block spam, inboxes are nearly free of unwanted mail, but not without a price. According to past Return Path studies, permissioned

More information

HOW TO: Use the UWITC Barracuda Spam Filter System

HOW TO: Use the UWITC Barracuda Spam Filter System HOW TO: Use the UWITC Barracuda Spam Filter System The Barracuda Spam Firewall has a learning engine that learns how to deal with future messages based on the ones you classify as spam and not spam. The

More information

USER GUIDE. Mailjet in webcrm

USER GUIDE. Mailjet in webcrm USER GUIDE Mailjet in webcrm Table of contents 1. Mailjet (mailjet.com); good news for high deliverability and excellent tracking... 2 2. Email On Behalf Of... 2 3. SPF records... 3 4. DKIM-feature for

More information

MMLIST Listserv User's Guide for ICORS.ORG

MMLIST Listserv User's Guide for ICORS.ORG MMLIST Listserv User's Guide for ICORS.ORG 12/12/06 Version 1.1 To Send Mail to the Listserv: mmlist@listserv.icors.org Only Subscribed Users can send mail to the Listserv. Anyone can have a Subscription.

More information

1 Introduction: Network Applications

1 Introduction: Network Applications 1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video

More information

eprism Email Security Suite

eprism Email Security Suite FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks

More information