Enterprise Managing Risks and Liabilities Avoiding Common Pitfalls under the Federal CAN-SPAM Act

Size: px
Start display at page:

Download "Enterprise Email: Managing Risks and Liabilities Avoiding Common Pitfalls under the Federal CAN-SPAM Act"

Transcription

1 Enterprise Managing Risks and Liabilities Avoiding Common Pitfalls under the Federal CAN-SPAM Act These materials do not constitute specific legal advice and may not address all aspects of a legal development relevant to the reader's circumstances. The reader should consult legal counsel to determine how laws apply to specific situations. Further, these materials are not intended to create, and receipt of them does not constitute, a lawyer client relationship. If you would like an Ice Miller attorney to review any materials for you, please contact one of our attorneys prior to forwarding any information. 1

2 Overview The CAN-SPAM Act of 2003 passed with a nearly unanimous vote in both the House and the Senate and was signed into law by President Bush in December of The Act, effective as of January 1, 2004, is a huge win for enterprises due to the fact that it targets the most egregious spammers and their fraudulent and deceptive practices, rather than hindering the sending practices of legitimate businesses. However, in addition to these advantages of the Act come some potential pitfalls for the unwary enterprise. Businesses that fail to implement and manage best practices to minimize the inherent risks of in their own organizations could face fines, a costly lawsuit, or worse yet, prison. Although the requirements of the CAN-SPAM Act seem fairly basic, the question of how to implement changes may be a challenge for many enterprises especially those who do not realize that their organization may be at risk. Essentially, any organization sending outbound whether in the form of promotions, updates, educational pieces, etc. may be at risk, and should therefore protect itself by becoming familiar with the regulations surrounding the law. Businesses must also understand that the scrutiny of marketing takes the form of not only legislation and litigation, but the processing industry's own procedures. The broad majority of Internet Service Providers (ISP s) and anti-spam filtering technology, with added encouragement from anti-spam action groups, set the bar much higher than the laws promulgated in various states and now at the federal level. The primary goal is to reduce the amount of spam received, meaning that organizations generating high rates of undeliverable or numerous spam complaints will experience some level of filtering at the hands of ISPs. To avoid action by ISP s, the key is to not look like a spammer. Failure to follow the unwritten ethics of the receiving and filtering community can have an extremely negative effect on an enterprise sending any sort of outbound . This paper explores both the practical and legal aspects of the processing industry and provides advice as to how an organization can best manage the risks inherent in this medium. is arguably the strongest vehicle for marketing, communication, and customer retention ever developed, and organizations that take the proper steps to overcome challenges and risks will certainly reap its rewards. Section I: CAN-SPAM Act Overview This section summarizes the major provisions of the CAN-SPAM Act of 2003 (the "Act" or the "CAN-SPAM Act"), including an outline of the prohibitions and required content of commercial under the Act, criminal and civil penalties including imprisonment, fines, and forfeiture, and who can sue to enforce the Act. The Act generally prohibits predatory and abusive commercial practices. The Act restricts transmission of certain s that do not include proper disclosures regarding their nature or origin. The Act specifically prohibits transmissions by initiators of commercial s when a recipient has "opted-out" of receiving such transmissions from the sender. The CAN-SPAM Act supersedes at least parts of the laws enacted by 37 states that currently regulate . One example of such a law, at least a portion of which will be superseded by the Act is California s stringent SB 186, which required an recipient s direct consent or a prior business relationship before a commercial could be sent. The CAN-SPAM Act, on the other hand, is essentially an opt-out law and does not require the opt-in or business relationship 2

3 required in California s legislation. However, it does not preempt other state laws or the portions of them that prohibit falsity or deception or that are not spam-specific. The federal law s most beneficial aspect to legitimate marketers is that it preempts major portions of differing state laws, allowing marketers to be more secure in their reliance on abiding by a single law. Further, the Act should reduce the number of nuisance suits that laws providing individuals with causes of action, such as the California law, would have been likely to encourage. The CAN-SPAM Act, comparatively more business-friendly for a number of reasons, does not permit suits to be brought by individuals. Only certain federal agencies, state attorneys general, or ISP s can enforce the provisions of the Act. Further, the Act does not regulate a wide range of transactional or relationship messages of which the primary purpose is not commercial. These include customer service interactions (even if relating to a commercial transaction), health or safety updates, recall notices, or employment communications. Additionally, the Act does not prohibit initiation of certain s when the recipient has affirmatively consented to receiving such a message. The Senate commerce committee outlined the purpose of the CAN-SPAM as follows: The purposes of this legislation are to: (i) prohibit senders of electronic mail ( ) for primarily commercial advertisement or promotional purposes from deceiving intended recipients or Internet service providers as to the source or subject matter of their messages; (ii) require such senders to give recipients an opportunity to decline to receive future commercial from them and to honor such requests; (iii) require senders of unsolicited commercial (UCE) to also include a valid physical address in the message and a clear notice that the message is an advertisement or solicitation; and (iv) prohibit businesses from knowingly promoting, or permitting the promotion of, their trade or business through transmitted with false or misleading sender or routing information. What is Criminal Under the Act? The Act specifically prohibits and criminalizes certain "predatory and abusive commercial electronic mail." Section 4 generally addresses the manipulation of subject, header, and origination information to evade detection by ISP s and filters. Section 4 provides very specific penalties to initiators of (and conspirators to initiate) multiple s, including imprisonment, fines, and forfeiture of property used or gained in commission of the offense. The following is prohibited under Section 4 of the Act: Hiding Origin Using Other Computers (Hacking and Relaying) Accessing, without authorization, a computer to initiate the transmission of multiple s is prohibited. Similarly, using a computer to relay or retransmit multiple messages with the intent to hide the origin of the message is prohibited. Spammers sometimes use different computers, with or without permission, to hide the true origin of an , thus evading filters and other blocking techniques used by ISP s. False or Misleading Header Information This is another tactic used by spammers to disguise their sending identity. The information is falsified in the header of their , which is typically the only portion of the that is seen by the receiving mail server. Spammers constantly change and falsify this information to evade detection, confuse spam filters, and continue sending spam. The Act prohibits initiation of multiple s with materially falsified header information. Deception in Registration of and Domain Names, and Ownership of IP Addresses The Act prohibits initiating multiple s from an account where the initiator has registered five or more accounts or two or more domain names using information that materially falsifies the registrant's true identity. The Act further prohibits 3

4 initiating multiple s from an IP address when the initiator has falsely represented he is the registrant of the address. Under the Act, violations of the provisions above can result in fines and imprisonment of between 1 and 5 years depending on the egregiousness of the violation and other factors. Section 4 of the Act provides for forfeiture of property used in connection with the commission of the offense, or gained in or traceable to the commission of the offense. The U.S. Sentencing Commission is directed under the Act to amend sentencing guidelines in accordance with the Act to provide specific, appropriate criminal penalties. Civil Actions. Section 5 of the Act provides other protections in the form of civil actions. The Act does not provide a civil cause of action for individuals against spammers. However, the Act empowers attorneys general of each state to pursue violators of certain parts of Section 5 on behalf of the residents of its state. A state attorney general can pursue money damages, injunctive relief to stop further violations of the Act, or statutory damages which can total to $2,000,000 or more for inclusion of false or misleading transmission information, or if circumstances support a finding of aggravated damages. Statutory damages can reach up to $250 per address to which an is sent. A court may treble damages if it finds aggravating circumstances, and may in its discretion award attorney fees for successful actions. Others who have a civil cause of action under the Act include ISP s and certain federal agencies. ISP s are provided a civil cause of action against violators of certain sections of the Act. Finally, the Act generally can be enforced by a variety of federal agencies noted in the Act when the actions or actors fall within the agency's purview. What is Required in Commercial s Under the Act? Section 5 of the Act requires the following: All Commercial Must Contain a Valid Opt-out Mechanism Essentially, the Act is an opt-out law. The Act allows the sending of unsolicited as long as the recipient is given an opportunity to opt-out of future communications. Notice of the opportunity to opt-out must be provided clearly and conspicuously. Companies can provide a generic opt-out from all communications or a more specific menu of options to permit the recipient to opt-out of certain types of commercial , as long as the recipient is also provided the option to opt-out of all communications. Opt-out Requests Must Be Honored Within 10 Business Days Though the FTC will review the number of days and recommend another number that it may determine is more appropriate, this requirement will be the first time many companies have had to develop a process that ensures full name removal. Sender Must Include a Valid Physical Postal Address Senders should include their physical postal address. It is not certain whether a post-office or similar postal address will satisfy the requirements of the Act. As the FTC promulgates rules on the Act or actions brought under the Act provide guidance to the meaning of "valid physical postal address," more clarity on what organizations should include will be available. Must Provide a Clear Notice that it is an Advertisement This may be the vaguest portion of the law in that no recommendation is made for the specific language 4

5 that is to be used or how it is to be positioned in the . However, when the FTC sets rules for the Act, they will specify what, if any, labeling is needed for commercial mail. Interestingly, Congress expressly prohibited the FTC from requiring the inclusion of specific indicators in the subject line; however, the FTC is free to suggest such inclusion in a report it is to issue regarding its recommendations. Must Provide an Operative Return Address To permit a recipient to opt-out, a valid return address or comparable other Internet-based communications technology must be provided for at least 30 days from the transmission of the message. The Act provides leniency for temporary outages. Senders Must Avoid False, Deceptive, or Misleading Transmission Info or Subject Lines Again, this requirement focuses on the deceptive practices often used by spammers to avoid filters and encourage recipients to open a message and respond to an offer or scam. s that contain an accurate identification of the message's initiator are not false or misleading. Senders Must Label Sexually-Oriented Messages 120 days after the law takes effect, the FTC s labeling recommendation must be implemented for s containing adult or sexual content. In the subject field, initiators of such s will be required to include those marks or notices required by the Commission. Additional requirements and specific penalties are provided under the Act relating to violations involving sexually oriented material. CAN-SPAM Potential Pitfalls: How Businesses Can Avoid Them At first glance, the CAN-SPAM Act establishes fairly basic rules for an organization to follow. However, given that the FTC will create rules to implement this new law and will provide reports to Congress as directed in the Act, new details and interpretation flowing from court proceedings will surely follow. Following the steps below is the first necessary action a company must take in order to avoid liability under the Act. 1) Develop and Enforce an Enterprise-wide Unsubscribe or Opt-Out Process The Act's requirement seems fairly simple: require such senders to give recipients an opportunity to decline to receive future commercial from them and to honor such requests. However, for a company to ensure that it is in perfect compliance of this requirement, it needs to ask itself these important questions: Is the company technically prepared to manage and maintain not just one, but potentially several suppression lists of recipients who don t want to receive commercial ? Is there a way to control this across all departments within an enterprise? Does it have the technological capability and capacity to log and maintain a master list and several more specific suppression lists? Does it have the decision-making procedures and communications procedures in place to determine when a subscriber has opted-out of all versus only some future communications, and to inform a database administrator of which list or lists to add the subscriber? Can the company make those changes in ten (10) business days as required by the law? Is the company prepared to act faster than 10 days (given the FTC's upcoming review of this time frame)? 5

6 Can database updates be communicated to all locations of the company s enterprise that use this data quickly enough to prevent another area of the company from contacting an unsubscribed user after 10 days have passed? The how may become a challenge for many companies, especially those with several disparate data sources, decentralized marketing programs, several locations, or multiple divisions or processes. Now the stakes are higher, as failure to act upon a removal request may violate federal law. To solve this problem, organizations need to make concerted effort to not only implement the proper technology, but also to ensure that the philosophy of honoring the opt-out is adopted at all customer touch points from the CEO to the sales representative. A training program in which appropriate employees are educated on the potential risks associated with should be considered if an organization's systems are not suited to centralized management of unsubscribe lists. One option for managing unsubscribes in a central location would be outsourcing communications to a single provider. An Service Provider (ESP), such as ExactTarget, has the ability to manage data in a centralized and secure location, thus providing many advantages over managing the data across multiple divisions in your own organization. In addition to the fact that an ESP has experience in managing and the complexities of list removal, the centralization of the data provides your organization with an easy way to manage communications and the cleansing of consumer data. It also provides enterprise-level security of your assets in a secure, log-in encrypted environment. 2) Enforce CAN-SPAM Compliance with Every Employee: It Takes Just One Bad Individual employee s present a substantial risk to companies without a central control point over their communications. As the Act provides, organizations and their agents (employees, contractors) must honor the recipients request to stop further mailings, and legal ramifications have the potential to result from one employee s decision to send an . Example: Widget Co. sends a commercial and a recipient asks to be removed from future communications. Widget Co. honors the list removal request 10 business days later, and marks the recipient as unsubscribed for all future communications by adding them to their master suppression list. At this point Widget Co. has complied with the law. However, on day 12, a single sales employee at Widget sends an to this specific customer asking if they would like to buy the latest widget One exposes Widget Co. to liability under the Act. It just takes one. Education and enforcement are critical to strict compliance with a company s policies and the CAN-SPAM Act. All employees must be familiar with best practices and the legal ramifications so that the consequences are understood, and unsubscribe requests are honored throughout the company and at all customer touch points. 3) Clearly and Conspicuously Label as an Advertisement Although no specific labeling is required under the law, all commercial must be clearly identified as an advertisement or solicitation (the exception is to those marketers who use only opt-in lists. See step 4 for details). 6

7 While the Act leaves this requirement rather vague, the FTC recommends companies follow its DotCom Disclosures as the litmus test for determining appropriate labeling. The FTC s DotCom Disclosures were initially developed to support consumer protection relating to online advertisements, while also loosely describing other related technologies. See Essentially, the FTC's DotCom Disclosures recommends that advertisers consider whether a reasonable person would find the overall net impression of the to be commercial. When developing an promotion, marketers should think about the placement of the call to action or inducement to purchase, as well as prominence and repetition. The spirit of the Act is to hold companies that are using in a deceptive manner accountable. With proper commercial branding, positioning, messaging, and prominence, the Act may well serve to legitimize the marketing of companies complying with the Act's provisions. 4) Develop a Strategy for Capturing Affirmative Consent Though CAN-SPAM is essentially an opt-out law, it does provide advantages to organizations that send only to recipients who have opted-in to receiving messages. Affirmative consent, (also referred to as permission marketing, explicit opt-in, or direct consent in other circles) exists if a recipient has, per the Act expressly consented to receive the message, either in response to a clear and conspicuous request for such consent or at the recipient s own initiative. When affirmative consent is obtained, the commercial labeling requirement no longer applies. Example: Company XYZ promotes their product through a promotion to consumers that have willingly provided their addresses to receive such promotions. Per the Act, XYZ does not need to provide any advertisement labeling on their s, which will provide a significant advantage promotionally unless the FTC recommends labeling such as ADV that was mandated in many state laws. Such labeling would no doubt be an easy target for spam filters, preventing many of these messages from ever reaching the subscriber. The new law might cause an organization to ask the following question regarding address collection: When a consumer visits a website and provides her as part of a request for information, does the Act require an sent in response to the inquiry to include an opt-out, valid physical address and reply address? The answer is that the Act defines a Commercial Electronic Mail Message as "any electronic mail message the primary purpose of which is the commercial advertisement or promotion of a commercial product or service." If the is a first communication and is truly in response to the consumer's inquiry, arguably the primary purpose is not to advertise or promote but rather to respond to an inquiry from the consumer. However, further communications or s that promote products or services beyond the scope of the inquiry might not be excluded from the definition. Creating a method to capture affirmative consent, such as an opt-in check box on a web form, provides clarity on whether future s to each subscriber are warranted. Though a physical postal address and unsubscribe mechanism would still be required, a company could avoid the commercial labeling requirement if affirmative consent is obtained. For more information on affirmative consent and permission based marketing, see tip #2 from Section II, below. 7

8 5) If Relates to a Particular Business Segment The Act provides, "if an entity operates through separate lines of business or divisions and holds itself out to the recipient throughout the message as that particular line of business or division rather than as the entity of which such line of business or division is a part, then the line of business or the division shall be treated as the sender of such message for purposes of this Act." Thus, if a particular business division sends an that is consistent in its indication that it is an advertisement from that division, the parent organization will not run afoul of the Act if the recipient opts out based on that transmission. Organizations should implement procedures and educate their divisions, business units, and other affiliates to clearly indicate who is the sender. It will also be important for organizations to specifically identify which division from which the subscriber is opting-out. If the possibility exists that a commercial transmission might be mistakenly understood as being sent by the parent organization, care should be taken to clearly identify the particular line of business or the division as the sender. The most conservative approach would be to eliminate the recipient from all of the lists of the related companies a strategy that may be acceptable to some organizations. 6) Avoid Misleading Subject Lines Years ago, it was possible to achieve a significant increase in response rate by using promotional language and teasers in a subject line that tricked the user into opening the . Example: An anti-virus software company might send and with the subject line: Your computer may be infected. Believe it or not, such a subject line was at one time considered a brilliant marketing tactic. Now, however, subject lines such as this will most likely be targeted by filters and may run afoul of the Act. A company needs to educate its employees and develop an internal communication process to ensure that its marketers are aware of these restrictions to their creative license. Companies should develop a review process to ensure that subject line restrictions are followed. Marketers should adopt the standpoint of the reasonable recipient to determine if a subject line is misleading or could be misinterpreted. 7) Refrain from Harvesting Addresses & Dictionary Attacks harvesting typically refers to the automated harvesting of addresses from web sites. This tactic is often used by spammers who employ software developed specifically for this purpose. Dictionary attacks refer to a spammer s tactics of guessing at addresses by using an algorithm or dictionary type feature to search for addresses. A dictionary attack might produce an string similar to (ajohnson@hotmail.com, bjohnson@hotmail.com, cjohnson@hotmail.com, etc.). The law generally provides for damages of $250 per violation up to $2 million dollars (or more for violations involving false or misleading transmission information), but these damages could be trebled for willful violations or violations where harvesting or dictionary attack processes were used. For causes of action initiated by ISP s, these damage caps are somewhat reduced. 8

9 8) Move Wireless Communications to Opt-in The federal law mandates that the Federal Communications Commission (FCC) develop requirements for promotions to wireless devices and cell phones. The Act also encourages the FCC to adopt opt-in or affirmative consent as the standard for wireless communications, and the FCC has hinted that they may follow this encouragement. Due to the amount of consumer backlash already directed toward the small amount of wireless marketing that exists today, pursuing an opt-in system appears to be a sound, forward-looking strategy. 9) Consider Preparation for a "Do Not Registry" Although the FTC is not required to implement such a list, it is directed to provide a report on the implementation of such a list. The commission is already authorized under the Act to implement whatever plan it submits to the Congressional Committees, but it cannot implement the plan before nine (9) months from the enactment of the Act. Given the trends toward restriction of advertising communications, positioning your organization to be prepared to act if such a registry is implemented may prove a prudent step. Section II: Setting the Bar Higher - Permission and Deliverability One of the major concerns that opponents of the CAN-SPAM Act have is that they do not believe that the Act will reduce spam. They argue that by allowing the sending of unsolicited commercial as long as an opt-out and physical addresses are present, the government is legalizing spam. However, the anti-spam community and ISP s have long been against anything but marketing where affirmative consent exists. Yahoo, for example, reportedly filters over three billion spam messages every day (source: ISP CON), and the statistics are very similar at other ISP s. Spam prevention is not a game, but rather an economic challenge for ISP s and a worthy cause for millions of subscribers whose inboxes are now flooded with fraudulent s, bogus health claims, and pornography. CAN-SPAM is somewhat sympathetic to the plight of ISP s. The Act provides that it shall have "no effect on policies of Internet access service." Thus, the Act leaves unaffected those more stringent requirements of ISP s (unlike the more stringent laws of certain states) by indicating that such policies are not to be preempted. The best way for an organization to understand the potential risks is for it to first understand the -receiving environment today and its three major players: ISP s, filtering companies, and anti-spam blacklist organizations. Following are recommended actions to take to improve deliverability by compliance with the standards set by ISP s, and the rest of the receiving world. 1) Play by the Rules of ISP s and Filtering Companies The job of ISP s has changed from merely putting connections in place for customers to fighting the daily deluge of unwanted . Inboxes are more crowded than ever, and ISP s are blocking nearly 90% of mail because they believe it to be spam. Much of this comes from companies who are unaware as to how ISP s' spam filtering logic works, and as a result, they encounter filtering of their legitimate business . Such a problem is known as a filtering false positive. 9

10 Most ISP s have implemented a number of different methods to weed out spam. Many combine the use of content filtering mechanisms, which scan subject lines and body content to determine which s are spam, with other types of filters that check for number of complaints received for each specific marketer, or look at the number of undeliverable s generated by a specific mailing. Basically, ISP s and others filtering take note of all actions of spammers (send high quantity of promotions, send to dirty lists, generate complaints from their users, etc.), then develop mechanisms to detect s that look like spam and block them. Though ISP filters are built on averages and are therefore imperfect, this is the reality of sending commercial in today s environment. False positives sometimes occur with s from legitimate marketers due to the commercial content of such s. However, false positives are most prevalent with that is "unwanted" in the first place. Organizations should not underestimate the power that ISP s, and other organizations using spam filtering, have over the delivery of their messages and their resulting economic success. 2) Reduce Spam Blocking with Permission-based Marketing Developing a sound plan to move towards permission-based marketing is extremely important to the success of any company s marketing efforts, as it provides significant deliverability and economic benefits. What is permission marketing? It is also known as opt-in marketing and entails sending to only those recipients who have agreed to hear from a specific company. Organizations should strive to use standards set forth by emarketing pioneer Seth Godin, author of Permission Marketing, who says that all marketing messages must be anticipated, personal and relevant. By opting-in to a company s communications, a subscriber has given permission to receive this type of message, and it is up to a company to deliver that promise. Developing a permission-based list is not difficult, but it takes time. However, an organization focused on it can quickly grow its list by capturing a customer s permission at each touch point. An address and permission to send mail can be captured at the point-of-sale on a sign-up form, keyed into a kiosk, or captured on a website or over the phone. The most important ingredient for an opt-in is that it be the subscriber s choice to opt-in and receive . Again, permission is important due to the ISP s and other receiving systems that look at a company s mail before delivering it. When permission is in place, subscribers are much less likely to complain that a message is spam, and the message is therefore less likely to be filtered to the junk folder or discarded. addresses gathered without the subscriber s knowledge or specific approval, however, will never qualify as permission names and will generate higher levels of complaints that could jeopardize the deliverability of future s. Enterprises must also be wary of the ways in which their employees gather addresses. In addition to harvesting addresses and dictionary attacks, there are low-tech ways in which a single employee might unwittingly gather addresses in an unsolicited fashion. Example: Joe, an employee of XYZ Company, attends a networking function. During the function, he collects business cards from several prospective clients. Although Joe has not asked each of these prospects permission to send them communications, he returns to work the following day and adds them to his company s subscriber list. The best practices in this situation would be for Joe to either follow up with a friendly phone call to gain each user s consent and add his/her name to XYZ s mailing list, or capture written consent at 10

11 the networking function. Likewise, Joe could send an to each prospective client to express his pleasure in meeting the prospect and to request permission to send information in a future communication. Not following best practices and failure to obtain permission could lead to ISP s or blocklists taking measures to block future s from XYZ Company. 3) Move to Double Opt-in to Reduce Threat of Public Blocklists When public blocklists block , it can have a substantial impact on deliverability by blocking 5 10% or more of an organization s . It is important to note that an blocked by one employee s address may put the entire enterprise at risk for blocking. ISP s subscribing to block lists typically screen out all mail from IP addresses listed on the list. Organizations that find the IP address of their own mail server on a list will often find the block list will require the organization prove they use permission-marketing practices before they will be approved for removal from the block list. Permission may be qualified into three categories: single, confirmed, and double opt-in. Single opt-in is simply capturing approval from a subscriber to send them . Confirmed opt-in merely confirms the opt-in by sending an automated follow-up to the subscriber to confirm their subscription. Double opt-in, however, carries this follow-up a bit further. A double optin occurs when the subscriber is required to respond to the confirmation , or click on a link, to confirm their subscription before they are actually added to a list. The benefits to an organization of using double opt-in in their name capture practices are threefold. First, by avoiding adding the address to a list initially, the organization prevents adding misspelled or fraudulent addresses to their list. Mailing to bogus addresses raises the number of undeliverable s and increases the likelihood of filtering, and it also can result in mailing to spamtrap addresses that are put in place by ISP s and filtering companies to trap unwary companies. Second, double opt-in addresses provide assurance, as well as an electronic record, that affirmative consent is in place should proof be necessary either to validate sending practices to an ISP, or to defend against potential litigation. And finally, double opt-in subscribers are much less likely to complain or misidentify an as spam. Maintaining a low complaint rate is the key in preventing ISP blocking and filtering. 4) Maximize Delivery with Reminders of Opt-in Since subscriber complaints are a large component of the logic used by many filtering mechanisms, subscriber recognition of an organization and a recollection of their opt-in determines the likelihood that a recipient will complain about an . Subscribers receiving mail that is expected, branded, and easy to recognize are unlikely to mistake a message as spam, which in turn, reduces the potential for filtering. Organizations can ensure their subscribers recognize them in a number of ways, perhaps the most important of which occurs at the time an address is captured. Best practice to improve recognition at the time of web site name capture, for example, would be for an organization to list the type of to be sent, the name of the publication, how often it will come and who it will be from. This better sets the expectation with subscribers as to exactly what they will be receiving, again, reducing the chance of complaints and filtering. Another step many organizations are taking to improve recognition and add credibility to their mailings is adding a short text reminder at the top of each . 11

12 An ideal message would be something such as: You are receiving this mailing because you opted-in to receiving s from xyzco.com. For best viewing of future s, please add as a "Safe Sender or address book. Providing text that asks each subscriber to add the sender to his or her address book will help organizations continue to deliver to the inbox, rather than having their messages routed to the bulk or junk folders. Major ISP s such as AOL, Yahoo! and MSN /Hotmail, in addition to Microsoft Outlook 2003 software, now include junk folders, but route sent from those in a subscriber s address book pass through their spam filters. Making the appeal to the user to be added to their address book further establishes recognition and prevents the chance of future filtering. 5) Maintain a Consistent From Address and Subject Line Recognition It is important for organizations to maintain a consistent from name in their s for a number of reasons. First, it is an important element of recognition and studies prove that a majority of users first look at the from name when determining whether or not they open a message. Organizations that use a consistent from name also benefit from a relationship stand-point due to the fact that their subscribers grow accustomed to receiving s from a particular address and begin to anticipate these messages. Second, maintaining a consistent from name will allow an organization to leverage the benefits of being in a subscriber s address book (as discussed in step 4 above). A final step organizations can take to ensure their subscribers recognize their s is to include the name of their organization in the subject line. The CAN-SPAM Act already requires that the subject line of a commercial not be misleading or fraudulent. Adding the company name to the subject line not only adds credibility, but also increases recognition and reduces the potential for subscriber complaints and subsequent filtering. Summary With the passage of the Federal CAN-SPAM Act, marketers need to be aware of both the practical and legal aspects of sending commercial . The requirements of the Act will have significant impact on unwary organizations or those that fail to adjust internal procedures appropriately. However, organizations that take the proper steps to overcome challenges and risks will certainly reap the rewards that has to provide. 12

13 About ExactTarget ExactTarget provides powerful web-based software that enables organizations of all sizes to create, deliver, and track permission-based s without technical assistance. ExactTarget s patent-pending solutions include point-and-click tools for quickly designing graphically rich HTML s, customizing content to match the audience, and segmenting mailing lists to reach highly targeted groups of recipients. The privately held company is based in Indianapolis and has more than 1,500 customers around the world. Note: ExactTarget holds monthly webinars on topics of compliance, optimization and deliverability. Sessions are free of charge. Contact info@exacttarget.com, call or visit for registration information. About Ice Miller Ice Miller is the largest law firm in Indianapolis with a nationally recognized reputation in many of its practice areas. With additional offices in Chicago and Washington D.C., the Firm has over 225 lawyers, 40 paraprofessionals and 250 support staff members. Ice Miller offers a broad array of capabilities in virtually all areas of the legal practice, including business, intellectual property, employment and labor law, litigation, public finance and real estate. We are dedicated to providing responsive personal service to our clients and to providing them with quality legal and business advice that effectively and creatively addresses their needs. 13

whitepaper Email Marketing CAN-SPAM Compliance Overview www.exacttarget.com

whitepaper Email Marketing CAN-SPAM Compliance Overview www.exacttarget.com Design Email Marketing Tips for Outlook CAN-SPAM 2007Compliance whitepaper Email Marketing CAN-SPAM Compliance Overview The CAN-SPAM Act (the Act ) passed with a nearly unanimous vote in both the House

More information

The DMA s Analysis of Can Spam Act of 2003

The DMA s Analysis of Can Spam Act of 2003 The DMA s Analysis of Can Spam Act of 2003 December 11, 2003 The following is a Direct Marketing Association analysis of the Can Spam Act of 2003 (S. 877), which Congress sent to the President for signing

More information

Congress Passes New Anti-Spam Legislation

Congress Passes New Anti-Spam Legislation DECEMBER 2003 Congress Passes New Anti-Spam Legislation On December 16, 2003, President Bush signed into law the Controlling the Assault of Non-Solicited Pornography and Marketing Act (the CAN-SPAM Act

More information

Privacy, Data Collection and Information Management Practice Team November 13, 2003

Privacy, Data Collection and Information Management Practice Team November 13, 2003 Overview of Current Anti-Spam Regulations Privacy, Data Collection and Information Management Practice Team The proliferation of unsolicited commercial e-mail, more commonly known as spam, has prompted

More information

E-mail Marketing: CAN- SPAM Act Compliance David J. Ervin and Christopher M. Loeffler, Kelley Drye and Warren LLP

E-mail Marketing: CAN- SPAM Act Compliance David J. Ervin and Christopher M. Loeffler, Kelley Drye and Warren LLP E-mail Marketing: CAN- SPAM Act Compliance David J. Ervin and Christopher M. Loeffler, Kelley Drye and Warren LLP This Practice Note is published by Practical Law Company on its PLC Law Department web

More information

SUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003

SUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003 SUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003 On December 16, 2003, President Bush signed into law the CAN-SPAM Act of 2003. CAN-SPAM stands for "Controlling the Assault of Non-Solicited Pornography

More information

Email and Text Message Campaigns. Justine Young Gottshall Partner, InfoLawGroup

Email and Text Message Campaigns. Justine Young Gottshall Partner, InfoLawGroup 2012 Email and Text Message Campaigns Justine Young Gottshall Partner, InfoLawGroup What s the Risk? Effective and active marketing area This makes it a target for litigation and enforcement action Consumer

More information

Software Solutions Digital Marketing Business Services. Email Marketing. What you need to know

Software Solutions Digital Marketing Business Services. Email Marketing. What you need to know Software Solutions Digital Marketing Business Services Email Marketing What you need to know Contents Building Your Email List 1 Managing Your Email List. 2 Designing Your Emails 3 Branding Your Emails.....

More information

E-mail Marketing: CAN- SPAM Act Compliance

E-mail Marketing: CAN- SPAM Act Compliance PRACTICE NOTES E-mail Marketing: CAN- SPAM Act Compliance The following is an excerpt from a Practice Note on our website that examines the federal Controlling the Assault of Non-Solicited Pornography

More information

Being labeled as a spammer will drive your customers way, ruin your business, and can even get you a big fine or a jail sentence!

Being labeled as a spammer will drive your customers way, ruin your business, and can even get you a big fine or a jail sentence! Getting Your Email Delivered Beware: If you send out spam mail (unsolicited emails), whether it be knowingly or not, you will put your business and your reputation at risk. Consequences for spamming have

More information

Deliverability Counts

Deliverability Counts Deliverability Counts 10 Factors That Impact Email Deliverability Deliverability Counts 2015 Harland Clarke Digital www.hcdigital.com 1 20% of legitimate commercial email is not being delivered to inboxes.

More information

Privacy Bulletin. Key Differences between US and Canadian Anti-Spam Laws

Privacy Bulletin. Key Differences between US and Canadian Anti-Spam Laws Privacy Bulletin April 2014 Key Differences between US and Canadian Anti-Spam Laws Canada's Anti-Spam Law (or "CASL") will be in effect in July 2014, about ten years after the U.S. has enacted its anti-spam

More information

Broadband Acceptable Use Policy

Broadband Acceptable Use Policy Broadband Acceptable Use Policy Contents General... 3 Your Responsibilities... 3 Use of Email with particular regards to SPAM... 4 Bulk Email... 5 Denial of Service... 5 Administration of Policy... 6 2

More information

Top 40 Email Marketing Terms You Should Know

Top 40 Email Marketing Terms You Should Know 1601 Trapelo Road Phone 781-472-8100 Suite 246 Fax 781-472-8101 Waltham, MA 02451 www.constantcontact.com Top 40 Email Marketing Terms You Should Know If you have ever felt out of your depth in a discussion

More information

How to Keep Marketing Email Out of the Spam Folder A guide for marketing managers and developers

How to Keep Marketing Email Out of the Spam Folder A guide for marketing managers and developers How to Keep Marketing Email Out of the Spam Folder A guide for marketing managers and developers Sarah Longfors Web Developer marketing + technology 701.235.5525 888.9.sundog fax: 701.235.8941 2000 44th

More information

How To Comply With The Can-Spam Act

How To Comply With The Can-Spam Act FTC FACTS for Business ftc.gov FEDERAL TRADE COMMISSION FOR THE CONSUMER 1-877-FTC-HELP The CAN-SPAM Act: A Compliance Guide for Business D o you use email in your business? The CAN-SPAM Act, a law that

More information

Enterprise Email Marketing: The 8 Essential Success Factors

Enterprise Email Marketing: The 8 Essential Success Factors Enterprise Email Marketing: The 8 Essential Success Factors How to Create High-Impact Email Marketing Campaigns When Managing Over 1 Million Sends per Month By John H. Sellers Certified Email Marketing

More information

SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing

SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing EMAIL MARKETING SCORECARD Find Out How Much You Are Really Getting Out of Your Email Marketing This guide is designed to help you self-assess your email sending activities. There are two ways to render

More information

Best Practices: How To Improve Your Survey Email Invitations and Deliverability Rate

Best Practices: How To Improve Your Survey Email Invitations and Deliverability Rate Best Practices: How To Improve Your Survey Email Invitations and Deliverability Rate Below, you will find some helpful tips on improving your email invitations and the deliverability rate from a blog post

More information

Creating Measurable Success Business-to-Business E-Marketing

Creating Measurable Success Business-to-Business E-Marketing Creating Measurable Success Business-to-Business E-Marketing When determining the most effective marketing mix, e-mail marketing as an inexpensive yet highly powerful vehicle is a critical part of a strategic

More information

ANTI-SPAM LAWS IN WESTERN COUNTRIES: A COMPARISON

ANTI-SPAM LAWS IN WESTERN COUNTRIES: A COMPARISON PRB 09-24E ANTI-SPAM LAWS IN WESTERN COUNTRIES: A COMPARISON Alysia Davies Legal and Legislative Affairs Division 18 January 2010 PARLIAMENTARY INFORMATION AND RESEARCH SERVICE SERVICE D INFORMATION ET

More information

Protecting your business from spam

Protecting your business from spam Protecting your business from spam What is spam? Spam is the common term for electronic junk mail unwanted messages sent to a person s email account or mobile phone. Spam messages vary: some simply promote

More information

Email Best Practices A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER

Email Best Practices A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER Email Best Practices A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER 2 Introduction Discussions of best practices for email marketing can be a confusing array of one- size- fits- all suggestions

More information

ARE YOU DOING E-MAIL MARKETING? LEGALLY?

ARE YOU DOING E-MAIL MARKETING? LEGALLY? ARE YOU DOING E-MAIL MARKETING? LEGALLY? Copyright 2008, Michael D. Jenkins, J.D., CPA All Rights Reserved Since so many small businesses now do a substantial part of their marketing on the Internet, it

More information

Anti-SPAM Policy v.3 06-01-2011

Anti-SPAM Policy v.3 06-01-2011 Anti-SPAM Policy v.3 06-01-2011 Each user must agree to this policy. comf5 has a no tolerance policy for the sending of spam and unsolicited email, and we prohibit the use of third-party, purchased, rented,

More information

Public Law 108 187 108th Congress An Act

Public Law 108 187 108th Congress An Act 117 STAT. 2699 Public Law 108 187 108th Congress An Act To regulate interstate commerce by imposing limitations and penalties on the transmission of unsolicited commercial electronic mail via the Internet.

More information

BUILDING A PERMISSION- BASED EMAIL MARKETING LIST

BUILDING A PERMISSION- BASED EMAIL MARKETING LIST BUILDING A PERMISSION- BASED EMAIL MARKETING LIST Say Please Before Hitting Send InfoUSA wants email marketers to know that you have two choices: You can either send unsolicited email or send email to

More information

FOR MARKETERS AND LIST OWNERS

FOR MARKETERS AND LIST OWNERS COUNCIL FOR RESPONSIBLE E-MAIL E-MAIL DELIVERY BEST PRACTICES FOR MARKETERS AND LIST OWNERS The following recommendations were developed to promote best practices for marketers and list owners seeking

More information

e-shot Unique Deliverability

e-shot Unique Deliverability e-shot Unique Deliverability Email Deliverability What is Email Deliverability? Email deliverability s aim is to maximise the number of email messages that reach the intended recipients inboxes. It is

More information

Frequently Asked Questions (FAQ) on Anti-Spam Legislation. What is the definition of a commercial electronic mail message?

Frequently Asked Questions (FAQ) on Anti-Spam Legislation. What is the definition of a commercial electronic mail message? Frequently Asked Questions (FAQ) on Anti-Spam Legislation On December 16, 2003, the President signed the CAN-SPAM Act of 2003 (S.877) into law, which went into effect January 1, 2004. Though the legislation

More information

Top 25 Email Marketing Terms You Should Know. Email Marketing from Constant Contact

Top 25 Email Marketing Terms You Should Know. Email Marketing from Constant Contact Email Marketing from Constant Contact Top 25 Email Marketing Terms You Should Know Constant Contact, Inc. 1601 Trapelo Road, Suite 329 Waltham, MA 02451 www.constantcontact.com If you have ever felt out

More information

Best Practice Standards for Email Marketing

Best Practice Standards for Email Marketing Best Practice Standards for Email Marketing Updated January 2008 Scope The Marketing Association s emarketing Network (emn) champions the adoption of industrywide standards of best practice and ethical

More information

SIMPLE STEPS TO AVOID SPAM FILTERS EMAIL DELIVERABILITY SUCCESS GUIDE

SIMPLE STEPS TO AVOID SPAM FILTERS EMAIL DELIVERABILITY SUCCESS GUIDE SIMPLE STEPS TO AVOID SPAM FILTERS SECTION 1 UNDERSTANDING THE BASICS Marketing emails account for most this is spam complaints, 70% in fact, which explains the scrutiny some marketers see applied to their

More information

Unica OnDemand. Unica and email deliverability. Getting to the inbox. Publication Date: January 19, 2010

Unica OnDemand. Unica and email deliverability. Getting to the inbox. Publication Date: January 19, 2010 Unica OnDemand Publication Date: January 19, 2010 N10014 Getting to the inbox N40002 Sending an email is something you do every day. Even when you send a single email, occasionally the message does not

More information

Fighting spam in Australia. A consumer guide

Fighting spam in Australia. A consumer guide Fighting spam in Australia A consumer guide Fighting spam Use filtering software Install anti-virus software Use a personal firewall Download security patches Choose long and random passwords Protect your

More information

PARTNER EMAIL GUIDELINES

PARTNER EMAIL GUIDELINES PARTNER EMAIL GUIDELINES The guidelines listed below are required pursuant to the Agreement entered into between Criteo and the Partner. Any breach of these guidelines except the last section related to

More information

Introduction > Become an Expert > Get Ready to Sell > Sales Opps > Follow Up > Consultation > Now What

Introduction > Become an Expert > Get Ready to Sell > Sales Opps > Follow Up > Consultation > Now What 12/16/13 Introduction Welcome to the Swiftpage Reseller Program! As a Swiftpage Reseller you have the ability to provide Swiftpage s valuable Email Marketing and Marketing Automation features to your clients,

More information

[First Reprint] SENATE COMMITTEE SUBSTITUTE FOR. SENATE, No. 1037 STATE OF NEW JERSEY. 211th LEGISLATURE ADOPTED MARCH 8, 2004

[First Reprint] SENATE COMMITTEE SUBSTITUTE FOR. SENATE, No. 1037 STATE OF NEW JERSEY. 211th LEGISLATURE ADOPTED MARCH 8, 2004 [First Reprint] SENATE COMMITTEE SUBSTITUTE FOR SENATE, No. 0 STATE OF NEW JERSEY th LEGISLATURE ADOPTED MARCH, 00 Sponsored by: Senator JOSEPH CONIGLIO District (Bergen) Assemblyman JEFF VAN DREW District

More information

How to Stop Spam Emails and Bounces

How to Stop Spam Emails and Bounces Managing Your Email Reputation For most companies and organizations, email is the most important means of business communication. The value of email today, however, has been compromised by the rampant

More information

Smart E-Marketer s Guide

Smart E-Marketer s Guide 30 insider tips to maximise your email deliverability rate 30 insider tips Step 1. Ensure the domain you use for sending emails is configured to enable authentication (SPF / Sender ID/ DomainKeys). Step

More information

THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA

THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA Communications and Information Technology Commission THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA Final Version 23/02/2008 Submitted to: Submitted By: Acceptance of Deliverable

More information

MCH Channel_e Email Best Practices for Marketers

MCH Channel_e Email Best Practices for Marketers MCH Channel_e Email Best Practices for Marketers Best Practices for Marketers Communicating with your prospects and customers through email is a popular channel that provides almost immediate response.

More information

CAN-SPAM Policy & Data Verification Guide

CAN-SPAM Policy & Data Verification Guide BIZ SERVICE PROVIDER CAN-SPAM Compliance & Data Verification Policy Document BSP CAN-SPAM Policy & Data Verification Guide BSP Page 1 of 5 Version 8.1 Effective Date; May 2015 BIZ SERVICE PROVIDER I. Summary

More information

EMAIL MARKETING $25. Your guide to navigating the evolving email landscape. THE LIST COMPANY THAT MAKES A DIFFERENCE

EMAIL MARKETING $25. Your guide to navigating the evolving email landscape. THE LIST COMPANY THAT MAKES A DIFFERENCE $25 Estimated Value 21st Century Marketing Presents AN INSIDER S GUIDE TO EMAIL MARKETING Your guide to navigating the evolving email landscape. THE LIST COMPANY THAT MAKES A DIFFERENCE CALL US TODAY AT

More information

How To Prevent Spam From Being Filtered Out Of Your Email Program

How To Prevent Spam From Being Filtered Out Of Your Email Program Active Carrot - Avoiding Spam Filters Table of Contents What is Spam?... 3 How Spam Filters Work... 3 Avoid these common mistakes... 3 Preventing False Abuse Reports... 4 How Abuse Reports Work... 4 Reasons

More information

The Basics of Email Marketing

The Basics of Email Marketing The Basics of Email Marketing YOU RE SMART TO EXPLORE EMAIL MARKETING You realize the value in staying in touch with your customers through email, but you may not be sure where to start. Let s face it

More information

Can Spam Be Legislated?

Can Spam Be Legislated? Journal of Applied Business and Economics Can Spam Be Legislated? Karen L. Hamilton Columbus State University Robert A. Fleck, Jr. Columbus State University Spam, the unsolicited email that shows up in

More information

Emailserving Email Marketing Best Practices Quick Guide

Emailserving Email Marketing Best Practices Quick Guide Emailserving Email Marketing Best Practices Quick Guide Written By: Shane Lee Assistant Marketing Manager Page 2 Summary: Email marketing is one of the most effective forms of advertising. It is cost effective,

More information

8/4/2015 Sphere 9.4.6 Sphere Email US

8/4/2015 Sphere 9.4.6 Sphere Email US Sphere Email Guide 8/4/2015 Sphere 9.4.6 Sphere Email US 2015 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical,

More information

Anchor s Email Marketing Glossary and Common Terms

Anchor s Email Marketing Glossary and Common Terms Anchor s Email Marketing Glossary and Common Terms A/B Split Test: A method used for testing the response of sending two different email campaigns to two equal segments of an email list. Marketers can

More information

Spam: What Consumers Really Think

Spam: What Consumers Really Think From First Click to Lifetime Customer WHITE PAPER Spam: What Consumers Really Think Survey Finds Growing Anger; Advice for Avoiding Recipients Wrath SPAM: WHAT CONSUMERS REALLY THINK Survey finds growing

More information

ESPC Best Practices Guide

ESPC Best Practices Guide A division of the Network Advertising Initiative ESPC Best Practices Guide I. Introduction Email is an excellent channel for mailers to establish and maintain valuable relationships with their subscribers.

More information

Mailworks Anti-Spam Policy

Mailworks Anti-Spam Policy Mailworks Anti-Spam Policy September 24, 2014 Guidelines Before adding new recipients to your contact list, you need to ensure that you have the proper permission for each and every recipient on your list.

More information

RESEARCH BRIEF (The Impact of SPAM on Email) Date: 6/1/2005

RESEARCH BRIEF (The Impact of SPAM on Email) Date: 6/1/2005 RESEARCH BRIEF (The Impact of SPAM on Email) Date: 6/1/2005 Topic: The Impact of SPAM on Email We investigate the new CAN-SPAM law and find how one major retailer risked a minimum $41,500 fine just by

More information

Review of Proposed Legislative Framework For the Control of E-mail Spam

Review of Proposed Legislative Framework For the Control of E-mail Spam Review of Proposed Legislative Framework For the Control of E-mail Spam Name: Job title: Company: Steven Sim Kok Leong IT Security Specialist Infocomm Security / QA, Computer Centre, NUS C. - Comment Q.

More information

Email deliverability: The good, the bad and the ugly

Email deliverability: The good, the bad and the ugly Email deliverability: The good, the bad and the ugly An Experian Data Quality White Paper March 2015 CONTENTS Introduction...1 The good...2 Open rate...2 Click-through rate...3 Authentication...4 The bad...4

More information

EMAIL DELIVERABILITY ESSENTIALS: 6 MUSTKNOW TIPS

EMAIL DELIVERABILITY ESSENTIALS: 6 MUSTKNOW TIPS EMAIL DELIVERABILITY ESSENTIALS: 6 MUSTKNOW TIPS 6 MUST-KNOW EMAIL DELIVERABILITY TIPS Here, in plain language, are the most essential elements of an email marketing campaign that will get your message

More information

Introduction:... 3. What is Spam?... 3 How to Bypass Spam Filters... 5. Common Mistakes... 7

Introduction:... 3. What is Spam?... 3 How to Bypass Spam Filters... 5. Common Mistakes... 7 Table of Contents Introduction:... 3 What is Spam?... 3 How to Bypass Spam Filters... 5 Common Mistakes... 7 How Spam Filters Work... 8 Testing Your Email Campaign... 8 Preventing False Abuse Reports...

More information

Email Best Practices: Proven strategies and tactics for success

Email Best Practices: Proven strategies and tactics for success Email Best Practices: Proven strategies and tactics for success 2 The most powerful marketing channel Email marketing is one of the most cost-effective marketing channels available. It s easy to get distracted

More information

1. Introduction...3 2. Email Deliverability-Benchmarks...4 2.1. Working with Your Service Provider...4 2.2. Email sent...4 2.3. Email delivered...

1. Introduction...3 2. Email Deliverability-Benchmarks...4 2.1. Working with Your Service Provider...4 2.2. Email sent...4 2.3. Email delivered... 1. Introduction...3 2. Email Deliverability-Benchmarks...4 2.1. Working with Your Service Provider...4 2.2. Email sent...4 2.3. Email delivered...4 2.4. Bounces....4 2.5. Email unsubscribe requests....5

More information

Questions or a need for further clarification should be directed to your College or department email administrator.

Questions or a need for further clarification should be directed to your College or department email administrator. Spam Email Advisory Continuing increases in the volume and sophistication of spam email have, in some cases, impacted the performance of our email systems causing nondelivery or delayed delivery of email.

More information

MODEL POLICY CONCERNING SOLICITATIONS SENT BY E-MAIL

MODEL POLICY CONCERNING SOLICITATIONS SENT BY E-MAIL MODEL POLICY CONCERNING SOLICITATIONS SENT BY E-MAIL Disclaimer concerning the Use of this Model Policy: The following is a model that Texas REALTORS may use as a guide to develop an office policy related

More information

What does it actually mean to warm up an IP address?

What does it actually mean to warm up an IP address? page1 The IP Warm-up Process Explained Whether you are new to the email game or an accomplished mailer, you have probably run across the idea of warming up an IP (Internet Protocol) address to improve

More information

Email Marketing Glossary of Terms

Email Marketing Glossary of Terms Email Marketing Glossary of Terms A/B Testing: A method of testing in which a small, random sample of an email list is split in two. One email is sent to the list A and another modified email is sent to

More information

Confirmed Opt-In Guide

Confirmed Opt-In Guide Confirmed Opt-In Guide 1601 Trapelo Road Suite 329 Waltham, MA 02451 www.constantcontact.com Constant Contact, Inc. reserves the right to make any changes to the information contained in this publication

More information

Federal Regulations on Advertising:

Federal Regulations on Advertising: Federal Regulations on Advertising: Phone, Fax, or E-mail By Jordan B. Hansell 700 Walnut, Suite 1600 Des Moines, Iowa 50309 Telephone: 515-283-8166 Facsimile: 515-283-8018 jbhansell@nyemaster.com Disclaimer

More information

SPAM AND PRIVACY ISSUES. Spam for Breakfast, Lunch and Dinner: What will the Unsolicited Electronic Messages Bill do for Privacy?

SPAM AND PRIVACY ISSUES. Spam for Breakfast, Lunch and Dinner: What will the Unsolicited Electronic Messages Bill do for Privacy? SPAM AND PRIVACY ISSUES Spam for Breakfast, Lunch and Dinner: What will the Unsolicited Electronic Messages Bill do for Privacy? 30 March 2006 Graeme Crombie Senior Associate Minter Ellison Rudd Watts

More information

Improving Email Deliverability

Improving Email Deliverability Improving Email Deliverability A focus on what happens after you hit the send button and the role of a SMTP Relay Service Provider April 2010 1 Introduction Email deliverability has become one of the hot

More information

MASS COMMUNICATIONS IN YOUR MINISTRY

MASS COMMUNICATIONS IN YOUR MINISTRY MASS COMMUNICATIONS IN YOUR MINISTRY W H I T E P A P E R MCWP0609 S M A L L G R O U P S M I N I S T R Y G U I D E C o m m u n i c a t i o n Communication is an important tool in determining the success

More information

Email Deliverability:

Email Deliverability: Email Deliverability: A guide to reaching your audience Email deliverability is a key factor in email campaign performance. Understanding how email deliverability is calculated and how it affects your

More information

Trext Details: Texting Best Practices, Legality and Security 1 For questions contact Kira McCoy: (303)-947-6583 kira@trext.com

Trext Details: Texting Best Practices, Legality and Security 1 For questions contact Kira McCoy: (303)-947-6583 kira@trext.com Trext Details: Texting Best Practices, Legality and Security 1 For questions contact Kira McCoy: (303)-947-6583 kira@trext.com I. Texting Best Practices (Based on research from CTIA, Cellular Telecommunications

More information

Data is at the heart of deliverability

Data is at the heart of deliverability FOR ADESTRA CLIENTS ONLY! Page 1 of 5 Data is at the heart of deliverability Introduction Following an in-depth project by Adestra into deliverability in the UK a common theme has emerged. Your data management

More information

An Email Delivery Report for 2012: Yahoo, Gmail, Hotmail & AOL

An Email Delivery Report for 2012: Yahoo, Gmail, Hotmail & AOL EmailDirect is an email marketing solution provider (ESP) which serves hundreds of today s top online marketers by providing all the functionality and expertise required to send and track effective email

More information

10 Tactics and Tips to Take Your Email Marketing Program to the Next Level

10 Tactics and Tips to Take Your Email Marketing Program to the Next Level 10 Tactics and Tips to Take Your Email Marketing Program to the Next Level Brought to you by em+c, a Target Marketing Group Publication www.emarketingandcommerce.com 10 Tactics and Tips to Take Your Email

More information

A Whitepaper of Email Marketing Questions and Answers Email Marketing 101: Tips to Maximize Email Results

A Whitepaper of Email Marketing Questions and Answers Email Marketing 101: Tips to Maximize Email Results A Whitepaper of Email Marketing Questions and Answers Email Marketing 101: Tips to Maximize Email Results Page 0 of 8 Introduction This document summarizes the questions that were asked during the session

More information

RIGHTNOW GUIDE: EMAIL MARKETING BEST PRACTICES

RIGHTNOW GUIDE: EMAIL MARKETING BEST PRACTICES RIGHTNOW GUIDE: EMAIL MARKETING BEST PRACTICES Version 0.5 2010 RightNow Technologies. All rights reserved. RightNow and RightNow logo are trademarks of RightNow Technologies Inc. All other trademarks

More information

Best Practice Data Collection for Marketers

Best Practice Data Collection for Marketers Best Practice Data Collection for Marketers 15 ways to streamline your sign up process For more information please contact clients@adestra.com or call +44 (0)1865 24 24 25 1 Best Practice Data Collection

More information

Fundamental Tips for Leveraging Email to Drive Restaurant Sales: Part I

Fundamental Tips for Leveraging Email to Drive Restaurant Sales: Part I Fundamental Tips for Leveraging Email to Drive Restaurant Sales: Part I Getting your email message to the recipient s inbox is the first step in driving restaurant sales with email messages. This article

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Acceptable Use Policy (AUP) ionfish Group, LLC s network and services have been designed to serve its clients, partners, and employees (each individually a User ), and to enhance

More information

Email Deliverability. Best Practices for Getting to the Inbox

Email Deliverability. Best Practices for Getting to the Inbox Email Deliverability Best Practices for Getting to the Inbox About Real Magnet Real Magnet develops digital marketing technologies with a focus on Email and Marketing Automation. Its full-featured platform

More information

INBOX. How to make sure more emails reach your subscribers

INBOX. How to make sure more emails reach your subscribers INBOX How to make sure more emails reach your subscribers White Paper 2011 Contents 1. Email and delivery challenge 2 2. Delivery or deliverability? 3 3. Getting email delivered 3 4. Getting into inboxes

More information

Spam - A Case Study in Unsolicited Email

Spam - A Case Study in Unsolicited Email MCLE ON THE WEB ($15 PER CREDIT HOUR) TEST # 38 1 HOUR CREDIT To earn one hour of MCLE credit, read the substantive material, then download the test, answer the questions and follow the directions to submit

More information

EMAIL MARKETING TIPS. From Our InfoUSA Email Experts

EMAIL MARKETING TIPS. From Our InfoUSA Email Experts EMAIL MARKETING TIPS From Our InfoUSA Email Experts In order to assist you every step of the way while creating an Email Marketing Campaign, our InfoUSA Email Experts have compiled lists of their best

More information

INinbox Start-up Pack

INinbox Start-up Pack 2 INspired Email Marketing This is what you should know about sending emails through INinbox and how to get started! Thanks for joining INinbox. choice. You ve made a great In front of you, you find the

More information

Opt-In versus Opt-Out Permission and Privacy. Picture the following scenario to see the industry s quandary on what options to CHAPTER 3

Opt-In versus Opt-Out Permission and Privacy. Picture the following scenario to see the industry s quandary on what options to CHAPTER 3 CHAPTER 3 Opt-In versus Opt-Out Permission and Privacy Picture the following scenario to see the industry s quandary on what options to offer customers. At your favorite online music store, you have chosen

More information

Spam DNA Filtering System

Spam DNA Filtering System The Excedent Spam DNA Filtering System provides webmail.us customers with premium and effective junk email protection. Threats to email services are rising rapidly. A Growing Problem As of November 2002,

More information

Professional Diploma in Digital Marketing Module 4: Email Marketing Version 5.0 Lecturer: David Maher

Professional Diploma in Digital Marketing Module 4: Email Marketing Version 5.0 Lecturer: David Maher Professional Diploma in Digital Marketing Module 4: Email Marketing Version 5.0 Lecturer: David Maher David Maher Product & ecommerce Manager with Scope Ophthalmics 10+ Years experience in Digital Marketing

More information

email deliverability

email deliverability There s no question that email software and the people who use it are getting better at filtering out spam. This is good since it makes it easier for engaging emails to get through but without a strong

More information

The Power of Email Marketing

The Power of Email Marketing The Power of Email Marketing Connect. Inform. Grow. Copyright 2008 Constant Contact Inc. Introduction This presentation has three parts Connect, Inform, and Grow Connecting to build customer relationships

More information

MailWorks Powered by PRI

MailWorks Powered by PRI MailWorks Powered by PRI Email marketing backed by real people COMMUNICATIONS This White Paper is provided by PRI for your resources. We strive not only to assist in web, mobile, and print communications,

More information

The Power of Email Marketing

The Power of Email Marketing The Power of Email Marketing Connect. Inform. Grow. Copyright 2008 Constant Contact Inc. Introduction This presentation has three parts Connect, Inform, and Grow Connecting to build customer relationships

More information

How To Ensure Your Email Is Delivered

How To Ensure Your Email Is Delivered Everything You Need to Know About Delivering Email through Your Web Application SECTION 1 The Most Important Fact about Email: Delivery is Never Guaranteed Email is the backbone of the social web, making

More information

6 TOP TIPS FOR IMPROVING YOUR DELIVERABILITY BROUGHT TO YOU BY

6 TOP TIPS FOR IMPROVING YOUR DELIVERABILITY BROUGHT TO YOU BY 6 TOP TIPS FOR IMPROVING YOUR DELIVERABILITY BROUGHT TO YOU BY INTRODUCTION What s the point in sending awesome email campaigns if they don t reach your recipients? Answer? None whatsoever! That s why

More information

The Virginia Joint Commission. on Technology and Science

The Virginia Joint Commission. on Technology and Science TO: FROM: SUBJECT: JCOTS CYBERCRIMES ADVISORY COMMITTEE PATRICK CUSHING, JOINT COMMISSION ON TECH NOLOGY AND SCIENCE HB 1354 - WIRELESS DEVICES; UNSOLICITED MESSAGES AND IMAGES SENT THERETO; PENALTY DATE:

More information

Email Marketing & Lead Generation Blueprint

Email Marketing & Lead Generation Blueprint Email Marketing & Lead Generation Blueprint Email marketing has been around for as long as email has been around. It has evolved into a powerful tool which can be utilized for various purposes. Since email

More information

BULK MAIL CAMPAIGN RULES

BULK MAIL CAMPAIGN RULES BULK MAIL CAMPAIGN RULES No matter what you do, or how closely you follow the guidelines we provide, the issue of spam is an ever changing and always evolving problem it is estimated that more than 70%

More information

Telemarketing, E-mail, and Text Message Marketing: Tips to Avoid Lawsuits

Telemarketing, E-mail, and Text Message Marketing: Tips to Avoid Lawsuits Telemarketing, E-mail, and Text Message Marketing: Tips to Avoid Lawsuits LeadsCouncil December 11, 2012 2 pm 3 pm ET Webinar Ari N. Rothman, Esq., Co-Presenter Molly T. Cusson, Esq., Co-Presenter Jonathan

More information

E-mail Marketing ABSTRACT

E-mail Marketing ABSTRACT E-mail Marketing * Mr. R. Vasudevan ABSTRACT E-MAIL MARKETING is a form of direct marketing which uses electronic mail as a means of communicating commercial or fundraising messages to an audience. E-Mail

More information

Miller Thomson Legal Alert on Canada s Upcoming Anti-Spam Legislation. Canada s Anti-Spam Legislation (CASL) Are You Ready?

Miller Thomson Legal Alert on Canada s Upcoming Anti-Spam Legislation. Canada s Anti-Spam Legislation (CASL) Are You Ready? Miller Thomson Legal Alert on Canada s Upcoming Anti-Spam Legislation Canada s Anti-Spam Legislation (CASL) Are You Ready? 2 No One Falls For These Scams, Do They? Nigerian 419 scam lead to Australians

More information

Email Marketing and Canada s Anti-Spam Law

Email Marketing and Canada s Anti-Spam Law Email Marketing and Canada s Anti-Spam Law Canada s Anti-Spam Law (CASL) is a strict law that applies to all email marketers sending messages to Canadian subscribers. An Act to promote the efficiency and

More information