iContact lists compromised
iContact has acknowledged that (some) of their customer lists were compromised and that they are investigating. As iContact has chosen not to allow comments on that post, feel free to share comments here.
HT: @aliverson
iContact has acknowledged that (some) of their customer lists were compromised and that they are investigating. As iContact has chosen not to allow comments on that post, feel free to share comments here.
HT: @aliverson
Yesterday I blogged about eROIs contention that consumers should not be wasting the time of lead gen companies by filling in fake data. There were lots of good comments on the post, and I strongly encourage you to go read them if you are interested in different perspectives on the data issue.
One of the arguments I was making is that people are only going to give accurate information if they trust the website that is collecting information. I do, strongly, believe this. I also believe very strongly that websites collecting information need to do so defensively. It is the only way you can get good information.
This ties in with an earlier post about a website that collects email addresses from any visitor, then turns around and submits those addresses to webforms. Hundreds of mailing lists have already been corrupted by this group. They are a prime reason companies must design address collection process defensively. There are people who do bad things, who will take an opportunity to harass senders and recipients. This company is not the first, nor will they be the last to commit such abuses.
Taking a stand against abusive companies and people may be useful, but that will not stop the abuse. It is much easier to design process that limits the amount of abuse. For lead gen, in particular, confirmed opt-in is one way to limit the amount of bad data collected. As a side effect, it also results in less blocked mail, fewer complaints and better delivery.
There have been a number of reports recently about customer lists leaking out through ESPs. In one case, the ESP attributed the leak to an outside hack. In other cases, the ESPs and companies involved have kept the information very quiet and not told anyone that data was leaked. People do notice, though, when they use single use addresses or tagged addresses and know to whom each address was submitted. Data security is not something that can be glossed over and ignored.
Most of the cases I am aware of have actually been inside jobs. Data has been stolen either by employees or by subcontractors that had access to it and then sold to spammers. There are steps that companies can take to prevent leaks and identify the source when or if they do happen.
Last week I wrote about a study classifying different types of email users. My point is that senders should be very aware of how their users interact with email, in order to provide the best user experience and the most revenue for the sender. If, for instance, the bulk of recipients are daytime (9 – 5 M-F) users, then the best time to email is different than if the bulk of recipients are all the time users of email.
At least 2 different people commented on when the “best” time to send email was, completely missing the entire point of my post. When you send email should be related to when your users are active in their email client. Senders know this, because they can track times when people open and click on links in the email. The data is all there, it just needs to be mined.
Plus, if every sender sent mail at the exact same time, that being the best time to send mail, then it will immediately become the absolute worst time to send email.
Pay attention to your recipients, and not to the internet experts. Listen to what your customers and recipients are telling you. Do what’s best for them, not what’s best for Joe’s Bait and Tackle Shop.