Deliverability, Return Path, List-Unsubscribe Header

Here are a few blog posts covering the email industry from Constant Contact, Return Path, and SpamResource.
Constant Contact posted a blog post about how they measure email deliverability on January 10th.  They started with just tracking bounce backs and using that metric to calculate deliverability but then moved to using seed list through a third-party and report that they get 97% deliverability.  Read more at Constant Contact
On January 6th, Return Path recapped their most read blog posts which includes covering Yahoo’s DMARC Reject Policy, Blacklist Basics, and GMails new FBL and Unsubscribe button. Read more at Return Path
Return Path and SpamResource both have an excellent write-ups about the preference change at Outlook.com/Hotmail regarding the List-Unsubscribe header.  Microsoft, like Google, prefers to use mailto instead of http or other URI protocols for the List-Unsubscribe header.
 

Related Posts

Email related laws

I’ve been working on a document discussing laws relevant to email delivery and have found some useful websites about laws in different countries.
US Laws from the FTC website.
European Union Laws from the European Law site.
Two documents on United Kingdom Law from the Information Commissioner’s Office and the Data Protection Laws.
Canadian Laws from the Industry Canada website.
Australian Laws from the Australian Law website.

Read More

Failed delivery of permission based email

A few weeks ago, ReturnPath published a study showing that 20% of permission based email was blocked. I previously discussed the definition of permission based email and that not all the mail described as permission based is actually sent with the permission of the recipient. However, I only consider this a small fraction of the mail RP is measuring, somewhere in the 3 – 5% range. What happens with the other 17 – 15% of that mail? Why is it being blocked?
There are 3 primary things I see that cause asked for and wanted email to be blocked.

Read More

Verifying email addresses

Over at CircleID Aviram Jenik posts about using email addresses as identification and how that can go horribly wrong if the website does no verification. In his case, the problem is a user who has made a purchase using Aviram’s gmail address and Aviram now has access to the other users personal information. As he explains it:

Read More