Recent Posts

Permission, Part 2

Permission Part 1 I talked about the definition of permission as I use it. Before we can talk about how to get permission we need to clarify the type of email that we’re talking about in this post. Specifically, I’m talking about marketing and newsletter email, not transactional email or other kinds of email a company may send to recipients. Also, when I talk about lists I include segments of a database that fit marketing criteria as well as specific list of email addresses.
There are two ways that recipients give permission to receive newsletters or marketing email, explicit permission and implicit permission. Recipients give explicit permission to receive marketing email when they sign up for such email. Implicit permission covers situations where a user provides an email address, either during the course of a purchase, a download or other interaction with a company. There may be some language in the company’s privacy policy explaining that recipients may receive marketing email, but the recipient may not be aware they will receive email.
The easier situation is explicit permission. There are two basic ways a company can gather explicit permission to send marketing email: single opt-in and double (confirmed) opt-in.
Single opt-in: Recipient provides an email address to the sender for the express purpose of receiving marketing email.
Double (or confirmed) opt-in: Recipient provides an email address to the sender for the express purpose of receiving marketing email. The sender then sends an initial email to the recipient that requires a positive action on the part of the recipient (click a link, log into a web page or reply to the email) before the address is added to the sender’s list.
There can be problems with both types of opt-in, but barring fake or typoed email addresses being given to the sender, there is an social contract that the sender will send email to the recipient. I’ll talk about single and double opt-in in later posts.
Implicit permission covers a lot of situations where email is commonly sent in response to a recipient giving the sender and email address. In these cases, though, the recipient may not be aware they are consenting to receive email. This behavior may annoy recipients as well as causing delivery problems for the sender. Common cases of implicit permission include website registration, product purchase and free downloads.
More responsible companies often change implicit opt-in to explicit opt-in. They do this by making it clear to users that they are agreeing to receive email at the point where the user gives the company an email address. Not only is the information about how email addresses will be used in the company’s privacy policy, but there is a clear and conspicuous notice at the point where the user must provide their email address. The recipient knows what the sender will do with the email address and is given the opportunity to express their preferences. If users do agree to receive email, the company will send a message to that recipient with relevant information about how their email address will be used, how often they will receive email and how they can opt-out.
Explicit opt-in is the best practice for building a list, however, there are still companies that successfully use implicit opt-in to build marketing lists. Companies successfully using implicit opt in usually are collecting emails as part of a sales transaction. There is very little incentive for their customers to give them an email address not belonging to the customer.
Outside of purchasers, however, implicit opt-in leaves a company open to getting email addresses that do not actually belong to the person providing the company with the email address. This most often occurs when the sender is providing some service, be it software downloads, music or access to content, in return for a “payment” of a valid email address. In order to protect against users inputting other, valid addresses into the form, the sender must verify that the address actually belongs to their user before sending any sort of marketing email. The easiest way for senders to do this is to send a link to the recipient email. This link can be the download link, or the password to get to restricted content. Because the recipient must be able to receive and act on email, the only addresses the sender has belong to actual users of the site.
In some rare cases, implicit opt-in can be used to build a list that performs well. However, senders must be aware of the risks of annoying their customer base and the recipient ISPs. Mitigating these risks can be done, but it often takes more effort than just using explicit opt-in in the first place.

Read More

IP Reputation Portability

Matt posted a discussion of the portability of IP reputation over at his EmailKarma blog.
I have heard about Hotmail/MSN’s claim that if you add your new IPs to your SPF/SenderID record and send from your old IPs that your old IP reputation will transfer to your new IPs. I’ve not heard it working in practice, but it really can’t hurt to add your new IPs to your records as soon as you know what they are.

Read More

419 … over live chat?

MailChimp’s customer service people were contacted by what appears to be a King selling monkeys.
I want to get permission part II up today, but this was just so funny I had to share.

Read More

It really can be your email

Yesterday I wrote about activist groups getting blocked at major ISPs and how the ISPs don’t block mail because they don’t like the political viewpoints in email. This morning Mark Brownlow has a post up about delivery in general and the cause of many delivery problems.

Read More

They’re not blocking you because they hate you.

Really. They’re blocking you because you’re doing something that is triggering their blocking mechanisms.
This has happened over and over and over again. Some political or activist website sends out an email that gets blocked by some large ISP and the political site turns it into a giant crisis that means the ISP hates them or is trying to shut them up or is trying to silence their message.
Except that’s not what is going on. The folks at the large ISPs who handle blocking and incoming mail are incredibly smart and conscientious . They take their jobs seriously. They, both personally and corporately, want their customers (the end recipients) to receive the email they want. Additionally, they do not want to deliver mail that the recipients did not ask to receive.
In almost no cases is the block a particular activist site encounters a result of the ISP not liking the content of the email. If an activist site is being blocked it’s due to complaints or reputation or something that ISPs measure and block on. Some person at the ISP didn’t read your email, decide they didn’t like what you had to say and then block that email. That email was blocked because something related to that email triggered the thresholds for blocking.
Of course, as with everything online, there are caveats. In this case it’s that the above statements really only hold true for large ISPs in free countries. There are some countries in the world that do block email based on content, and that is dictated by the government. Likewise, some small ISPs will block based on the guy in charge not liking the email.
Generally, though, if an activist site is being blocked by a large ISP in the US or other free countries it is because their mailings are somehow not complying with that ISPs standards. Instead of starting an email campaign or blog campaign to shame the ISP for suppressing speech, it is much more productive to actually contact the ISP in question and find out what went wrong.

Read More

Goodmail

Goodmail made a splash on the email marketing and ISP industries a few years ago by announcing their CertifiedEmail program. They guaranteed that using their certification would result in email going directly to the inbox, and all images in the email would be displayed by default. Senders using Goodmail would pay money, per message, and Goodmail would split that money with the receiving ISP.
This sounds very much like a situation where everyone wins. The senders get their mail to the inbox with images turned on. The receiving ISPs get a little money to deliver email and offloads some of their sender screening onto a third party. Individual recipients know that this email is certified and that it’s safe to click on links in the email.
In the time since CertifiedEmail has been announced, however, there seems to be very little adoption. Sure, receivers do seem to be signing up, a little. AOL and Yahoo have been using CertifiedEmail for a while. In summer 2007, a number of cable providers announced they would be using CertifiedEmail as well.
Senders, on the other hand, don’t seem to be adopting this as fast as Goodmail might like. The Federal Government recently announced they would be sending email signed by Goodmail and some large online companies, Overstock.com among them, are also sending with certified email. In order to get more companies to sign up for CertifiedEmail, Goodmail announced in August 2007 that they had partnered with CheetahMail, Episilon and Axciom Digital to provide free CertifiedEmail to qualifying customers of those ESPs.
Why might companies not be adopting CertifiedEmail? I have a couple of thoughts.

Read More

Spam Documentary on TV

A few months back John Levine participated in a Canadian TV Show called Spam, The documentary. This will be shown on Court TV on Sept 18th at 11pm or the 19th at 3am.
John says

Read More

Visiting customers through email

A few months ago I was working on a deliverability problem with a new client. They are a social networking site heavily branded with black background and pink text. One of the questions they asked me during the course of troubleshooting their delivery problems was if sending pink and black branded emails to match their site branding would decrease their deliverability.
That was actually a more interesting question than many I have received and led to the following analogy. A website is your showroom on the web. It is the equivalent of a brick and mortar store where people visit you and come to see what you have to offer for sale. Heavily branding the store is the right thing to do.
An email, be it marketing, transactional or relationship, is the equivalent of sending a traveling salesperson to someone’s house. That sales person is entering the customer’s space. In this case overly branding your presence in the customer’s space which can annoy or completely turn off your customers.
Branding emails to customers is a good thing; it builds brand recognition and customer relationships. Just remember, though, that you’re entering the customer’s space. Be respectful of that space.
As an aside, I did actually ask AOL about the color of email would decrease delivery. The nice folks over there did reply “AOL SAYS NO PINK!” But I’m fairly sure they weren’t serious.

Read More

Real Spam?

Both Al and Mickey have written astute comments on Kevin Sirtz’s article about how permission is not important in web[sic] marketing.
It is pretty clear to me that Mr. Sirtz does not really understand email, and not just because he conflates email with the web. Anyone who has been involved in the email marketing space knows that permission is the lynchpin of good deliverability and high ROI.
This is not to say that Mr. Sirtz is not having the experience he states. With very small lists you can get away with personal relationships substituting for permission. Senders of any size, though, do not have the relationship with their recipients and need to actually send email only to those recipients who have requested to receive email from the sender.

Read More

Permission, Part 1

Before I can talk about permission and how a mailer can collect permission from a recipient to send them email I really need to define what I mean by permission as there are multiple definitions used by various players in the market. Permission marketing was a term coined by Seth Godin in his book entitled Permission Marketing.
The underlying concept beneath permission marketing is that all marketing should be “anticipated, personal and relevant.” Others have defined permission marketing as consumers volunteering or requesting to be marketed to.
When I talk about permission in the email marketing context I mean that the recipient understood *at the time they provided the sender with an email address* that they would receive email from that sender as a result.
Let’s look at some of the relevant parts of that definition.

Read More
Tags