SlideShare a Scribd company logo
1 of 14
Download to read offline
9/30/2011




 Email Marketing Workshop

                 Part V
  Deliverability, Compliance & Trust




              Agenda

• Getting To The Inbox
• Protecting Your Brand
• Email Laws & Regulations




                                              1
9/30/2011




           Laurence Rothman

Nationwide
Senior Consultant, Brand Reputation
rothmal@nationwide.com
Twitter: @LaurenceRothman




           Matt Rausenberger

Return Path, Inc.
Sr. Director, Deliverability Consulting
matt.rausenberger@returnpath.net



eec Co-Chair
Deliverability & Rendering Roundtable

PSVillage Co-Chair, Denver Chapter




GETTING TO THE INBOX:
DELIVERABILITY & REPUTATION




                                                 2
9/30/2011




                  Reputation




 Poor Reputation & Deliverability

= NO INBOX
• No Clicks
• No Opens
• No Purchases
• No Conversions
• No Brand Building
• No Relationships




 Factors That Affect Deliverability
• Subscriber Actions
   – Complaints
   – Opens
• List Quality
   – Unknown Users
   – Spam Traps
• Content
• Email Infrastructure
   – Authentication
   – Sending Permanence
• Accreditation




                                             3
9/30/2011




       Complaints




Positive Subscriber Actions




     List Maintenance




                                     4
9/30/2011




          Unknown Users




              Bounces

• Automated Response from Receiving
  Network that Email Message Was Not
  Delivered
• Can Happen at any Stage of
  Message Transfer or Days After
• Classified as Hard and Soft
  Bounces




            Spam Traps




                                              5
9/30/2011




Give Them a Choice




     Content




Content Rendering




                            6
9/30/2011




Mail Infrastructure




Certify Your Email




 Manage Metrics




                             7
9/30/2011




Relevance & Response Rates




BUILDING AND PROTECTING
YOUR BRAND VIA EMAIL




      Email Branding




                                    8
9/30/2011




What Makes Subscribers Open?




 Prominently Display Your Logo




                Email Fraud
• Spoofing – Modifying the sender
  address and other parts of the email
  header to appear as if the email
  originated from some place it did not
• Phishing – Fraudulent practice of sending e-mails
  purporting to be from legitimate companies in order
  to induce individuals to reveal personal information
  such as email addresses, SS# and credit cards
• Malware – Malicious software meant to steal private
  data, take control of resources or cause abusive
  behavior




                                                                9
9/30/2011




       Brand Reputation & Trust
                   • Company perception in the
                     marketplace
                   • Erosion of brand trust
                   • In a recent Cloudmark survey,
                     42% of respondents said that
                     their trust in a brand would be
                     greatly reduced if they received
                     a phishing email claiming to be
                     sent by that brand.




      You Can Stop Phishing!
• Authenticate email with SPF and DKIM
• Educate your employees about spoofing,
  phishing and malware
• Monitor phishing and malware attacks
• Third-party vendors can help with:
  – Registering your domain to prevent unauthenticated
    email from being delivered
  – Monitoring, detecting and taking down phishing sites




 COMPLIANCE FOR
 COMMERCIAL EMAIL




                                                                 10
9/30/2011




              United States
• CAN-SPAM Act of 2003
• Email Law, not Privacy Law
• Opt-out, not Opt-in
• Make your privacy statement easy to find
  and read
• Track source and date of subscriber
  acquisition




               CAN-SPAM
• Covers all commercial email
• Clear and conspicuously displayed opt-out
  mechanism
• Valid postal address
• Clear notice that the message is commercial
• Process unsubscribes within 10 business days
• No false headers or subject lines
• Accurately represent Forward to a Friend (FTAF)




                                                          11
9/30/2011




                 Canada & CASL
• Law takes effect early 2012
• CEM Law, not just Email Law
• Affects all companies that send email, SMS, and
  social network messages into Canada
• Must have consent from subscriber unless implied
  relationship exists (allowed up to 2 years)
• Organization will need to review their email
  policies
• Penalties can be as high as $1 million per violation
  for individuals, and $10 million per violation for
  organizations




            Complying with CASL
• Establish baseline policy for all digital
  communications with subscribers
• Segment your subscribers based on expressed
  preferences, observed behaviors, demographics
• Use opt-in consent methods for capturing contact
  information.
• Clear unsubscribe information in communications
• Use preference centers so that subscribers can choose
  the timing and frequency with which they receive emails
• Obtain explicit consent within 2 year window
• Include postal address in all communications
• Never rent lists or do email appends




                 European Union
•   Data Protection Directive
•   Privacy Law not Email Law
•   Opt-in, not Opt-out
•   7 Principals:
    –   Notice
    –   Purpose
    –   Consent
    –   Security
    –   Disclosure
    –   Access
    –   Accountability




                                                                  12
9/30/2011




Asia-Pacific Privacy Framework
• Forum of 21 Pacific Rim countries
• Privacy Principles:
   –   Preventing Harm
   –   Notice
   –   Collection Limitations
   –   Uses of Personal Information
   –   Choice
   –   Integrity of Personal Information
   –   Security Safeguards
   –   Access and Correction
   –   Accountability




                   Rest of World

• Existence, detail and enforcement of
  privacy law in countries around the world
  vary dramatically




         Compliance Resources
Morrison & Foerster's International Privacy Library
www.mofo.com/privacy--data-security-services
Email Spam Legislation by Country
en.wikipedia.org/wiki/E-mail_spam_legislation_by_country
U.S. CAN-SPAM Act of 2003
www.spamlaws.com/federal/108s877.shtml
Canada - Marketer’s Guide to Applying CASL
www.thindata.com/aboutus/resourcecenter/casl/pdf/The_M
arketers_Guide_to_Applying_casl.pdf
Email Sender and Provider Coalition (ESPC)
www.espcoalition.org




                                                                 13
9/30/2011




          Deliverability Blogs

Return Path
www.returnpath.net
Deliverability.com
www.deliverability.com
Word to the Wise
blog.wordtothewise.com
Al Iverson
blog.exacttarget.com/blog.php/al-iverson




      Thank You!




                                                 14

More Related Content

Viewers also liked

Notes Version: Social Media as Focus Group Tapping Into a Vast Resource, Priv...
Notes Version: Social Media as Focus Group Tapping Into a Vast Resource, Priv...Notes Version: Social Media as Focus Group Tapping Into a Vast Resource, Priv...
Notes Version: Social Media as Focus Group Tapping Into a Vast Resource, Priv...
Vivastream
 
Notes Version: DMA's Do the Right Thing Best Practices Digital Guidepost
 Notes Version: DMA's Do the Right Thing Best Practices Digital Guidepost Notes Version: DMA's Do the Right Thing Best Practices Digital Guidepost
Notes Version: DMA's Do the Right Thing Best Practices Digital Guidepost
Vivastream
 
Notes Version :10 Things Marketers Can Do To Take Advantage Of Social Media
Notes Version :10 Things Marketers Can Do To Take Advantage Of Social MediaNotes Version :10 Things Marketers Can Do To Take Advantage Of Social Media
Notes Version :10 Things Marketers Can Do To Take Advantage Of Social Media
Vivastream
 
Email Direct Marketing Techniques
Email Direct Marketing TechniquesEmail Direct Marketing Techniques
Email Direct Marketing Techniques
Vivastream
 
Notes Version: Celtics 3-Point Play - Gleaning Data from Facebook Engagement
Notes Version: Celtics 3-Point Play - Gleaning Data from Facebook EngagementNotes Version: Celtics 3-Point Play - Gleaning Data from Facebook Engagement
Notes Version: Celtics 3-Point Play - Gleaning Data from Facebook Engagement
Vivastream
 
Shift Your Game Mobile, Social, Gaming!
Shift Your Game Mobile, Social, Gaming!Shift Your Game Mobile, Social, Gaming!
Shift Your Game Mobile, Social, Gaming!
Vivastream
 
Notes Version: Sustainability Elements of a Responsible Request for Proposal
Notes Version: Sustainability Elements of a Responsible Request for ProposalNotes Version: Sustainability Elements of a Responsible Request for Proposal
Notes Version: Sustainability Elements of a Responsible Request for Proposal
Vivastream
 
Notes Version: Part 1. The Next Extraordinary Marketing Opportunity- Healthca...
Notes Version: Part 1. The Next Extraordinary Marketing Opportunity- Healthca...Notes Version: Part 1. The Next Extraordinary Marketing Opportunity- Healthca...
Notes Version: Part 1. The Next Extraordinary Marketing Opportunity- Healthca...
Vivastream
 
Notes Version: How Anyone Can Be More Creative in 3 Easy Steps
Notes Version: How Anyone Can Be More Creative in 3 Easy StepsNotes Version: How Anyone Can Be More Creative in 3 Easy Steps
Notes Version: How Anyone Can Be More Creative in 3 Easy Steps
Vivastream
 
The New Face of Online Advertising: OBA & Compliance
The New Face of Online Advertising: OBA & ComplianceThe New Face of Online Advertising: OBA & Compliance
The New Face of Online Advertising: OBA & Compliance
Vivastream
 
Notes Version: 10 things marketers can do to take advantage of social media
Notes Version: 10 things marketers can do to take advantage of social mediaNotes Version: 10 things marketers can do to take advantage of social media
Notes Version: 10 things marketers can do to take advantage of social media
Vivastream
 
Free social media resources
Free social media resourcesFree social media resources
Free social media resources
Vivastream
 
Multichannel Retention Strategies: A Steady Diet of Low Hanging Fruit
Multichannel Retention Strategies: A Steady Diet of Low Hanging FruitMultichannel Retention Strategies: A Steady Diet of Low Hanging Fruit
Multichannel Retention Strategies: A Steady Diet of Low Hanging Fruit
Vivastream
 
Broadcast and Triggered Emails: A Match Made in Heaven
Broadcast and Triggered Emails: A Match Made in HeavenBroadcast and Triggered Emails: A Match Made in Heaven
Broadcast and Triggered Emails: A Match Made in Heaven
Vivastream
 
March 2012 SES Magazine: SES New York Preview
March 2012 SES Magazine: SES New York PreviewMarch 2012 SES Magazine: SES New York Preview
March 2012 SES Magazine: SES New York Preview
Vivastream
 
Prospect Segmentation for Performance
Prospect Segmentation for PerformanceProspect Segmentation for Performance
Prospect Segmentation for Performance
Vivastream
 
Notes Version: Which Medium Works Multichannel Testing For High-Performance R...
Notes Version: Which Medium Works Multichannel Testing For High-Performance R...Notes Version: Which Medium Works Multichannel Testing For High-Performance R...
Notes Version: Which Medium Works Multichannel Testing For High-Performance R...
Vivastream
 

Viewers also liked (17)

Notes Version: Social Media as Focus Group Tapping Into a Vast Resource, Priv...
Notes Version: Social Media as Focus Group Tapping Into a Vast Resource, Priv...Notes Version: Social Media as Focus Group Tapping Into a Vast Resource, Priv...
Notes Version: Social Media as Focus Group Tapping Into a Vast Resource, Priv...
 
Notes Version: DMA's Do the Right Thing Best Practices Digital Guidepost
 Notes Version: DMA's Do the Right Thing Best Practices Digital Guidepost Notes Version: DMA's Do the Right Thing Best Practices Digital Guidepost
Notes Version: DMA's Do the Right Thing Best Practices Digital Guidepost
 
Notes Version :10 Things Marketers Can Do To Take Advantage Of Social Media
Notes Version :10 Things Marketers Can Do To Take Advantage Of Social MediaNotes Version :10 Things Marketers Can Do To Take Advantage Of Social Media
Notes Version :10 Things Marketers Can Do To Take Advantage Of Social Media
 
Email Direct Marketing Techniques
Email Direct Marketing TechniquesEmail Direct Marketing Techniques
Email Direct Marketing Techniques
 
Notes Version: Celtics 3-Point Play - Gleaning Data from Facebook Engagement
Notes Version: Celtics 3-Point Play - Gleaning Data from Facebook EngagementNotes Version: Celtics 3-Point Play - Gleaning Data from Facebook Engagement
Notes Version: Celtics 3-Point Play - Gleaning Data from Facebook Engagement
 
Shift Your Game Mobile, Social, Gaming!
Shift Your Game Mobile, Social, Gaming!Shift Your Game Mobile, Social, Gaming!
Shift Your Game Mobile, Social, Gaming!
 
Notes Version: Sustainability Elements of a Responsible Request for Proposal
Notes Version: Sustainability Elements of a Responsible Request for ProposalNotes Version: Sustainability Elements of a Responsible Request for Proposal
Notes Version: Sustainability Elements of a Responsible Request for Proposal
 
Notes Version: Part 1. The Next Extraordinary Marketing Opportunity- Healthca...
Notes Version: Part 1. The Next Extraordinary Marketing Opportunity- Healthca...Notes Version: Part 1. The Next Extraordinary Marketing Opportunity- Healthca...
Notes Version: Part 1. The Next Extraordinary Marketing Opportunity- Healthca...
 
Notes Version: How Anyone Can Be More Creative in 3 Easy Steps
Notes Version: How Anyone Can Be More Creative in 3 Easy StepsNotes Version: How Anyone Can Be More Creative in 3 Easy Steps
Notes Version: How Anyone Can Be More Creative in 3 Easy Steps
 
The New Face of Online Advertising: OBA & Compliance
The New Face of Online Advertising: OBA & ComplianceThe New Face of Online Advertising: OBA & Compliance
The New Face of Online Advertising: OBA & Compliance
 
Notes Version: 10 things marketers can do to take advantage of social media
Notes Version: 10 things marketers can do to take advantage of social mediaNotes Version: 10 things marketers can do to take advantage of social media
Notes Version: 10 things marketers can do to take advantage of social media
 
Free social media resources
Free social media resourcesFree social media resources
Free social media resources
 
Multichannel Retention Strategies: A Steady Diet of Low Hanging Fruit
Multichannel Retention Strategies: A Steady Diet of Low Hanging FruitMultichannel Retention Strategies: A Steady Diet of Low Hanging Fruit
Multichannel Retention Strategies: A Steady Diet of Low Hanging Fruit
 
Broadcast and Triggered Emails: A Match Made in Heaven
Broadcast and Triggered Emails: A Match Made in HeavenBroadcast and Triggered Emails: A Match Made in Heaven
Broadcast and Triggered Emails: A Match Made in Heaven
 
March 2012 SES Magazine: SES New York Preview
March 2012 SES Magazine: SES New York PreviewMarch 2012 SES Magazine: SES New York Preview
March 2012 SES Magazine: SES New York Preview
 
Prospect Segmentation for Performance
Prospect Segmentation for PerformanceProspect Segmentation for Performance
Prospect Segmentation for Performance
 
Notes Version: Which Medium Works Multichannel Testing For High-Performance R...
Notes Version: Which Medium Works Multichannel Testing For High-Performance R...Notes Version: Which Medium Works Multichannel Testing For High-Performance R...
Notes Version: Which Medium Works Multichannel Testing For High-Performance R...
 

Similar to Notes Version: Email Marketing Workshop Part 5 Deliverability, Compliance and Trust

Email Marketing Workshop Part 5: Deliverability, Compliance and Trust
Email Marketing Workshop Part 5: Deliverability, Compliance and TrustEmail Marketing Workshop Part 5: Deliverability, Compliance and Trust
Email Marketing Workshop Part 5: Deliverability, Compliance and Trust
Vivastream
 
Eis thu 0815 sponsored breakfast strong mail
Eis thu 0815 sponsored breakfast strong mailEis thu 0815 sponsored breakfast strong mail
Eis thu 0815 sponsored breakfast strong mail
MediaPost
 
Deliverability and The Realities of Today’s Market
Deliverability and The Realities of Today’s MarketDeliverability and The Realities of Today’s Market
Deliverability and The Realities of Today’s Market
Act-On Software
 
Deliverability and The Realities and Demands of Today's Market
Deliverability and The Realities and Demands of Today's MarketDeliverability and The Realities and Demands of Today's Market
Deliverability and The Realities and Demands of Today's Market
Act-On Software
 
Email privacy seal_data_sheet
Email privacy seal_data_sheetEmail privacy seal_data_sheet
Email privacy seal_data_sheet
Jason Macias
 
Marqui's Top 10 Email Marketing Mistakes and How to Avoid Them
Marqui's Top 10 Email Marketing Mistakes and How to Avoid Them Marqui's Top 10 Email Marketing Mistakes and How to Avoid Them
Marqui's Top 10 Email Marketing Mistakes and How to Avoid Them
Marqui CMS
 

Similar to Notes Version: Email Marketing Workshop Part 5 Deliverability, Compliance and Trust (20)

Eloqua Grande Guide to Deliverability and Privacy
Eloqua Grande Guide to Deliverability and PrivacyEloqua Grande Guide to Deliverability and Privacy
Eloqua Grande Guide to Deliverability and Privacy
 
Permission Based Email Marketing
Permission Based Email MarketingPermission Based Email Marketing
Permission Based Email Marketing
 
Email Marketing Workshop Part 5: Deliverability, Compliance and Trust
Email Marketing Workshop Part 5: Deliverability, Compliance and TrustEmail Marketing Workshop Part 5: Deliverability, Compliance and Trust
Email Marketing Workshop Part 5: Deliverability, Compliance and Trust
 
Privacy and Big Data Overload!
Privacy and Big Data Overload!Privacy and Big Data Overload!
Privacy and Big Data Overload!
 
Eis thu 0815 sponsored breakfast strong mail
Eis thu 0815 sponsored breakfast strong mailEis thu 0815 sponsored breakfast strong mail
Eis thu 0815 sponsored breakfast strong mail
 
Pathway to Email Marketing: Best Practices and How-To
Pathway to Email Marketing: Best Practices and How-ToPathway to Email Marketing: Best Practices and How-To
Pathway to Email Marketing: Best Practices and How-To
 
Deliverability and The Realities of Today’s Market
Deliverability and The Realities of Today’s MarketDeliverability and The Realities of Today’s Market
Deliverability and The Realities of Today’s Market
 
Deliverability and The Realities and Demands of Today's Market
Deliverability and The Realities and Demands of Today's MarketDeliverability and The Realities and Demands of Today's Market
Deliverability and The Realities and Demands of Today's Market
 
Email Marketing Best Practices
Email Marketing Best PracticesEmail Marketing Best Practices
Email Marketing Best Practices
 
L42 slides
L42 slidesL42 slides
L42 slides
 
Bill C-28: What is it and what does it mean for marketers?
Bill C-28: What is it and what does it mean for marketers?Bill C-28: What is it and what does it mean for marketers?
Bill C-28: What is it and what does it mean for marketers?
 
Email privacy seal_data_sheet
Email privacy seal_data_sheetEmail privacy seal_data_sheet
Email privacy seal_data_sheet
 
The Digital Privacy Equation
The Digital Privacy EquationThe Digital Privacy Equation
The Digital Privacy Equation
 
Email marketing today
Email marketing todayEmail marketing today
Email marketing today
 
Deliverability for Daily Deals Industry
Deliverability for Daily Deals IndustryDeliverability for Daily Deals Industry
Deliverability for Daily Deals Industry
 
Messaging:Protecting your Data and your Reputation
Messaging:Protecting your Data and your ReputationMessaging:Protecting your Data and your Reputation
Messaging:Protecting your Data and your Reputation
 
How to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer CareHow to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer Care
 
How to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer CareHow to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer Care
 
Marqui's Top 10 Email Marketing Mistakes and How to Avoid Them
Marqui's Top 10 Email Marketing Mistakes and How to Avoid Them Marqui's Top 10 Email Marketing Mistakes and How to Avoid Them
Marqui's Top 10 Email Marketing Mistakes and How to Avoid Them
 
Online security and privacy Netiquettesh
Online security and privacy NetiquetteshOnline security and privacy Netiquettesh
Online security and privacy Netiquettesh
 

More from Vivastream

Vivastream Poster
Vivastream PosterVivastream Poster
Vivastream Poster
Vivastream
 
Vivastream Poster
Vivastream PosterVivastream Poster
Vivastream Poster
Vivastream
 
Breaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Breaking Up is Hard to Do: Small Businesses’ Love Affair with ChecksBreaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Breaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Vivastream
 
EY Smart Commerce Report
EY Smart Commerce ReportEY Smart Commerce Report
EY Smart Commerce Report
Vivastream
 
EY Global Consumer Banking Survey 2014
EY Global Consumer Banking Survey 2014EY Global Consumer Banking Survey 2014
EY Global Consumer Banking Survey 2014
Vivastream
 
EY Global Consumer Banking Survey
EY Global Consumer Banking SurveyEY Global Consumer Banking Survey
EY Global Consumer Banking Survey
Vivastream
 
Automation for RDC and Mobile
Automation for RDC and MobileAutomation for RDC and Mobile
Automation for RDC and Mobile
Vivastream
 
Healthcare Payments Automation Center
Healthcare Payments Automation CenterHealthcare Payments Automation Center
Healthcare Payments Automation Center
Vivastream
 
Next Generation Recognition Solutions
Next Generation Recognition SolutionsNext Generation Recognition Solutions
Next Generation Recognition Solutions
Vivastream
 
Automation Services
Automation ServicesAutomation Services
Automation Services
Vivastream
 
Company Overview
Company OverviewCompany Overview
Company Overview
Vivastream
 

More from Vivastream (20)

Exchange Solutions Datasheet_Ecommerce
Exchange Solutions Datasheet_EcommerceExchange Solutions Datasheet_Ecommerce
Exchange Solutions Datasheet_Ecommerce
 
Exchange Solutions Datasheet_Customer Engagement Roadmap
Exchange Solutions Datasheet_Customer Engagement RoadmapExchange Solutions Datasheet_Customer Engagement Roadmap
Exchange Solutions Datasheet_Customer Engagement Roadmap
 
Test
TestTest
Test
 
Tcap
TcapTcap
Tcap
 
SQA
SQASQA
SQA
 
Jeeva jessf
Jeeva jessfJeeva jessf
Jeeva jessf
 
Vivastream Poster
Vivastream PosterVivastream Poster
Vivastream Poster
 
Vivastream Poster
Vivastream PosterVivastream Poster
Vivastream Poster
 
APEX
APEXAPEX
APEX
 
Breaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Breaking Up is Hard to Do: Small Businesses’ Love Affair with ChecksBreaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Breaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
 
EY Smart Commerce Report
EY Smart Commerce ReportEY Smart Commerce Report
EY Smart Commerce Report
 
EY Global Consumer Banking Survey 2014
EY Global Consumer Banking Survey 2014EY Global Consumer Banking Survey 2014
EY Global Consumer Banking Survey 2014
 
EY Global Consumer Banking Survey
EY Global Consumer Banking SurveyEY Global Consumer Banking Survey
EY Global Consumer Banking Survey
 
Serano
SeranoSerano
Serano
 
Accura XV
Accura XVAccura XV
Accura XV
 
Automation for RDC and Mobile
Automation for RDC and MobileAutomation for RDC and Mobile
Automation for RDC and Mobile
 
Healthcare Payments Automation Center
Healthcare Payments Automation CenterHealthcare Payments Automation Center
Healthcare Payments Automation Center
 
Next Generation Recognition Solutions
Next Generation Recognition SolutionsNext Generation Recognition Solutions
Next Generation Recognition Solutions
 
Automation Services
Automation ServicesAutomation Services
Automation Services
 
Company Overview
Company OverviewCompany Overview
Company Overview
 

Recently uploaded

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Recently uploaded (20)

How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 

Notes Version: Email Marketing Workshop Part 5 Deliverability, Compliance and Trust

  • 1. 9/30/2011 Email Marketing Workshop Part V Deliverability, Compliance & Trust Agenda • Getting To The Inbox • Protecting Your Brand • Email Laws & Regulations 1
  • 2. 9/30/2011 Laurence Rothman Nationwide Senior Consultant, Brand Reputation rothmal@nationwide.com Twitter: @LaurenceRothman Matt Rausenberger Return Path, Inc. Sr. Director, Deliverability Consulting matt.rausenberger@returnpath.net eec Co-Chair Deliverability & Rendering Roundtable PSVillage Co-Chair, Denver Chapter GETTING TO THE INBOX: DELIVERABILITY & REPUTATION 2
  • 3. 9/30/2011 Reputation Poor Reputation & Deliverability = NO INBOX • No Clicks • No Opens • No Purchases • No Conversions • No Brand Building • No Relationships Factors That Affect Deliverability • Subscriber Actions – Complaints – Opens • List Quality – Unknown Users – Spam Traps • Content • Email Infrastructure – Authentication – Sending Permanence • Accreditation 3
  • 4. 9/30/2011 Complaints Positive Subscriber Actions List Maintenance 4
  • 5. 9/30/2011 Unknown Users Bounces • Automated Response from Receiving Network that Email Message Was Not Delivered • Can Happen at any Stage of Message Transfer or Days After • Classified as Hard and Soft Bounces Spam Traps 5
  • 6. 9/30/2011 Give Them a Choice Content Content Rendering 6
  • 8. 9/30/2011 Relevance & Response Rates BUILDING AND PROTECTING YOUR BRAND VIA EMAIL Email Branding 8
  • 9. 9/30/2011 What Makes Subscribers Open? Prominently Display Your Logo Email Fraud • Spoofing – Modifying the sender address and other parts of the email header to appear as if the email originated from some place it did not • Phishing – Fraudulent practice of sending e-mails purporting to be from legitimate companies in order to induce individuals to reveal personal information such as email addresses, SS# and credit cards • Malware – Malicious software meant to steal private data, take control of resources or cause abusive behavior 9
  • 10. 9/30/2011 Brand Reputation & Trust • Company perception in the marketplace • Erosion of brand trust • In a recent Cloudmark survey, 42% of respondents said that their trust in a brand would be greatly reduced if they received a phishing email claiming to be sent by that brand. You Can Stop Phishing! • Authenticate email with SPF and DKIM • Educate your employees about spoofing, phishing and malware • Monitor phishing and malware attacks • Third-party vendors can help with: – Registering your domain to prevent unauthenticated email from being delivered – Monitoring, detecting and taking down phishing sites COMPLIANCE FOR COMMERCIAL EMAIL 10
  • 11. 9/30/2011 United States • CAN-SPAM Act of 2003 • Email Law, not Privacy Law • Opt-out, not Opt-in • Make your privacy statement easy to find and read • Track source and date of subscriber acquisition CAN-SPAM • Covers all commercial email • Clear and conspicuously displayed opt-out mechanism • Valid postal address • Clear notice that the message is commercial • Process unsubscribes within 10 business days • No false headers or subject lines • Accurately represent Forward to a Friend (FTAF) 11
  • 12. 9/30/2011 Canada & CASL • Law takes effect early 2012 • CEM Law, not just Email Law • Affects all companies that send email, SMS, and social network messages into Canada • Must have consent from subscriber unless implied relationship exists (allowed up to 2 years) • Organization will need to review their email policies • Penalties can be as high as $1 million per violation for individuals, and $10 million per violation for organizations Complying with CASL • Establish baseline policy for all digital communications with subscribers • Segment your subscribers based on expressed preferences, observed behaviors, demographics • Use opt-in consent methods for capturing contact information. • Clear unsubscribe information in communications • Use preference centers so that subscribers can choose the timing and frequency with which they receive emails • Obtain explicit consent within 2 year window • Include postal address in all communications • Never rent lists or do email appends European Union • Data Protection Directive • Privacy Law not Email Law • Opt-in, not Opt-out • 7 Principals: – Notice – Purpose – Consent – Security – Disclosure – Access – Accountability 12
  • 13. 9/30/2011 Asia-Pacific Privacy Framework • Forum of 21 Pacific Rim countries • Privacy Principles: – Preventing Harm – Notice – Collection Limitations – Uses of Personal Information – Choice – Integrity of Personal Information – Security Safeguards – Access and Correction – Accountability Rest of World • Existence, detail and enforcement of privacy law in countries around the world vary dramatically Compliance Resources Morrison & Foerster's International Privacy Library www.mofo.com/privacy--data-security-services Email Spam Legislation by Country en.wikipedia.org/wiki/E-mail_spam_legislation_by_country U.S. CAN-SPAM Act of 2003 www.spamlaws.com/federal/108s877.shtml Canada - Marketer’s Guide to Applying CASL www.thindata.com/aboutus/resourcecenter/casl/pdf/The_M arketers_Guide_to_Applying_casl.pdf Email Sender and Provider Coalition (ESPC) www.espcoalition.org 13
  • 14. 9/30/2011 Deliverability Blogs Return Path www.returnpath.net Deliverability.com www.deliverability.com Word to the Wise blog.wordtothewise.com Al Iverson blog.exacttarget.com/blog.php/al-iverson Thank You! 14