21.07.2013 Views

Essential Guide to E-mail Marketing - Haymarket

Essential Guide to E-mail Marketing - Haymarket

Essential Guide to E-mail Marketing - Haymarket

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

30 INFRASTRUCTURE DM News • E-Mail <strong>Marketing</strong> <strong>Guide</strong> 2007<br />

Keep your e-<strong>mail</strong> safe from<br />

legal challenges<br />

BY ZAFAR KHAN<br />

If your company does business transactions via e-<strong>mail</strong>, you’ll<br />

need <strong>to</strong> be sure that business-critical messages are treated, well,<br />

critically. While most e-<strong>mail</strong> users are not concerned about the<br />

electronic record they have created, it can serve as a critically<br />

important defense for business transitions, if properly managed.<br />

Businesses must consider anti-spam laws, e-discovery rulings,<br />

s<strong>to</strong>rage and retention of e-<strong>mail</strong>s. Proof of e-<strong>mail</strong>s for business<br />

transactions are a must have, and companies are investing billions<br />

of dollars <strong>to</strong> protect themselves. Analysts at the Radicati Group<br />

estimate that the e-<strong>mail</strong> archiving market will hit $6 billion in<br />

2010.<br />

The good news is e-<strong>mail</strong> technology is catching up with the<br />

evolving regula<strong>to</strong>ry and business landscape. A case in point is<br />

Great Lakes List Management, an Erie, PA-based provider of data<br />

for direct marketers, and an RPost client. Because Great Lakes’<br />

business model involves multiple companies — including direct<br />

cus<strong>to</strong>mers and list brokers — it experiences a sizeable time lag<br />

between delivering services and getting paid for them. By sending<br />

business files with a registered e-<strong>mail</strong> service, Great Lakes receives<br />

a detailed electronic audit trail that proves precisely what e-<strong>mail</strong><br />

content and attachments were sent and received, by whom and<br />

when. Armed with this information, the company can ensure it<br />

gets paid for services rendered without hassle, and has the necessary<br />

backup <strong>to</strong> demonstrate compliance with regulated/required<br />

disclosures, such as privacy notices.<br />

For companies that operate their business using e-<strong>mail</strong>, legal protection<br />

is even more critical.<br />

Provisions of electronic law and<br />

recent court decisions underscore<br />

the fact that electronic business<br />

systems require proper transaction<br />

documentation, and a reliable<br />

recordkeeping management<br />

system.<br />

Here are a few ways you can<br />

ensure your business is safe from<br />

legal challenges:<br />

■ Send business-critical e-<strong>mail</strong>s<br />

Zafar Khan<br />

with legal proof of delivery and<br />

RPost<br />

content.<br />

■ Archive your e-<strong>mail</strong>s in a solution that’s easy <strong>to</strong> retrieve.<br />

■ Prevent e-<strong>mail</strong> manipulation on the receiving end with encryption<br />

<strong>to</strong>ols.<br />

■ Don’t save every single e-<strong>mail</strong>, just the business-critical ones.<br />

Many e-<strong>mail</strong> service providers aim <strong>to</strong> ensure deliverability and<br />

legally protect their e-<strong>mail</strong> users with value-added services, such as<br />

proof of delivery and content with registered e-<strong>mail</strong>, e-contracting<br />

<strong>to</strong>ols, encryption, meta data cleaning and e-<strong>mail</strong> archiving capabilities.<br />

Take advantage of the technology that is out there <strong>to</strong> cost<br />

effectively and proactively protect yourself.<br />

Zafar Khan is CEO and founder of RPost. You can reach him at<br />

zkhan@rpost.com.<br />

ESSENTIAL GUIDE<br />

Questions and answers<br />

about sending reputation<br />

BY GEORGE BILBREY<br />

Astudy by Return Path indicates that more than 80 percent of<br />

delivery problems are caused by reputation. But there is still<br />

confusion as <strong>to</strong> what reputation is, where the data comes from and<br />

how <strong>to</strong> manage your reputation for better deliverability. Below are<br />

three common questions that<br />

marketers ask about reputation.<br />

1. What is a sender reputation<br />

and how do ISPs and other e-<strong>mail</strong><br />

receivers moni<strong>to</strong>r it? Your sending<br />

reputation is made up of a<br />

variety of fac<strong>to</strong>rs, primarily complaint<br />

rates, unknown user rates,<br />

spam trap hits, infrastructure<br />

issues and sending stability.<br />

Spammers tend <strong>to</strong> do badly on<br />

these measures. Your job is <strong>to</strong> not<br />

George Bilbrey<br />

look like a spammer by perform-<br />

Return Path’s Sender Score<br />

ing well on these measures. Every<br />

major receiver has a slightly different way of determining and<br />

measuring reputation. They begin with their own data — what they<br />

see on their network. Some ISPs also use proprietary reputation<br />

data aggrega<strong>to</strong>rs <strong>to</strong> see how a sender behaves with other receivers.<br />

2. How can I manage my e-<strong>mail</strong> reputation <strong>to</strong> ensure high deliverability?<br />

It really comes down <strong>to</strong> the <strong>to</strong>p five fac<strong>to</strong>rs that are<br />

most likely <strong>to</strong> get you blocked. These are:<br />

■ Complaint rate: Isolating why your subscribers complain about<br />

you is crucial <strong>to</strong> bringing this number down. We find the following<br />

fac<strong>to</strong>rs <strong>to</strong> be the most common: Weak or no permission; content<br />

that isn’t valuable or relevant; <strong>to</strong>o high or low frequency; and<br />

subscribers’ inability <strong>to</strong> recognize the e-<strong>mail</strong>.<br />

■ Unknown user rate: If you have a high unknown user rate you<br />

need <strong>to</strong> review your bounce processing rules and make sure you<br />

are removing “unknown user” hard bounces after two attempts.<br />

■ Spam trap hits: You can see if you are hitting some spam traps<br />

through Microsoft’s Smart Network Data Services. Unfortunately,<br />

while this and other publicly available <strong>to</strong>ols can tell you if you have<br />

spam traps, there isn’t any way <strong>to</strong> identify which e-<strong>mail</strong> addresses<br />

they are. Instead, you need <strong>to</strong> isolate the parts of your list most<br />

likely <strong>to</strong> harbor spam traps and suppress those parts of the list.<br />

■ Infrastructure: There are specific ways that ISPs like <strong>to</strong> see a<br />

<strong>mail</strong>ing system set up in order <strong>to</strong> have some confidence that the<br />

e-<strong>mail</strong> is legitimate. If you use a reputable e-<strong>mail</strong> service provider,<br />

you shouldn’t have infrastructure issues. If you are sending your<br />

own messages, you should consider reaching out <strong>to</strong> a deliverability<br />

expert.<br />

■ Sending stability: Once you have established a good reputation<br />

for an IP address, don’t move <strong>to</strong> a new server.<br />

3. How can I determine my reputation? There are a number of<br />

public sources of reputation data. These include Microsoft’s<br />

SNDS, DNSStuff, CipherTrust’s TrustedSource, Ironport’s<br />

Senderbase, and Return Path’s Sender Score.<br />

George Bilbrey is vice president and general manager of Return Path’s Sender<br />

Score. You can reach him at george.bilbrey@returnpath.net.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!