SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
9/30/2011




 Email Marketing Workshop

                 Part V
  Deliverability, Compliance & Trust




              Agenda

• Getting To The Inbox
• Protecting Your Brand
• Email Laws & Regulations




                                              1
9/30/2011




           Laurence Rothman

Nationwide
Senior Consultant, Brand Reputation
rothmal@nationwide.com
Twitter: @LaurenceRothman




           Matt Rausenberger

Return Path, Inc.
Sr. Director, Deliverability Consulting
matt.rausenberger@returnpath.net



eec Co-Chair
Deliverability & Rendering Roundtable

PSVillage Co-Chair, Denver Chapter




GETTING TO THE INBOX:
DELIVERABILITY & REPUTATION




                                                 2
9/30/2011




                  Reputation




 Poor Reputation & Deliverability

= NO INBOX
• No Clicks
• No Opens
• No Purchases
• No Conversions
• No Brand Building
• No Relationships




 Factors That Affect Deliverability
• Subscriber Actions
   – Complaints
   – Opens
• List Quality
   – Unknown Users
   – Spam Traps
• Content
• Email Infrastructure
   – Authentication
   – Sending Permanence
• Accreditation




                                             3
9/30/2011




       Complaints




Positive Subscriber Actions




     List Maintenance




                                     4
9/30/2011




          Unknown Users




              Bounces

• Automated Response from Receiving
  Network that Email Message Was Not
  Delivered
• Can Happen at any Stage of
  Message Transfer or Days After
• Classified as Hard and Soft
  Bounces




            Spam Traps




                                              5
9/30/2011




Give Them a Choice




     Content




Content Rendering




                            6
9/30/2011




Mail Infrastructure




Certify Your Email




 Manage Metrics




                             7
9/30/2011




Relevance & Response Rates




BUILDING AND PROTECTING
YOUR BRAND VIA EMAIL




      Email Branding




                                    8
9/30/2011




What Makes Subscribers Open?




 Prominently Display Your Logo




                Email Fraud
• Spoofing – Modifying the sender
  address and other parts of the email
  header to appear as if the email
  originated from some place it did not
• Phishing – Fraudulent practice of sending e-mails
  purporting to be from legitimate companies in order
  to induce individuals to reveal personal information
  such as email addresses, SS# and credit cards
• Malware – Malicious software meant to steal private
  data, take control of resources or cause abusive
  behavior




                                                                9
9/30/2011




       Brand Reputation & Trust
                   • Company perception in the
                     marketplace
                   • Erosion of brand trust
                   • In a recent Cloudmark survey,
                     42% of respondents said that
                     their trust in a brand would be
                     greatly reduced if they received
                     a phishing email claiming to be
                     sent by that brand.




      You Can Stop Phishing!
• Authenticate email with SPF and DKIM
• Educate your employees about spoofing,
  phishing and malware
• Monitor phishing and malware attacks
• Third-party vendors can help with:
  – Registering your domain to prevent unauthenticated
    email from being delivered
  – Monitoring, detecting and taking down phishing sites




 COMPLIANCE FOR
 COMMERCIAL EMAIL




                                                                 10
9/30/2011




              United States
• CAN-SPAM Act of 2003
• Email Law, not Privacy Law
• Opt-out, not Opt-in
• Make your privacy statement easy to find
  and read
• Track source and date of subscriber
  acquisition




               CAN-SPAM
• Covers all commercial email
• Clear and conspicuously displayed opt-out
  mechanism
• Valid postal address
• Clear notice that the message is commercial
• Process unsubscribes within 10 business days
• No false headers or subject lines
• Accurately represent Forward to a Friend (FTAF)




                                                          11
9/30/2011




                 Canada & CASL
• Law takes effect early 2012
• CEM Law, not just Email Law
• Affects all companies that send email, SMS, and
  social network messages into Canada
• Must have consent from subscriber unless implied
  relationship exists (allowed up to 2 years)
• Organization will need to review their email
  policies
• Penalties can be as high as $1 million per violation
  for individuals, and $10 million per violation for
  organizations




            Complying with CASL
• Establish baseline policy for all digital
  communications with subscribers
• Segment your subscribers based on expressed
  preferences, observed behaviors, demographics
• Use opt-in consent methods for capturing contact
  information.
• Clear unsubscribe information in communications
• Use preference centers so that subscribers can choose
  the timing and frequency with which they receive emails
• Obtain explicit consent within 2 year window
• Include postal address in all communications
• Never rent lists or do email appends




                 European Union
•   Data Protection Directive
•   Privacy Law not Email Law
•   Opt-in, not Opt-out
•   7 Principals:
    –   Notice
    –   Purpose
    –   Consent
    –   Security
    –   Disclosure
    –   Access
    –   Accountability




                                                                  12
9/30/2011




Asia-Pacific Privacy Framework
• Forum of 21 Pacific Rim countries
• Privacy Principles:
   –   Preventing Harm
   –   Notice
   –   Collection Limitations
   –   Uses of Personal Information
   –   Choice
   –   Integrity of Personal Information
   –   Security Safeguards
   –   Access and Correction
   –   Accountability




                   Rest of World

• Existence, detail and enforcement of
  privacy law in countries around the world
  vary dramatically




         Compliance Resources
Morrison & Foerster's International Privacy Library
www.mofo.com/privacy--data-security-services
Email Spam Legislation by Country
en.wikipedia.org/wiki/E-mail_spam_legislation_by_country
U.S. CAN-SPAM Act of 2003
www.spamlaws.com/federal/108s877.shtml
Canada - Marketer’s Guide to Applying CASL
www.thindata.com/aboutus/resourcecenter/casl/pdf/The_M
arketers_Guide_to_Applying_casl.pdf
Email Sender and Provider Coalition (ESPC)
www.espcoalition.org




                                                                 13
9/30/2011




          Deliverability Blogs

Return Path
www.returnpath.net
Deliverability.com
www.deliverability.com
Word to the Wise
blog.wordtothewise.com
Al Iverson
blog.exacttarget.com/blog.php/al-iverson




      Thank You!




                                                 14

Contenu connexe

En vedette

Notes Version: Social Media as Focus Group Tapping Into a Vast Resource, Priv...
Notes Version: Social Media as Focus Group Tapping Into a Vast Resource, Priv...Notes Version: Social Media as Focus Group Tapping Into a Vast Resource, Priv...
Notes Version: Social Media as Focus Group Tapping Into a Vast Resource, Priv...Vivastream
 
Notes Version: DMA's Do the Right Thing Best Practices Digital Guidepost
 Notes Version: DMA's Do the Right Thing Best Practices Digital Guidepost Notes Version: DMA's Do the Right Thing Best Practices Digital Guidepost
Notes Version: DMA's Do the Right Thing Best Practices Digital GuidepostVivastream
 
Notes Version :10 Things Marketers Can Do To Take Advantage Of Social Media
Notes Version :10 Things Marketers Can Do To Take Advantage Of Social MediaNotes Version :10 Things Marketers Can Do To Take Advantage Of Social Media
Notes Version :10 Things Marketers Can Do To Take Advantage Of Social MediaVivastream
 
Email Direct Marketing Techniques
Email Direct Marketing TechniquesEmail Direct Marketing Techniques
Email Direct Marketing TechniquesVivastream
 
Notes Version: Celtics 3-Point Play - Gleaning Data from Facebook Engagement
Notes Version: Celtics 3-Point Play - Gleaning Data from Facebook EngagementNotes Version: Celtics 3-Point Play - Gleaning Data from Facebook Engagement
Notes Version: Celtics 3-Point Play - Gleaning Data from Facebook EngagementVivastream
 
Shift Your Game Mobile, Social, Gaming!
Shift Your Game Mobile, Social, Gaming!Shift Your Game Mobile, Social, Gaming!
Shift Your Game Mobile, Social, Gaming!Vivastream
 
Notes Version: Sustainability Elements of a Responsible Request for Proposal
Notes Version: Sustainability Elements of a Responsible Request for ProposalNotes Version: Sustainability Elements of a Responsible Request for Proposal
Notes Version: Sustainability Elements of a Responsible Request for ProposalVivastream
 
Notes Version: Part 1. The Next Extraordinary Marketing Opportunity- Healthca...
Notes Version: Part 1. The Next Extraordinary Marketing Opportunity- Healthca...Notes Version: Part 1. The Next Extraordinary Marketing Opportunity- Healthca...
Notes Version: Part 1. The Next Extraordinary Marketing Opportunity- Healthca...Vivastream
 
Notes Version: How Anyone Can Be More Creative in 3 Easy Steps
Notes Version: How Anyone Can Be More Creative in 3 Easy StepsNotes Version: How Anyone Can Be More Creative in 3 Easy Steps
Notes Version: How Anyone Can Be More Creative in 3 Easy StepsVivastream
 
The New Face of Online Advertising: OBA & Compliance
The New Face of Online Advertising: OBA & ComplianceThe New Face of Online Advertising: OBA & Compliance
The New Face of Online Advertising: OBA & ComplianceVivastream
 
Notes Version: 10 things marketers can do to take advantage of social media
Notes Version: 10 things marketers can do to take advantage of social mediaNotes Version: 10 things marketers can do to take advantage of social media
Notes Version: 10 things marketers can do to take advantage of social mediaVivastream
 
Free social media resources
Free social media resourcesFree social media resources
Free social media resourcesVivastream
 
Multichannel Retention Strategies: A Steady Diet of Low Hanging Fruit
Multichannel Retention Strategies: A Steady Diet of Low Hanging FruitMultichannel Retention Strategies: A Steady Diet of Low Hanging Fruit
Multichannel Retention Strategies: A Steady Diet of Low Hanging FruitVivastream
 
Broadcast and Triggered Emails: A Match Made in Heaven
Broadcast and Triggered Emails: A Match Made in HeavenBroadcast and Triggered Emails: A Match Made in Heaven
Broadcast and Triggered Emails: A Match Made in HeavenVivastream
 
March 2012 SES Magazine: SES New York Preview
March 2012 SES Magazine: SES New York PreviewMarch 2012 SES Magazine: SES New York Preview
March 2012 SES Magazine: SES New York PreviewVivastream
 
Prospect Segmentation for Performance
Prospect Segmentation for PerformanceProspect Segmentation for Performance
Prospect Segmentation for PerformanceVivastream
 
Notes Version: Which Medium Works Multichannel Testing For High-Performance R...
Notes Version: Which Medium Works Multichannel Testing For High-Performance R...Notes Version: Which Medium Works Multichannel Testing For High-Performance R...
Notes Version: Which Medium Works Multichannel Testing For High-Performance R...Vivastream
 

En vedette (17)

Notes Version: Social Media as Focus Group Tapping Into a Vast Resource, Priv...
Notes Version: Social Media as Focus Group Tapping Into a Vast Resource, Priv...Notes Version: Social Media as Focus Group Tapping Into a Vast Resource, Priv...
Notes Version: Social Media as Focus Group Tapping Into a Vast Resource, Priv...
 
Notes Version: DMA's Do the Right Thing Best Practices Digital Guidepost
 Notes Version: DMA's Do the Right Thing Best Practices Digital Guidepost Notes Version: DMA's Do the Right Thing Best Practices Digital Guidepost
Notes Version: DMA's Do the Right Thing Best Practices Digital Guidepost
 
Notes Version :10 Things Marketers Can Do To Take Advantage Of Social Media
Notes Version :10 Things Marketers Can Do To Take Advantage Of Social MediaNotes Version :10 Things Marketers Can Do To Take Advantage Of Social Media
Notes Version :10 Things Marketers Can Do To Take Advantage Of Social Media
 
Email Direct Marketing Techniques
Email Direct Marketing TechniquesEmail Direct Marketing Techniques
Email Direct Marketing Techniques
 
Notes Version: Celtics 3-Point Play - Gleaning Data from Facebook Engagement
Notes Version: Celtics 3-Point Play - Gleaning Data from Facebook EngagementNotes Version: Celtics 3-Point Play - Gleaning Data from Facebook Engagement
Notes Version: Celtics 3-Point Play - Gleaning Data from Facebook Engagement
 
Shift Your Game Mobile, Social, Gaming!
Shift Your Game Mobile, Social, Gaming!Shift Your Game Mobile, Social, Gaming!
Shift Your Game Mobile, Social, Gaming!
 
Notes Version: Sustainability Elements of a Responsible Request for Proposal
Notes Version: Sustainability Elements of a Responsible Request for ProposalNotes Version: Sustainability Elements of a Responsible Request for Proposal
Notes Version: Sustainability Elements of a Responsible Request for Proposal
 
Notes Version: Part 1. The Next Extraordinary Marketing Opportunity- Healthca...
Notes Version: Part 1. The Next Extraordinary Marketing Opportunity- Healthca...Notes Version: Part 1. The Next Extraordinary Marketing Opportunity- Healthca...
Notes Version: Part 1. The Next Extraordinary Marketing Opportunity- Healthca...
 
Notes Version: How Anyone Can Be More Creative in 3 Easy Steps
Notes Version: How Anyone Can Be More Creative in 3 Easy StepsNotes Version: How Anyone Can Be More Creative in 3 Easy Steps
Notes Version: How Anyone Can Be More Creative in 3 Easy Steps
 
The New Face of Online Advertising: OBA & Compliance
The New Face of Online Advertising: OBA & ComplianceThe New Face of Online Advertising: OBA & Compliance
The New Face of Online Advertising: OBA & Compliance
 
Notes Version: 10 things marketers can do to take advantage of social media
Notes Version: 10 things marketers can do to take advantage of social mediaNotes Version: 10 things marketers can do to take advantage of social media
Notes Version: 10 things marketers can do to take advantage of social media
 
Free social media resources
Free social media resourcesFree social media resources
Free social media resources
 
Multichannel Retention Strategies: A Steady Diet of Low Hanging Fruit
Multichannel Retention Strategies: A Steady Diet of Low Hanging FruitMultichannel Retention Strategies: A Steady Diet of Low Hanging Fruit
Multichannel Retention Strategies: A Steady Diet of Low Hanging Fruit
 
Broadcast and Triggered Emails: A Match Made in Heaven
Broadcast and Triggered Emails: A Match Made in HeavenBroadcast and Triggered Emails: A Match Made in Heaven
Broadcast and Triggered Emails: A Match Made in Heaven
 
March 2012 SES Magazine: SES New York Preview
March 2012 SES Magazine: SES New York PreviewMarch 2012 SES Magazine: SES New York Preview
March 2012 SES Magazine: SES New York Preview
 
Prospect Segmentation for Performance
Prospect Segmentation for PerformanceProspect Segmentation for Performance
Prospect Segmentation for Performance
 
Notes Version: Which Medium Works Multichannel Testing For High-Performance R...
Notes Version: Which Medium Works Multichannel Testing For High-Performance R...Notes Version: Which Medium Works Multichannel Testing For High-Performance R...
Notes Version: Which Medium Works Multichannel Testing For High-Performance R...
 

Similaire à Email Marketing Workshop Deliverability Compliance Trust

Eloqua Grande Guide to Deliverability and Privacy
Eloqua Grande Guide to Deliverability and PrivacyEloqua Grande Guide to Deliverability and Privacy
Eloqua Grande Guide to Deliverability and PrivacyJoe Chernov
 
Permission Based Email Marketing
Permission Based Email MarketingPermission Based Email Marketing
Permission Based Email MarketingBlue Sky Factory
 
Email Marketing Workshop Part 5: Deliverability, Compliance and Trust
Email Marketing Workshop Part 5: Deliverability, Compliance and TrustEmail Marketing Workshop Part 5: Deliverability, Compliance and Trust
Email Marketing Workshop Part 5: Deliverability, Compliance and TrustVivastream
 
Privacy and Big Data Overload!
Privacy and Big Data Overload!Privacy and Big Data Overload!
Privacy and Big Data Overload!SparkPost
 
Eis thu 0815 sponsored breakfast strong mail
Eis thu 0815 sponsored breakfast strong mailEis thu 0815 sponsored breakfast strong mail
Eis thu 0815 sponsored breakfast strong mailMediaPost
 
Pathway to Email Marketing: Best Practices and How-To
Pathway to Email Marketing: Best Practices and How-ToPathway to Email Marketing: Best Practices and How-To
Pathway to Email Marketing: Best Practices and How-ToMarketo
 
Deliverability and The Realities of Today’s Market
Deliverability and The Realities of Today’s MarketDeliverability and The Realities of Today’s Market
Deliverability and The Realities of Today’s MarketAct-On Software
 
Deliverability and The Realities and Demands of Today's Market
Deliverability and The Realities and Demands of Today's MarketDeliverability and The Realities and Demands of Today's Market
Deliverability and The Realities and Demands of Today's MarketAct-On Software
 
Email Marketing Best Practices
Email Marketing Best PracticesEmail Marketing Best Practices
Email Marketing Best PracticesBill Powell
 
Bill C-28: What is it and what does it mean for marketers?
Bill C-28: What is it and what does it mean for marketers?Bill C-28: What is it and what does it mean for marketers?
Bill C-28: What is it and what does it mean for marketers?TC Media
 
Email privacy seal_data_sheet
Email privacy seal_data_sheetEmail privacy seal_data_sheet
Email privacy seal_data_sheetJason Macias
 
The Digital Privacy Equation
The Digital Privacy EquationThe Digital Privacy Equation
The Digital Privacy EquationTC Media
 
Deliverability for Daily Deals Industry
Deliverability for Daily Deals IndustryDeliverability for Daily Deals Industry
Deliverability for Daily Deals IndustryAndrew Bonar
 
Messaging:Protecting your Data and your Reputation
Messaging:Protecting your Data and your ReputationMessaging:Protecting your Data and your Reputation
Messaging:Protecting your Data and your ReputationWaterstons Ltd
 
How to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer CareHow to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer CareTRUSTe
 
How to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer CareHow to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer CareTRUSTe
 
Marqui's Top 10 Email Marketing Mistakes and How to Avoid Them
Marqui's Top 10 Email Marketing Mistakes and How to Avoid Them Marqui's Top 10 Email Marketing Mistakes and How to Avoid Them
Marqui's Top 10 Email Marketing Mistakes and How to Avoid Them Marqui CMS
 
Online security and privacy Netiquettesh
Online security and privacy NetiquetteshOnline security and privacy Netiquettesh
Online security and privacy Netiquetteshanmol326996
 

Similaire à Email Marketing Workshop Deliverability Compliance Trust (20)

Eloqua Grande Guide to Deliverability and Privacy
Eloqua Grande Guide to Deliverability and PrivacyEloqua Grande Guide to Deliverability and Privacy
Eloqua Grande Guide to Deliverability and Privacy
 
Permission Based Email Marketing
Permission Based Email MarketingPermission Based Email Marketing
Permission Based Email Marketing
 
Email Marketing Workshop Part 5: Deliverability, Compliance and Trust
Email Marketing Workshop Part 5: Deliverability, Compliance and TrustEmail Marketing Workshop Part 5: Deliverability, Compliance and Trust
Email Marketing Workshop Part 5: Deliverability, Compliance and Trust
 
Privacy and Big Data Overload!
Privacy and Big Data Overload!Privacy and Big Data Overload!
Privacy and Big Data Overload!
 
Eis thu 0815 sponsored breakfast strong mail
Eis thu 0815 sponsored breakfast strong mailEis thu 0815 sponsored breakfast strong mail
Eis thu 0815 sponsored breakfast strong mail
 
Pathway to Email Marketing: Best Practices and How-To
Pathway to Email Marketing: Best Practices and How-ToPathway to Email Marketing: Best Practices and How-To
Pathway to Email Marketing: Best Practices and How-To
 
Deliverability and The Realities of Today’s Market
Deliverability and The Realities of Today’s MarketDeliverability and The Realities of Today’s Market
Deliverability and The Realities of Today’s Market
 
Deliverability and The Realities and Demands of Today's Market
Deliverability and The Realities and Demands of Today's MarketDeliverability and The Realities and Demands of Today's Market
Deliverability and The Realities and Demands of Today's Market
 
Email Marketing Best Practices
Email Marketing Best PracticesEmail Marketing Best Practices
Email Marketing Best Practices
 
L42 slides
L42 slidesL42 slides
L42 slides
 
Bill C-28: What is it and what does it mean for marketers?
Bill C-28: What is it and what does it mean for marketers?Bill C-28: What is it and what does it mean for marketers?
Bill C-28: What is it and what does it mean for marketers?
 
Email privacy seal_data_sheet
Email privacy seal_data_sheetEmail privacy seal_data_sheet
Email privacy seal_data_sheet
 
The Digital Privacy Equation
The Digital Privacy EquationThe Digital Privacy Equation
The Digital Privacy Equation
 
Email marketing today
Email marketing todayEmail marketing today
Email marketing today
 
Deliverability for Daily Deals Industry
Deliverability for Daily Deals IndustryDeliverability for Daily Deals Industry
Deliverability for Daily Deals Industry
 
Messaging:Protecting your Data and your Reputation
Messaging:Protecting your Data and your ReputationMessaging:Protecting your Data and your Reputation
Messaging:Protecting your Data and your Reputation
 
How to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer CareHow to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer Care
 
How to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer CareHow to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer Care
 
Marqui's Top 10 Email Marketing Mistakes and How to Avoid Them
Marqui's Top 10 Email Marketing Mistakes and How to Avoid Them Marqui's Top 10 Email Marketing Mistakes and How to Avoid Them
Marqui's Top 10 Email Marketing Mistakes and How to Avoid Them
 
Online security and privacy Netiquettesh
Online security and privacy NetiquetteshOnline security and privacy Netiquettesh
Online security and privacy Netiquettesh
 

Plus de Vivastream

Exchange Solutions Datasheet_Ecommerce
Exchange Solutions Datasheet_EcommerceExchange Solutions Datasheet_Ecommerce
Exchange Solutions Datasheet_EcommerceVivastream
 
Exchange Solutions Datasheet_Customer Engagement Roadmap
Exchange Solutions Datasheet_Customer Engagement RoadmapExchange Solutions Datasheet_Customer Engagement Roadmap
Exchange Solutions Datasheet_Customer Engagement RoadmapVivastream
 
Vivastream Poster
Vivastream PosterVivastream Poster
Vivastream PosterVivastream
 
Vivastream Poster
Vivastream PosterVivastream Poster
Vivastream PosterVivastream
 
Breaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Breaking Up is Hard to Do: Small Businesses’ Love Affair with ChecksBreaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Breaking Up is Hard to Do: Small Businesses’ Love Affair with ChecksVivastream
 
EY Smart Commerce Report
EY Smart Commerce ReportEY Smart Commerce Report
EY Smart Commerce ReportVivastream
 
EY Global Consumer Banking Survey 2014
EY Global Consumer Banking Survey 2014EY Global Consumer Banking Survey 2014
EY Global Consumer Banking Survey 2014Vivastream
 
EY Global Consumer Banking Survey
EY Global Consumer Banking SurveyEY Global Consumer Banking Survey
EY Global Consumer Banking SurveyVivastream
 
Automation for RDC and Mobile
Automation for RDC and MobileAutomation for RDC and Mobile
Automation for RDC and MobileVivastream
 
Healthcare Payments Automation Center
Healthcare Payments Automation CenterHealthcare Payments Automation Center
Healthcare Payments Automation CenterVivastream
 
Next Generation Recognition Solutions
Next Generation Recognition SolutionsNext Generation Recognition Solutions
Next Generation Recognition SolutionsVivastream
 
Automation Services
Automation ServicesAutomation Services
Automation ServicesVivastream
 
Company Overview
Company OverviewCompany Overview
Company OverviewVivastream
 

Plus de Vivastream (20)

Exchange Solutions Datasheet_Ecommerce
Exchange Solutions Datasheet_EcommerceExchange Solutions Datasheet_Ecommerce
Exchange Solutions Datasheet_Ecommerce
 
Exchange Solutions Datasheet_Customer Engagement Roadmap
Exchange Solutions Datasheet_Customer Engagement RoadmapExchange Solutions Datasheet_Customer Engagement Roadmap
Exchange Solutions Datasheet_Customer Engagement Roadmap
 
Test
TestTest
Test
 
Tcap
TcapTcap
Tcap
 
SQA
SQASQA
SQA
 
Jeeva jessf
Jeeva jessfJeeva jessf
Jeeva jessf
 
Vivastream Poster
Vivastream PosterVivastream Poster
Vivastream Poster
 
Vivastream Poster
Vivastream PosterVivastream Poster
Vivastream Poster
 
APEX
APEXAPEX
APEX
 
Breaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Breaking Up is Hard to Do: Small Businesses’ Love Affair with ChecksBreaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Breaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
 
EY Smart Commerce Report
EY Smart Commerce ReportEY Smart Commerce Report
EY Smart Commerce Report
 
EY Global Consumer Banking Survey 2014
EY Global Consumer Banking Survey 2014EY Global Consumer Banking Survey 2014
EY Global Consumer Banking Survey 2014
 
EY Global Consumer Banking Survey
EY Global Consumer Banking SurveyEY Global Consumer Banking Survey
EY Global Consumer Banking Survey
 
Serano
SeranoSerano
Serano
 
Accura XV
Accura XVAccura XV
Accura XV
 
Automation for RDC and Mobile
Automation for RDC and MobileAutomation for RDC and Mobile
Automation for RDC and Mobile
 
Healthcare Payments Automation Center
Healthcare Payments Automation CenterHealthcare Payments Automation Center
Healthcare Payments Automation Center
 
Next Generation Recognition Solutions
Next Generation Recognition SolutionsNext Generation Recognition Solutions
Next Generation Recognition Solutions
 
Automation Services
Automation ServicesAutomation Services
Automation Services
 
Company Overview
Company OverviewCompany Overview
Company Overview
 

Dernier

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Dernier (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

Email Marketing Workshop Deliverability Compliance Trust

  • 1. 9/30/2011 Email Marketing Workshop Part V Deliverability, Compliance & Trust Agenda • Getting To The Inbox • Protecting Your Brand • Email Laws & Regulations 1
  • 2. 9/30/2011 Laurence Rothman Nationwide Senior Consultant, Brand Reputation rothmal@nationwide.com Twitter: @LaurenceRothman Matt Rausenberger Return Path, Inc. Sr. Director, Deliverability Consulting matt.rausenberger@returnpath.net eec Co-Chair Deliverability & Rendering Roundtable PSVillage Co-Chair, Denver Chapter GETTING TO THE INBOX: DELIVERABILITY & REPUTATION 2
  • 3. 9/30/2011 Reputation Poor Reputation & Deliverability = NO INBOX • No Clicks • No Opens • No Purchases • No Conversions • No Brand Building • No Relationships Factors That Affect Deliverability • Subscriber Actions – Complaints – Opens • List Quality – Unknown Users – Spam Traps • Content • Email Infrastructure – Authentication – Sending Permanence • Accreditation 3
  • 4. 9/30/2011 Complaints Positive Subscriber Actions List Maintenance 4
  • 5. 9/30/2011 Unknown Users Bounces • Automated Response from Receiving Network that Email Message Was Not Delivered • Can Happen at any Stage of Message Transfer or Days After • Classified as Hard and Soft Bounces Spam Traps 5
  • 6. 9/30/2011 Give Them a Choice Content Content Rendering 6
  • 8. 9/30/2011 Relevance & Response Rates BUILDING AND PROTECTING YOUR BRAND VIA EMAIL Email Branding 8
  • 9. 9/30/2011 What Makes Subscribers Open? Prominently Display Your Logo Email Fraud • Spoofing – Modifying the sender address and other parts of the email header to appear as if the email originated from some place it did not • Phishing – Fraudulent practice of sending e-mails purporting to be from legitimate companies in order to induce individuals to reveal personal information such as email addresses, SS# and credit cards • Malware – Malicious software meant to steal private data, take control of resources or cause abusive behavior 9
  • 10. 9/30/2011 Brand Reputation & Trust • Company perception in the marketplace • Erosion of brand trust • In a recent Cloudmark survey, 42% of respondents said that their trust in a brand would be greatly reduced if they received a phishing email claiming to be sent by that brand. You Can Stop Phishing! • Authenticate email with SPF and DKIM • Educate your employees about spoofing, phishing and malware • Monitor phishing and malware attacks • Third-party vendors can help with: – Registering your domain to prevent unauthenticated email from being delivered – Monitoring, detecting and taking down phishing sites COMPLIANCE FOR COMMERCIAL EMAIL 10
  • 11. 9/30/2011 United States • CAN-SPAM Act of 2003 • Email Law, not Privacy Law • Opt-out, not Opt-in • Make your privacy statement easy to find and read • Track source and date of subscriber acquisition CAN-SPAM • Covers all commercial email • Clear and conspicuously displayed opt-out mechanism • Valid postal address • Clear notice that the message is commercial • Process unsubscribes within 10 business days • No false headers or subject lines • Accurately represent Forward to a Friend (FTAF) 11
  • 12. 9/30/2011 Canada & CASL • Law takes effect early 2012 • CEM Law, not just Email Law • Affects all companies that send email, SMS, and social network messages into Canada • Must have consent from subscriber unless implied relationship exists (allowed up to 2 years) • Organization will need to review their email policies • Penalties can be as high as $1 million per violation for individuals, and $10 million per violation for organizations Complying with CASL • Establish baseline policy for all digital communications with subscribers • Segment your subscribers based on expressed preferences, observed behaviors, demographics • Use opt-in consent methods for capturing contact information. • Clear unsubscribe information in communications • Use preference centers so that subscribers can choose the timing and frequency with which they receive emails • Obtain explicit consent within 2 year window • Include postal address in all communications • Never rent lists or do email appends European Union • Data Protection Directive • Privacy Law not Email Law • Opt-in, not Opt-out • 7 Principals: – Notice – Purpose – Consent – Security – Disclosure – Access – Accountability 12
  • 13. 9/30/2011 Asia-Pacific Privacy Framework • Forum of 21 Pacific Rim countries • Privacy Principles: – Preventing Harm – Notice – Collection Limitations – Uses of Personal Information – Choice – Integrity of Personal Information – Security Safeguards – Access and Correction – Accountability Rest of World • Existence, detail and enforcement of privacy law in countries around the world vary dramatically Compliance Resources Morrison & Foerster's International Privacy Library www.mofo.com/privacy--data-security-services Email Spam Legislation by Country en.wikipedia.org/wiki/E-mail_spam_legislation_by_country U.S. CAN-SPAM Act of 2003 www.spamlaws.com/federal/108s877.shtml Canada - Marketer’s Guide to Applying CASL www.thindata.com/aboutus/resourcecenter/casl/pdf/The_M arketers_Guide_to_Applying_casl.pdf Email Sender and Provider Coalition (ESPC) www.espcoalition.org 13
  • 14. 9/30/2011 Deliverability Blogs Return Path www.returnpath.net Deliverability.com www.deliverability.com Word to the Wise blog.wordtothewise.com Al Iverson blog.exacttarget.com/blog.php/al-iverson Thank You! 14