Your SlideShare is downloading. ×
Is email harvesting good for your email marketing campaign
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Is email harvesting good for your email marketing campaign


Published on

Email harvesting is the method of getting email addresses without permission.

Email harvesting is the method of getting email addresses without permission.

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. Is Email Harvesting Good For Your Email Marketing Campaign? By:
  • 2. What is email harvesting • Email harvesting is the method of getting email addresses without permission. The most adverse method of harvesting email addresses is through using computer programs that look for public areas of the internet to collect and capture lists of email addresses from websites, newsgroups, chat rooms and somewhere else online.
  • 3. Does it affect your email marketing efforts • Email harvesting is not a good idea. Once your customer’s email id is stolen and if goes in the hands of a spammer, your customer will get inundated with spam and trash instantly.
  • 4. Methods that spammers use 1. One of the common method that is the use of unique software known as harvesting bots, which includes spider web pages, postings on Usenet, mailing list documents, internet debates and other online resources to acquire email addresses from public data.
  • 5. 2. Spammers may also use a kind of dictionary attack in order to yield email addresses, called as a directory harvest attack, where legitimate email addresses at a particular domain are found by speculating email address using common usernames in email ids at that specific domain. Methods that spammers use
  • 6. 3. A different method of email harvesting is to provide customers with a product or service free of charge if the user provides a legitimate email address, and then use the addresses gathered from users as spam targets. Methods that spammers use
  • 7. 4. A new, dubious method is called as e-pending. It includes the addition of email addresses to direct- marketing lists. Direct marketers or promoters usually gather lists of customers from resources such as magazine subscriptions and client lists. Methods that spammers use
  • 8. Is email harvesting legal? • In the USA, the CAN-SPAM Act 2003 banned to send out emails to a receiver where the email address of the recipient was acquired: 1.Using an automatic medium that produces probable email ids by integrating names, letters, or numbers into frequent transformations. 2.Using an automatic medium to abstract email addresses from a website or proprietary online service controlled by another person.
  • 9. Conclusion • At last, disobeying the CAN- SPAM act is not significant. The prerequisites in the CAN-SPAM act are a fully rational approach to marketing. Bottom line is that, marketers or promoters should fix to what works and what they are good at, i.e. creating great opt-in and permission based email lists.
  • 10. Verify email addresses with our free email verifier tool. For more details have a look at