SlideShare a Scribd company logo
1 of 14
Download to read offline
9/30/2011




 Email Marketing Workshop

                 Part V
  Deliverability, Compliance & Trust




              Agenda

• Getting To The Inbox
• Protecting Your Brand
• Email Laws & Regulations




                                              1
9/30/2011




           Laurence Rothman

Nationwide
Senior Consultant, Brand Reputation
rothmal@nationwide.com
Twitter: @LaurenceRothman




           Matt Rausenberger

Return Path, Inc.
Sr. Director, Deliverability Consulting
matt.rausenberger@returnpath.net



eec Co-Chair
Deliverability & Rendering Roundtable

PSVillage Co-Chair, Denver Chapter




GETTING TO THE INBOX:
DELIVERABILITY & REPUTATION




                                                 2
9/30/2011




                  Reputation




 Poor Reputation & Deliverability

= NO INBOX
• No Clicks
• No Opens
• No Purchases
• No Conversions
• No Brand Building
• No Relationships




 Factors That Affect Deliverability
• Subscriber Actions
   – Complaints
   – Opens
• List Quality
   – Unknown Users
   – Spam Traps
• Content
• Email Infrastructure
   – Authentication
   – Sending Permanence
• Accreditation




                                             3
9/30/2011




       Complaints




Positive Subscriber Actions




     List Maintenance




                                     4
9/30/2011




          Unknown Users




              Bounces

• Automated Response from Receiving
  Network that Email Message Was Not
  Delivered
• Can Happen at any Stage of
  Message Transfer or Days After
• Classified as Hard and Soft
  Bounces




            Spam Traps




                                              5
9/30/2011




Give Them a Choice




     Content




Content Rendering




                            6
9/30/2011




Mail Infrastructure




Certify Your Email




 Manage Metrics




                             7
9/30/2011




Relevance & Response Rates




BUILDING AND PROTECTING
YOUR BRAND VIA EMAIL




      Email Branding




                                    8
9/30/2011




What Makes Subscribers Open?




 Prominently Display Your Logo




                Email Fraud
• Spoofing – Modifying the sender
  address and other parts of the email
  header to appear as if the email
  originated from some place it did not
• Phishing – Fraudulent practice of sending e-mails
  purporting to be from legitimate companies in order
  to induce individuals to reveal personal information
  such as email addresses, SS# and credit cards
• Malware – Malicious software meant to steal private
  data, take control of resources or cause abusive
  behavior




                                                                9
9/30/2011




       Brand Reputation & Trust
                   • Company perception in the
                     marketplace
                   • Erosion of brand trust
                   • In a recent Cloudmark survey,
                     42% of respondents said that
                     their trust in a brand would be
                     greatly reduced if they received
                     a phishing email claiming to be
                     sent by that brand.




      You Can Stop Phishing!
• Authenticate email with SPF and DKIM
• Educate your employees about spoofing,
  phishing and malware
• Monitor phishing and malware attacks
• Third-party vendors can help with:
  – Registering your domain to prevent unauthenticated
    email from being delivered
  – Monitoring, detecting and taking down phishing sites




 COMPLIANCE FOR
 COMMERCIAL EMAIL




                                                                 10
9/30/2011




              United States
• CAN-SPAM Act of 2003
• Email Law, not Privacy Law
• Opt-out, not Opt-in
• Make your privacy statement easy to find
  and read
• Track source and date of subscriber
  acquisition




               CAN-SPAM
• Covers all commercial email
• Clear and conspicuously displayed opt-out
  mechanism
• Valid postal address
• Clear notice that the message is commercial
• Process unsubscribes within 10 business days
• No false headers or subject lines
• Accurately represent Forward to a Friend (FTAF)




                                                          11
9/30/2011




                 Canada & CASL
• Law takes effect early 2012
• CEM Law, not just Email Law
• Affects all companies that send email, SMS, and
  social network messages into Canada
• Must have consent from subscriber unless implied
  relationship exists (allowed up to 2 years)
• Organization will need to review their email
  policies
• Penalties can be as high as $1 million per violation
  for individuals, and $10 million per violation for
  organizations




            Complying with CASL
• Establish baseline policy for all digital
  communications with subscribers
• Segment your subscribers based on expressed
  preferences, observed behaviors, demographics
• Use opt-in consent methods for capturing contact
  information.
• Clear unsubscribe information in communications
• Use preference centers so that subscribers can choose
  the timing and frequency with which they receive emails
• Obtain explicit consent within 2 year window
• Include postal address in all communications
• Never rent lists or do email appends




                 European Union
•   Data Protection Directive
•   Privacy Law not Email Law
•   Opt-in, not Opt-out
•   7 Principals:
    –   Notice
    –   Purpose
    –   Consent
    –   Security
    –   Disclosure
    –   Access
    –   Accountability




                                                                  12
9/30/2011




Asia-Pacific Privacy Framework
• Forum of 21 Pacific Rim countries
• Privacy Principles:
   –   Preventing Harm
   –   Notice
   –   Collection Limitations
   –   Uses of Personal Information
   –   Choice
   –   Integrity of Personal Information
   –   Security Safeguards
   –   Access and Correction
   –   Accountability




                   Rest of World

• Existence, detail and enforcement of
  privacy law in countries around the world
  vary dramatically




         Compliance Resources
Morrison & Foerster's International Privacy Library
www.mofo.com/privacy--data-security-services
Email Spam Legislation by Country
en.wikipedia.org/wiki/E-mail_spam_legislation_by_country
U.S. CAN-SPAM Act of 2003
www.spamlaws.com/federal/108s877.shtml
Canada - Marketer’s Guide to Applying CASL
www.thindata.com/aboutus/resourcecenter/casl/pdf/The_M
arketers_Guide_to_Applying_casl.pdf
Email Sender and Provider Coalition (ESPC)
www.espcoalition.org




                                                                 13
9/30/2011




          Deliverability Blogs

Return Path
www.returnpath.net
Deliverability.com
www.deliverability.com
Word to the Wise
blog.wordtothewise.com
Al Iverson
blog.exacttarget.com/blog.php/al-iverson




      Thank You!




                                                 14

More Related Content

Viewers also liked

Notes Version: Social Media as Focus Group Tapping Into a Vast Resource, Priv...
Notes Version: Social Media as Focus Group Tapping Into a Vast Resource, Priv...Notes Version: Social Media as Focus Group Tapping Into a Vast Resource, Priv...
Notes Version: Social Media as Focus Group Tapping Into a Vast Resource, Priv...Vivastream
 
Notes Version: DMA's Do the Right Thing Best Practices Digital Guidepost
 Notes Version: DMA's Do the Right Thing Best Practices Digital Guidepost Notes Version: DMA's Do the Right Thing Best Practices Digital Guidepost
Notes Version: DMA's Do the Right Thing Best Practices Digital GuidepostVivastream
 
Notes Version :10 Things Marketers Can Do To Take Advantage Of Social Media
Notes Version :10 Things Marketers Can Do To Take Advantage Of Social MediaNotes Version :10 Things Marketers Can Do To Take Advantage Of Social Media
Notes Version :10 Things Marketers Can Do To Take Advantage Of Social MediaVivastream
 
Email Direct Marketing Techniques
Email Direct Marketing TechniquesEmail Direct Marketing Techniques
Email Direct Marketing TechniquesVivastream
 
Notes Version: Celtics 3-Point Play - Gleaning Data from Facebook Engagement
Notes Version: Celtics 3-Point Play - Gleaning Data from Facebook EngagementNotes Version: Celtics 3-Point Play - Gleaning Data from Facebook Engagement
Notes Version: Celtics 3-Point Play - Gleaning Data from Facebook EngagementVivastream
 
Shift Your Game Mobile, Social, Gaming!
Shift Your Game Mobile, Social, Gaming!Shift Your Game Mobile, Social, Gaming!
Shift Your Game Mobile, Social, Gaming!Vivastream
 
Notes Version: Sustainability Elements of a Responsible Request for Proposal
Notes Version: Sustainability Elements of a Responsible Request for ProposalNotes Version: Sustainability Elements of a Responsible Request for Proposal
Notes Version: Sustainability Elements of a Responsible Request for ProposalVivastream
 
Notes Version: Part 1. The Next Extraordinary Marketing Opportunity- Healthca...
Notes Version: Part 1. The Next Extraordinary Marketing Opportunity- Healthca...Notes Version: Part 1. The Next Extraordinary Marketing Opportunity- Healthca...
Notes Version: Part 1. The Next Extraordinary Marketing Opportunity- Healthca...Vivastream
 
Notes Version: How Anyone Can Be More Creative in 3 Easy Steps
Notes Version: How Anyone Can Be More Creative in 3 Easy StepsNotes Version: How Anyone Can Be More Creative in 3 Easy Steps
Notes Version: How Anyone Can Be More Creative in 3 Easy StepsVivastream
 
The New Face of Online Advertising: OBA & Compliance
The New Face of Online Advertising: OBA & ComplianceThe New Face of Online Advertising: OBA & Compliance
The New Face of Online Advertising: OBA & ComplianceVivastream
 
Notes Version: 10 things marketers can do to take advantage of social media
Notes Version: 10 things marketers can do to take advantage of social mediaNotes Version: 10 things marketers can do to take advantage of social media
Notes Version: 10 things marketers can do to take advantage of social mediaVivastream
 
Free social media resources
Free social media resourcesFree social media resources
Free social media resourcesVivastream
 
Multichannel Retention Strategies: A Steady Diet of Low Hanging Fruit
Multichannel Retention Strategies: A Steady Diet of Low Hanging FruitMultichannel Retention Strategies: A Steady Diet of Low Hanging Fruit
Multichannel Retention Strategies: A Steady Diet of Low Hanging FruitVivastream
 
Broadcast and Triggered Emails: A Match Made in Heaven
Broadcast and Triggered Emails: A Match Made in HeavenBroadcast and Triggered Emails: A Match Made in Heaven
Broadcast and Triggered Emails: A Match Made in HeavenVivastream
 
March 2012 SES Magazine: SES New York Preview
March 2012 SES Magazine: SES New York PreviewMarch 2012 SES Magazine: SES New York Preview
March 2012 SES Magazine: SES New York PreviewVivastream
 
Prospect Segmentation for Performance
Prospect Segmentation for PerformanceProspect Segmentation for Performance
Prospect Segmentation for PerformanceVivastream
 
Notes Version: Which Medium Works Multichannel Testing For High-Performance R...
Notes Version: Which Medium Works Multichannel Testing For High-Performance R...Notes Version: Which Medium Works Multichannel Testing For High-Performance R...
Notes Version: Which Medium Works Multichannel Testing For High-Performance R...Vivastream
 

Viewers also liked (17)

Notes Version: Social Media as Focus Group Tapping Into a Vast Resource, Priv...
Notes Version: Social Media as Focus Group Tapping Into a Vast Resource, Priv...Notes Version: Social Media as Focus Group Tapping Into a Vast Resource, Priv...
Notes Version: Social Media as Focus Group Tapping Into a Vast Resource, Priv...
 
Notes Version: DMA's Do the Right Thing Best Practices Digital Guidepost
 Notes Version: DMA's Do the Right Thing Best Practices Digital Guidepost Notes Version: DMA's Do the Right Thing Best Practices Digital Guidepost
Notes Version: DMA's Do the Right Thing Best Practices Digital Guidepost
 
Notes Version :10 Things Marketers Can Do To Take Advantage Of Social Media
Notes Version :10 Things Marketers Can Do To Take Advantage Of Social MediaNotes Version :10 Things Marketers Can Do To Take Advantage Of Social Media
Notes Version :10 Things Marketers Can Do To Take Advantage Of Social Media
 
Email Direct Marketing Techniques
Email Direct Marketing TechniquesEmail Direct Marketing Techniques
Email Direct Marketing Techniques
 
Notes Version: Celtics 3-Point Play - Gleaning Data from Facebook Engagement
Notes Version: Celtics 3-Point Play - Gleaning Data from Facebook EngagementNotes Version: Celtics 3-Point Play - Gleaning Data from Facebook Engagement
Notes Version: Celtics 3-Point Play - Gleaning Data from Facebook Engagement
 
Shift Your Game Mobile, Social, Gaming!
Shift Your Game Mobile, Social, Gaming!Shift Your Game Mobile, Social, Gaming!
Shift Your Game Mobile, Social, Gaming!
 
Notes Version: Sustainability Elements of a Responsible Request for Proposal
Notes Version: Sustainability Elements of a Responsible Request for ProposalNotes Version: Sustainability Elements of a Responsible Request for Proposal
Notes Version: Sustainability Elements of a Responsible Request for Proposal
 
Notes Version: Part 1. The Next Extraordinary Marketing Opportunity- Healthca...
Notes Version: Part 1. The Next Extraordinary Marketing Opportunity- Healthca...Notes Version: Part 1. The Next Extraordinary Marketing Opportunity- Healthca...
Notes Version: Part 1. The Next Extraordinary Marketing Opportunity- Healthca...
 
Notes Version: How Anyone Can Be More Creative in 3 Easy Steps
Notes Version: How Anyone Can Be More Creative in 3 Easy StepsNotes Version: How Anyone Can Be More Creative in 3 Easy Steps
Notes Version: How Anyone Can Be More Creative in 3 Easy Steps
 
The New Face of Online Advertising: OBA & Compliance
The New Face of Online Advertising: OBA & ComplianceThe New Face of Online Advertising: OBA & Compliance
The New Face of Online Advertising: OBA & Compliance
 
Notes Version: 10 things marketers can do to take advantage of social media
Notes Version: 10 things marketers can do to take advantage of social mediaNotes Version: 10 things marketers can do to take advantage of social media
Notes Version: 10 things marketers can do to take advantage of social media
 
Free social media resources
Free social media resourcesFree social media resources
Free social media resources
 
Multichannel Retention Strategies: A Steady Diet of Low Hanging Fruit
Multichannel Retention Strategies: A Steady Diet of Low Hanging FruitMultichannel Retention Strategies: A Steady Diet of Low Hanging Fruit
Multichannel Retention Strategies: A Steady Diet of Low Hanging Fruit
 
Broadcast and Triggered Emails: A Match Made in Heaven
Broadcast and Triggered Emails: A Match Made in HeavenBroadcast and Triggered Emails: A Match Made in Heaven
Broadcast and Triggered Emails: A Match Made in Heaven
 
March 2012 SES Magazine: SES New York Preview
March 2012 SES Magazine: SES New York PreviewMarch 2012 SES Magazine: SES New York Preview
March 2012 SES Magazine: SES New York Preview
 
Prospect Segmentation for Performance
Prospect Segmentation for PerformanceProspect Segmentation for Performance
Prospect Segmentation for Performance
 
Notes Version: Which Medium Works Multichannel Testing For High-Performance R...
Notes Version: Which Medium Works Multichannel Testing For High-Performance R...Notes Version: Which Medium Works Multichannel Testing For High-Performance R...
Notes Version: Which Medium Works Multichannel Testing For High-Performance R...
 

Similar to Notes Version: Email Marketing Workshop Part 5 Deliverability, Compliance and Trust

Eloqua Grande Guide to Deliverability and Privacy
Eloqua Grande Guide to Deliverability and PrivacyEloqua Grande Guide to Deliverability and Privacy
Eloqua Grande Guide to Deliverability and PrivacyJoe Chernov
 
Permission Based Email Marketing
Permission Based Email MarketingPermission Based Email Marketing
Permission Based Email MarketingBlue Sky Factory
 
Email Marketing Workshop Part 5: Deliverability, Compliance and Trust
Email Marketing Workshop Part 5: Deliverability, Compliance and TrustEmail Marketing Workshop Part 5: Deliverability, Compliance and Trust
Email Marketing Workshop Part 5: Deliverability, Compliance and TrustVivastream
 
Privacy and Big Data Overload!
Privacy and Big Data Overload!Privacy and Big Data Overload!
Privacy and Big Data Overload!SparkPost
 
Eis thu 0815 sponsored breakfast strong mail
Eis thu 0815 sponsored breakfast strong mailEis thu 0815 sponsored breakfast strong mail
Eis thu 0815 sponsored breakfast strong mailMediaPost
 
Pathway to Email Marketing: Best Practices and How-To
Pathway to Email Marketing: Best Practices and How-ToPathway to Email Marketing: Best Practices and How-To
Pathway to Email Marketing: Best Practices and How-ToMarketo
 
Deliverability and The Realities and Demands of Today's Market
Deliverability and The Realities and Demands of Today's MarketDeliverability and The Realities and Demands of Today's Market
Deliverability and The Realities and Demands of Today's MarketAct-On Software
 
Deliverability and The Realities of Today’s Market
Deliverability and The Realities of Today’s MarketDeliverability and The Realities of Today’s Market
Deliverability and The Realities of Today’s MarketAct-On Software
 
Email Marketing Best Practices
Email Marketing Best PracticesEmail Marketing Best Practices
Email Marketing Best PracticesBill Powell
 
Bill C-28: What is it and what does it mean for marketers?
Bill C-28: What is it and what does it mean for marketers?Bill C-28: What is it and what does it mean for marketers?
Bill C-28: What is it and what does it mean for marketers?TC Media
 
Email privacy seal_data_sheet
Email privacy seal_data_sheetEmail privacy seal_data_sheet
Email privacy seal_data_sheetJason Macias
 
The Digital Privacy Equation
The Digital Privacy EquationThe Digital Privacy Equation
The Digital Privacy EquationTC Media
 
Deliverability for Daily Deals Industry
Deliverability for Daily Deals IndustryDeliverability for Daily Deals Industry
Deliverability for Daily Deals IndustryAndrew Bonar
 
Messaging:Protecting your Data and your Reputation
Messaging:Protecting your Data and your ReputationMessaging:Protecting your Data and your Reputation
Messaging:Protecting your Data and your ReputationWaterstons Ltd
 
How to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer CareHow to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer CareTRUSTe
 
How to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer CareHow to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer CareTRUSTe
 
Marqui's Top 10 Email Marketing Mistakes and How to Avoid Them
Marqui's Top 10 Email Marketing Mistakes and How to Avoid Them Marqui's Top 10 Email Marketing Mistakes and How to Avoid Them
Marqui's Top 10 Email Marketing Mistakes and How to Avoid Them Marqui CMS
 
Online security and privacy Netiquettesh
Online security and privacy NetiquetteshOnline security and privacy Netiquettesh
Online security and privacy Netiquetteshanmol326996
 

Similar to Notes Version: Email Marketing Workshop Part 5 Deliverability, Compliance and Trust (20)

Eloqua Grande Guide to Deliverability and Privacy
Eloqua Grande Guide to Deliverability and PrivacyEloqua Grande Guide to Deliverability and Privacy
Eloqua Grande Guide to Deliverability and Privacy
 
Permission Based Email Marketing
Permission Based Email MarketingPermission Based Email Marketing
Permission Based Email Marketing
 
Email Marketing Workshop Part 5: Deliverability, Compliance and Trust
Email Marketing Workshop Part 5: Deliverability, Compliance and TrustEmail Marketing Workshop Part 5: Deliverability, Compliance and Trust
Email Marketing Workshop Part 5: Deliverability, Compliance and Trust
 
Privacy and Big Data Overload!
Privacy and Big Data Overload!Privacy and Big Data Overload!
Privacy and Big Data Overload!
 
Eis thu 0815 sponsored breakfast strong mail
Eis thu 0815 sponsored breakfast strong mailEis thu 0815 sponsored breakfast strong mail
Eis thu 0815 sponsored breakfast strong mail
 
Pathway to Email Marketing: Best Practices and How-To
Pathway to Email Marketing: Best Practices and How-ToPathway to Email Marketing: Best Practices and How-To
Pathway to Email Marketing: Best Practices and How-To
 
Deliverability and The Realities and Demands of Today's Market
Deliverability and The Realities and Demands of Today's MarketDeliverability and The Realities and Demands of Today's Market
Deliverability and The Realities and Demands of Today's Market
 
Deliverability and The Realities of Today’s Market
Deliverability and The Realities of Today’s MarketDeliverability and The Realities of Today’s Market
Deliverability and The Realities of Today’s Market
 
Email Marketing Best Practices
Email Marketing Best PracticesEmail Marketing Best Practices
Email Marketing Best Practices
 
L42 slides
L42 slidesL42 slides
L42 slides
 
Bill C-28: What is it and what does it mean for marketers?
Bill C-28: What is it and what does it mean for marketers?Bill C-28: What is it and what does it mean for marketers?
Bill C-28: What is it and what does it mean for marketers?
 
Email privacy seal_data_sheet
Email privacy seal_data_sheetEmail privacy seal_data_sheet
Email privacy seal_data_sheet
 
The Digital Privacy Equation
The Digital Privacy EquationThe Digital Privacy Equation
The Digital Privacy Equation
 
Email marketing today
Email marketing todayEmail marketing today
Email marketing today
 
Deliverability for Daily Deals Industry
Deliverability for Daily Deals IndustryDeliverability for Daily Deals Industry
Deliverability for Daily Deals Industry
 
Messaging:Protecting your Data and your Reputation
Messaging:Protecting your Data and your ReputationMessaging:Protecting your Data and your Reputation
Messaging:Protecting your Data and your Reputation
 
How to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer CareHow to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer Care
 
How to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer CareHow to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer Care
 
Marqui's Top 10 Email Marketing Mistakes and How to Avoid Them
Marqui's Top 10 Email Marketing Mistakes and How to Avoid Them Marqui's Top 10 Email Marketing Mistakes and How to Avoid Them
Marqui's Top 10 Email Marketing Mistakes and How to Avoid Them
 
Online security and privacy Netiquettesh
Online security and privacy NetiquetteshOnline security and privacy Netiquettesh
Online security and privacy Netiquettesh
 

More from Vivastream

Exchange Solutions Datasheet_Ecommerce
Exchange Solutions Datasheet_EcommerceExchange Solutions Datasheet_Ecommerce
Exchange Solutions Datasheet_EcommerceVivastream
 
Exchange Solutions Datasheet_Customer Engagement Roadmap
Exchange Solutions Datasheet_Customer Engagement RoadmapExchange Solutions Datasheet_Customer Engagement Roadmap
Exchange Solutions Datasheet_Customer Engagement RoadmapVivastream
 
Vivastream Poster
Vivastream PosterVivastream Poster
Vivastream PosterVivastream
 
Vivastream Poster
Vivastream PosterVivastream Poster
Vivastream PosterVivastream
 
Breaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Breaking Up is Hard to Do: Small Businesses’ Love Affair with ChecksBreaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Breaking Up is Hard to Do: Small Businesses’ Love Affair with ChecksVivastream
 
EY Smart Commerce Report
EY Smart Commerce ReportEY Smart Commerce Report
EY Smart Commerce ReportVivastream
 
EY Global Consumer Banking Survey 2014
EY Global Consumer Banking Survey 2014EY Global Consumer Banking Survey 2014
EY Global Consumer Banking Survey 2014Vivastream
 
EY Global Consumer Banking Survey
EY Global Consumer Banking SurveyEY Global Consumer Banking Survey
EY Global Consumer Banking SurveyVivastream
 
Automation for RDC and Mobile
Automation for RDC and MobileAutomation for RDC and Mobile
Automation for RDC and MobileVivastream
 
Healthcare Payments Automation Center
Healthcare Payments Automation CenterHealthcare Payments Automation Center
Healthcare Payments Automation CenterVivastream
 
Next Generation Recognition Solutions
Next Generation Recognition SolutionsNext Generation Recognition Solutions
Next Generation Recognition SolutionsVivastream
 
Automation Services
Automation ServicesAutomation Services
Automation ServicesVivastream
 
Company Overview
Company OverviewCompany Overview
Company OverviewVivastream
 

More from Vivastream (20)

Exchange Solutions Datasheet_Ecommerce
Exchange Solutions Datasheet_EcommerceExchange Solutions Datasheet_Ecommerce
Exchange Solutions Datasheet_Ecommerce
 
Exchange Solutions Datasheet_Customer Engagement Roadmap
Exchange Solutions Datasheet_Customer Engagement RoadmapExchange Solutions Datasheet_Customer Engagement Roadmap
Exchange Solutions Datasheet_Customer Engagement Roadmap
 
Test
TestTest
Test
 
Tcap
TcapTcap
Tcap
 
SQA
SQASQA
SQA
 
Jeeva jessf
Jeeva jessfJeeva jessf
Jeeva jessf
 
Vivastream Poster
Vivastream PosterVivastream Poster
Vivastream Poster
 
Vivastream Poster
Vivastream PosterVivastream Poster
Vivastream Poster
 
APEX
APEXAPEX
APEX
 
Breaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Breaking Up is Hard to Do: Small Businesses’ Love Affair with ChecksBreaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
Breaking Up is Hard to Do: Small Businesses’ Love Affair with Checks
 
EY Smart Commerce Report
EY Smart Commerce ReportEY Smart Commerce Report
EY Smart Commerce Report
 
EY Global Consumer Banking Survey 2014
EY Global Consumer Banking Survey 2014EY Global Consumer Banking Survey 2014
EY Global Consumer Banking Survey 2014
 
EY Global Consumer Banking Survey
EY Global Consumer Banking SurveyEY Global Consumer Banking Survey
EY Global Consumer Banking Survey
 
Serano
SeranoSerano
Serano
 
Accura XV
Accura XVAccura XV
Accura XV
 
Automation for RDC and Mobile
Automation for RDC and MobileAutomation for RDC and Mobile
Automation for RDC and Mobile
 
Healthcare Payments Automation Center
Healthcare Payments Automation CenterHealthcare Payments Automation Center
Healthcare Payments Automation Center
 
Next Generation Recognition Solutions
Next Generation Recognition SolutionsNext Generation Recognition Solutions
Next Generation Recognition Solutions
 
Automation Services
Automation ServicesAutomation Services
Automation Services
 
Company Overview
Company OverviewCompany Overview
Company Overview
 

Recently uploaded

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Notes Version: Email Marketing Workshop Part 5 Deliverability, Compliance and Trust

  • 1. 9/30/2011 Email Marketing Workshop Part V Deliverability, Compliance & Trust Agenda • Getting To The Inbox • Protecting Your Brand • Email Laws & Regulations 1
  • 2. 9/30/2011 Laurence Rothman Nationwide Senior Consultant, Brand Reputation rothmal@nationwide.com Twitter: @LaurenceRothman Matt Rausenberger Return Path, Inc. Sr. Director, Deliverability Consulting matt.rausenberger@returnpath.net eec Co-Chair Deliverability & Rendering Roundtable PSVillage Co-Chair, Denver Chapter GETTING TO THE INBOX: DELIVERABILITY & REPUTATION 2
  • 3. 9/30/2011 Reputation Poor Reputation & Deliverability = NO INBOX • No Clicks • No Opens • No Purchases • No Conversions • No Brand Building • No Relationships Factors That Affect Deliverability • Subscriber Actions – Complaints – Opens • List Quality – Unknown Users – Spam Traps • Content • Email Infrastructure – Authentication – Sending Permanence • Accreditation 3
  • 4. 9/30/2011 Complaints Positive Subscriber Actions List Maintenance 4
  • 5. 9/30/2011 Unknown Users Bounces • Automated Response from Receiving Network that Email Message Was Not Delivered • Can Happen at any Stage of Message Transfer or Days After • Classified as Hard and Soft Bounces Spam Traps 5
  • 6. 9/30/2011 Give Them a Choice Content Content Rendering 6
  • 8. 9/30/2011 Relevance & Response Rates BUILDING AND PROTECTING YOUR BRAND VIA EMAIL Email Branding 8
  • 9. 9/30/2011 What Makes Subscribers Open? Prominently Display Your Logo Email Fraud • Spoofing – Modifying the sender address and other parts of the email header to appear as if the email originated from some place it did not • Phishing – Fraudulent practice of sending e-mails purporting to be from legitimate companies in order to induce individuals to reveal personal information such as email addresses, SS# and credit cards • Malware – Malicious software meant to steal private data, take control of resources or cause abusive behavior 9
  • 10. 9/30/2011 Brand Reputation & Trust • Company perception in the marketplace • Erosion of brand trust • In a recent Cloudmark survey, 42% of respondents said that their trust in a brand would be greatly reduced if they received a phishing email claiming to be sent by that brand. You Can Stop Phishing! • Authenticate email with SPF and DKIM • Educate your employees about spoofing, phishing and malware • Monitor phishing and malware attacks • Third-party vendors can help with: – Registering your domain to prevent unauthenticated email from being delivered – Monitoring, detecting and taking down phishing sites COMPLIANCE FOR COMMERCIAL EMAIL 10
  • 11. 9/30/2011 United States • CAN-SPAM Act of 2003 • Email Law, not Privacy Law • Opt-out, not Opt-in • Make your privacy statement easy to find and read • Track source and date of subscriber acquisition CAN-SPAM • Covers all commercial email • Clear and conspicuously displayed opt-out mechanism • Valid postal address • Clear notice that the message is commercial • Process unsubscribes within 10 business days • No false headers or subject lines • Accurately represent Forward to a Friend (FTAF) 11
  • 12. 9/30/2011 Canada & CASL • Law takes effect early 2012 • CEM Law, not just Email Law • Affects all companies that send email, SMS, and social network messages into Canada • Must have consent from subscriber unless implied relationship exists (allowed up to 2 years) • Organization will need to review their email policies • Penalties can be as high as $1 million per violation for individuals, and $10 million per violation for organizations Complying with CASL • Establish baseline policy for all digital communications with subscribers • Segment your subscribers based on expressed preferences, observed behaviors, demographics • Use opt-in consent methods for capturing contact information. • Clear unsubscribe information in communications • Use preference centers so that subscribers can choose the timing and frequency with which they receive emails • Obtain explicit consent within 2 year window • Include postal address in all communications • Never rent lists or do email appends European Union • Data Protection Directive • Privacy Law not Email Law • Opt-in, not Opt-out • 7 Principals: – Notice – Purpose – Consent – Security – Disclosure – Access – Accountability 12
  • 13. 9/30/2011 Asia-Pacific Privacy Framework • Forum of 21 Pacific Rim countries • Privacy Principles: – Preventing Harm – Notice – Collection Limitations – Uses of Personal Information – Choice – Integrity of Personal Information – Security Safeguards – Access and Correction – Accountability Rest of World • Existence, detail and enforcement of privacy law in countries around the world vary dramatically Compliance Resources Morrison & Foerster's International Privacy Library www.mofo.com/privacy--data-security-services Email Spam Legislation by Country en.wikipedia.org/wiki/E-mail_spam_legislation_by_country U.S. CAN-SPAM Act of 2003 www.spamlaws.com/federal/108s877.shtml Canada - Marketer’s Guide to Applying CASL www.thindata.com/aboutus/resourcecenter/casl/pdf/The_M arketers_Guide_to_Applying_casl.pdf Email Sender and Provider Coalition (ESPC) www.espcoalition.org 13
  • 14. 9/30/2011 Deliverability Blogs Return Path www.returnpath.net Deliverability.com www.deliverability.com Word to the Wise blog.wordtothewise.com Al Iverson blog.exacttarget.com/blog.php/al-iverson Thank You! 14