SlideShare a Scribd company logo
1 of 37
Email Marketing
 Best Practices

  www.inboxorange.com
Whatchu talkin’ about?


 1) Why Email?
 2) SPAM
 3) Best Practices
 4) Choosing an ESP
 5) Q&A
Why Email?


             Easy
             Interactive
             Data Driven
             Inexpensive
OLD
                                                    Print
                                                    Television
                                                    Radio
                                                    Direct Mail
                                                    Web     (online brochure)


                                                    Hard to measure
                                                    Hard to maximize
                                                    Lifetime Customer Value

Photo from the Tom Lennon Photographic Collection
Traditional media =
           Interrupt for Awareness
Customer Relationship Life cycle
New media = Trust and Credibility
Turn Strangers into friends
and friends into customers




    1999
Multi-channel Marketing

Consistency to keep your customers
connected with your brand or product
through targeted marketing mediums

Connect with customers in a way that is
comfortable for them.

The result = higher response rate, more
repeat buyers and increased revenues.

Database holds the information.
50 million people checked
 email at least 5 times by
    11:00 am today
How do we break through?
SPAM
CAN-SPAM                                It bans false or misleading
                                        header information.
Controlling the Assault of Non-Solic-
ited Pornography and Marketing Act      It prohibits deceptive
                                        subject lines

                                        It requires that your
                                        email give recipients
                                        an opt-out method

                                        It requires that commercial
                                        email be identified as an
                                        advertisement and include
                                        the sender’s valid physical
                                        postal address.
Filters


  Server Side

  Email Client

  Subscriber
Statistics are needed


  Open Rates

  Click Throughs

  Hard/Soft Bounce
Best Practices




From shadphotos’ Flickr photostream
When to send?

• Industry and customer specific

• Focus on key events

• Seasonal - Email only coupon
  with special code to measure ROI

• Personal - birthday, anniversary

• Follow multiple channel marketing
  calendar to ti e into special events

• Utilize CRM or POS to send based
  on customer behavior
1. Opt-in


  How you collect your email addresses
  are extremely important.

       • Implicit

       • Explicit
2. Welcome message


  This is your first impression
       • Timeliness
       • Reiteration of what your
         customer can expect to receive
       • Reiterate selection of or invite
         subscriber to select frequency.


  Obtain data over a series of emails
3. Relevancy

   Anyone can send an email—
   engagement is the key.


   Clean list
   + engaged audience
   + relevant message
   = open rate close to 100%.
-
3. Relevancy



   Send based on
   the preferences
   identified by
   your subscriber
Open rates for segmented versus non-segmented
campaigns are as much as 20% higher on average
for the first 30 days.
MarketingSherpa “Email Marketing Benchmark Guide 2008” (2008)‫‏‬




Click rates for segmented versus non-segmented
campaigns are five times higher the last 90 days of
the year.
MarketingSherpa “Email Marketing Benchmark Guide 2008” (2008)‫‏‬
3. Relevancy




   Dynamic Content
   based on your users
   profile.
4. Design


   Five Stages
                      73% of subscribers
   of Email Viewing
                      click “Report Spam”
                      or “Report Junk”
   1. From Name
                      based on the content
                      from this field
                      source ESPC
4. Design
                     -




   2. Subject Line       • Inform-what will
                          they miss
                         • Intrigue-stand out
                         • Entrust-don’t mislead
                         • Action
                         • Empathy-speak
                          to the individual
4. Design
                     -




   3. Preview Pane       Make sure you place
                         branding and main
                         call-to-action at top
                         left of email‫‏‬
4. Design
                  -




   4. Open            11% will see the
   (pre-scroll)       whole email


                      bullets, borders and
                      background colors


                      Encourage scrolling
Use ‘Alt’ tags
4. Design


   5. Full Email

   -


       Make sure you place branding
       and main call-to-action at top
       left of email‫‏‬
ICI Restaurants

Timbuk2

Fifty Coins
Test, test and retest


A/B split test
   • Subject lines
   • Design


Different email clients render emails differently
A/B Split Test

A            B
Email Service Providers

            Private IP
           Education
          Best Practices
            Tracking
          Deliverability
Lisa Wester       Bill Powell
  www.facebook.com/inboxorange

More Related Content

Similar to Email Marketing Best Practices

Grow Your Business with Email Marketing SUFFOLK CHAMBER 03May12
Grow Your Business with Email Marketing SUFFOLK CHAMBER 03May12Grow Your Business with Email Marketing SUFFOLK CHAMBER 03May12
Grow Your Business with Email Marketing SUFFOLK CHAMBER 03May12
little green plane
 
Email: Cut Through the Clutter
Email: Cut Through the ClutterEmail: Cut Through the Clutter
Email: Cut Through the Clutter
Marqui CMS
 
Email Marketing Strategy - Pardot Users Conference
Email Marketing Strategy - Pardot Users ConferenceEmail Marketing Strategy - Pardot Users Conference
Email Marketing Strategy - Pardot Users Conference
Pardot
 
Don't Make Your Subscribers Think: How to Optimize Your Email Usability
Don't Make Your Subscribers Think: How to Optimize Your Email UsabilityDon't Make Your Subscribers Think: How to Optimize Your Email Usability
Don't Make Your Subscribers Think: How to Optimize Your Email Usability
Fathom: A Digital Marketing Agency
 
Best Practises in List Building and Deliverability
Best Practises in List Building and DeliverabilityBest Practises in List Building and Deliverability
Best Practises in List Building and Deliverability
Act-On Software
 

Similar to Email Marketing Best Practices (20)

Email Marketing
Email MarketingEmail Marketing
Email Marketing
 
Ecircle Optimise Email Marketing
Ecircle Optimise Email MarketingEcircle Optimise Email Marketing
Ecircle Optimise Email Marketing
 
A masterclass in email marketing for hotels
A masterclass in email marketing for hotelsA masterclass in email marketing for hotels
A masterclass in email marketing for hotels
 
Deliverability for Daily Deals Industry
Deliverability for Daily Deals IndustryDeliverability for Daily Deals Industry
Deliverability for Daily Deals Industry
 
Grow Your Business with Email Marketing SUFFOLK CHAMBER 03May12
Grow Your Business with Email Marketing SUFFOLK CHAMBER 03May12Grow Your Business with Email Marketing SUFFOLK CHAMBER 03May12
Grow Your Business with Email Marketing SUFFOLK CHAMBER 03May12
 
Email: Cut Through the Clutter
Email: Cut Through the ClutterEmail: Cut Through the Clutter
Email: Cut Through the Clutter
 
The Path to the Inbox Part 2
The Path to the Inbox Part 2The Path to the Inbox Part 2
The Path to the Inbox Part 2
 
Email Marketing Strategy - Pardot Users Conference
Email Marketing Strategy - Pardot Users ConferenceEmail Marketing Strategy - Pardot Users Conference
Email Marketing Strategy - Pardot Users Conference
 
\'\'MyPC\'\' email marketing
\'\'MyPC\'\' email marketing\'\'MyPC\'\' email marketing
\'\'MyPC\'\' email marketing
 
Power of Email Marketing (NADA 2010) Peter Martin
Power of Email Marketing (NADA 2010) Peter MartinPower of Email Marketing (NADA 2010) Peter Martin
Power of Email Marketing (NADA 2010) Peter Martin
 
Making the most of Email Marketing
Making the most of Email MarketingMaking the most of Email Marketing
Making the most of Email Marketing
 
Pathway to Email Marketing: Best Practices and How-To
Pathway to Email Marketing: Best Practices and How-ToPathway to Email Marketing: Best Practices and How-To
Pathway to Email Marketing: Best Practices and How-To
 
The Digital Marketing Guide E-Book
The Digital Marketing Guide E-BookThe Digital Marketing Guide E-Book
The Digital Marketing Guide E-Book
 
Don't Make Your Subscribers Think: How to Optimize Your Email Usability
Don't Make Your Subscribers Think: How to Optimize Your Email UsabilityDon't Make Your Subscribers Think: How to Optimize Your Email Usability
Don't Make Your Subscribers Think: How to Optimize Your Email Usability
 
Email marketing today
Email marketing todayEmail marketing today
Email marketing today
 
The Path to the Inbox Part 1
The Path to the Inbox Part 1The Path to the Inbox Part 1
The Path to the Inbox Part 1
 
CRM Introduction
CRM IntroductionCRM Introduction
CRM Introduction
 
Chapter Five- 5 Email Marketing
Chapter Five- 5 Email MarketingChapter Five- 5 Email Marketing
Chapter Five- 5 Email Marketing
 
B2B email marketing rechenda smith
B2B email marketing rechenda smithB2B email marketing rechenda smith
B2B email marketing rechenda smith
 
Best Practises in List Building and Deliverability
Best Practises in List Building and DeliverabilityBest Practises in List Building and Deliverability
Best Practises in List Building and Deliverability
 

Recently uploaded

Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
Overkill Security
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Recently uploaded (20)

Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 

Email Marketing Best Practices

  • 1. Email Marketing Best Practices www.inboxorange.com
  • 2. Whatchu talkin’ about? 1) Why Email? 2) SPAM 3) Best Practices 4) Choosing an ESP 5) Q&A
  • 3. Why Email? Easy Interactive Data Driven Inexpensive
  • 4. OLD Print Television Radio Direct Mail Web (online brochure) Hard to measure Hard to maximize Lifetime Customer Value Photo from the Tom Lennon Photographic Collection
  • 5. Traditional media = Interrupt for Awareness
  • 7. New media = Trust and Credibility
  • 8. Turn Strangers into friends and friends into customers 1999
  • 9. Multi-channel Marketing Consistency to keep your customers connected with your brand or product through targeted marketing mediums Connect with customers in a way that is comfortable for them. The result = higher response rate, more repeat buyers and increased revenues. Database holds the information.
  • 10. 50 million people checked email at least 5 times by 11:00 am today
  • 11. How do we break through?
  • 12. SPAM
  • 13. CAN-SPAM It bans false or misleading header information. Controlling the Assault of Non-Solic- ited Pornography and Marketing Act It prohibits deceptive subject lines It requires that your email give recipients an opt-out method It requires that commercial email be identified as an advertisement and include the sender’s valid physical postal address.
  • 14. Filters Server Side Email Client Subscriber
  • 15. Statistics are needed Open Rates Click Throughs Hard/Soft Bounce
  • 16. Best Practices From shadphotos’ Flickr photostream
  • 17. When to send? • Industry and customer specific • Focus on key events • Seasonal - Email only coupon with special code to measure ROI • Personal - birthday, anniversary • Follow multiple channel marketing calendar to ti e into special events • Utilize CRM or POS to send based on customer behavior
  • 18. 1. Opt-in How you collect your email addresses are extremely important. • Implicit • Explicit
  • 19. 2. Welcome message This is your first impression • Timeliness • Reiteration of what your customer can expect to receive • Reiterate selection of or invite subscriber to select frequency. Obtain data over a series of emails
  • 20.
  • 21. 3. Relevancy Anyone can send an email— engagement is the key. Clean list + engaged audience + relevant message = open rate close to 100%.
  • 22. -
  • 23. 3. Relevancy Send based on the preferences identified by your subscriber
  • 24. Open rates for segmented versus non-segmented campaigns are as much as 20% higher on average for the first 30 days. MarketingSherpa “Email Marketing Benchmark Guide 2008” (2008)‫‏‬ Click rates for segmented versus non-segmented campaigns are five times higher the last 90 days of the year. MarketingSherpa “Email Marketing Benchmark Guide 2008” (2008)‫‏‬
  • 25. 3. Relevancy Dynamic Content based on your users profile.
  • 26. 4. Design Five Stages 73% of subscribers of Email Viewing click “Report Spam” or “Report Junk” 1. From Name based on the content from this field source ESPC
  • 27. 4. Design - 2. Subject Line • Inform-what will they miss • Intrigue-stand out • Entrust-don’t mislead • Action • Empathy-speak to the individual
  • 28. 4. Design - 3. Preview Pane Make sure you place branding and main call-to-action at top left of email‫‏‬
  • 29. 4. Design - 4. Open 11% will see the (pre-scroll) whole email bullets, borders and background colors Encourage scrolling
  • 30.
  • 32. 4. Design 5. Full Email - Make sure you place branding and main call-to-action at top left of email‫‏‬
  • 34. Test, test and retest A/B split test • Subject lines • Design Different email clients render emails differently
  • 36. Email Service Providers Private IP Education Best Practices Tracking Deliverability
  • 37. Lisa Wester Bill Powell www.facebook.com/inboxorange