For an email campaign to be successful, marketers must blend art and science to reach the right person at the right time, with the right offer. Much planning, analysis, and creative work go into creating a campaign that can motivate people to take that next step on the buyer’s journey. But no matter how compelling your email is, if it doesn’t reach the inbox – you’ve lost that opportunity. If you know the basics of deliverability, you’re better prepared to build emails that will actually reach your potential customers.
For an email campaign to be successful, marketers must blend art and science to reach the right person at the right time, with the right offer. Much planning, analysis, and creative work go into creating a campaign that can motivate people to take that next step on the buyer’s journey. But no matter how compelling your email is, if it doesn’t reach the inbox – you’ve lost that opportunity. If you know the basics of deliverability, you’re better prepared to build emails that will actually reach your potential customers.
Due to the evolution of personalized, data-driven digital marketing, companies now have infinite amounts of personally identifiable information (PII) about their customers; and this stockpile of information continues to grow—at an exponential rate. In fact, according to the Pew Research Center, the volume of business data worldwide—across all industries—doubles every 1.2 years.
But how should you use this treasure trove of data? And at what point does the information known about your consumers—and the ways you use this information—risk consumer privacy? Is there such thing as too much data?
Attend this webinar to learn:
• What your responsibilities are in today’s ‘big data universe’
• How to use your data and meet compliance laws
• Tips for integrating data across channels and platforms
• How to implement the principles of ‘Privacy by Design’
75% of large organizations suffered a staff-related breach. In the graphical report we reveal the most significant email security risks facing organizations today and three sure ways encryption can mitigate them.
Hacker Defense: How to Make Your Law Firm a Harder TargetLexisNexis
It is up to law firms to protect both themselves and their clients with security measures that keep up with increasing risk. The firm can’t risk losing the trust of its clients. Here are some important ways that individual lawyers, and their firms, can improve the security of the information entrusted to them.
Law firms need to stay sharp because corporate security is getting harder,not easier. At the same time, companies are starting to recognize that information security is a fundamental business issue—one that demands an increased focus on cyber resilience, not just security. The reason is simple: criminals and state-sponsored attackers are targeting intellectual property, customer information, and avenues for business disruption. That makes law firms an ideal target.
To learn how you can locate and get a more complete picture of people and businesses across the U.S., visit http://www.lexisnexis.com/publicrecords.
For more topics that are transforming the legal industry,
visit http://www.thisisreallaw.com.
Understand Risk in Communications and Data BreachJon Gatrell
Secure communications whether you are sending a confidential message or a file with sensitive or proprietary information is necessary for users. IT needs to ensure that confidential business information is safe from data breaches and the negative effects a breach can have on your business’s reputation. Additionally, most businesses must comply with federal and industry regulations. You must maintain compliance with all mandates whether corporate, federal or industry-specific.
The ability to easily identify a legit email message is changing the industry for the better.
Since 2012, dmarcian has been helping organizations of every size across the globe to deploy DMARC.
This presentation is from Affiliate Summit East 2013 (August 18-20, 2013) in Philadelphia, PA). Session Description: Compliance doesn’t end with CAN-SPAM. With inbox access more challenging than ever, learn about the increasing importance of compliance on deliverability.
How to Strengthen Enterprise Data Governance with Data QualityDATAVERSITY
If your organization is in a highly-regulated industry – or relies on data for competitive advantage – data governance is undoubtedly a top priority. Whether you’re focused on “defensive” data governance (supporting regulatory compliance and risk management) or “offensive” data governance (extracting the maximum value from your data assets, and minimizing the cost of bad data), data quality plays a critical role in ensuring success.
Join our webinar to learn how enterprise data quality drives stronger data governance, including:
The overlaps between data governance and data quality
The “data” dependencies of data governance – and how data quality addresses them
Key considerations for deploying data quality for data governance
Data is the key to emerging from the digital “Dark Ages” and cutting through the clutter to create trusted relationships with customers. But data alone isn’t enough. You need the right data and the right insights to promote and protect your brand. In this deck, we’ll show you how to achieve true Data Enlightenment.
How to Strengthen Enterprise Data Governance with Data QualityPrecisely
If your organization is in a highly-regulated industry – or relies on data for competitive advantage – data governance is undoubtedly a top priority. Whether you’re focused on “defensive” data governance (supporting regulatory compliance and risk management) or “offensive” data governance (extracting the maximum value from your data assets, and minimizing the cost of bad data), data quality plays a critical role in ensuring success.
View this webinar on-demand to learn how enterprise data quality drives stronger data governance, including:
• The overlaps between data governance and data quality
• The “data” dependencies of data governance – and how data quality addresses them
• Key considerations for deploying data quality for data governance
This presentation, complied by Joe Chernov and designed by Beutler Ink, highlights 10 premium products that content marketers should consider. The solutions highlighted fall into one of three categories: content creation / curation, content distribution / amplification, analytics.
Due to the evolution of personalized, data-driven digital marketing, companies now have infinite amounts of personally identifiable information (PII) about their customers; and this stockpile of information continues to grow—at an exponential rate. In fact, according to the Pew Research Center, the volume of business data worldwide—across all industries—doubles every 1.2 years.
But how should you use this treasure trove of data? And at what point does the information known about your consumers—and the ways you use this information—risk consumer privacy? Is there such thing as too much data?
Attend this webinar to learn:
• What your responsibilities are in today’s ‘big data universe’
• How to use your data and meet compliance laws
• Tips for integrating data across channels and platforms
• How to implement the principles of ‘Privacy by Design’
75% of large organizations suffered a staff-related breach. In the graphical report we reveal the most significant email security risks facing organizations today and three sure ways encryption can mitigate them.
Hacker Defense: How to Make Your Law Firm a Harder TargetLexisNexis
It is up to law firms to protect both themselves and their clients with security measures that keep up with increasing risk. The firm can’t risk losing the trust of its clients. Here are some important ways that individual lawyers, and their firms, can improve the security of the information entrusted to them.
Law firms need to stay sharp because corporate security is getting harder,not easier. At the same time, companies are starting to recognize that information security is a fundamental business issue—one that demands an increased focus on cyber resilience, not just security. The reason is simple: criminals and state-sponsored attackers are targeting intellectual property, customer information, and avenues for business disruption. That makes law firms an ideal target.
To learn how you can locate and get a more complete picture of people and businesses across the U.S., visit http://www.lexisnexis.com/publicrecords.
For more topics that are transforming the legal industry,
visit http://www.thisisreallaw.com.
Understand Risk in Communications and Data BreachJon Gatrell
Secure communications whether you are sending a confidential message or a file with sensitive or proprietary information is necessary for users. IT needs to ensure that confidential business information is safe from data breaches and the negative effects a breach can have on your business’s reputation. Additionally, most businesses must comply with federal and industry regulations. You must maintain compliance with all mandates whether corporate, federal or industry-specific.
The ability to easily identify a legit email message is changing the industry for the better.
Since 2012, dmarcian has been helping organizations of every size across the globe to deploy DMARC.
This presentation is from Affiliate Summit East 2013 (August 18-20, 2013) in Philadelphia, PA). Session Description: Compliance doesn’t end with CAN-SPAM. With inbox access more challenging than ever, learn about the increasing importance of compliance on deliverability.
How to Strengthen Enterprise Data Governance with Data QualityDATAVERSITY
If your organization is in a highly-regulated industry – or relies on data for competitive advantage – data governance is undoubtedly a top priority. Whether you’re focused on “defensive” data governance (supporting regulatory compliance and risk management) or “offensive” data governance (extracting the maximum value from your data assets, and minimizing the cost of bad data), data quality plays a critical role in ensuring success.
Join our webinar to learn how enterprise data quality drives stronger data governance, including:
The overlaps between data governance and data quality
The “data” dependencies of data governance – and how data quality addresses them
Key considerations for deploying data quality for data governance
Data is the key to emerging from the digital “Dark Ages” and cutting through the clutter to create trusted relationships with customers. But data alone isn’t enough. You need the right data and the right insights to promote and protect your brand. In this deck, we’ll show you how to achieve true Data Enlightenment.
How to Strengthen Enterprise Data Governance with Data QualityPrecisely
If your organization is in a highly-regulated industry – or relies on data for competitive advantage – data governance is undoubtedly a top priority. Whether you’re focused on “defensive” data governance (supporting regulatory compliance and risk management) or “offensive” data governance (extracting the maximum value from your data assets, and minimizing the cost of bad data), data quality plays a critical role in ensuring success.
View this webinar on-demand to learn how enterprise data quality drives stronger data governance, including:
• The overlaps between data governance and data quality
• The “data” dependencies of data governance – and how data quality addresses them
• Key considerations for deploying data quality for data governance
This presentation, complied by Joe Chernov and designed by Beutler Ink, highlights 10 premium products that content marketers should consider. The solutions highlighted fall into one of three categories: content creation / curation, content distribution / amplification, analytics.
The Blog Tree: New Growth by Eloqua and JESS3, is a re-imagined version of the original Blog Tree infographic. This version depicts the interrelationships between newly launched, marketing relevant blogs (those introduced afar 1/1/09). This infographic is the second in the Eloqua / JESS3 "Blog Tree" series. Unlike the original, this version uses Edelman’s BlogLevel tool as the primary way to grade each featured blog.
Infographics in 15 Minutes is a presentation created by Eloqua’s VP of content marketing, Joe Chernov, and data visualization firm JESS3, for a session at Content Marketing World 2011. It looks at attributes of successful infographics, examples of effective design, and how to measure impact.
The sixth infographic collaboration between Eloqua and JESS3, "A History of Dreamforce" is the only visualized depiction of the year's most important cloud computing event with 100% of the data supplied by salesforce.com. The infographic visualizes virtually all aspects of the past 9 years of the Dreamforce conference.
This infographic depicts the shift in the public’s trust from “institutional” media to “personal” media. That is, as traditional media’s empire crumbles, influence shifts to the individual. This visual captures 86 of the most trusted voices in new media, publishing, advocacy, entrepreneurship, public relations and research. We call it, “The Message is the Messenger.”
The Social Media ProBook (#ProBook), by Eloqua and JESS3, is a 42-page e-book written by 20 of the most influential figures in social media. Topics include influencer marketing, PR and social media, Wikipedia fundamentals, rules for social advertising platforms, scaling social media globally, social organizational structures, practical uses for geosocial networks, writing for facebook, and more.
The Blog Tree is the first visual depiction of the interrelationship between bloggers and their sources. Depicted are marketing, news and VC bloggers. Part list, part infographic, part art, The Blog Tree is another Eloqua / JESS3 production.
This was a presentation I gave at the MediaPost Social Media Insiders Summit (#MBSMIS) in Miami. It’s a playful look at how we can perfect social media from both a user’s POV and a brand’s POV. For users, the central theme is aesthetics/design. For brands it’s data – that is, data that learns and analytics that plug into business objectives.
Learn how Eloqua and JESS3 collaborated to combine content marketing with social media to improve business performance. Content includes: The Content Grid, The Social Media Playbook, The Future of Revenue Video and Grande Guide series. Case study prepared by Joe Chernov (Director of Content, Eloqua) and Leslie Bradshaw (President & COO of JESS3) in November 2010.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
2. The Grande Guide to
Privacy & Email Deliverability
What’s a “Grande Guide”? Why Do We Need to Understand
We know what the typical day is like for marketers. Deliverability and Privacy?
After all, we are marketers ourselves. Between strategy
sessions, impromptu meetings (“It’ll just take a minute, Getting your message delivered is vital to revenue performance.
really!”), and trips to meet colleagues and customers, After all, a slight increase at the top of the funnel can make a
you can barely find time to breathe – never mind keep huge difference to your bottom line. And your ability to reach
up with the latest marketing trends. That’s why we’ve your prospects’ inbox is tied to deliverability and privacy.
developed the Grande Guide series. In the time it
takes you to drink a cup of coffee, you can become As a marketer, you’re continually collecting personal
proficient on a key marketing topic, in this case, email information through landing pages, web forms, third-party
deliverability and privacy. list providers and conference registrations. You’re responsible
for developing a comprehensive privacy policy and notifying
individuals about how you will collect, use and protect their
What is Deliverability and Privacy? data. Plus, you need to do everything possible to reduce the
Email deliverability is about maximizing the potential likelihood of complaints, unsubscribes, bounces and spam
number of emails reaching the inbox. How well you do traps.
with deliverability depends on how your organization:
Manages its email sender reputation Your reputation as an email sender impacts your potential reach
Manages lists as a marketer. The following can earn you a poor deliverability
Ensures a quality database, such as where you get score, which prevents your emails from reaching your
email addresses from and how you manage bounces desired target:
Lack of adherence to an email privacy policy
When it comes to email, privacy is about safeguarding the Poor list management
personal information contained in your mailing database. Frequency and relevancy of sends
This includes honoring the opt-in/opt-out, data access, Complaints from recipients
and data destruction wishes of the data subject. Number of blocks
Spam trap hits
How people are engaging
Why Deliverability and Privacy
Matter Today If you’re not tracking who is active and inactive in your
Email deliverability and privacy matter more than ever. database, you’ll keep sending emails to people who don’t
The first reason is that existing laws – and new ones on engage and your metrics will get skewed, making it hard to
the horizon – up the stakes greatly for companies that understand the effectiveness of your communications. After all,
don’t comply with standards and regulations. Second, the more you know about your prospects, the better you will be
today’s email marketers are finding it harder and harder at sending targeted, relevant emails.
to be heard. As a result, they need to master deliverability
and privacy to rise above “noise” from social media, other Furthermore, if your email is seen as spam, your IP address will
email marketers, and even new techniques like word-of- be labeled as a spammer’s IP, preventing you from getting into
mouth marketing. the inbox. According to Return Path, the world’s leading email
deliverability services company, more than 20 percent of opt-in
email in North America does not make it to the inbox.
A Return Path study found that Moreover, if you’re not following regulations – such as the CAN-
83% of delivery problems are SPAM Act – in the country where you’re conducting business,
caused by reputation issues. you’re open to serious legal ramifications. For example, you
need an explicit opt-in to send email to someone in the
02 The Grande Guide to Privacy & Email Deliverability www.eloqua.com
4. The Grande Guide to
Privacy & Email Deliverability
restriction on the recipient’s mailbox size. A block Email Deliverability Best Practices
bounce typically indicates that filtering – whether Step 1: Manage Your Reputation
content filtering, user filtering, complaint filtering, or
other spam filtering – is impacting the deliverability of A. Know Your Sender Score.
your email. a. Measure it for free at http://www.senderscore.
It’s illegal to harvest email addresses from websites org. All scores are based on a scale of 0 to
to create a mailing list. 100, where 0 is the worst and 100 is the best
If more than 10% of your list comprises bad email possible score.
addresses, you can expect spam protection to block
your emails. Industry average usually keeps the B. Authenticate your Email IP Address.
acceptable rate between 1 and 3%. a. Publish IP-based solutions like Sender Policy
Framework (SPF) and Cryptographic solutions
like DomainKeys Identified Mail (DKIM)
Deliverability and Privacy b. Create separate records for each type of email
Best Practices communication, such as promotional, newsletter
Understand all capabilities of your email service and corporate.
provider. For example, does it manage global opt-outs
automatically and in a compliant way, or remove hard C. Control Complaints.
bounces in a timely manner? a. Monitor complaint trends throughout each email
Know the privacy laws where you do business. Get campaign.
proper counsel. b. Avoid getting on blacklists. Monitor http://www.
Get third-party certification as a trusted sender. dnsstuff.com for your IP addresses, use the
free lookup tool at http://www.mxtoolbox.com/
blacklists.aspx, or see blacklistings via the
Blacklist Monitor service from Return Path.
What is Sender Reputation?
D. Gain Recipient Permission.
Sender reputation is a score
assigned to every mailing IP a. Only send to those who have explicitly requested
address (regardless of size or email from you.
industry of the mailer) based on a b. Target “neutral” contacts (i.e., those who have
combination of factors determined neither opted in nor opted out) with the goal of
by your mailing practices, including
gaining permission.
content, frequency, and data
sourcing. Your score is primarily c. Re-engage inactive contacts by confirming
based on three factors: subscription status one or two times per year.
d. Strengthen the relationship with active opt-in
> Complaints (clicks on the Report contacts by soliciting feedback on the quality
Spam button) and frequency of your communications, and
> Infrastructure (reverse DNS and their communication preferences. Confirm
mail exchanger – or MX – record,
volume/throttling, and bounce preferences with the recipient and then comply.
handling) e. Send only what the subscriber signed up to
> List hygiene (source, quality and receive.
engagement)
Source: Return Path
04 The Grande Guide to Privacy & Email Deliverability www.eloqua.com
6. The Grande Guide to
Privacy & Email Deliverability
Step 3: Optimize Your Content
Return Path’s Sender Reputation Checklist
A. Reinforce Email Expectations.
Know your sender reputation by asking Eloqua
or visiting www.senderscore.org. a. Clearly communicate your privacy policy and the type
of content you send and when.
Track complaints and remove complainers by
signing up for all feedback loops from the ISPs/ b. Send a welcome message to new email subscribers
receivers. with instructions on how to ensure the emails get
Dig into the root causes of why people delivered and the benefits of subscribing.
complain – and adjust your email program to c. Check in with contacts periodically to verify that they
accommodate subscriber preferences. are satisfied with your content and highlight options
Determine if you are on any major blacklists for changing their communication preferences.
and why. d. Move your subscription management options to the
Authenticate with DKIM and SPF records. These top of your emails so they don’t get overlooked.
are used by the various mailbox providers in
proving trustworthy domains and are required B. Optimize Relevancy and Frequency.
for some whitelists. Check to see if you are
authenticated: http://www.espcoalition.org/ a. Use automated programs to test frequency and
senderid/ determine the optimal mix for your target audience.
Apply for as much sender certification (third- b. Ask subscribers for input and feedback on relevancy
party and from the major ISPs) as you qualify and frequency.
for and can afford. Certification is reserved c. Make sure you are clearly communicating your
for the best senders and carries significant message—even with images turned off.
benefits.
Understand the origin of and your relationship C. Review and Refine.
with everyone in your mail file. Keep only those
subscribers who granted permission and are a. Generate reports that provide insight into bounces,
active. complaints, and unsubscribes.
Align your permission policy with your i. Keep bounce rates under 3%. Monitor bounces by
business. Use stricter permission with high- contact list, by email/email batch/email group and
frequency programs or with prospects who do by those sent by automated email systems.
not know you well. ii. Keep complaints under 0.01% by monitoring spam
Be clear about frequency, message type unsubscribes (i.e., contacts that reported your
and how data will be used at the point of email as spam).
subscription.
iii. Keep unsubscription rates below 1% by monitoring
Maintain a master calendar of messages sent unsubscribe trends:
to each subscriber, and optimize relevancy
1. How does this email campaign’s unsubscribe
based on self-reported data as well as purchase
behavior. rate trend against average performance? If there
Assign someone to regularly check your is a variance, pinpoint how this email differed
unsubscribe process, and your role accounts from others in terms of list quality, content, etc.
(e.g.: sales@, info@, etc.). Are the response 2. Is my unsubscribe rate trending upward? If so,
techniques working properly? Be sure to investigate a possible frequency or relevancy
forward customer requests for handling in a problem.
timely manner.
06 The Grande Guide to Privacy & Email Deliverability www.eloqua.com
8. The Grande Guide to
Privacy & Email Deliverability
Glossary/Resources
Deliverability.com: News, rumors, and commentary
from the email deliverability community - http://www. U.S. Congress Planning Broader Email & Digital Marketing
deliverability.com Enforcement and Regulatory Power for the FTC: http://blog.
emailexperience.org/blog/email-experience-council/0/0/
Deliverability.com Blog: posts on privacy - http://blog. us-congress-planning-broader-email-digital-marketing-
deliverability.com/privacy/ enforcement-and-regulatory-power-for-the-ftc
Eloqua Email Deliverability Playbook: http://img.en25. What marketers might expect in 2010 around privacy: blog
com/Web/Eloqua/EmailDeliverability_Playbook_1583.pdf post by Dennis Dayman of Eloqua - http://blog.deliverability.
com/2010/02/what-marketers-might-expect-in-2010.html
Eloqua Email Deliverability Resources: http://www.
eloqua.com/topics/email-deliverability.html
Eloqua Privacy Policy: http://www.eloqua.com/trust/
Privacy_Policy.html
Eloqua and TRUSTe Form Partnership: http://www.
marketwire.com/press-release/Eloqua-and-TRUSTe-Form-
Partnership-1353331.htm
Email Reputation Score: Free Email Reputation Report
from Sender Score: https://www.senderscore.org/
Email Stat Center: The leading authority on email
marketing metrics: http://www.emailstatcenter.com/
Deliverability.html
International Association of Privacy Professionals
(IAPP): https://www.privacyassociation.org/
IAPP Glossary of Common Privacy Terminology: https://
www.privacyassociation.org/images/uploads/CIPP%20
Privacy%20Glossary_0909.pdf
Messaging Anti-Abuse Working Group: http://www.
maawg.org/
Return Path: http://www.returnpath.net/
Return Path’s 2010 Email Deliverability Imperatives
report - http://www.returnpath.net/landing/
emailimperatives2010/
SenderScore.org: www.senderscore.org
08 The Grande Guide to Privacy & Email Deliverability www.eloqua.com