SlideShare a Scribd company logo
1 of 11
Becoming a trusted
sender
 Spam-blocking and filtering technology has improved, but everyone who
uses emails still deals with spam on one level or another.
 The main difference the spam of today and the spam of the past is the fact
that customers increasingly apply the word to unwanted emails, whether
or not those emails are technically spam.
Determining which emails have to
comply
 The CAN- SPAM Act of 2003 applies to commercial email messages, which
the law distinguishes from transactional or relationship messages.
 In general , the CAN-SPAM Act defines the two separate kinds of email
messages as follows:
- A commercial email – Its basically an email containing an advertisement,
promotion, or content from a business’s website.
- A Transactional or Relationship email- Its basically anything other than a
commercial email.
Collecting email address legally
 The CAN-SPAM Act makes certain types of email address collection illegal and
requires permission from your email list subscribers before you send certain
types of content.
 Here are some best practices for steering clear of potentially permissionless
email addresses:
- Never purchase an email list from a company that allows you to keep the email
addresses as a data file.
- Never collect email addresses from websites and other online directories.
- Don’t use an email address collection service.
- Don’t borrow an email list from another business and send email to that
business’s email list.
- Don’t rent an email list unless you’re certain that the list rental company’s
practices are legally compliant.
Including required content in your e-
mails
 The CAN-SPAM Act requires you to include certain content in your emails.
 Include the following in your e-mails to stay CAN-SPAM complaint:
- Provide a way for your subscribers to opt out of receiving future emails.
- Make sure that your email includes your physical address.
- Make sure that your email header information clearly identifies your business
and doesn’t mislead your audience in any way.
- Make sure that your email’s subject line isn’t misleading.
- Make sure that your email clearly states that the email is a solicitation.
- Make sure that your email complies with any applicable guidelines for sexually
oriented material
Asking for permission
 Deciding on a permission level
When formulating your permission strategy, put yourself in the prospective
subscriber’s shoes so that you can assess the level of permission necessary to
meet individual expectations.
Level 1: Implied Permission
Implied permission happens when someone shares her email address with
you in the course of normal business communications. The transaction implies
that the purpose of giving you the email address is to receive emails from you
in reply.
 Level 2: Explicit Permission
Explicit permission happens when you include text or language disclosing how you plan to use the prospective
subscriber’s email address.
Explicit permission doesn’t have to be a lengthy or complicated process, but the benefits of obtaining explicit
permission are worth having a straightforward process.
Here are some examples of explicit permission that you can adapt to your own subscriber situations:
1. Verbal- when someone shares his email address by handing you a business card or dictates an email address
to you during a phone conversation, you could query.
Is it alright if I send you my weekly event invitation e-mail?
2. Written – If a prospective subscriber sends a single email to you and you want to add him to your email list,
you could reply to the email and ask.
By the way, may I add your email address to my list so that you can receive my monthly e-newsletter?
3. Physical – some subscribers physically add their e-mail address to a guest book or sign up via a paper form.
If you have such an arrangement , you could post a professional- looking plaque or sign next to the guest book
or sign up form that states.
Thank you for giving us permission to send you our weekly e-coupons by signing our guest book. We promise
never to share your email address with anyone otside the company without your permission.
 Level 3: Confirmed permission
Confirmed permission happens when someone implicitly or explicitly
subscribes to your email list, and you respond to the subscriber with an email
requiring the subscriber to confirm his interest by reading your intended
usage and then clicking a confirmation link.
Inheriting a list
 Sometimes, you might find yourself in possession of an email list with
questionable – or even – permission.
 This often happens when you obtained your list in one of the following
scenarios:
- You purchased an existing business and inherited an e-mail list without
knowing the source of the email addresses on the list.
- Your list contains email addresses collected over a long time period, and
you can’t identify each type of associated permission.
- You purchased a list or built your list with low permission standards
 Follow these steps to determine the permission status of an inherited list
with questionable permission:
1. Sort your list by source
2. Sort your list by date; discard any addresses belonging to customers who
haven’t made a purchase in over a year.
3. Check your list visually; discard any addresses that begin with ambiguous
names or that are part of a distribution list.
4. Sort the rest of your list by category
5. Confirm permission to send email.
You can minimize your spam
complaints over time by doing the
following:
 Say thanks- Send a welcome e-mail immediately after the subscriber joins
the list.
 Send email reminders- insert a paragraph of text at the top of every email
reminding the recipient how you obtained his email address.
 Keep your email frequency in line with your email content and your email
list subscribers’ expectations.
 Reinforce branding- include your logo and colors on your sign-up form
and make sure that future emails match your brand.

More Related Content

What's hot

Email Deliverability: The What, Why & How
Email Deliverability: The What, Why & HowEmail Deliverability: The What, Why & How
Email Deliverability: The What, Why & HowYes Lifecycle Marketing
 
RunSignup Email Marketing
RunSignup Email MarketingRunSignup Email Marketing
RunSignup Email Marketingrunsignup
 
B2B Email Deliverability Whitepaper
B2B Email Deliverability WhitepaperB2B Email Deliverability Whitepaper
B2B Email Deliverability WhitepaperB2B Email Experts
 
Stay Out of Spam Folder
Stay Out of Spam FolderStay Out of Spam Folder
Stay Out of Spam FolderMyStockAlarm
 
Glossary of important email marketing terms
Glossary of important email marketing termsGlossary of important email marketing terms
Glossary of important email marketing termsInamDurrani2
 
Designing Your Email Program From Online Outreach To Welcome Email- Dylan Boy...
Designing Your Email Program From Online Outreach To Welcome Email- Dylan Boy...Designing Your Email Program From Online Outreach To Welcome Email- Dylan Boy...
Designing Your Email Program From Online Outreach To Welcome Email- Dylan Boy...Online Marketing Summit
 
How to build email database
How to build email databaseHow to build email database
How to build email databaseramswebsolution
 
Can spam act- check whether your email comply with it or not
Can spam act- check whether your email comply with it or notCan spam act- check whether your email comply with it or not
Can spam act- check whether your email comply with it or notSherin Thomas
 
Apple Ransomware Slides
Apple Ransomware SlidesApple Ransomware Slides
Apple Ransomware SlidesAltinetLtd
 
8 ways to improve email deliverability rates
8 ways to improve email deliverability rates8 ways to improve email deliverability rates
8 ways to improve email deliverability ratesLocke Truong
 
Email Validation for Improved Deliverability and Marketing Results
Email Validation for Improved Deliverability and Marketing ResultsEmail Validation for Improved Deliverability and Marketing Results
Email Validation for Improved Deliverability and Marketing ResultsScott Valentine, MBA, CSPO
 
Email phishing and its effect on your marketing campaign
Email phishing and its effect on your marketing campaignEmail phishing and its effect on your marketing campaign
Email phishing and its effect on your marketing campaignSherin Thomas
 
Email Best Practices for Nonprofits
Email Best Practices for NonprofitsEmail Best Practices for Nonprofits
Email Best Practices for NonprofitsMolly Maple Bryant
 
Advertising Through Email
Advertising Through EmailAdvertising Through Email
Advertising Through EmailmbSShare
 
The power of emails (h educate) 2021 v1
The power of emails (h educate) 2021 v1The power of emails (h educate) 2021 v1
The power of emails (h educate) 2021 v1MacJeffreyEscalera
 
Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User. Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User. Empowerhosting
 

What's hot (20)

Email Deliverability: The What, Why & How
Email Deliverability: The What, Why & HowEmail Deliverability: The What, Why & How
Email Deliverability: The What, Why & How
 
RunSignup Email Marketing
RunSignup Email MarketingRunSignup Email Marketing
RunSignup Email Marketing
 
B2B Email Deliverability Whitepaper
B2B Email Deliverability WhitepaperB2B Email Deliverability Whitepaper
B2B Email Deliverability Whitepaper
 
Stay Out of Spam Folder
Stay Out of Spam FolderStay Out of Spam Folder
Stay Out of Spam Folder
 
Glossary of important email marketing terms
Glossary of important email marketing termsGlossary of important email marketing terms
Glossary of important email marketing terms
 
How to Detect Email Fraud
How to Detect Email FraudHow to Detect Email Fraud
How to Detect Email Fraud
 
Email Collections
Email CollectionsEmail Collections
Email Collections
 
Designing Your Email Program From Online Outreach To Welcome Email- Dylan Boy...
Designing Your Email Program From Online Outreach To Welcome Email- Dylan Boy...Designing Your Email Program From Online Outreach To Welcome Email- Dylan Boy...
Designing Your Email Program From Online Outreach To Welcome Email- Dylan Boy...
 
Email Marketing The Easy Way
Email Marketing The Easy WayEmail Marketing The Easy Way
Email Marketing The Easy Way
 
How to build email database
How to build email databaseHow to build email database
How to build email database
 
Can spam act- check whether your email comply with it or not
Can spam act- check whether your email comply with it or notCan spam act- check whether your email comply with it or not
Can spam act- check whether your email comply with it or not
 
Apple Ransomware Slides
Apple Ransomware SlidesApple Ransomware Slides
Apple Ransomware Slides
 
8 ways to improve email deliverability rates
8 ways to improve email deliverability rates8 ways to improve email deliverability rates
8 ways to improve email deliverability rates
 
Email Validation for Improved Deliverability and Marketing Results
Email Validation for Improved Deliverability and Marketing ResultsEmail Validation for Improved Deliverability and Marketing Results
Email Validation for Improved Deliverability and Marketing Results
 
Email phishing and its effect on your marketing campaign
Email phishing and its effect on your marketing campaignEmail phishing and its effect on your marketing campaign
Email phishing and its effect on your marketing campaign
 
Email Best Practices for Nonprofits
Email Best Practices for NonprofitsEmail Best Practices for Nonprofits
Email Best Practices for Nonprofits
 
Advertising Through Email
Advertising Through EmailAdvertising Through Email
Advertising Through Email
 
The power of emails (h educate) 2021 v1
The power of emails (h educate) 2021 v1The power of emails (h educate) 2021 v1
The power of emails (h educate) 2021 v1
 
Email basics
Email basicsEmail basics
Email basics
 
Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User. Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User.
 

Similar to Becoming a Trusted Email Sender: 4 Steps to Compliance

The Role of Email Verification in Building a Quality Subscriber Base ||verif...
The Role of Email Verification in  Building a Quality Subscriber Base ||verif...The Role of Email Verification in  Building a Quality Subscriber Base ||verif...
The Role of Email Verification in Building a Quality Subscriber Base ||verif...madhumadhu542020
 
Email Marketing Melinda
Email Marketing MelindaEmail Marketing Melinda
Email Marketing MelindaAndrea Gomez
 
15 Best Email Verification Practices for
15 Best Email Verification Practices for15 Best Email Verification Practices for
15 Best Email Verification Practices formadhumadhu542020
 
The Impact of Email Verification on Your Conversion Rates ||verifyemail
The Impact of Email Verification on Your  Conversion Rates ||verifyemailThe Impact of Email Verification on Your  Conversion Rates ||verifyemail
The Impact of Email Verification on Your Conversion Rates ||verifyemailmadhumadhu542020
 
Practical Solutions To Internet Marketing Legal Compliance, pt 2
Practical Solutions To Internet Marketing Legal Compliance, pt 2Practical Solutions To Internet Marketing Legal Compliance, pt 2
Practical Solutions To Internet Marketing Legal Compliance, pt 2Affiliate Summit
 
Email Marketing chapter 3
Email Marketing chapter 3Email Marketing chapter 3
Email Marketing chapter 3kondamanasa
 
Why You Should Implement Email Verification in Marketing Campaigns ||verifye...
Why You Should Implement Email  Verification in Marketing Campaigns ||verifye...Why You Should Implement Email  Verification in Marketing Campaigns ||verifye...
Why You Should Implement Email Verification in Marketing Campaigns ||verifye...madhumadhu542020
 
Email Deliverability Do's and Don’t s
Email Deliverability Do's and Don’t sEmail Deliverability Do's and Don’t s
Email Deliverability Do's and Don’t sHandySends
 
Email Verification vs. Validation: Understanding the Difference ||verifyemail
Email Verification vs. Validation:  Understanding the Difference ||verifyemailEmail Verification vs. Validation:  Understanding the Difference ||verifyemail
Email Verification vs. Validation: Understanding the Difference ||verifyemailmadhumadhu542020
 
U Need to Know: Canadian Anti-Spam Law (CASL)
U Need to Know: Canadian Anti-Spam Law (CASL)U Need to Know: Canadian Anti-Spam Law (CASL)
U Need to Know: Canadian Anti-Spam Law (CASL)HighRoad Solution
 
Segmentation & Personalization in Email Marketing - Brafton Webinar
Segmentation & Personalization in Email Marketing - Brafton WebinarSegmentation & Personalization in Email Marketing - Brafton Webinar
Segmentation & Personalization in Email Marketing - Brafton WebinarKayla Perry
 
eMarketing Techniques Conference_Email Lists For Prospecting
eMarketing Techniques Conference_Email Lists For ProspectingeMarketing Techniques Conference_Email Lists For Prospecting
eMarketing Techniques Conference_Email Lists For ProspectingCorporate College
 
Why Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfWhy Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfHost It Smart
 
Email Verification for Nonprofits: Enhancing Communication and Outreach ||v...
Email Verification for Nonprofits:  Enhancing Communication and  Outreach ||v...Email Verification for Nonprofits:  Enhancing Communication and  Outreach ||v...
Email Verification for Nonprofits: Enhancing Communication and Outreach ||v...madhumadhu542020
 
Opt-in Email Marketing - Email-Marketing Tips
Opt-in Email Marketing - Email-Marketing TipsOpt-in Email Marketing - Email-Marketing Tips
Opt-in Email Marketing - Email-Marketing TipsEmailMarketingTips
 
DM06Succesful Email
DM06Succesful EmailDM06Succesful Email
DM06Succesful EmailAntti Leino
 
Email campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxEmail campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxPatricia Rountree
 

Similar to Becoming a Trusted Email Sender: 4 Steps to Compliance (20)

The Role of Email Verification in Building a Quality Subscriber Base ||verif...
The Role of Email Verification in  Building a Quality Subscriber Base ||verif...The Role of Email Verification in  Building a Quality Subscriber Base ||verif...
The Role of Email Verification in Building a Quality Subscriber Base ||verif...
 
Email Marketing Melinda
Email Marketing MelindaEmail Marketing Melinda
Email Marketing Melinda
 
15 Best Email Verification Practices for
15 Best Email Verification Practices for15 Best Email Verification Practices for
15 Best Email Verification Practices for
 
Double optinandemailmarketing en
Double optinandemailmarketing enDouble optinandemailmarketing en
Double optinandemailmarketing en
 
The Impact of Email Verification on Your Conversion Rates ||verifyemail
The Impact of Email Verification on Your  Conversion Rates ||verifyemailThe Impact of Email Verification on Your  Conversion Rates ||verifyemail
The Impact of Email Verification on Your Conversion Rates ||verifyemail
 
Practical Solutions To Internet Marketing Legal Compliance, pt 2
Practical Solutions To Internet Marketing Legal Compliance, pt 2Practical Solutions To Internet Marketing Legal Compliance, pt 2
Practical Solutions To Internet Marketing Legal Compliance, pt 2
 
Post 2.pdf
Post 2.pdfPost 2.pdf
Post 2.pdf
 
Email Marketing chapter 3
Email Marketing chapter 3Email Marketing chapter 3
Email Marketing chapter 3
 
Post 1.pdf
Post 1.pdfPost 1.pdf
Post 1.pdf
 
Why You Should Implement Email Verification in Marketing Campaigns ||verifye...
Why You Should Implement Email  Verification in Marketing Campaigns ||verifye...Why You Should Implement Email  Verification in Marketing Campaigns ||verifye...
Why You Should Implement Email Verification in Marketing Campaigns ||verifye...
 
Email Deliverability Do's and Don’t s
Email Deliverability Do's and Don’t sEmail Deliverability Do's and Don’t s
Email Deliverability Do's and Don’t s
 
Email Verification vs. Validation: Understanding the Difference ||verifyemail
Email Verification vs. Validation:  Understanding the Difference ||verifyemailEmail Verification vs. Validation:  Understanding the Difference ||verifyemail
Email Verification vs. Validation: Understanding the Difference ||verifyemail
 
U Need to Know: Canadian Anti-Spam Law (CASL)
U Need to Know: Canadian Anti-Spam Law (CASL)U Need to Know: Canadian Anti-Spam Law (CASL)
U Need to Know: Canadian Anti-Spam Law (CASL)
 
Segmentation & Personalization in Email Marketing - Brafton Webinar
Segmentation & Personalization in Email Marketing - Brafton WebinarSegmentation & Personalization in Email Marketing - Brafton Webinar
Segmentation & Personalization in Email Marketing - Brafton Webinar
 
eMarketing Techniques Conference_Email Lists For Prospecting
eMarketing Techniques Conference_Email Lists For ProspectingeMarketing Techniques Conference_Email Lists For Prospecting
eMarketing Techniques Conference_Email Lists For Prospecting
 
Why Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfWhy Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdf
 
Email Verification for Nonprofits: Enhancing Communication and Outreach ||v...
Email Verification for Nonprofits:  Enhancing Communication and  Outreach ||v...Email Verification for Nonprofits:  Enhancing Communication and  Outreach ||v...
Email Verification for Nonprofits: Enhancing Communication and Outreach ||v...
 
Opt-in Email Marketing - Email-Marketing Tips
Opt-in Email Marketing - Email-Marketing TipsOpt-in Email Marketing - Email-Marketing Tips
Opt-in Email Marketing - Email-Marketing Tips
 
DM06Succesful Email
DM06Succesful EmailDM06Succesful Email
DM06Succesful Email
 
Email campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxEmail campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docx
 

Becoming a Trusted Email Sender: 4 Steps to Compliance

  • 2.  Spam-blocking and filtering technology has improved, but everyone who uses emails still deals with spam on one level or another.  The main difference the spam of today and the spam of the past is the fact that customers increasingly apply the word to unwanted emails, whether or not those emails are technically spam.
  • 3. Determining which emails have to comply  The CAN- SPAM Act of 2003 applies to commercial email messages, which the law distinguishes from transactional or relationship messages.  In general , the CAN-SPAM Act defines the two separate kinds of email messages as follows: - A commercial email – Its basically an email containing an advertisement, promotion, or content from a business’s website. - A Transactional or Relationship email- Its basically anything other than a commercial email.
  • 4. Collecting email address legally  The CAN-SPAM Act makes certain types of email address collection illegal and requires permission from your email list subscribers before you send certain types of content.  Here are some best practices for steering clear of potentially permissionless email addresses: - Never purchase an email list from a company that allows you to keep the email addresses as a data file. - Never collect email addresses from websites and other online directories. - Don’t use an email address collection service. - Don’t borrow an email list from another business and send email to that business’s email list. - Don’t rent an email list unless you’re certain that the list rental company’s practices are legally compliant.
  • 5. Including required content in your e- mails  The CAN-SPAM Act requires you to include certain content in your emails.  Include the following in your e-mails to stay CAN-SPAM complaint: - Provide a way for your subscribers to opt out of receiving future emails. - Make sure that your email includes your physical address. - Make sure that your email header information clearly identifies your business and doesn’t mislead your audience in any way. - Make sure that your email’s subject line isn’t misleading. - Make sure that your email clearly states that the email is a solicitation. - Make sure that your email complies with any applicable guidelines for sexually oriented material
  • 6. Asking for permission  Deciding on a permission level When formulating your permission strategy, put yourself in the prospective subscriber’s shoes so that you can assess the level of permission necessary to meet individual expectations. Level 1: Implied Permission Implied permission happens when someone shares her email address with you in the course of normal business communications. The transaction implies that the purpose of giving you the email address is to receive emails from you in reply.
  • 7.  Level 2: Explicit Permission Explicit permission happens when you include text or language disclosing how you plan to use the prospective subscriber’s email address. Explicit permission doesn’t have to be a lengthy or complicated process, but the benefits of obtaining explicit permission are worth having a straightforward process. Here are some examples of explicit permission that you can adapt to your own subscriber situations: 1. Verbal- when someone shares his email address by handing you a business card or dictates an email address to you during a phone conversation, you could query. Is it alright if I send you my weekly event invitation e-mail? 2. Written – If a prospective subscriber sends a single email to you and you want to add him to your email list, you could reply to the email and ask. By the way, may I add your email address to my list so that you can receive my monthly e-newsletter? 3. Physical – some subscribers physically add their e-mail address to a guest book or sign up via a paper form. If you have such an arrangement , you could post a professional- looking plaque or sign next to the guest book or sign up form that states. Thank you for giving us permission to send you our weekly e-coupons by signing our guest book. We promise never to share your email address with anyone otside the company without your permission.
  • 8.  Level 3: Confirmed permission Confirmed permission happens when someone implicitly or explicitly subscribes to your email list, and you respond to the subscriber with an email requiring the subscriber to confirm his interest by reading your intended usage and then clicking a confirmation link.
  • 9. Inheriting a list  Sometimes, you might find yourself in possession of an email list with questionable – or even – permission.  This often happens when you obtained your list in one of the following scenarios: - You purchased an existing business and inherited an e-mail list without knowing the source of the email addresses on the list. - Your list contains email addresses collected over a long time period, and you can’t identify each type of associated permission. - You purchased a list or built your list with low permission standards
  • 10.  Follow these steps to determine the permission status of an inherited list with questionable permission: 1. Sort your list by source 2. Sort your list by date; discard any addresses belonging to customers who haven’t made a purchase in over a year. 3. Check your list visually; discard any addresses that begin with ambiguous names or that are part of a distribution list. 4. Sort the rest of your list by category 5. Confirm permission to send email.
  • 11. You can minimize your spam complaints over time by doing the following:  Say thanks- Send a welcome e-mail immediately after the subscriber joins the list.  Send email reminders- insert a paragraph of text at the top of every email reminding the recipient how you obtained his email address.  Keep your email frequency in line with your email content and your email list subscribers’ expectations.  Reinforce branding- include your logo and colors on your sign-up form and make sure that future emails match your brand.