Edating Readers

One of our Australian clients sent out a campaign using a list which had been complied manually.

The message contained information relevant for the specific job position that these recipients held. It had the sender's details, a functional (and automated) unsubscribe link, real "from" and "reply" addresses and manual unsubscribes were actioned and replied to immediately. It was personalised with name, Company and position.

Did they have express consent from the recipient? No.

Was it Spam? No

According to the Australian Spam Act 2003, our client was able to send these targeted recipients information relevant to their positions. This is what is referred as "Inferred Consent".

However, even though the campaign was entirely in accordance with the legislation, many of the recipients responded with "This is Spam" replies.

What went wrong? Nothing?.other than readers expectations.

Australian, American and European readers expect a simplified solution to the current Spam problem. Hence, when the relevant legislations came into being in each country, the readers immediately (and wrongly) thought that any communications sent to them other than what had been specifically requested must be Spam. Similar to the Australian Legislation (Spam ACT 2003), the USA (CAN Spam ACT) and the EU Anti-Spam Legislation, provide avenues for businesses to conduct legitimate marketing campaigns to corporates (as opposed to the general public). So, rather than asking the obvious question, such as: Is this the end of all direct marketing email campaigns? I believe we should be asking: How can we educate the public?

Readers need to be educated on the difference between permission and non-permission email. It seems that the once starkly obvious line between permission-based emails and Spam is fading in our readers minds, causing endless problems for emailers - not only the obvious problems such as blacklisting, but other more insidious problems such as ROI and maintaining clean lists.

Most of the causes of the publics distrust are of course, rightly attributed to Spammers - real Spammers.

Consumers have been told repeatedly not to reply to, or unsubscribe from, Spam, for fear of confirming that their address is "real" and therefore being added to Spam lists. This thought, in turn has encompassed anything that hinted at a whiff of Spam, with no consideration for permission-based email.

These are the readers who press their "this is Spam" button at anything doubtful or unwanted without a second's hesitation. They are also the reason for the growing amount of unopened email rates, as they are finding it easier to simply delete and report instead of unsubscribing to a newsletter they once signed up for. One such filtering program that is enabling the reader to do this is Mailwasher.

For the average email user, Mailwasher is an easy to use program to filter out Spam emails from legitimate emails. Unfortunately, it is also perfect for filtering your unwanted emails as well - emails that the reader once was interested in receiving, but now is not. With a click of the mouse, the once requested email is deleted on the server (i.e. it does not get recorded as being opened in your statistics), bounced (this is why your bounce rates are growing and your open rates are declining) AND reported to SpamCop - all with one click and 1 second of deliberation (or less). What's more, Mailwasher is free. I thoroughly recommend you download a copy and see for yourself how easy it is for your readers to blacklist you: www.mailwasher.net.

Some things you can do to minimise complaints:

1. Have a complaint system in place

This should be preferably manned by a person, not automated, so the complainant knows that you are taking them seriously. A reply ideally needs to be done in the same day as the complaint, and it needs to be positive rather than negative in tone. Be understanding, whilst clarifying that you have followed the legislative requirements and assure them that they will receive no further email communications from your company. THEN IMMEDIATELY, unsubscribe them from your database.

2. Have as much personalisation within the email as possible.

True Spammers don't have actual lists of email addresses. They create lists using dictionary attacks. Once they have emailed the list created using the above method, they pull the bounces, and then reuse the "good" addresses. Because of this, they are not able to personalise the emails at all, hence servers and personalise filters are set to stop any emails which do not include any personalisation. Therefore personalisation helps on 3 main levels:

? Helps to get through the filters and actually arrive in the recipient's mailbox.

? Helps the recipient to identify that is not Spam as it is addressed to themselves in various ways.

? The more personalising of the email the better - not only in name, company, position, member number etc but also in tailoring content to suit the person therefore reducing the likelihood of the recipient growing tired of receiving your communications.

3. The readers must be educated.

This will only happen in time - and only from using a combination of good emailing etiquette will they be assured that it is safe to unsubscribe from a newsletter they no longer want rather than delete and report. Most people that call you a spammer do so because they don't know the legislation. We, as marketers need to be aware of the need of educating our readers.

4. Automate the unsubscribe method.

Why do readers delete/bounce/report when tired of receiving the email instead of unsubscribing? Because it's easy. So, make it as easy as possible for your recipient to unsubscribe. It's a mistake to try and keep them on your list by means of a complicated unsubscribe method. You want a clean list -you only want people on your list who are potential buyers etc. By having a clean list you are better able to: deliver accurate reports, market research -understand what your customers are wanting and reduce the risk of being reported as a spammer and being blacklisted.

5. Inform them how you received their information.

Be open with them. The more you hide, the more you will look like a spammer in their eyes.

Don't be discouraged. As with all things, the more learned we (and our clients) become with regards to the Spam legislature, the easier it will be to conduct successful email marketing campaigns. The more marketers comply with the legislature, the more responsive our readers will be as well as learning to distinguish between Spam and genuine email marketing.

Kath Pay is Marketing Director of Ezemail, a web-based e-communications tool, which enables you to create, send and track your email marketing and SMS messaging campaigns. For more information please go to http://www.ezemail.com or contact Kath at: http://www.ezemail.com.

after renovation cleaning Glenview ..
In The News:

Ghost-tapping scammers exploit wireless technology to drain accounts through small transactions, but RFID-blocking wallets and transaction alerts can protect you.
French pilot project demonstrates wireless charging roads that can deliver over 300 kilowatts of power to EVs while driving, potentially eliminating range anxiety.
YouTube's Ghost Network spreads information-stealing malware through thousands of fake videos offering cracked software, using compromised accounts and fake engagement.
Protect your privacy by disabling your smart TV microphone. Most TVs have hidden mics that listen even when voice commands are off. Learn quick steps to stop unwanted audio capture.
SessionReaper vulnerability hits Magento and Adobe Commerce stores, compromising 250+ sites in one day. Hackers steal data and hijack shopping sessions.
Master essential parental controls and digital safety tools to protect your kids online. Learn screen time limits, location settings and privacy controls every parent needs.
Cybersecurity expert shares six essential steps to protect against dark web threats, including data removal services, password managers and antivirus software.
NVIDIA GPU space mission could revolutionize cloud services by enabling orbital data centers that make apps, games and AI tools faster and more efficient.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Microsoft warns Windows 10 users face serious security risks as 90% of ransomware attacks target unsupported systems. Learn why upgrading to Windows 11 is crucial.
Nike unveils Project Amplify, revolutionary motorized shoes developed with Dephy that add powered assistance to every step for runners and walkers.
Cybersecurity experts warn about one of the largest credential compilations ever found, urging users to check "Have I Been Pwned" and change passwords immediately.
Quick iPhone and Android battery optimization techniques help your device stay powered all day by turning off hidden features that secretly drain power in the background.
Kodiak Driver autonomous truck achieves perfect 98 safety score, matching top human fleets in groundbreaking AI evaluation by Nauto's VERA system.
New 401k catch-up contribution rules in 2026 will change taxes for high earners over 50. Learn how scammers exploit these changes and protect your retirement savings.
Kurt Knutsson's guide covers social media privacy protection through location settings, account privacy controls and two-factor authentication to prevent scams and data breaches.
Revolutionary retinal implant restores central vision in 80% of patients with advanced macular degeneration, offering hope where treatments once only slowed blindness.
Learn how to use passkeys on Windows and Mac computers without cameras or fingerprint readers. Discover secure authentication methods that replace passwords.
Tesla's FSD v14.1.2 update reintroduces Mad Max mode, enabling higher speeds and more frequent lane changes than the standard Hurry profile setting.
A phishing email scam targeting American Express customers shows how cybercriminals use fake urgent messages to steal personal and financial information.
Facebook's new Meta AI feature analyzes your camera roll photos to create polished collages automatically, but requires cloud processing and raises privacy concerns.
A New Jersey teenager filed a major lawsuit against AI/Robotics Venture Strategy 3 Ltd. over ClothOff, an AI tool that created fake nude images from her social media photos.
Microsoft reports Storm-2657 cybercriminals sent phishing emails to 6,000 addresses at 25 universities to steal payroll credentials and redirect funds.
Astronomers have discovered asteroid 2025 SC79, a skyscraper-sized space rock orbiting the sun in just 128 days. the second-fastest known.
The Fox News AI Newsletter delivers the latest developments form the world of artificial intelligence, including the technology's challenges and opportunities.

Do Not Spam

The temptation among internet marketers to SPAM is greater than... Read More

Is Your Website Blacklisted?

A blacklist, as the name implies, is a list of... Read More

How Spammers Fool Spam Blacklists - And How to Stop Them

Effectively stopping spam over the long-term requires much more than... Read More

The War on Spam: Google Fights Back

Google is engaged in a war. It is a war... Read More

Spam Filters Explained

What do they do? How do they work? Which one... Read More

Block Spam with An Easy Behavioral Change

E-mails now have a connection back to their servers. I... Read More

The Anti Spam Challenge ? Minimizing False Positives

Email is the quintessential business communication tool, so when it... Read More

How To Analyze A Rip-Off Scheme

This review is taken DIRECTLY from a piece of "junk... Read More

Spammer Stole My Email Address?

Do you get bounced, or rejected emails sent by someone... Read More

Stuffing the Spammers!

I'm really, truly fed up with spam. Every day when... Read More

FTC Botches Fight on SPAM, Microsoft Takes Over the Battle

While the Federal Trade Commission is busy fighting over definitions... Read More

Dont Look Spammy!

We all hate spam and get way too much of... Read More

Phishing for an Identity

Phishing is rapidly becoming on the largest threats to your... Read More

ANTI-S*P^A#M: Protecting Your Web Sites Email Address(es)

Did you know that there are software programs that view... Read More

5 Zero-Cost Spam Prevention Tools For All Situations!

Anyone who uses email knows what Spam is!It's annoying and... Read More

Spam with Typos: Why Do They All Have Spelling Errors?

A friend asked me: I don't get it. Why do... Read More

What Is Spam?

If you've been around the interenet any length of time... Read More

Dont Give the Spammers Your Address From Your Page

Spammers get email addresses from web pages using programs called... Read More

Im Guilty Until Proven Innocent

No doubt about it."Spam" (unsolicited commercial email) threatens to paralyze... Read More

Eight Quick Tips For Stopping SPAM

If you are buried in SPAM then you're not alone.... Read More

Ignoring These Tips Could Result in an Inbox Full of Spam

Although there still seem to be some differences among the... Read More

Invasion of the Email Snatchers

They're sneaky. And stealthy. They're quiet and mostly unobtrusive, but... Read More

Customers Demand Internet Privacy

... and you'd better sit up and take notice! Customers... Read More

The 4 Ws of Junk E-mail

Junk e-mail or spam has become the scourge of the... Read More

The Business Of Sending Spam

You all tear your hair out in frustration every time... Read More

no-contract cleaning service Lincolnshire ..