Edating Readers

One of our Australian clients sent out a campaign using a list which had been complied manually.

The message contained information relevant for the specific job position that these recipients held. It had the sender's details, a functional (and automated) unsubscribe link, real "from" and "reply" addresses and manual unsubscribes were actioned and replied to immediately. It was personalised with name, Company and position.

Did they have express consent from the recipient? No.

Was it Spam? No

According to the Australian Spam Act 2003, our client was able to send these targeted recipients information relevant to their positions. This is what is referred as "Inferred Consent".

However, even though the campaign was entirely in accordance with the legislation, many of the recipients responded with "This is Spam" replies.

What went wrong? Nothing?.other than readers expectations.

Australian, American and European readers expect a simplified solution to the current Spam problem. Hence, when the relevant legislations came into being in each country, the readers immediately (and wrongly) thought that any communications sent to them other than what had been specifically requested must be Spam. Similar to the Australian Legislation (Spam ACT 2003), the USA (CAN Spam ACT) and the EU Anti-Spam Legislation, provide avenues for businesses to conduct legitimate marketing campaigns to corporates (as opposed to the general public). So, rather than asking the obvious question, such as: Is this the end of all direct marketing email campaigns? I believe we should be asking: How can we educate the public?

Readers need to be educated on the difference between permission and non-permission email. It seems that the once starkly obvious line between permission-based emails and Spam is fading in our readers minds, causing endless problems for emailers - not only the obvious problems such as blacklisting, but other more insidious problems such as ROI and maintaining clean lists.

Most of the causes of the publics distrust are of course, rightly attributed to Spammers - real Spammers.

Consumers have been told repeatedly not to reply to, or unsubscribe from, Spam, for fear of confirming that their address is "real" and therefore being added to Spam lists. This thought, in turn has encompassed anything that hinted at a whiff of Spam, with no consideration for permission-based email.

These are the readers who press their "this is Spam" button at anything doubtful or unwanted without a second's hesitation. They are also the reason for the growing amount of unopened email rates, as they are finding it easier to simply delete and report instead of unsubscribing to a newsletter they once signed up for. One such filtering program that is enabling the reader to do this is Mailwasher.

For the average email user, Mailwasher is an easy to use program to filter out Spam emails from legitimate emails. Unfortunately, it is also perfect for filtering your unwanted emails as well - emails that the reader once was interested in receiving, but now is not. With a click of the mouse, the once requested email is deleted on the server (i.e. it does not get recorded as being opened in your statistics), bounced (this is why your bounce rates are growing and your open rates are declining) AND reported to SpamCop - all with one click and 1 second of deliberation (or less). What's more, Mailwasher is free. I thoroughly recommend you download a copy and see for yourself how easy it is for your readers to blacklist you: www.mailwasher.net.

Some things you can do to minimise complaints:

1. Have a complaint system in place

This should be preferably manned by a person, not automated, so the complainant knows that you are taking them seriously. A reply ideally needs to be done in the same day as the complaint, and it needs to be positive rather than negative in tone. Be understanding, whilst clarifying that you have followed the legislative requirements and assure them that they will receive no further email communications from your company. THEN IMMEDIATELY, unsubscribe them from your database.

2. Have as much personalisation within the email as possible.

True Spammers don't have actual lists of email addresses. They create lists using dictionary attacks. Once they have emailed the list created using the above method, they pull the bounces, and then reuse the "good" addresses. Because of this, they are not able to personalise the emails at all, hence servers and personalise filters are set to stop any emails which do not include any personalisation. Therefore personalisation helps on 3 main levels:

? Helps to get through the filters and actually arrive in the recipient's mailbox.

? Helps the recipient to identify that is not Spam as it is addressed to themselves in various ways.

? The more personalising of the email the better - not only in name, company, position, member number etc but also in tailoring content to suit the person therefore reducing the likelihood of the recipient growing tired of receiving your communications.

3. The readers must be educated.

This will only happen in time - and only from using a combination of good emailing etiquette will they be assured that it is safe to unsubscribe from a newsletter they no longer want rather than delete and report. Most people that call you a spammer do so because they don't know the legislation. We, as marketers need to be aware of the need of educating our readers.

4. Automate the unsubscribe method.

Why do readers delete/bounce/report when tired of receiving the email instead of unsubscribing? Because it's easy. So, make it as easy as possible for your recipient to unsubscribe. It's a mistake to try and keep them on your list by means of a complicated unsubscribe method. You want a clean list -you only want people on your list who are potential buyers etc. By having a clean list you are better able to: deliver accurate reports, market research -understand what your customers are wanting and reduce the risk of being reported as a spammer and being blacklisted.

5. Inform them how you received their information.

Be open with them. The more you hide, the more you will look like a spammer in their eyes.

Don't be discouraged. As with all things, the more learned we (and our clients) become with regards to the Spam legislature, the easier it will be to conduct successful email marketing campaigns. The more marketers comply with the legislature, the more responsive our readers will be as well as learning to distinguish between Spam and genuine email marketing.

Kath Pay is Marketing Director of Ezemail, a web-based e-communications tool, which enables you to create, send and track your email marketing and SMS messaging campaigns. For more information please go to http://www.ezemail.com or contact Kath at: http://www.ezemail.com.

residential cleaning services Winnetka ..
In The News:

New AI road monitoring system uses sensor-embedded fabric to predict infrastructure problems, potentially reducing maintenance costs and traffic disruptions for cities.
Holiday charity scams target retirees through lookalike organization names, untraceable payment requests, and data broker information to steal donations.
The Federal Trade Commission says criminals are posing as IRS agents, law enforcement officers or other officials, often over the phone or online, to steal thousands of dollars at a time.
AI phishing scams now use voice cloning and deepfake technology to trick victims, but Kurt "CyberGuy" Knutsson reveals warning signs to watch for.
Inversion Space unveils Arc, a reusable reentry vehicle that can deliver up to 500 pounds of cargo from orbit to anywhere on Earth in under an hour.
Red flags like processing fees, urgent countdowns and requests for full Social Security numbers expose fraudulent settlement sites targeting consumers.
Comprehensive analysis of Google Maps, Waze and Apple Maps examines usability, routing accuracy, data handling and features across the top navigation platforms.
Expert analysis reveals whether wired Ethernet or wireless Wi-Fi connections are safer for home internet use, plus practical steps to secure your network from attackers.
Australian construction robot Charlotte uses sand, crushed brick and recycled glass to 3D print fireproof, floodproof homes with reduced carbon footprint.
Cybercriminals are using fake invitation emails to trick recipients into downloading malware and stealing personal information and data.
Flying drones could help retailers fight a 93% increase in theft rates as Flock Safety promotes airborne security systems to track suspects and deter crime.
The Fox News Artificial Intelligence Newsletter brings you the latest news on the emerging technology every Saturday, highlighting top stories.
Hacker group Radiant stole data from 8,000 children at Kido nursery chain, demanding ransom and directly contacting parents with intimidation tactics.
As 18 states implement bell-to-bell cell phone bans, creative students use Google Docs, iMessage on MacBooks and Post-It notes to stay connected in class.
A sheriff's captain says deputies often spend hours writing reports between calls, but Axon's AI program, Draft One, helps them save crucial time in the field.
Sora 2, OpenAI's new video-generation app, can create AI-generated videos based on a singular prompt. The results are both mind-blowing and terrifying.
iPhone and Android users can reduce Wi-Fi calling battery drainage through settings adjustments, background app limits and stronger Wi-Fi connections.
Work email scams are becoming harder to detect as criminals use AI and spoofed addresses to trick employees into opening malicious attachments and links.
From her Arizona living room, Christina Chapman ran a covert hub that helped North Korean operatives infiltrate U.S. firms, netting $17 million in stolen salaries.
UC Santa Barbara researchers developed a soft robotic intubation system that achieved 100% success rates for experts and 96% for paramedics with minimal training.
Scammers exploit probate filings to target grieving families with fake fees and debts, Kurt "Cyberguy" Knutsson reports.
Automotive giant Stellantis becomes latest victim of widespread Salesforce breaches affecting companies like Google, Cisco and Adidas this year.
A woman from Washington reunited with her missing Maine Coon cat Louie after 11 days using Love Lost, a free AI-powered pet recovery platform.
Expert cybersecurity tips help Mac owners remove malware infections and strengthen defenses with antivirus software, password managers and system updates.
Meta's AI chatbot training rules bans sexual roleplay with minors and block access to child abuse material as regulators scrutinize its safety measures.

Email Chain Letters - Harmless Fun or Not?

I'm sure I'm not the only person on the planet... Read More

Where Did The Word Spam Come From?

We've all become familiar with the term spam. It's become... Read More

Kill The Messenger (Service)

You are familiar with the software applications that you run... Read More

Having a Bad e MALE Day? Email, Spam, Spam and More Spam

You just sat at your desk, opened your email account... Read More

Bayesian Spam Filters Explained

In a word Bayesian spam filters are "intelligent". Bayesian spam... Read More

Eight Quick Tips For Stopping SPAM

If you are buried in SPAM then you're not alone.... Read More

Protecting Your Business From Spam

Even being as careful as possible with my email address,... Read More

Junk Mail Works!

Junk mail works. Why does it work? How does it... Read More

Is Email Dying?

2004 was really a year when the whole subject of... Read More

How to Fight Back BEFORE Youre Falsely Accused of Spam

A friend of mine received a chilling email message from... Read More

Protecting Yourself With A Porn Filter

The harmful affects of pornography use and addiction are well... Read More

The Great Spam Scam: Five Strategies To Stop Brand and Revenue Robbery

Marketers usually think of anti-spam tactics as 'how to prevent'... Read More

Stuffing the Spammers!

I'm really, truly fed up with spam. Every day when... Read More

I Must Be The Luckiest Person Alive! Spam

I must be the luckiest person alive! My inbox is... Read More

How To Analyze A Rip-Off Scheme

This review is taken DIRECTLY from a piece of "junk... Read More

Demand for Spam? It exists

Do you like spam? No, I'm not kidding. Everybody knows... Read More

Phishing for an Identity

Phishing is rapidly becoming on the largest threats to your... Read More

Block Ads, Defeat Pop-Ups, and STOP Page Hijacking

You're not alone!Who hasn't surfed the web looking for information... Read More

Spam Filters Explained

What do they do? How do they work? Which one... Read More

Internet Theft and Fraud

My friends in the web hosting business have recently informed... Read More

Is There A National Do Not Spam List?

You may have already received a do not spam list... Read More

Of Spam and Sandboxes

About a month ago I had the privilege of giving... Read More

Take Back Control of Your Inbox: Eliminate Annoying and Potentially Harmful E-mails

Are you tired of spam stealing your time, your money,... Read More

Do Not Spam

The temptation among internet marketers to SPAM is greater than... Read More

Block Spam with An Easy Behavioral Change

E-mails now have a connection back to their servers. I... Read More

high-end home cleaning Highland Park ..