© GetActive Software. All rights reserved 10/1/2004 page 1 Is Dead? Communicating in the era of spam control Bill Pease Chief Technology Officer GetActive Software NTEN, Washington DC October 14, 2004
© GetActive Software. All rights reserved 10/1/2004 page 2 Overview of Session Publisher Perspective – Bill Pease, CTO, GetActive Impact of spam on non-profit communication efforts Social, legal, technical trends in spam control Best practice advice ISP Perspective – Charles Stiles, Postmaster, America Online
© GetActive Software. All rights reserved 10/1/2004 page 3 at risk as a means of communication Spam flood 65% of all traffic in 2004 will be spam or virus Increasing forgery, fraud and malware exploits make untrusted Triggers spam control measures Control “at any cost” results in considerable “collateral damage” Legitimate messaging is blocked or routed into oblivion
© GetActive Software. All rights reserved 10/1/2004 page 4 Non-delivery is a growing problem Return Path March 2004 Blocking and Filtering Report
© GetActive Software. All rights reserved 10/1/2004 page 5 Impact on non-profits Messages don’t get through Slower list growth Greater risk of brand damage Stigmatized as a spammer Spoofed by a phisher
© GetActive Software. All rights reserved 10/1/2004 page 6 Social trends in spam control Throw the baby out with the bathwater Benefit of blocking offensive spam outweighs risk of non-delivery of legitimate Guilty until proven innocent No special exemptions for messaging to members, for political or charitable appeals, etc. Vigilantism Private action required to stop spam; government action only makes it worse
© GetActive Software. All rights reserved 10/1/2004 page 7 Legal trends in spam control CAN-SPAM of 2003 Worsened spam problem Opt-out, not opt-in Legalized unsolicited commercial messaging Weak requirements No false headers/subjects No harvesting Working opt-out Study do-not- registry Pre-empted stricter state laws
© GetActive Software. All rights reserved 10/1/2004 page 8 Technical trends in spam control Client-side delivery barriers to protect the inbox Multiple, error-prone systems Accessing each inbox becomes a job Distributed spam id systems More complaints -> more barriers Demand for sender authentication
© GetActive Software. All rights reserved 10/1/2004 page 9 Your deliverability depends on List building Subscription management Content vendor performance Spam complaint management
© GetActive Software. All rights reserved 10/1/2004 page 10 Value of permission To establish & maintain a trust relationship with supporters To improve response rates To defend the legitimacy of your messaging if challenged by ISP blocking, blacklisting, etc.
© GetActive Software. All rights reserved 10/1/2004 page 11 Getting it and losing it Request explicit permission whenever you collect addresses Link brand or publication name to every opt-in request Document all opt-ins – especially those collected offline Respect permission Let subscribers control their communication preferences Honor opt-out
© GetActive Software. All rights reserved 10/1/2004 page 12 List-building methods to avoid Questionable Opt-in without positive action Pre-checked opt-in Hidden opt-in Transactional opt-in Auto-adding to other lists – especially independent orgs Transferred opt-in List shares or buys Co-registration Indefensible Opt-out harvesting From web pages or directories E-pending To voter registration lists To any list source without permission >80% of recipients do not think a mailer who has their postal address on file "has the right to send me "
© GetActive Software. All rights reserved 10/1/2004 page 13 Barriers to list growth: Challenge-response Assumes sender is suspect unless listed in recipient's address book Imposes additional burden on publishers to “prove” their legitimacy prior to accessing inbox
© GetActive Software. All rights reserved 10/1/2004 page 14 Barriers to list growth: Getting into the address book Serves as a local whitelist If you’re on it, is delivered If you’re not, will be blocked, routed or mangled Use a persistent from: address Provide instructions regularly
© GetActive Software. All rights reserved 10/1/2004 page 15 Barriers to list growth: address churn Basic list hygiene Quality control capture Easy subscription management Self-serve profile maintenance No complicated log-in Personalized links Address correction services
© GetActive Software. All rights reserved 10/1/2004 page 16 Don’t make subscription management difficult
© GetActive Software. All rights reserved 10/1/2004 page 17 Make it the starting point for relationship management
© GetActive Software. All rights reserved 10/1/2004 page 18 Does content matter? Generally, no Market-leading spam systems rely on multiple filters Non-profit content itself rarely exceeds triggers But “false positives” do occur Error-prone, rule-based systems exist among your audience
© GetActive Software. All rights reserved 10/1/2004 page 19 Understanding filters Few filter by content alone Market-leaders like Spam Assassin authenticate senders check blocklists & whitelists check distributed spam id systems Spam complaints, list building and mailing practices drive delivery barriers
© GetActive Software. All rights reserved 10/1/2004 page 20 vendor mailing practices GOOD Whitelisted Verifiable sender Throttle by ISP Compliance with bounce mngmt standards Feedback loops & Good ISP relationship mngmt BAD Blacklisted Incorrect DNS High send rates High proportion hard bounce or invalid s No respect for ISP customers & no relationship mngmt
© GetActive Software. All rights reserved 10/1/2004 page 21 Abuse complaint management Operational removal/unsubscribe Feedback loops to automate complaint processing Ongoing evaluation of list building practices Strategic use of subscribers to communicate with ISPs Maintain a good reputation
© GetActive Software. All rights reserved 10/1/2004 page 22 What to expect (1) Accountability For your list building & messaging practices Reputation based on measurable performance Vulnerability Threat to brand from being tarred a spammer Identity theft by a spoofer or phisher Increasing costs To acquire permission-based names To respond to spam controls To obtain third-party certification
© GetActive Software. All rights reserved 10/1/2004 page 23 What to expect (2) List growth challenges Less e-pending & co-registration Resistance to list sharing Decline in viral marketing yields New communication channels Alternatives to RSS syndication
© GetActive Software. All rights reserved 10/1/2004 page 24 Links - General Best Spam resources Spam legislation & regulation Anti-Spam tools in use t_id=322713&FOLDER%3C%3Efolder_id=162693&bmUID= Anti-Spam activism
© GetActive Software. All rights reserved 10/1/2004 page 25 Links - Practical Check your spam status Avoiding spam filters AvoidingtheSpamTrap.html Challenge-response