© 2004. GetActive Software. All rights reserved 10/1/2004 page 1 Is Email Dead? Communicating in the era of spam control Bill Pease Chief Technology Officer.

Slides:



Advertisements
Similar presentations
1 Eloqua Providing Industry-Leading Management Tools May 2009.
Advertisements

Eloqua Providing Industry-Leading Management Tools.
IP Warming Overview and Implementation Using Eloqua.
© 2012 Eloqua, Inc. Confidential 1 Deliverability and IP Warming Overview and Implementation Using Eloqua.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Spam Edward W. Felten Dept. of Computer Science Princeton University.
Deliverability How We Get You to the Inbox. +98 % Our Deliverability routinely ranks in the high 90s. There’s another way of saying this: We Get Your.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Breaking Trust On The Internet
Are You Spamming Your Clients? June 17, Introductions  Doug Ladendorf Manager of Marketing Databases & CRM Mayer Brown LLP  1,600 Attorneys 
© 2007 Convio, Inc. Implementation of Sender ID Bill Pease, Chief Scientist Convio.
----Presented by Di Xu  Introduction  Overview of Spam  Solutions to Spam  Conclusion.
© 2008 Convio, Inc. The Anatomy of Delivery Bill Pease, Chief Scientist Convio.
Fighting Spam Randy Appleton Northern Michigan University
The One-to-One eMessaging Company David S. Fowler Dir of Deliverability & ISP Relations How to Optimize Deliverability.
Chapter 6 SPAM. Synopsis What is spam Why does spam keep coming Specialty spam Why doesn't someone stop the spammers How do spammers get the addresses.
How To Make Marketing Work for Your Small Business or Non-Profit Presented by Milton Zlotnick SCORE Counselors to America’s Small Business Chapter.
Marketing PE: Understand the use of direct marketing to attract attention and to build brand. PI: Explain the nature of marketing tactics.
Using the Engaging Networks tools Ghazal Vaghedi Toronto February 21, 2012 #12ENCONF.
Broadcast service Core tools. Agenda 1.Introduction – tool and its main features 2.Setting up and sending a simple broadcast 3.Achieving.
A – Promotion Marketing PE: Understand the use of direct marketing to attract attention and to build brand. PI: Explain the nature of marketing.
Marketing What is marketing? Marketing is the art and science of management process through which goods and services move from concept to the customer.
Marketing PE: Understand the use of direct marketing to attract attention and to build brand. PI: Explain the nature of marketing tactics.
MIT Info Group, January 19, 2005 Page 1 The CAN-SPAM Act and what it means for MIT communicators MIT Info Group, January 19, 2005 Marsha Sanders Senior.
“WE Can Stop the Spam!” By: Jack McHugh. Proposals to identify spam  Michigan- require commercial ers to insert “ADV” as the first three characters.
Marketing - Best Practice from a Legal Point of View Yvonne Cunnane - Information Technology Law Group 30 November 2006.
© 2008 RightNow Technologies, Inc. Best Practices & Deliverability with RightNow Marketing Mathew Callison RightNow Technologies.
Untouchable?: A Canadian Perspective on the Anti- Spam Battle Michael Geist Canada Research Chair in Internet & E- commerce Law University of Ottawa, Faculty.
How Companies Fight Spamming by Sonya Tormaschy & Marc Eggert E-Commerce: Tuesday & Thursdays; 1:30 – 2:45.
Should there be a law that forbids people from sending to thousands of people (spam)? By: Bennett Moss Daniel Hoyt Hizkias Neway Junyu Wang.
Responsible Targeting Chapter One. Content from The Essential Guide to Web Strategy for Entrepreneurs unless otherwise noted Chapter One Opt-in.
© 2007 Convio, Inc. Implementation of Yahoo DomainKeys Bill Pease, Chief Scientist Convio.
ExactTarget State of Indiana Partnership Overview November 21, 2006.
1 The Business Case for DomainKeys Identified Mail.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
1 MyMortgageHostMyMortgageHost CRM/Databasing Call October 4, 2007 “HOLIDAY CRM TIPS & STRATEGIES” Presented by Eric Risley, Wayne Hohler: Aclient Software.
Internet Advertising © 2001 Ann Schlosser, University of Washington Business School.
How to Get Permission and Avoid Being Spam Jill Bastian Training and Education Manager.
marketing MBA 563 Week 6. Overview: marketing The new Canadian anti-spam legislation (CASL)
We’ve Done SEO Now We’re Moving On To….. Search Engine Marketing Types of Online Marketing  Newsletters  Online Lead Generation  Landing Pages.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
2 nd International Summer School Risks and Challenges of the Network Society Karlstad University and HumanIT Theme: Service Provider Responsibility for.
Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The.
Small Business Resource Power Point Series How to Avoid Your Marketing Messages Being Labelled as Spam.
Anti-Spam update Unsolicited Electronic Messages Bill and ISP Spam Code of Practice 2 February 2006 Keith Davidson Executive Director.
Privacy Issues In Market Research Duane L. Berlin, Esq. General Counsel, CASRO Principal, Lev & Berlin, P.C. PL&B Annual Conference Cambridge, MA 22 August.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
Technology Considerations for Spam Control 3 rd AP Net Abuse Workshop Busan Dave Crocker Brandenburg InternetWorking
1 Adding Secure and Collaboration to Your Business with SCOoffice Server 4.1.
Leveraging Asset Reputation Systems to Detect and Prevent Fraud and Abuse at LinkedIn Jenelle Bray Staff Data Scientist Strata + Hadoop World New York,
Deliverability Making it to the inbox
Optimal Database Marketing Drozdenko & Drake,
Return to the PC Security web page Lesson 6: Improving Security.
RUCUS - IETF 71 1 Lessons Learned From IETF Antispam Work Jim Fenton.
X-ASVP Executive Overview eXtensible Anti-spam Verification Protocol X-ASVP Committee Technical Working Group July 25, 2007.
Marketing with Lyris. Agenda Why marketing? best practices Tips for effective messaging Writing good content Things to avoid.
RECENT DEVELOPMENTS IN DIGITAL MEDIA ADVERTISING LAW : CANADIAN EDITION VALERIE WARNER DANIN, ESQ.
Marketing PE: Understand the use of direct marketing to attract attention and to build brand. PI: Explain the nature of marketing tactics.
Dr. Roger Ward.  It is a source of Congressional power to regulate interstate commerce is the Commerce Clause in Article I, Section 8.  According to.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Serving the Public. Regulating the Profession. CANADA’S ANTI-SPAM LEGISLATION (CASL) Training for Chapters Based on Guidelines for Chapters First published.
Lecture2 Networking. Overview and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
[ Direct marketing – an introduction to data protection and privacy] For [insert name of organisation] presented by [insert name of presenter] on [date]
Broadcast TOOLS AND BEST PRACTICES. Is your communication successful? Why or why not? Have you even thought about it? What is your current.
Click to start Improve Your Response Rates Dawn Sims MARKETING:
Deliverability and IP Warming
Information Security Session October 24, 2005
Hearth Bulk System Divisional Secretaries Briefing 2011.
Presentation transcript:

© GetActive Software. All rights reserved 10/1/2004 page 1 Is Dead? Communicating in the era of spam control Bill Pease Chief Technology Officer GetActive Software NTEN, Washington DC October 14, 2004

© GetActive Software. All rights reserved 10/1/2004 page 2 Overview of Session Publisher Perspective – Bill Pease, CTO, GetActive Impact of spam on non-profit communication efforts Social, legal, technical trends in spam control Best practice advice ISP Perspective – Charles Stiles, Postmaster, America Online

© GetActive Software. All rights reserved 10/1/2004 page 3 at risk as a means of communication Spam flood 65% of all traffic in 2004 will be spam or virus Increasing forgery, fraud and malware exploits make untrusted Triggers spam control measures Control “at any cost” results in considerable “collateral damage” Legitimate messaging is blocked or routed into oblivion

© GetActive Software. All rights reserved 10/1/2004 page 4 Non-delivery is a growing problem Return Path March 2004 Blocking and Filtering Report

© GetActive Software. All rights reserved 10/1/2004 page 5 Impact on non-profits Messages don’t get through Slower list growth Greater risk of brand damage Stigmatized as a spammer Spoofed by a phisher

© GetActive Software. All rights reserved 10/1/2004 page 6 Social trends in spam control Throw the baby out with the bathwater Benefit of blocking offensive spam outweighs risk of non-delivery of legitimate Guilty until proven innocent No special exemptions for messaging to members, for political or charitable appeals, etc. Vigilantism Private action required to stop spam; government action only makes it worse

© GetActive Software. All rights reserved 10/1/2004 page 7 Legal trends in spam control CAN-SPAM of 2003 Worsened spam problem Opt-out, not opt-in Legalized unsolicited commercial messaging Weak requirements No false headers/subjects No harvesting Working opt-out Study do-not- registry Pre-empted stricter state laws

© GetActive Software. All rights reserved 10/1/2004 page 8 Technical trends in spam control Client-side delivery barriers to protect the inbox Multiple, error-prone systems Accessing each inbox becomes a job Distributed spam id systems More complaints -> more barriers Demand for sender authentication

© GetActive Software. All rights reserved 10/1/2004 page 9 Your deliverability depends on List building Subscription management Content vendor performance Spam complaint management

© GetActive Software. All rights reserved 10/1/2004 page 10 Value of permission To establish & maintain a trust relationship with supporters To improve response rates To defend the legitimacy of your messaging if challenged by ISP blocking, blacklisting, etc.

© GetActive Software. All rights reserved 10/1/2004 page 11 Getting it and losing it Request explicit permission whenever you collect addresses Link brand or publication name to every opt-in request Document all opt-ins – especially those collected offline Respect permission Let subscribers control their communication preferences Honor opt-out

© GetActive Software. All rights reserved 10/1/2004 page 12 List-building methods to avoid Questionable Opt-in without positive action Pre-checked opt-in Hidden opt-in Transactional opt-in Auto-adding to other lists – especially independent orgs Transferred opt-in List shares or buys Co-registration Indefensible Opt-out harvesting From web pages or directories E-pending To voter registration lists To any list source without permission >80% of recipients do not think a mailer who has their postal address on file "has the right to send me "

© GetActive Software. All rights reserved 10/1/2004 page 13 Barriers to list growth: Challenge-response Assumes sender is suspect unless listed in recipient's address book Imposes additional burden on publishers to “prove” their legitimacy prior to accessing inbox

© GetActive Software. All rights reserved 10/1/2004 page 14 Barriers to list growth: Getting into the address book Serves as a local whitelist If you’re on it, is delivered If you’re not, will be blocked, routed or mangled Use a persistent from: address Provide instructions regularly

© GetActive Software. All rights reserved 10/1/2004 page 15 Barriers to list growth: address churn Basic list hygiene Quality control capture Easy subscription management Self-serve profile maintenance No complicated log-in Personalized links Address correction services

© GetActive Software. All rights reserved 10/1/2004 page 16 Don’t make subscription management difficult

© GetActive Software. All rights reserved 10/1/2004 page 17 Make it the starting point for relationship management

© GetActive Software. All rights reserved 10/1/2004 page 18 Does content matter? Generally, no Market-leading spam systems rely on multiple filters Non-profit content itself rarely exceeds triggers But “false positives” do occur Error-prone, rule-based systems exist among your audience

© GetActive Software. All rights reserved 10/1/2004 page 19 Understanding filters Few filter by content alone Market-leaders like Spam Assassin authenticate senders check blocklists & whitelists check distributed spam id systems Spam complaints, list building and mailing practices drive delivery barriers

© GetActive Software. All rights reserved 10/1/2004 page 20 vendor mailing practices GOOD Whitelisted Verifiable sender Throttle by ISP Compliance with bounce mngmt standards Feedback loops & Good ISP relationship mngmt BAD Blacklisted Incorrect DNS High send rates High proportion hard bounce or invalid s No respect for ISP customers & no relationship mngmt

© GetActive Software. All rights reserved 10/1/2004 page 21 Abuse complaint management Operational removal/unsubscribe Feedback loops to automate complaint processing Ongoing evaluation of list building practices Strategic use of subscribers to communicate with ISPs Maintain a good reputation

© GetActive Software. All rights reserved 10/1/2004 page 22 What to expect (1) Accountability For your list building & messaging practices Reputation based on measurable performance Vulnerability Threat to brand from being tarred a spammer Identity theft by a spoofer or phisher Increasing costs To acquire permission-based names To respond to spam controls To obtain third-party certification

© GetActive Software. All rights reserved 10/1/2004 page 23 What to expect (2) List growth challenges Less e-pending & co-registration Resistance to list sharing Decline in viral marketing yields New communication channels Alternatives to RSS syndication

© GetActive Software. All rights reserved 10/1/2004 page 24 Links - General Best Spam resources Spam legislation & regulation Anti-Spam tools in use t_id=322713&FOLDER%3C%3Efolder_id=162693&bmUID= Anti-Spam activism

© GetActive Software. All rights reserved 10/1/2004 page 25 Links - Practical Check your spam status Avoiding spam filters AvoidingtheSpamTrap.html Challenge-response