T2dgroup.co.uk

Email Deliverability:
How We Got Here and
What Marketer’s Should do About It
Published by the Deliverability Hub of the Email Marketing Council of Written By Skip Fidura, Warehouse Marketing Email Deliverability: How We Got Here and What Marketer’s
Should do About It

Introduction
The first step in any marketing campaign is getting the message to the consumer.
Regardless of how good the copy and creative are and how compelling the offer is, a
campaign will fail if your target audience never sees the message. In other marketing disciplines this step is taken for granted by the marketer. Booking a slot on television, buying space in a broadsheet, or dropping the mail pack into the post pretty much guarantees that the consumer will see it. This leaves marketers to apply their creative energies to ensuring that the consumer pays attention to the message through effective targeting, strong copywriting and compelling visuals. Email marketers, on the other hand, do have to worry about getting their messages in front of the intended audience. Even if they get the message past the Spam filters, there is no guarantee that the message is going to be placed in the primary inbox nor is there a guarantee that the message will have the look and feel as the This white paper will first look at why the ISPs block emails and the economic impact that it has on marketers. We will then examine the current methods for filtering and blocking emails and strategies to prevent being blocked and getting unblocked if that is necessary. Finally, we will look into the future for a glimpse of where this issue is heading. What we will not be looking at here are the shades of grey in deliverability. For the purpose of this document (except where otherwise stated), we will define deliverability in terms of whether the email was accepted by the mail server or not. At the next level, deliverability can deal with what happens to the email after it has been accepted by the mail server - does it get delivered to the inbox or the bulk
folder; do the images render; do the hyperlinks work; etc.
Why do ISPs block legitimate emails?
Email as we know it was invented in 1972 by Ray Tomlinson. Prior to this users could
“send” emails to other users on the same computer (at this time computers were mainframes with multiple users sharing its relatively limited computing resources). Tomlinson recognized the need to be able to send messages to other mainframes connected to ARPANET (a network built to facilitate collaboration between researchers at various locations in the United States and the precursor to the internet). He picked the “@” to indicate when a message was to go to a user on another computer. The system developed by Tomlinson would evolve into Simple Message Transfer Protocol (SMTP) which is in use today. Jon Postel, a contemporary of Tomlinson’s, described this system as a “nice hack.” Unfortunately email is still fundamentally built on this “nice hack,” which has lead to the deliverability problems we face today. ARPANET was a closed network used by universities, companies, and agencies doing research for the Advanced Research Projects Agency, which has variously come under the auspices of the United States Department of Defense. As such, there was no need to build into the system even the most cursory security checks to confirm that the email actually came from the sender. In most cases the recipient would know the sender and there was little or no Email Marketing Council, Direct Marketing Association, June 2007
Email Deliverability: How We Got Here and What Marketer’s
Should do About It


benefit to be gained by spoofing someone else’s email address. Even if the
designers of SMTP could have predicted the technological advancements that led to
the PC revolution and the rise of the internet as a ubiquitous tool in our everyday lives, they didn’t or chose not to act on this prediction. This oversight has allowed the rise of spammers, phishers and virus spreaders. Another distinguishing characteristic of email is its low cost of set-up and management. It is relatively simple to buy a server and configure it to send millions of emails per day. After that, all the spammer needs to do is maintain an internet account. If the cost of the server and the internet account are spread across millions of email addresses harvested by bots or gleaned from dictionary attacks, the cost per contact is a fraction of pence. It takes very few conversions (whether that be selling dodgy Viagra or capturing personal banking details unwittingly given over by naive consumers) to make this venture wildly profitable. Combine this earnings
potential with the ease in faking the source of the email and you have the perfect
recipe for criminal activity.
Size of the Problem
The volume of spam is a global problem that impacts all email users. In January
2007 Postini estimated that 94% of all emails sent were Spam. It detected over 25 billion Spam emails in December 2006 - an increase of over 15 billion from the same month in 2005. This figure is higher than the 70% to 90% Spam figures that have been reported over the past few years. At the same time, MessageLabs reported that only 74.68% of emails sent in December were Spam. While these statistics are at odds with each other, the picture they paint is clear - Spam is a major problem. It would be easy to pass off Spam as a victimless crime and to regard those who are taken in by dubious offers and unwittingly give over their personal banking details as people who should have known better. Spam and Phishing, however, are not victimless - there is a real cost related to these activities over and above those borne by those who have been misled. If 80% of all email traffic is Spam, then the ISPs and Internet Email Providers (IEPs) such as Yahoo and Hotmail need to maintain 4X in extra hardware and processing capacity to handle this volume. Imagine having to own five cars because you had to plan to have four missing whenever you needed to go out. These wasted costs are not limited to the large ISPs and IEPs, however, as corporations face a double whammy. First, they have to maintain the same level of excess capacity - because email has become such a mission critical tool for the modern business this is even more important than it is to the consumer ISPs and 1 Spoofing is the practice of hiding the sender’s real identity by making the email appear to come from a reputable source. 2 Phishers are adept at making emails appear to be from reputable sources, such as a bank, the purpose of which is to defraud readers out of the personal banking or credit card details so they can gain access to these accounts. 3 Spammers use a variety of methods to harvest email addresses. One method uses a bot or spider, which is a program that works its way through the internet looking for email addresses. Another method is called a dictionary attack where the spammer uses software to try every combination of letters and numbers that could possibly be used at a domain. Email Marketing Council, Direct Marketing Association, June 2007
Email Deliverability: How We Got Here and What Marketer’s
Should do About It


IEPs. Second, corporations face the hidden costs of lost productivity related to
dealing with Spam - from employees having to filter these unwanted messages out
of their inbox to the downtime that comes from virus attacks. A study released by Nucleus Research in May 2004 put this cost at $1,934 per employee per year. At this point we can see a business case developing that ISPs, IEPs and corporate domain owners need to do something to protect their organisations from the cost and security exposure stemming from all forms of Spam. In response to this threat, domain owners have started using various tools to block unsolicited commercial emails from entering their systems and forcing a class system on the emails they do accept by either labelling the messages as spam, filtering them into a special folder, such as the bulk mail folder, or limiting their functionality by blocking images or link destinations. It is not the intention of the ISPs however, to block commercial emails that have been requested by their users. They explain that any of these that are blocked are ‘false positives’ or emails that they would see as legitimate that are getting identified as spam and blocked in error. They further claim that these false positives are small in number, are an unfortunate by-product of the system and part of doing business for marketers. Impact on the Marketer
There are some in the email marketing community, however, that argue that ISP/IEP
blocking is systemic and more than just a few false positives. Everybody can see
how a campaign or a mishandled list could cause a temporary block, but the fact that the bigger ESPs have been forced to hire whole departments to handle ISP/IEP relations is evidence to some that the ISPs/IEPs are taking things too far. This argument may have some validity and it is important that the industry continue to work to build good relations with the ISPs and IEPs. All of this, however, is not going to do the marketer any good when they are sending out that all important campaign. What they need to know is how a block could affect the ROI on the campaign and whether the additional costs to remove the block are justified in this instance.
Cost of a Block
In its simplest form the cost of a block is calculated by multiplying the expected
return per email delivered by the number of emails blocked. As shown below where total cost of the block is TCB, the return per email is RE and the number of emails Depending on your program, RE can be made up of lost revenue due to sales not being made or by additional cost associated with servicing customers through a more expensive channel. An example of this additional cost would be where a company includes tips and tricks, search our support, or FAQs in the email to avoid having the customer call the contact centre. A more mission critical example would be with Email Marketing Council, Direct Marketing Association, June 2007
Email Deliverability: How We Got Here and What Marketer’s
Should do About It


While this certainly makes up the bulk of the costs it is not the whole cost associated
with a block. There are both campaign related overheads and corporate overheads
that should be factored in as well. The campaign related overheads include anything that was spent specifically for that campaign such as design and creative, data purchased, lost advertising revenue, cross charges paid to the internal data centre, etc. The corporate overheads would include primarily staff costs to run and support the campaign. These elements can be added to the original formula where COH is the total campaign overheads, TES is the total number of emails sent and CCH is the total of the corporate overheads that can be applied to this campaign. So the expanded The next element of cost would be the opportunity cost of any time needed to explain the issue to senior management and resolve if necessary. We will represent this as U. There are also costs that are much harder to quantify surrounding the damage to the brand resulting from your recipients not getting an email that they had requested. We are going to leave that element out as it would be almost impossible to calculate on a case by case basis. The final formula therefore looks like: TCB = (RE + ((COH+CCH)/TES)) X B + U To look at this another way, the total cost of a block is calculated by adding the per email amounts for: • the additional expense of servicing the customer through an alternate channel • the wasted marketing and corporate overheads
This sum is then multiplied by the number of emails blocked. You then need to add
in an amount to cover the time and hassle of explaining this to management.
Unblock or Not?
It turns out that it is the relationship between U and RE that is critical in determining
the marketer’s response to a block. The rest of the equation is a sunk cost because the money has already been spent and cannot be recovered. Additionally, if RE is not greater than (COH+CCH)/TES or the expected return per email does not exceed the costs of sending that email, then the campaign was a loser from the off. Consequently, the cost of sending the email has no bearing on the future decision. Only if RE X B is greater than U should the marketer work to resolve the block. In other words, the expected return per email times the number of emails blocked must be greater than the cost to explain the block to senior management and more importantly to resolve with the ISPs before the marketer lifts a finger to remove this That said if the block remains we would have to look at the expected return across all future campaigns, which could dramatically change the equation. This discussion 4 Total emails sent is equal to the number of emails delivered plus the number of emails blocked. Email Marketing Council, Direct Marketing Association, June 2007
Email Deliverability: How We Got Here and What Marketer’s
Should do About It


however, does highlight two important points. First, emails will get blocked and
marketers need to take a deep breath and do some analysis before making an
ultimately fruitless attempt to get all of their emails delivered. Second, Spammers don’t worry about getting blocked. They know that their U is going to be ridiculously high and they can mail to different addresses at other domains. Spammers need infinitesimal conversion rates to have a positive ROI. The Methods for Blocking & Filtering Emails
So we know that emails are getting blocked and filtered but how do they do it? The
most important thing to remember is that there is a hierarchy in how these methods and tools develop. The mail receivers will implement a new tool or technique and the spammers will quickly find another way around, which the receivers will work to head off. At the same time the average email marketer is months if not years behind Initially the receivers were trying everything they could think of and each developed their own processes. At the same time they also did not see any incentive to working with legitimate marketers to make sure opt-in emails were delivered to the consumers who had requested them. In January 2003, a group of email service providers in the US came together forming the Email Service Providers Coalition with a view of putting a sensible plan forward as a starting point for discussions with the ISPs and IEPs. This plan was called Project Lumos and is built on four fundamentals: • Authentication – Ensuring that the email is from who it appears to be from • Reputation – Identifying whether the email sender follows recognised • Education – Changing consumer behaviour and attitudes towards email • Legal Reform – Changing the law to cover 21st century issues It was never the intention of the ESPCC that Project Lumos would be adopted as proposed but they hoped that it would form a basis for dialogue with the ISPs and IEPs. In this, Project Lumos was an unqualified success. The outcome was two different methods for authenticating senders and at least two major reputation services. It also positioned the ESPCC to have a big voice in lobbying the United States Congress for the Can-Spam Act of 2003.
DomainKeys
DomainKeys is one of the authentication systems developed and was originally
designed by Mark Delaney of Yahoo! with high levels of collaboration from many other experts in the field. It adds a header to each email message called a domainkey-signature, which includes an encrypted code. It also includes a plain text code around the message body. The receiver uses information in the header to Email Marketing Council, Direct Marketing Association, June 2007
Email Deliverability: How We Got Here and What Marketer’s
Should do About It


perform a DNS lookup. From the DNS lookup the receiver gets the public key
needed to decrypt the code in the header. If the decrypted header code matches the
plain text code then the message is actually from the sender and has not been tampered with since leaving the sending server. • The positive identification of the sending domain reduces the chance of false positives on both black lists and white lists. This positive identification of the sending domain virtually eliminates domain spoofing which is a key to • Forged emails can be blocked before they enter the ISP, IEP or corporate domain, thereby reducing both the drain on bandwidth and the risk posed by the email. Clearly this system will not eliminate spam or other abuse but it does allow the perpetrators to be tracked more easily. The other problem is that the plain text code can be corrupted by some email forwarding mechanisms.
Sender Id/Sender Policy Framework (SPF)
While the SPF concept was being presented in a 2002 paper titled “Repudiating Mail-From,” written by Paul Vixie, and development had been started by Meng Weng Wong working with a large community of developers, another authentication system was developed. Sender ID was created by an industry working group that controversially added the third authentication framework, developed by Microsoft, called “Caller-Id”. Because of the similarities in these systems and the politics surrounding these issues, they were combined. This system allows a domain owner to identify which machines are authorized to send email with a return address to that domain in a special DNS record. For example should the DMA decide to implement SPF, they would use the special DNS record to identify which servers (using their IP addresses) are allowed to send emails with a DMA.org.uk reply address. If some other machine sends an email with a DMA.org.uk reply address, these messages can be blocked by receivers who check
these SPF records.
Bonded Sender® and Sender Score Certified®
Both DomainKeys and Sender ID/SPF are forms of authentication; they allow the receiving domain to positively identify both the sending IP address and in the case of Sender ID/SPF ensure that the sending machine is authorised to send emails for that domain. What it does not do is give the recipient any idea of the reputation of the sender. Bonded Sender® was a program that was originally developed by IronPort® who signed a partnership with Return Path® in April 2005 to develop, operate and market the program. 5 DNS or domain naming service is the system that allows users to type in a URL and for their browser to direct them to the somewhat more cryptic IP address. Other information can also be stored in the DNS record which is used by a receiving email server to authenticate the sending Email Marketing Council, Direct Marketing Association, June 2007
Email Deliverability: How We Got Here and What Marketer’s
Should do About It


The Bonded Sender® program was made up of two main elements: certification and
a financial bond. The certification process is managed by TRUSTe® which describes
‘independent, non-profit enabling trust based on privacy for personal information on the Internet. We certify and monitor web site privacy and email policies, monitor practices, and resolve thousands of consumer privacy problems every year.’ This certification ensures that the sender has a history of following good email practice and independently establishes their reputation. The second element of the Bonded Sender® program was the financial bond. The size of the bond was linked to the volume of email sent by the sender and is a significant sum designed to weed out only but the most reputable senders. This bond was then debited based on consumer complaints received by the program. This program had a number of benefits. Firstly, this self regulation model promoted the adoption of best practices for all reputable senders. Secondly, by using a recognised independent third party to complete the sender certification, consumers had faith the program was not used by spammers. In April of 2006, Return Path® re-launched the Bonded Sender program as Sender Score Certified®. Other than the name, there were two major changes to the program. First, the bond element was dropped. The second change is that Return Path® have raised the compliance standards based on the data they have collected since the Bonded Sender® program was launched. This new program also provides greater reporting to let participants know how they are performing against the standards of the program. Failure to keep within the complaint thresholds will cause your sending IP to get blocked. Return Path® also advocates the use of feedback loops from their users including MSN/Hotmail which is
their biggest.
Goodmail CertifiedEmail
The CertifiedEmail program is also an authentication and certification system, which was launched in early 2006. This initial launch was in a pilot mode limited to the US and Canada only. Both AOL and Yahoo! were early adopters of the program with AOL using it for all emails and Yahoo! limiting their participation to transactional emails Goodmail launched in the UK in May 2007. Like the Sender Score Certified program there is a sender certification process, but this is limited to the client companies. Email Service Providers, on the other hand, are limited to partner status only. While Goodmail partners with TRUSTe, they manage the certification process in house. Email Marketing Council, Direct Marketing Association, June 2007
Email Deliverability: How We Got Here and What Marketer’s
Should do About It


After accreditation email senders pay a nominal per email fee to ensure that their
emails bypass the filtering systems of partner ISPs. In return for the fee, the sender
gets guaranteed delivery as well as a special icon denoting the certified email in the inbox, full functionality of all links and no image blocking. Goodmail launched in the UK in May 2007, creating a premium class of email for the first time. For some types of email, such as order confirmations and regulatory notifications, paying the premium to ensure deliverability may make good business sense. As of the date of publication, however, it is too early to see the impact that this two tier system will have on the email market in the UK.
White Lists
Not all delivery programs, however, are managed by third parties. ISPs and other email receivers use white lists to fast track deliverability for emails from reputable senders. While being on an ISPs white list is not a foolproof way to get your email delivered, they do significantly reduce the rate of false positives. Each ISP has different rules and procedures for getting on their white list but in general they are: • Always include a prominent unsubscribe link and promptly respond to all • Use separate IP addresses for different lists • Keep email lists clean by scrubbing invalid addresses • Monitor and react to ISP feedback collected both on your email server logs Including your brand in the from address and subject line Implementing SPF/Sender ID and Domain Keys Some ISPs also maintain “Enhanced White Lists”. As their name implies these are white lists with higher standards for inclusion, which further improve deliverability to that ISP.
Content Filtering
Unlike the programs listed above, which requires email marketers to take active
steps to use, filtering tools used by email receivers look at the image, text content and the underlying code of the email and use heuristic or Bayesian rules to determine if the email is legitimate. The ISPs would use this as a secondary system if the sender cannot be validated using one of the authentication or reputation systems mentioned above. Users, however, also use these systems locally to filter emails that make it through the ISPs systems. There are three things to remember about these rules based systems. First, no single rule will cause an email to be blocked. They measure the email against all of the rules to give it a spam score. If the score exceeds the threshold set by the user, the email will be rejected. The second thing to remember is that emails blocked by content filters will have been reported as being delivered because they have been accepted by the mail server and are blocked at the inbox. Finally, the third thing to remember is that these rules change on a daily basis, so marketers need to monitor changes in how these rules are used. Email Marketing Council, Direct Marketing Association, June 2007
Email Deliverability: How We Got Here and What Marketer’s
Should do About It



Real Time Black Lists
Real time black lists (RBLs) were the first attempts to limit the amount of Spam on
the internet. A RBL is a list of IP addresses and domains that send Spam. Credited with creating the first RBL is Paul Vixie of the Mail Abuse Prevention System (MAPS). ISPs and other email recipients can subscribe to one or more of these lists and block all incoming email from IPs and domains on the list. ISPs do not maintain their own RBLs in the sense that they do not let other use their list. ISPs do however maintain lists of IP from which they will not accept email. RBLs have frequently been surrounded in controversy. From the email sender side, getting on an RBL is a somewhat arbitrary process and RBLs are often seen to be uncooperative toward removing legitimate senders that have been placed on the list in error and therefore a restraint of trade. At the same time consumers have also had problems with RBLs that list ranges of dynamic and dial-up IP addresses, as this can block those who run their own mail server or people connecting to the internet Increasing Deliverability
Now that we have a better idea of how emails get blocked, we will look at ways to
improve email deliverability. The techniques to improve deliverability can be grouped

Permission
Permission is the key to all deliverability. In the UK, the legal requirement is that you
get the subscriber’s permission by them taking a positive action, which is fully informed and freely given before sending an unsolicited commercial email. There are 1. Business to Business emails sent to staff of limited companies and public limited companies with content that relates to business products or services. 2. Business to Consumer emails sent to individuals when all the following (i) email address collected in the course of negotiations for the sale of (ii) consumer told email address would be used for marketing purposes and offered an unsubscribe facility (easy to use and free of charge other than the cost of transmission) at the time of data collection Email Marketing Council, Direct Marketing Association, June 2007
Email Deliverability: How We Got Here and What Marketer’s
Should do About It

(iii) the marketing relates to similar products and services of the organisation which collected the data; and (iv) the identity of the sender not disguised. Staff of sole traders and partnerships should be treated as individuals above under Business to Consumer regardless of whether the marketing relates to consumer or business products. Following guidelines on opt-in and opt-out are vital components of permission. For example, a marketing director at a stationery supply company wants to send an email to businesses that may benefit from stationery products. There is no need to have prior consent as long as the recipients work for a limited company. On the other hand, a marketer for a clothing company cannot send an email to the same population promoting their products, because, while it is important to be dressed at work, clothing does not relate to the recipient’s job in most cases. For the business to consumer exclusion to the opt-in rule, the email address must have been collected as part of a negotiation or sale and advertises a similar product or service. In the UK a negotiation is defined as beginning when the seller quotes a price to the consumer. For example, if a consumer places a number of items of clothing in a shopping basket and provides their email address as part of this process, it is permissible to email these consumers clothing related offers in the future. It would not be permissible to mail this consumer offers for furniture, even if these items are sold by Neither the B2B carve out nor the prior negotiation exclusion are considered best practice by the ISP community. They feel it is best practice to acquire a positive opt- in for all forms of email marketing. This is a higher standard than the DMA’s own best practice guidelines, the DMA code and the law. Readers should refer to the DMA’s Best Practice document (June 2007). When using either exception, however, it is important to remember that all marketing emails must include an opportunity to opt-out of future communications.
Collecting the Opt-in and Confirmation Emails
There are two components of permission. The first of these is the opt-in, which is simply asking potential subscribers if they want to receive marketing email communications from you and getting their email address. This can be done anywhere on your web site but a few things should be included with the registration process. First, there must be a clear link to your privacy policy, which details how you will handle the registrant’s data. You should also set the recipients expectations appropriately by detailing what you intend to send and how often. Where possible you should let the recipient dictate content, message type (HTML vs. plain text) and frequency. This is also a good time to collect additional data that would be useful for your program, but remember to explain how this data will be used and how giving this data will benefit the recipient. Email Marketing Council, Direct Marketing Association, June 2007
Email Deliverability: How We Got Here and What Marketer’s
Should do About It


The second part of getting permission is confirming that permission. This should
always be done by sending out a non-commercial welcome (NCW) email. This email
should remind the recipient of the benefits of the email program. It is also a good opportunity for marketers to get users to add their from address and domain to safe senders lists (a locally managed white list). Finally, the NCW, like all marketing emails, must include a prominent unsubscribe link to provide recipients to prevent future emails if they were registered in error. At this point, the NCW described would be used for confirmed opt-in. What the sender has done is confirmed that the email address is valid and given the owner of that address the opportunity to unsubscribe if they registered in error. This is the minimum best practice standard. A higher standard is called double opt-in, where the recipient has to take an additional positive action by clicking on the NCW email. The upside of this approach is that there can be little ambiguity of the intentions of the recipient and they are likely to be very engaged with the email messages. The downside to this approach is the drop off of recipients who registered but do not follow up by clicking on the It is also possible to collect valid opt-ins from off-line sources such as a contact centre, product registration cards and retail outlets. Data quality is always an issue when data is collected off-line, so these addresses need to be treated differently. First, until you have confirmed the email, it is best to segregate these addresses from the rest of your list both in your database and by sending them separately (ideally through a separate IP address). Second, as a practical matter, using double opt-in here gives you a digital audit trail for the opt-in.
Opt-out
Email marketing is all about permission and the recipient has the right to revoke their permission at any time. It is not only a legal requirement that the sender act on this revocation but this is also the best way for the sender to protect their brand. Each email sent must include an obvious unsubscribe mechanism. It is best practice that a registrant can unsubscribe in one or two clicks and that unsubscribe requests are processed by the sender in near real-time. Some feel that putting the unsubscribe link at the top of the email and/or using the same font size as the rest of the text are also best practice. Recipients may prefer to notify the sender of an unsubscribe request through any of the customer touch points such as contact centres, retail outlets or in the post. It is
important that the sender be able to process these requests in a reasonable amount
of time regardless of the channel.
List Hygiene
After opt-in/opt-out policies and practices, maintaining list hygiene is the most
effective way to maintain high deliverability rates. In off-line direct marketing, the cost of producing and mailing each pack acts as a deterrent to over mailing campaigns. In email marketing, however, the marginal cost of each additional email Email Marketing Council, Direct Marketing Association, June 2007
Email Deliverability: How We Got Here and What Marketer’s
Should do About It


does not hold the same disincentive. The result is that list owners have become lazy
in removing invalid email addresses.
There are many reasons for email addresses becoming invalid. The first source of invalid email addresses is poor data collection. This is especially troublesome when email addresses are collected through offline means such as using the contact centre, product registration cards, etc. Using a confirmation email helps validate addresses collected offline, but only if the sender stops sending to addresses where the emails bounce. Similarly, email addresses churn periodically and will become invalid and it is important that senders stop sending to these invalid addresses. Part of the SMTP handshake that transfers an email from the sender’s server to the receiver’s server is an acknowledgement of what the recipient is going to do with the email it has received. Recipient servers pass back codes letting the sender know among other things if the target email address is no longer valid. Processing this information to minimise the number of invalid email addresses on the list is not only best practice, it will also improve the sender’s reputation with recipients. In addition to codes indicating bad email addresses, recipients pass back a number of these bounce codes indicating both soft and hard message failures. In general, soft bounces occur when a message cannot be delivered for reasons that are temporary, while hard bounce failures are permanent. Ideally, senders will understand each code and act accordingly in marking addresses invalid on their email lists. In practice, however, it is not always as straight forward. SMTP bounce codes were set in 1982 and have been in use since. While the codes are set, how they are applied is up to the network administrators managing each recipient domain. As a consequence, most senders have adopted business rules around the number of bounces needed to make an address invalid. The best practice rule of thumb is to make email addresses invalid after three consecutive bounces. It is possible, however, for senders to reverse engineer how each major ISP uses the codes and therefore adjust the rules around the number of bounces needed to invalidate and email accordingly. For example, some SMTP response codes should drive invalidation in the first instance, but other softer bounces (like mailbox full) should drive invalidation after as many as six bounces. Another difference between off-line and on-line direct marketing surrounds recipients who could be classified as chronic non-responders or inactives. The costs associated with offline communications means that these inactives would be excluded. This is not the case in the online world where the marginal costs of each additional email are fractions of pence. Costs, however, should not be the driver for eliminating inactive recipients but rather the marketer’s desire to protect their brand by sending information only to those recipients that want it.
ISP and IEP Relations
Regardless of how carefully you collect your opt-in data, process unsubscribe requests and maintain good list hygiene, you will occasionally find yourself being blocked. It is at this point you may need to contact the abuse experts at the ISP. The Email Marketing Council, Direct Marketing Association, June 2007
Email Deliverability: How We Got Here and What Marketer’s
Should do About It


first place to look for information is at the ISP website. Here you will frequently find
an FAQ page which will give you an idea of the source of your block. This area will
also frequently give you contact details if you need to speak with somebody. When speaking to an abuse representative, you should have all of the information to hand that they will need to help you. This includes: • The date and time when the block started (if possible) • A copy of the message that caused the block • The IP address or range that is being blocked While it is not guaranteed, frequently just the fact that you called is enough to get your first block lifted. Spammers never call to get blocks lifted, so your willingness to call gives you and your brand some legitimacy. Getting the block lifted, however, is not the only reason for the call. You should also try to establish why you were blocked in the first place, so you can take corrective action and ask for advice on how to prevent future blocks. A quick count on the domains in your email list will tell you which ISPs are the most important to you. Depending on the impact that a block would have, it may be worthwhile to proactively begin to build relationships with these ISPs. You can begin this with an introduction of yourself and your brand that explains what you are doing and how you collected your data. This is also a good time to ask advice on how to prevent blocks. The Future of Email Deliverability
As stated earlier, Spam exists because it works. The economics of Spam are such
that an almost infinitesimal response rates becomes profitable. This gives the Spammers the economic incentive to be one step behind the ISPs in identifying new ways through the filters, if not closer. Legitimate email marketers are always going to be farther behind this development curve. It is this gap that is being filled by companies like ReturnPath® with their Sender Score Certified® program and Goodmail® with their CertifiedEmail® offering. This intermediary space will continue to grow and will become increasingly crowded with companies that offer accreditation services. At the same time, authentication technology will continue to develop. There have been proposals to fundamentally change the way SMTP works to make the entire email system more secure and less vulnerable to Spam and phishing techniques. This will take years to be adopted as internet standard and even more time to be implemented, assuming it can be agreed in the first place. In the meantime, there will be incremental advancements to DomainKeys and SPF/Sender ID as well as the development of new standards. It will continue to be important that senders keep up with these changes. Email Marketing Council, Direct Marketing Association, June 2007
Email Deliverability: How We Got Here and What Marketer’s
Should do About It


Conclusion
Unlike marketers in other disciplines, email marketers have to worry about getting
their messages to their intended recipients. Regardless of how much time you spend
on getting the copy just right and the care you put into your creative, it is all wasted if your message is not delivered. The volume of spam is driving the ISPs to block emails. Currently 80% of email traffic is spam, so there is a legitimate financial reason for the ISPs to control the amount of spam traffic on their networks. The challenge in effectively blocking Spam, however, stems from weaknesses in the fundamental design of SMTP, which makes it hard for ISPs to decide which emails are legitimate and which are not. SPF and Domain keys are two technical solutions that allow ISPs to authenticate who the email is really from, but these do not provide into the reputation of the sender. Reputation is at the core of both the Sender Score Certified and Goodmail Certified Email programs. Aside from these technologies and programs, email marketers should follow basic data hygiene rules that will allow them onto the ISPs white lists and hopefully off real time black lists. Going forward there will be a number of technical advances as well as other third party reputation services entering the market. Email marketers will have to keep abreast of these developments if they want to continue to receive their high rates of delivery. Email Marketing Council, Direct Marketing Association, June 2007

Source: http://www.t2dgroup.co.uk/downloads/Email%20Deliverability%20How%20we%20Got%20Here.pdf

Microsoft word - ringworm_scalp_instruction.doc

CINCINNATI HEALTH DEPARTMENT SCHOOL HEALTH PROGRAM SCALP RINGWORM INSTRUCTION SHEET (TINEA CAPITIS) *Your child must bring back a doctor’s note upon returning to school. If your child is diagnosed with scalp ringworm, the recommendations for treatment include the following: • Scalp ringworm is treated by an oral prescription medicine such as Griseofulvin, or Nizora

mpfn.gob.pe

El Proceso Legal: ¿Tendré que atestiguar ante el Gran Jurado, y si es asi, cuando? ¿Si decido entablar juicio, qué debo hacer? En la mayoría de los casos, usted no tendra que ates-Una vez que usted tome esa decisión, se le pedirá que envíetiguar. Si se le pide atestiguar, una consejera/o dela la agencia de policía que maneja su caso, una declaraciónCentro Contra el Asal

Copyright 2014 Pdf Medic Finder