Best practices: a meaningless term

Chad White wrote an article for MediaPost about best practices which parallels a lot of thinking I’ve been doing about how the email marketing industry treats best practices.

After several conversations recently about “best practices,” I’m convinced that the term is now meaningless. It’s been bastardized in the same way that the definition of “spam” has shifted to the point that it has very different meanings to different groups of people.

I have actually had clients tell me things like “we follow all the best practices” only to tell me later in the phone call that they go out of their way to ignore opt-outs. When a company ignores opt-outs as a matter of policy and then feels safe claiming they follow all the best practices then the term is totally meaningless.
Best practices as I tend to think of them are technical implementations of commonly accepted policies. It’s how you translate intention into action.
With email marketing, though, there are very few commonly accepted policies. In fact, I’d argue that there are no commonly accepted policies. There’s not even any real consensus on whether or not permission is necessary to send email.
If you can’t even agree on the first principles, like permission, then best practices is a totally meaningless phrase. In fact, in many cases when a client tells me they follow all the best practices it tells me nothing about what they are actually doing. Instead we have to go back and establish what they’re drawing the term best practices from.
All of these things that just confirm Chad’s observation that best practices is a totally meaningless term.

Related Posts

TWSD: Using FOIA requests for email addresses

Mickey has a good summary of what’s going on in Maine where the courts forced the Department of Inland Fisheries and Wildlife to sell the email addresses of license purchasers to a commercial company.
There isn’t permission associated with this and the commercial company has no pretense that the recipients want to receive mail from them. This is a bad idea and a bad way to get email addresses and is no better than spammers scraping addresses from every website mentioning “fishing” or “hunting.”

Read More

Don't be Amelia

I have an adorable cat that I ‘taught’ that I would pet her if she tapped me on the arm or shoulder with her paw. It was cute for a while, but then she got more and more demanding. Eventually, she was clawing at my clothes and skin to get attention and petting.
It’s gotten to the point where I have to put a stop to it. She’s just getting too destructive to me and my clothing. So over the last two weeks I’ve been trying to only reward those touches that don’t involve claws and giving her a stern “NO CLAWS” when she does try to claw me.
As I was sitting here this afternoon, going through yet another round of NO CLAWS with her, I realized that my interactions with her were eerily similar to email marketing.
You see, Amelia started using her claws to get my attention because I didn’t always respond to her gentle taps. But claws hurt, and were a problem, so I would respond. This is exactly like marketers who don’t see a response to their email marketing campaigns and thus up the aggressiveness of those campaigns. More mail, more frequency, stronger offers, anything to get a response out of recipients.
Eventually, though, the recipient finally gets annoyed. The aggressive “taps” result in spam complaints. The sender has pushed the recipient from “it’s not so bad” to “make this sender stop bugging me.”
Email marketing is interruption marketing and there is only so much recipients will tolerate. And, trust me, few email marketers are as cute as my Amelia Cat.

Read More

Social network sends spam

Yesterday we talked about social networks that harvest the address books of registered  users and send mail to all those addresses on behalf of their registered user. In the specific case, the registered user did not know that the network was going to send that mail and subsequently apologized to everyone.
That is not the only way social networks collect addresses. After I posted that, Steve mentioned to me that he had been receiving invitations from a different social network. In that case, the sender was unknown to Steve. It was random mail from a random person claiming that they knew each other and should network on this new website site.  After some investigation, Steve discovered that the person making the invitation was the founder of the website in question and there was no previous connection between them.
The founder of the social networking site was harvesting email addresses and sending out spam inviting people he did not know to join his site.
Social networking is making huge use of email. Many of my new clients are social networking sites having problems delivering mail. Like with most things, there are some good guys who really do respect their users and their privacy and personal information. There are also bad guys who will do anything they can to grow a site, including appropriating their users information and the information of all their users correspondents.
It is relatively early in the social networking product cycle. It remains to be seen how much of an impact the spammers and sloppier end will have. If too much spam gets through, the spam filters and ISPs will adapt and social networks will have to focus more on respecting users and potential users in order for their mail to get delivered.

Read More