Growing your list carefully

Karl Murray wrote a great set of recommendations for growing an email marketing list. I really can’t think of anything I would have said differently. Touching customers and getting contact information from them is great, but there are situations where this gets bad addresses. Too many bad addresses can impact delivery.
So how do you grow your list without falling into a delivery trap? The specific recommendations, as always, depend on your specific situation. But knowing how bad addresses get onto your list will allow you to implement mitigation strategies that actually work.

Types of bad addresses

Typos
These are usually addresses typed in by the user during a transaction. In my case, my fingers can type wordtothewise.com very quickly, but at least 1 time in 10 I type wordtotehwise.com or something similar. My fingers just get away from me. Other people can typo their username or their domain name.  Many typo domains are used by various spam filtering companies as spamtrap domains and any mail to them can result in blocked mail. Username typos won’t always lead to blocking, but if you have a lot of them, then the complaints may hurt your reputation.
Data Entry Errors
These usually happen when the user writes down their email address and it’s later transcribed into a database or when an address is taken over the phone. Many people have horrible handwriting, increasing the chance that the address is wrong. Plus, there are all the risks of typos during the data entry.
Purposely bad data
These cases are where stores give discounts or other incentives for addresses at point of sale. The customer doesn’t necessarily want email from the store, but is happy to claim their 5% discount or free gift. One of our local brew pubs actually gives free beers during special events if the customer “signs up for their mailing list.” I can only imagine how many people will give a fake address just for a free beer. Some of these addresses are obviously bad (none@none.com, asdf@asdf.com, etc) but some of them are just randomly made up or belong to other people.

What can senders do to protect themselves?

When collecting addresses at the point of sale, have the have the user type in the address or read the address on the screen before submission.
Collect addresses electronically rather than on paper for later transcription to minimize data entry errors.
When collecting email addresses over the phone, try to send a message during the call to confirm the recipient can receive it.
The first email sent to any recipient should always have a link for “This is not me” so the mistaken recipient can notify you that the address is incorrect and should not be mailed again.
Always send a welcome message. This should be sent as soon as possible, ideally before the user leaves the website or the register. In stores people with smart phones can be encouraged to check their mail right there to make sure they’ve received it. If the message bounces and that information can be pushed back to the register the company associate can ask for a correct address before the end of the transaction. The same bounce data can be pushed back to the website to give the user the opportunity to correct the address.
If you’re collecting addresses by giving things away, send a welcome message, or a welcome series, but do not add those addresses to your main list unless and until there has been some positive activity.
Overall, consumers expect to be asked for their email address during most every interaction with a business. This is not a bad thing, but does mean that the business needs to have processes in place to make sure their data is clean. Clean data is more responsive data.
 

Related Posts

Sending mail to the wrong person, part eleventy

Another person has written another blog post talking about their experiences with an email address a lot of people add to mailing lists without actually owning the email address. In this case the address isn’t a person’s name, but is rather just what happens when you type across rows on they keyboard.
These are similar suggestions to those I (and others) have made in the past. It all boils down to allow people who never signed up for your list, even if someone gave you their email address, to tell you ‘This isn’t me.” A simple link in the mail, and a process to stop all mail to that address (and confirm it is true if someone tries to give it to you again), will stop a lot of unwanted and unasked for email.

Read More

Email verification – what are we verifying

One of the ongoing discussions in the email space is the one about address verification. Multiple companies have sprung up to do “real time” email address verification. They ensure that addresses collected at the point of sale are valid.
But what does valid mean? In most of these contexts, valid means that the addresses don’t bounce and aren’t spam traps. And that is one part of validating email addresses.
That isn’t the only part, though. In my opinion, an even more important thing to validate is that the email address belongs to the person giving it to you. The Consumerist has had an ongoing series of articles discussing people getting mis-directed email from various companies.
Today the culprit is AT&T, who are sending a lot of personal information to an email address of someone totally unconnected to that account. There are a lot of big problems with this, and it’s not just in the realm of email delivery.
The biggest problem, as I see it, is that AT&T is exposing personally identifiable information (PII) to third parties. What’s even worse, though, is that AT&T has no process in place for the recipient to correct the issue. Even when notified of the problem, support can’t do anything to fix the problem.

Read More

Uploading your address book to social media

I am one of the moderators of a discussion list working on a document about getting off blocklists. If anyone not on the list attempts to post to the list I get a moderation request. One came through while I was gone.
linkedinspam Now, I don’t really think Jim Mills wants to be friends with a mailing list. I think he probably gave LinkedIn his email password and LinkedIn went through and scraped addresses out of his address book and sent invitations to all those addresses.
I don’t have any problem with connecting to people on social media. I do even understand that some people have no problem giving their passwords over to let social media sites plunder their address books and find connections. What I do have a problem with is social media sites that don’t do any pruning or editing of the scraped addresses before sending invitations.
In this case, the email address, like many mailing lists, has in the email address “mailman.” While it’s probably impossible to weed out every mailing list, support address and commercial sender, it doesn’t seem like it would be too difficult to run some minor word matching and filtering. It’s not even like those addresses have to be removed from invites. Instead they could be presented to the user for confirmation that these are real people and addresses.
Yes, it’s friction in the transaction and it costs money to do and do well. But those costs and friction are currently offloaded onto uninvolved third parties.

Read More