Thinking about the concept of best practices

In 2010 Chad White declared best practices dead.

Frankly, the term has always been too “big tent” to be truly useful. When “don’t buy email lists” and “use buttons for primary calls-to-action” are both best practices, it’s no wonder there’s confusion. What we need is new language that differentiates those practices that are a litmus test for legitimate email marketers vs. spammers, from practices that are simply wise.

He went on to define a set of Ethical Imperatives that all legitimate marketers should follow in order to separate themselves from spammers. These imperatives entered around permission and gaining informed consent from recipients. At the time this article was published, I wrote a blog post agreeing with him about how the term best practices is meaningless. This is reflected in my blogging, over the years I’ve written fewer and fewer posts tagged with Best Practices.

Many of the posts I have written about best practices mention permission and then focus on the technical things every mailer should do as a responsible mailer. But even then, much of the time I write about them as minimum practices, not best practices. They are the bare minimum practices that bulk mail should conform to.

But are those really best practices? As I think about it more and more the answer is really no. Best practices are not the minimum practices. They’re actually being thoughtful and doing things right. To me, best practices should take some effort to get right. They need to be more than simply the minimum standard. What do I mean by that? Let’s look at some specific examples.

I state that every email should be authenticated. At a minimum that means either having SPF or DKIM and it doesn’t mention what domains are authenticated. Many small companies using Mailchimp or other mail providers send authenticated mail, but all the mail is authenticated with Mailchimp’s domain(s). A better practice is authenticating with both SPF and DKIM and having the d= point directly to you. A best practice is to have both SPF and DKIM authenticated with your own domains and aligning with the 5322.from.

We can go through the same thought process when discussing permission. Email addresses should be collected with permission. At a minimum that means having an opt-in notice on a website where the address is collected. Better practices are to require the user to actually take an action to opt-in, like checking a box. Best practices are to do a round trip confirmation to link the person giving the email address on the website with the person receiving the email.

Another feature (?) of best practices is that doing them doesn’t necessarily improve deliverability. They’re good things to do, they’re the right thing to do, they’re even the best thing to do. But they’re not always going to get your mail to the inbox. Many of the minimum practices will get >95% of mail to the inbox. Improving practices isn’t necessarily going to get you that last 5%.

Best practices are about going the extra mile to do things correctly, whether or not they actually benefit you.

 

Related Posts

Best practices or required practices

What really are the best practices for email?

A year ago I wrote a post about best practices and how most of my best practices were different from what other people recommend. I don’t talk about rules for frequency or subject line length. I don’t focus on best practices for bounce processing or content length.
BestPracticesBallMy best practice recommendations are really about process.

Read More

Questioning standards

M3AAWG publishes documents summarizing and discussing current practices for stopping and preventing abuse. Some of these documents are focused on ISPs while others are focused on marketers. While M3AAWG is not directly nor officially a standards body, most of the documents have been written by members and reflect the best current practices for that document.
Members have been asked to leave the organization and some companies are denied membership because they are not in line with the organizational values. Some of these companies are ESPs or marketers, but some of these companies have been ISPs as well.
The standards written by M3AAWG are challenging for a lot of marketers to follow. These standards are written with the input of senders, but they all comply with the M3AAWG mission of stopping messaging abuse. Many ISPs believe that unsolicited email is abuse, thus M3AAWG standards say that all mail needs to be sent to recipients who request that mail. Purchasing lists, selling lists, and appending email addresses are all unacceptable activities for M3AAWG members.
I never really had much concern about the effectiveness of the M3AAWG process. Most of the big industry players are there and many of the ISPs have an aggressive anti-abuse attitude.
But last week I saw a blog post on a fairly major industry blog that listed a bunch of (made up, tasteless and sexist) things “overheard” at the recent M3AAWG conference (it’s been removed and I wouldn’t link to it anyway). The blog post made it look like no real work gets done at M3AAWG and that the attendees don’t work at the conference. I won’t claim that it’s a staid and quiet conference, but most attendees work very hard during the day.
The next day, the author tweeted:

Read More