Tagdata hygiene

Data Cleansing part 2

In an effort to get a blog post out yesterday before yet another doctor’s appointment I did not do nearly enough research on the company I mentioned selling list cleansing data. As Al correctly pointed out in the comments they are currently listed on the SBL. And when I actually did the research I should have done it was clear this company has a long term history of sending unsolicited...

Data Cleansing

According to Ken, Outward Media has productized a database of 300,000,000 email addresses that should never be mailed. OMI’s Clean-Send Suppression Database can help to protect your email sender reputation and save you valuable marketing dollars. In a nutshell, OMI Clean-Send is a database consisting of approximately 300 million negative email records (spam traps, foreign IP’s, hard bounces, and...

More than just getting past the filters

I’ve been feeling a little philosophical lately. My thoughts are meandering a lot around the whys and the deeper issues surrounding stuff, including email. It means I’m a bit more distracted and less focused than usual. And more prone to pose questions than usual. This was part of the introspection that led me to write the motivating people post last week. I’m trying to figure...

Data hygiene and bouncing zombies

There are a number of folks who tell me there can be no zombie addresses on their lists, they aggressively remove any address that bounces. The problem is that zombie addresses don’t bounce, at least not always. And even when ISPs say they have a policy to bounce email after a certain period of time with no access, that’s not always put into practice. How do I know that ISPs...

Data hygiene

I talk about data hygiene with clients a lot. In my experience, poor data hygiene is the number one reason that legitimate, permission based marketing ends up in the junk folder. Too many marketers don’t remove abandoned addresses from their mailing lists. As the abandoned addresses build up, eventually the list accumulates enough zombie addresses that it looks similar to a spammer’s...

Six best practices for every mailer

People get into all sorts of details when talking about best practices. But so much of email depends on the type of email and the target market and the goals of the sender. It’s difficult to come up with universal best practices. I’ve said in the past that I think that best practices are primarily technical. I don’t believe there is a best frequency or a best time to send mail...

It would be nice…

It’d be nice to have a tool to uncover the zombie email addys, but until then, read this from @wise_laura: Kelly Lorenz There’s currently not a programmatic way to make those determinations, but this is where the relationship between senders and receivers comes in. All you have to do is ask recipients what they want. I know, I know, most marketers have a low opinion of the ability or...

Nothing is forever, even email

Yesterday I talked about how important it was to send welcome messages when you discover old email addresses. Today on the Return Path Blog, Tami Monahan Foreman shares an example email that does just that, but not as well as one might hope. You are receiving this email because sometime during the past 20+ years you have registered with PACE, or one of our affiliated companies, to receive free...

Broken signup processes

DJ Waldow wrote a post on explicit permission over on Mediapost. I think he hit on some interesting bits and wanted to comment on them. In order to comment on a Mediapost blog, you have to register. I’ve thought about it before, but every time I start the process I get to the page asking for detailed demographic information and decide no. This time, I was inspired enough by DJ to get to the...

Recent Posts

Archives

Follow Us