Industry Updates

AOL confirms move to shared mail infrastructure with Yahoo

Last week I wrote about the changes taking place at major email providers, specifically the convergence of AOL and Yahoo’s mail servers. Today on their Postmaster blog, AOL issued confirmation of these changes. The statement indicates the “majority of AOL’s MX records” will be routed to the new combined mail servers with little if any visible impact to senders.

The message also assured senders that established feedback loops (FBLs) should continue to function without interruption. While AOL notes that issues are unlikely, if you see any abnormalities postmaster@aol.com remains the best way to reach out for assistance.

– BG

Advertisements
Industry Updates

Changes

bowie-change
courtesy securosis.com

New year, new you…that’s what they always say, right? Just a few weeks into 2018, it seems like some of the big 4 ISPs (soon to be Big 3?) are really taking that concept to heart.

Microsoft’s major migration of Outlook.com to the Office365 backend was technically completed in 2017, but based on feedback from senders in industry groups delivery issues still abound. The indications from MS are that the mail handling and filtering infrastructure are a work in progress, but no formal statement has been issued to that end. Some senders have stated MS support is unable to provide remediation for many of these issues, even though there may be backend adjustments taking place. If you’re having trouble getting mail to Microsoft, just know you’re not alone and that someone over there is paying attention.

Verizon ended its own webmail service last year, and consolidated its AOL and Yahoo brands under the Oath moniker. AOL and Yahoo’s email services have remained separate thus far, but indications are that will change in the next few days. It’s been reported that the merger of these mail platforms starts in earnest on or around February 1st. As of that date, mail to AOL will be routed and handled by the Yahoo mail servers. To me this sounds a bit like the SBCGlobal arrangement between AT&T/BellSouth and Yahoo, wherein one provided the mail interface while the other handled the mail routing and filtering. At this time, no formal announcement has been made, so we’ll have to sit tight to find out exactly what this means for sending to AOL recipients.

– BG

Industry Updates

Gmail’s Inbox offers to unsubscribe recipients from mail they’re not reading

Last month Al Iverson at Spam Resource, along with Engadget and XDA developers, reported on a new feature of Google’s Inbox that prompts recipients to unsubscribe from mailings they don’t open. The card, which appears at the top of the interface, calls out mailings categorized as Promotions that the user hasn’t opened in the past 30 days and provides the option to unsubscribe or not, all with a single click.

Edit_Post_‹_DELIVERY_COUNTS_—_WordPress_com

Introduced in 2014, Inbox is Google’s next-gen email client. The app takes Gmail’s concept of the Tabbed Inbox to the next level, bundling messages by type and showing cards based on data found in emails – receipts for purchases, travel arrangements, and event tickets, for example. At the time of Al’s post the feature was live on the web and Android versions of Inbox, but I can confirm it has now arrived in the iOS version as well.

According to Litmus, Gmail accounts for roughly 26% of all email opens – second only to Apple’s iOS mail client. This doesn’t indicate what percentage of those openers use Inbox as opposed to traditional Gmail, but Google has previously indicated that Inbox has a significant number of users and in 2016 noted that 10% of all email replies on mobile came from the Smart Reply feature found within Inbox.

Google continues to innovate in finding ways to prioritize mail its users want and get rid of mail they don’t. Does your email strategy reflect that? If your sending patterns and list management foster engagement and interaction, you’re likely to see less of an impact from a change like this. Alternatively, if you’re still holding on to the “batch and blast” mindset, you may not be so lucky.

– BG

 

Best Practices, Delivery Essentials

Fact or Fiction: Can you REALLY clean spam traps from your email list?

320px-busted_in_rustEarlier this month I spent a week in sunny Toronto for the Fall M³AAWG meeting, featuring a variety of sessions and conversations around all things anti-abuse. At any industry event like this, spam traps are usually a popular topic of discussion (check out this post for a primer on spam traps and why they matter). Senders want to know how to avoid or get rid of them, while many blacklist operators consider them a necessary evil to help identify poor sending practices. One of the most hotly-debated questions regarding spam traps surrounds how to remove them from your list. Many senders and solution vendors claim to be able to identify and remove spam traps, while trap operators go to great lengths to keep their traps anonymous. Let’s look at a couple of the most commonly-cited ways of identifying spam traps and how effective they really are.

List Validation & Hygiene Vendors

As mailbox providers have made it harder to reach the inbox, list hygiene services have become a booming segment of the industry. While some employ dubious methods, even prompting a warning from Spamhaus, there are a number of services that are considered reputable and are commonly used by legitimate marketers and even ESPs. For our discussion, let’s focus on these more reputable vendors.

As a basic rule, list validation services will take your file of contacts and provide a grade or score for each record. The data will indicate whether the email address is confirmed valid, confirmed invalid, or somewhere in between. Most of these vendors claim (some more prominently than others) to be able to identify spam trap addresses. Therefore, if you believe or know you have traps in your list, you should be able to purchase these services and solve your problem, right?

Not so fast, hot shot. Spam traps are secret by nature – if you know an address is a spam trap, then it has lost its effectiveness. As a result, trap operators make efforts to ensure traps are not identified by any outside party, including validation services. The traps identified by these services may have been actively used in the past, but at this point have likely been abandoned by their operator. Even those traps that are still in use would represent only a fraction of the spam traps that exist in the wild. So you may clean a few traps off your list, but you’re not going to solve any major spam trap issues using one of these services.

Effectiveness grade: F

Segmentation and isolation

Over the years I’ve run across many senders (and even some vendors) who believe that identifying spam traps in your list is as simple as pinpointing the time of the trap hits and/or the affected message(s) and/or the group that contains the traps. These senders will often slice up affected lists, sending to smaller and smaller segments of contacts until they have isolated a very small number of records that are, or may be, traps. They can then remove these bad apples from the list and go on sending willy-nilly to the rest of the recipients.

In reality, there are a couple of problems with this approach. First, most trap operators or blacklist admins aren’t going to provide you with the type of data that is required for this process. If you are considered a relatively trustworthy sender, you might get very limited data about trap hits – a date or a subject line, perhaps – but this is almost always just a sample of the full data set. If you get details on a single trap hit, there are likely 10 or 20 or 100 more hits that you can’t see. Trying to narrow down your list based on incomplete data is not likely to generate accurate results.

Effectiveness grade: D

Nullification

Similar to the previous method, this process involves using data provided by the trap operator to isolate and remove affected recipients. This is most often implemented by senders who use highly targeted segments and who may be sending to only a few dozen or hundred recipients at a time. Because of the small segment size, the sender often finds it more appealing to simply remove the entire list that was targeted on the specific day or with the specific message identified as hitting traps.

While removing the entire recipient list could be a slightly more effective solution, this method suffers from the same deficiency as the last: lack of data. This method is only effective if the trap operator provides the full list of trap hits with timestamps – which is extremely unlikely. So even if you suppress the list of recipients called out for one hit, you are likely to be missing the lists that contain additional traps. .

Effectiveness grade: C-

As you can see, none of these methods are especially effective at resolving spam trap issues, and it’s for a simple reason: they address the symptoms (spam traps) instead of the underlying problem (poor list acquisition or hygiene practices). Many trap operators will recommend reconfirming your contact database, the only truly effective method to remove spam traps from your database. However, you’re likely to lose some valid recipients in the process so most senders will only do this as a last resort. We’ve found that a better solution is a hybrid approach that includes both engagement and confirmation elements.

Engagement-based list cleanup

One fact we know about spam traps is that they don’t open email (with very few exceptions). As such, excluding recent openers and clickers from your confirmation efforts will help minimize potential losses to your list. Once you’ve identified those recipients who haven’t engaged in the past 6-12 months, you can temporarily suppress them from further mailings, then send them a confirmation request. Those who engage with the confirmation request can be returned to your active mailing list, and the rest should remain suppressed.

Effectiveness grade: A

It’s nearly impossible to isolate and remove spam traps from your database, so it’s best to stop them from getting there in the first place. Getting clear permission for all new recipients and using an engagement-based list hygiene process can all but eliminate the risk of spam traps in your list and make sure you never need to put these methods to the test.

– BG

 

Industry Updates, Laws and Regulations

CRTC releases full decision on CompuFinder CASL appeal

canada-649858_1280

Yesterday, the Canadian Radio-television and Telecommunications Commission (CRTC) published their official decision on CompuFinder’s appeal of CASL penalties levied against them. You may recall CompuFinder was subject to the first CASL enforcement action in March 2015 and hit with a hefty $1.1 million fine for their violations. In the appeal, CompuFinder argued that the emails in question were not in violation of CASL in addition to challenging the constitutionality of the law.

In the original notice of violation, the CRTC presented CompuFinder with 3 specific email campaigns that were deemed to be sent without the recipients’ consent, and in at least one instance the message did not contain a working unsubscribe link. CompuFinder argued unsuccessfully that because someone at the receiving domain had purchased a training or resource from them in the past, they had established a business relationship with any recipient at the same organizational domain. Not surprisingly, the CRTC shot down this argument, lending credibility to the assertion that consent follows the individual and not the organization. However, while CompuFinder’s violations were deemed valid, the penalties for those violations was lowered from $1.1 million to $200,000.

In a separate document, the CRTC also rebutted CompuFinder’s constitutionality challenges, finding the Commission does hold jurisdiction to enforce these regulations and that the regulations themselves were within the authority of the Canadian Parliament to enact.

Like CompuFinder, many senders are hanging a lot of their CASL compliance efforts (or lack thereof) on the “existing relationship” clause of the law. As evidenced in this case, there is a very high standard of proof for that relationship and the scope is narrow. CompuFinder produced many invoices for purchases and historical records of their email campaigns to these recipients, but they weren’t able to provide what CASL requires – proof of consent. And while the fine was ultimately lowered, this decision should provide you with at least 200,000 reasons to make sure your consent and documentation are in order.

– BG

Industry Updates

Roadrunner FBLs shut down

320px-1968_road_runner_emblem_vaThanks to Laura at Word to the Wise for the official heads up that the Roadrunner (Time Warner Cable) FBL has been turned off as of today, meaning no more spam complaint data will be sent from Roadrunner’s servers to mail senders.

Personally, I would consider this a good opportunity to check your list for rr.com addresses to gauge potential impact, as well as making sure your unsubscribe link is prominent and functioning properly. Since Roadrunner users who lodge spam complaints will now remain on your list, you want to be sure you make it as easy as possible for them to unsubscribe and avoid that Spam button.

It’s not uncommon to still have a number of Roadrunner addresses throughout your list, particularly if you’ve been collecting email addresses for a few years. If so, it could also be a good indicator that it’s time to run some engagement metrics or a campaign to encourage recipients to update their information.

– BG

Best Practices, Delivery Essentials

Zombies are everywhere…including your member database

WARNING: PLEASE DO NOT FEED THE ZOMBIESYesterday morning I received a bit of a surprise in the form of an email from Tumblr congratulating me on the 9th “birthday” of my blog. I checked and it seems I last posted on Tumblr just over 3 years ago…and only three times ever. In March 2013, I posted a photo from a photo sharing app called Streamzoo – an Instagram alternative that, apparently, wasn’t a good enough alternative and shuttered in 2014. In 2012 I posted a photo from Instagram, but from an account that no longer exists (it was deleted among the wave of privacy concerns about Instagram around that time.)

The fact that I got this notification is a good thing, as it means I’m still using the email address I used to create the Tumblr account – but what about all those accounts I created with previous addresses?

As I dug through websites I hadn’t thought of in years – MySpace, LiveJournal, even Angelfire! – it brought to mind a common issue for the association groups I work with: zombie members. While the use of zombie imagery in reference to old email addresses and web accounts isn’t new, paying attention to those undead records is more relevant than ever for organizations whose email program relies heavily on membership rolls.

Too often when troubleshooting delivery issues, membership organizations completely exclude their active member list from any sort of list hygiene initiatives. The reasoning makes sense on the surface: if someone is an active (often paying!) member of your organization, clearly they want your emails, right? Unfortunately, that often doesn’t take into account some of your most loyal members.

It’s an oft-quoted statistic that 20-30% of email account owners change their email address each year, often due to a change in internet provider or employer. Over the course of 5 years, that equates to a greater than 1 in 3 chance a recipient has changed their email address – but did they tell you? How would you know?

Let’s talk through some of the most common assumptions used to justify why an email address shouldn’t be subject to list hygiene practices and how they can lead to trouble.

1. “They logged into our website.”

This seems like a slam dunk: your website uses email address as username, and the member had to log into their account to renew (or you can see a record of their login.) That definitely means the address is good, right? Nope. Every web browser since Netscape Navigator (and probably before) has been able to save login information so you don’t have to remember those pesky passwords. If members aren’t required to confirm their email address regularly, they have little incentive to change their username (assuming they even realize they’re using the old address).

2. “They attended a conference.”

Like logging into your site, this is a great sign they’re engaged with your organizationbut not necessarily with your emails. If the registration for the event took place on your org’s website (that same one with the saved password, above), attendees may be using the same saved information to register. It may seem unlikely, but I’ve worked with many orgs who were unpleasantly surprised by the number of recent event registrants whose information was out of date.

3. “CAN-SPAM says we can send to members no matter what.”

It is true that CAN-SPAM has an exemption for messages deemed to be pertaining to a transaction or ongoing relationship. The FTC has issued some guidelines around this, but there’s still quite a bit of grey area. Sending a message announcing conference registration to your members? Maybe a promotion for a Continuing Ed course for industry professionals? Most experts would tell you these aren’t exempted messages.

Truth be told, whether they are or aren’t exempt is irrelevant to the discussion. CAN-SPAM allows you to send almost any sort of unsolicited email as long as you provide contact info and an unsubscribe method. This is the bare minimum required to comply with the law (and any reputable ESP will require permission.) However, every major email provider has implemented complex spam filtering systems designed to block or reject mail their recipients don’t want.  If their recipients don’t open your emails, or they mark them as spam or unwanted, your mail won’t get delivered. So yes, you may have legal permission to send them email, but that means absolutely zero when it comes to whether your message reaches the inbox.

How can you be sure your members’ information is valid?

While none of the above methods should be considered a reason to keep an email address in your list, there are a few options for confirming addresses that are a bit more reliable.

Send a reconfirmation email

The gold standard of email verification is the confirmation email. Once per year (often at the time of renewal), send an email to the address on file that requires a click on a confirmation link to stay on your list. If someone clicks, you know you’ve got the right person and the right address. If they open but don’t click? That’s a bit more of a grey area. Depending on the language in your email, you may want to keep them around but limit the emails they receive. Non-openers should be suppressed from your email campaigns going forward.

Look for recent opens or clicks

Most orgs are hesitant to require annual confirmation, which is understandable. It’s likely to shrink the size of the email database, a prospect that rarely elicits a thumbs-up from the executive team. In those cases, you can still look for recent activity from the recipient in the form of opens, clicks, and replies. If you have records indicating a recipient opened, clicked on, or replied to an email in the past 12 months, it’s generally a safe bet to keep them around. You may even want to use this in conjunction with the annual confirmation – only those records with no activity have to reconfirm. That will require a bit of additional work, but could pay off in spades if you avoid the loss of legitimate member email addresses.

Conduct an outreach campaign

If a member has no recorded interactions with an email, they’re not dead to you just yet. Many orgs conduct targeted outreach via phone, postcard, or even in-person meetings to get updated information from members. We’ve seen a number of associations have success driving traffic to their online information forms through these offline methods.

Once you’ve gone through these steps, you’ll likely have to decide to suppress some email addresses from your member list to maintain good deliverability. When this happens, remember that removing a member from your email list doesn’t negate their membership – they may still attend events, participate in forums, and engage with your organization. And each of those interactions is another opportunity for you to get updated information from them and bring them back into the email fold.

– BG