UnsubCentral  Service Overview. Privacy Futures Symposium June 2004.

Slides:



Advertisements
Similar presentations
WELCOME! Commute Trip Reduction (CTR) Electronic Survey Slides prepared by WSDOT Urban Programs Staff Updated 2013.
Advertisements

Chapter 3 Launching a Business on the Internet. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES Introduction of E-Business Life Cycle.
1 Eloqua Providing Industry-Leading Management Tools May 2009.
Eloqua Providing Industry-Leading Management Tools.
3.02H Publishing a Website 3.02 Develop webpages..
How to protect yourself, your computer, and others on the internet
IP Warming Overview and Implementation Using Eloqua.
LeadManager™- Internet Marketing Lead Management Solution May, 2009.
NetScanTools ® LE Law Enforcement Version of NetScanTools ® from Northwest Performance Software, Inc. netscantools.com.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Enterprise Content Management Departmental Solutions Enterprisewide Document/Content Management at half the cost of competitive systems ImageSite is:
Are You Spamming Your Clients? June 17, Introductions  Doug Ladendorf Manager of Marketing Databases & CRM Mayer Brown LLP  1,600 Attorneys 
The Postmaster Network: The Leader in Customer Acquisition Confidential Return Path, Inc. Do Not Reproduce or Distribute
marketing. Overview  Basic Calculations  Building your list  Choosing a mailing company  Designing an  Mailing frequency  List selection.
New Canadian Anti-Spam Legislation Robert Lipson – April 8, 2014.
SilentWhistle Overview June 22, Allegiance at a Glance Headquarters: Salt Lake City, Utah 700+ companies; 3 million+ employees & students Global.
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter 9 1.
How To Make Marketing Work for Your Small Business or Non-Profit Presented by Milton Zlotnick SCORE Counselors to America’s Small Business Chapter.
Using the Engaging Networks tools Ghazal Vaghedi Toronto February 21, 2012 #12ENCONF.
Introduction to the Secure SMTP Server service. Secure SMTP server is a secure, reliable SMTP mail relay server for your outgoing mail. Secure SMTP service.
“If you build it, they will come.”. Virtual Business  There is much more that goes into a virtual business than just building the web site.  You will.
Electronic Customer Portal System. Reducing Risks – Increasing Efficiency – Lowering Costs Secure Internet based Communication Gateway direct to your.
Use The Web Your Way With You have a large audience… We've created a very innovative way for you create a completely self-funding program at absolutely.
How Companies Fight Spamming by Sonya Tormaschy & Marc Eggert E-Commerce: Tuesday & Thursdays; 1:30 – 2:45.
Chapter 9 Collecting Data with Forms. A form on a web page consists of form objects such as text boxes or radio buttons into which users type information.
© 2008 Authorize.Net 1 Welcome to Authorize.Net New Reseller Overview 2008.
ExactTarget State of Indiana Partnership Overview November 21, 2006.
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
>>APMG 8119: DIGITAL ENTERPRISE. Copyright ??  Copyright is a exclusive right that gives the right to owner for ownership, transfer or sell to others.
Copyright © 2002 ComputerLogic Inc. All Rights Reserved Newsletters - Steps to Success.
The Internet in Education Objectives Introduction Overview –The World Wide Web –Web Page v. Web Site v. Portal Unique and Compelling Characteristics Navigation.
How to Get Permission and Avoid Being Spam Jill Bastian Training and Education Manager.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Marketing Systems Group Southern California MRA Education Seminar Presentation September 17, 2005 Privacy and Current Issues.
Virtual Business CREATING A WEB PRESENCE Copyright © Texas Education Agency, All rights reserved.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
WEB DESIGN SOLUTIONS. 2 Presentation by JAVANET SYSTEMS 1st Floor, ROFRA House, Suite 4, Kansanga, Gaba Road P.O Box 31586, Kampala, Uganda Tel: +256(0) ,
Web Page Design I Basic Computer Terms “How the Internet & the World Wide Web (www) Works”
Infusionsoft Training Session #5 – Broadcasts & Reports.
Spam Act 2003 Consumer Education and Awareness. About the ACA Independent government regulator Ensures industry compliance with legislation (Telecommunications.
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
1 Mail Saurus Reference:“Usable Encryption Enabled by AJAX” J.F. Ryan; B.L. Reid; Networking and Services, ICNS '06. Digital Object Identifier /ICNS
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
IPortal Bringing your company and your business partners together through customized WEB-based portal software. SanSueB Software Presents iPortal.
CAN SPAM and Your Marketing Best Practices for Senders By Lars Helgeson Cooler .
Marketing Amanda Freeman. Design Guidelines Set your width to pixels Avoid too many tables Flash, JavaScript, ActiveX and movies will not.
1 E-newsletters Paul Clarke Nonprofit Resource Center November 23, 2010.
Optimal Database Marketing Drozdenko & Drake,
Detecting Phishing in s Srikanth Palla Ram Dantu University of North Texas, Denton.
X-ASVP Executive Overview eXtensible Anti-spam Verification Protocol X-ASVP Committee Technical Working Group July 25, 2007.
Sears Privacy Policy & Security information Shaina Lacher.
Presentation will begin shortly. (Please Stand By)
Strictly Business Using “StrictlyFused” to Create an Extensible Knowledge Portal.
BY: CHRIS GROVES Privacy in the Voting Booth. Reason for Privacy Voters worry that their vote may be held against them in the future  People shouldn’t.
Marketing PE: Understand the use of direct marketing to attract attention and to build brand. PI: Explain the nature of marketing tactics.
Creativematch eCRM Creativematch has launched a new eCRM platform providing access to an marketing suite from your own desktop. Our eCRM platform.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
The Data Protection Audit How to prepare What to expect The end results Dublin Chamber of Commerce, March 24 th.
What you will learn “How to go online and be successful” The Landscape The Website Getting Found Managing Your Customers Automation.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Web Content And Customer Relationship Management Solution. Transforming web sites into a customer-focused, revenue generating channel with less stress.
Append Services Append Services is a data handling solution we offer which aids increase advertising advocate businesses by appending.
BUILD SECURE PRODUCTS AND SERVICES
3.02H Publishing a Website 3.02 Develop webpages..
4.02 Develop web pages using various layouts and technologies.
SysKit Security Manager
Presentation transcript:

UnsubCentral  Service Overview

Privacy Futures Symposium June 2004

The CAN-SPAM Act It doesn’t change much for legitimate marketers.

The CAN-SPAM Act Clear rules for marketers –No deceptive or fraudulent tactics –Must include physical address –Must include opt-out link for Advertiser Stops the frivolous law suits –Clearly assigns liability to the Advertiser –Clearly defines who can enforce this – the FTC, Attorneys General, and the ISPs

One thing does change… New requirements for Advertisers –Creating a centralized suppression list –Providing suppression lists to affiliates –Updating suppression list with new opt- out requests New Data Challenges –Integrating across sales channels –Maintaining data privacy & security

Not just bulk mail… CAN-SPAM applies to all commercial messages, not just bulk ones –Viral marketing –Independent sales force –In-house newsletter –Auction notifications –Online communities – dating / networking –Forward-to-Friend

Not so clear… Newsletters –What is the primary purpose? –Does having an advertisement = commercial? Single / Multiple Advertisers –Show one unsubscribe link or multiple? –Does unsubscribing apply to each Advertiser? Postal Address –Are PO Boxes and Mail Drops acceptable? –Can it be displayed as part of an image?

Multi-Channel Integration

New Processes Create the Initial List –Look for sources across your organization –Internal database –3 rd party vendors Keeping it Up-to-Date Create channels for… –Tech support –Customer service –Sales people –Website forms –3 rd party vendors

New Processes Share with Partners, Affiliates, 3 rd Parties –Internal access control –Control who accesses it –Make sure they use it –Audit trail for all access Filter Outbound SMTP Mail –Channel through common SMTP gateway –Gateway checks against suppression list before sending each message Collect new Optouts –Web-based, one-click unsubscribe page –Track where each optout comes from –Report on optouts by advertiser –Detect optouts received after 10 day deadline –Integrate with list management options

Security List Seeding 1.Register a bunch of domains. 2.Make up unique addresses. 3.Assign a few to each partner and insert them into the suppression file. 4.If you ever receive a message at the seed address, you know exactly who is at fault. MD5 Hashing 1. addresses are encrypted one- way into gobbly-gook. 2.Once encrypted, they cannot be decrypted. 3.Still can be used to compare one list against another. 4.No chance of revealing addresses. Server Based Suppression 1.Maximum security solution 2.Advertiser list maintained by 3 rd party 3.Partner uploads list for cleaning 4.3 rd party performs the suppression and returns the “cleaned” list 5.Entire operation can be MD5 hashed Suppression Relay 1.Ensure that all outbound mail is compliant 2.Stop suppressed s at the MTA 3.Every outbound message is checked against the suppression list.

Auditing Signup Process 1.Save all information you have 2.MINIMUM – , IP address, datestamp, signup URL or action 3.Referrer URL 4.Other environmental information, message trail, or website trail Optout Process 1.Save all information you have 2.MINIMUM – , IP address, datestamp, optout URL or action 3.Channel source – was this optout from an in-house mailing or a partner? Which partner? 4.Other environmental information, message trail, or website trail Sanity Checks 1.Notice if a duplicate optout is received >10 days after the first 2.Notice if a partner accesses a suppression list but then doesn’t generate any optouts 3.Notice if one partner or channel source creates too many optouts Monitor Complaints 1.Monitor your IP space with SpamCop 2.Make it easy for consumers to find you Be Cautious 1.Given the option, take the safe route 2.If in doubt, suppress the address 3.Make sure suppression is timely

Build vs. Buy In-house solutions make sense for organizations –With a single house list –With no marketing partnerships or 3 rd party relationships –With strong IT and development resources Outsourcing has many advantages –3 rd Party Bonded Entity to act as broker between Advertisers and Affiliates –Enhanced security and fraud detection –Integration with A ffiliate Networks and ESPs, API’s for customization –Fast implementation –No internal resources –Low Cost

? Questions

Background Standards Development – Service Provider Coalition (ESPC) Technology Committee –IronPort Bonded Sender Program –Co-author Internet RFC 2369 (1998) creating List-Unsubscribe header Carnegie Mellon University –Computer Science –Information & Decision Systems –Don Jones Entrepreneurship Center Enterprise Award with Distinction Joshua Baer SKYLIST, Inc. –One of first Service Providers –Advanced targeting, tracking, reporting –ISP Management & Deliverability –Partnered with IronPort Systems Trilogy Software Incubator –Trilogy University Bootcamp –Founded IveBeenGood.com / Uberworks, acquired by public company in mid-2000 UnsubCentral, Inc. –Launched in response to CAN-SPAM –Helps Advertisers manage their suppression lists, sales force, and refer-a-friend viral marketing –Custom TRUSTe Review Process Underway industry veteran of almost 10 years Active in recent regulatory development Cross-industry support, leading customer base