SlideShare uma empresa Scribd logo
1 de 35
25 Keywords
           understand   TO

         Email Marketing
  © lilufoto - Fotolia.com
jeudi 19 juillet 2012
Hatime Araki
 Email Data Analytics & Deliverability
 @matehi




                                              Bruno Fridlansky
                           Social Media Marketing & Email Marketing
© milachka - Fotolia.com
                                                      @brunofridl
jeudi 19 juillet 2012
Your GOAL ?

                            Reach
                            your
                           CLIENTS



© rangizzz - Fotolia.com
jeudi 19 juillet 2012
Who are you talking to?                Who are you?




                        Gathering    Identification

                                Internet
                                  User


                         Relevance   Reputation


           What are you saying?       What are you worth?

jeudi 19 juillet 2012
Who are you
                        talking to?


                   Who are your recipients?




© Ints Vikmanis - Fotolia.com
jeudi 19 juillet 2012
#1 CNIL
                        Conseil National de l’Informatique et des Libertés
                        French National council for computers and freedom

                        Monitors files and checks if the
                        proprietors of the files
                        respect the law




© Helder Almeida - Fotolia.com
jeudi 19 juillet 2012
#2 OPTOUT
                        The Internet user gives his email address in
                        an online form without realizing that he
                        will receive advertizing emails




                        The CNIL authorizes OPTOUT
                        for communicating to
                        clients (loyalty)

© arztsamui - Fotolia.com
jeudi 19 juillet 2012
#3 OPTIN
                        The Internet user explicitly agrees
                        to receive emails from the brand
                        and/or its partners




                                                      The CNIL imposes OPTIN for
                                                      communicating to prospects in
                                                      BtoC (recruitment)

                                                                    © ra2 studio - Fotolia.com
jeudi 19 juillet 2012
#4 DOUBLE OPTIN
                        The Internet user explicitly agrees to receive
                        emails AND confirms
                        his email address




                        Some European countries impose
                        double optin for communicating
                        to prospects.

© Klaus-Peter Adler - Fotolia.com
jeudi 19 juillet 2012
Who
                         are you?


                   Identify yourself!




© Stephen Coburn - Fotolia.com
jeudi 19 juillet 2012
#5 ICANN
                        Internet Corporation for Assigned Names and
                        Numbers




                        Non-profit organization in charge of
                        Internet Protocol addresses (IP)
                        and the Domain Name System (DNS).


jeudi 19 juillet 2012
#6 CAN-SPAM ACT
                        Controlling the Assault of Non-Solicited
                        Pornography And Marketing




Law established in
2003 in the USA with
the first anti-SPAM
rules
© Gina Sanders - Fotolia.com
jeudi 19 juillet 2012
#7 PHISHING
                        Identity fraud technique




                                                         Username: STARLET
                                                         11 years old, looking for new friends




                                     ANYONE CAN HIDE BEHIND A USERNAME
                                        BE WATCHFUL ON THE INTERNET

                          A crook takes the name of an
                          announcer for a fraudulent
                          scheme

http://www.actioninnocence.org/
jeudi 19 juillet 2012
#8 SPF SENDER ID               or

                        Sender Policy Framework




                                     An Email is sent by a domain via an IP.
                                     The SPF declares IPs which are
                                     authorized to send emails for this
                                     domain.
© alphaspirit - Fotolia.com
jeudi 19 juillet 2012
#9 DMARC
                        Domain-based Message Authentification,
                        Reporting and Conformance




                        The DMARC declares blocking and
                        reporting rules for emails which do
                        not comply to SPF

© alphaspirit - Fotolia.com
jeudi 19 juillet 2012
#10 DKIM DOMAINS KEY             or

                        Domain Key Identifier Mail




                                      Authentification system based on a
                                      cryptographic signature of the
                                      message body




jeudi 19 juillet 2012
What
                        are you saying?


                   Is your message relevant?




© Jean B. - Fotolia.com
jeudi 19 juillet 2012
#11 SENDER
                        Designates the person or brand which
                        addresses the recipient




                                                      The sender is the first element
                                                      considered for message filtering


© Vladimir Melnikov - Fotolia.com
jeudi 19 juillet 2012
#12 SUBJECT
                        Expresses the promise
                        located in the message body




                        Respect your audience and
                        deliver what you promised


© auremar - Fotolia.com
jeudi 19 juillet 2012
#13 OPENING
                        The recipient opens the message
                        and loads its images




                        The sender and the subject have
                        aroused curiosity and/or interest



jeudi 19 juillet 2012
#14 READ LENGTH
                        Time spent to read the content




                        This indicator is sometimes used by
                        Web-Mail to measure the interest
                        of the recipient

© Yuri Arcurs - Fotolia.com
jeudi 19 juillet 2012
#15 CLICK
                        The recipient clicks on a link in the message




                        A recipient clicks to continue, proof that the
                        content is relevant to his needs and interests
© Szasz-Fabian Erika - Fotolia.com
jeudi 19 juillet 2012
#16 JUNKBOX
                        Mail considered junk by the Internet provider, the
                        Web-Mail or the message management system




                        The message has arrived to the
                        recipient as junk and can still be
                        flagged as desirable

© Richard Villalon - Fotolia.com
jeudi 19 juillet 2012
#17 SPAMFILTER
                        Message rejected by Internet provider or
                        Web-Mail as suspicious of spam




                        If this suspicion is not cancelled,
                        total blocking can occur!


© Sebastian Wolf - Fotolia.com
jeudi 19 juillet 2012
#18 SOFT BOUNCE
                        Message temporarily rejected for various reasons




                        A recipient often
                        in soft bounce can
                        have a negative
                        impact on
                        deliverability


© tiero - Fotolia.com
jeudi 19 juillet 2012
#19 HARD BOUNCE
                        Message rejected because of invalid domain or
                        unknown recipient




                        A large volume of hard bounces is a sign
                        of an unclean database
© Alex_Mac - Fotolia.com
jeudi 19 juillet 2012
What are you
                        worth?


                        Why are you blocked?




© Milan Surkala - Fotolia.com
jeudi 19 juillet 2012
#20 HONEY POT
                        Adress specially created to trap spammers




© Sinisa Botas - Fotolia.com
jeudi 19 juillet 2012
#21 SPAMTRAP
                        Dead addresses used by
                        recipient’s server to
                        detect spammers




© Rido - Fotolia.com
jeudi 19 juillet 2012
#22 SPAM REPORT
                        The recipient declares the message as SPAM




                                                    Some Web-Mails give notice to the
                                                    sender via a FEED-BACK LOOP


© Dron - Fotolia.com
jeudi 19 juillet 2012
#23 RBL BLACK LIST              or

                        Real-time Blackhole List
                        Liste of senders considered as spammers




                                      ACCESS DENIED
                                     TO UNAUTHORIZED
                                         PERSONS




© bricef - Fotolia.com
jeudi 19 juillet 2012
#24 SENDER SCORE
                        REPU TATION Score
                        established by Return Path




                                           Scale from 0 to 100
                                           by IP and sender domain
© Pavel Losevsky - Fotolia.com
jeudi 19 juillet 2012
#25 WARMING UP AN IP
                                    Progressively increase the volume
                                    of emails sent from an IP to build
                                    up its reputation




© Guillaume Besnard - Fotolia.com
jeudi 19 juillet 2012
jeudi 19 juillet 2012
Download this presentation
                        by participating to its distribution

                             with Pay With A Tweet




jeudi 19 juillet 2012

Mais conteúdo relacionado

Destaque

Vienna Convention on Road Traffic from 08th November 1968
Vienna Convention on Road Traffic from 08th November 1968Vienna Convention on Road Traffic from 08th November 1968
Vienna Convention on Road Traffic from 08th November 1968ITI-HOLIDAY
 
Non quantum entanglement through time and gravity
Non quantum entanglement through time and gravityNon quantum entanglement through time and gravity
Non quantum entanglement through time and gravityEran Sinbar
 
Convocatoria asamblea 18 junio
Convocatoria asamblea 18 junioConvocatoria asamblea 18 junio
Convocatoria asamblea 18 junioSergio Diaz Torres
 
1. presentación teoría del justo a tiempo
1. presentación teoría del justo a tiempo1. presentación teoría del justo a tiempo
1. presentación teoría del justo a tiempotatyanasaltos
 
Plan clase enciclopedia
Plan clase enciclopediaPlan clase enciclopedia
Plan clase enciclopediaEmilio Vergne
 
Agenda reunión maestros bibliotecarios 21 de agosto de 2015
Agenda reunión maestros bibliotecarios 21 de agosto de 2015Agenda reunión maestros bibliotecarios 21 de agosto de 2015
Agenda reunión maestros bibliotecarios 21 de agosto de 2015Emilio Vergne
 
Venture Cup 2016 - презентация команды 2го места
Venture Cup 2016 - презентация команды 2го места Venture Cup 2016 - презентация команды 2го места
Venture Cup 2016 - презентация команды 2го места Alexander Gubarev
 

Destaque (14)

Formació escola colors
Formació escola colorsFormació escola colors
Formació escola colors
 
PAGE 2008 - Bajkay
PAGE 2008 - BajkayPAGE 2008 - Bajkay
PAGE 2008 - Bajkay
 
Vienna Convention on Road Traffic from 08th November 1968
Vienna Convention on Road Traffic from 08th November 1968Vienna Convention on Road Traffic from 08th November 1968
Vienna Convention on Road Traffic from 08th November 1968
 
Bitácora 1
Bitácora 1Bitácora 1
Bitácora 1
 
Non quantum entanglement through time and gravity
Non quantum entanglement through time and gravityNon quantum entanglement through time and gravity
Non quantum entanglement through time and gravity
 
Convocatoria asamblea 18 junio
Convocatoria asamblea 18 junioConvocatoria asamblea 18 junio
Convocatoria asamblea 18 junio
 
001_TNN90_CAPA_troca
001_TNN90_CAPA_troca001_TNN90_CAPA_troca
001_TNN90_CAPA_troca
 
Proyecto 2(2)
Proyecto 2(2)Proyecto 2(2)
Proyecto 2(2)
 
Paczkomaty - Nowe usługi w InPost
Paczkomaty - Nowe usługi w InPostPaczkomaty - Nowe usługi w InPost
Paczkomaty - Nowe usługi w InPost
 
1. presentación teoría del justo a tiempo
1. presentación teoría del justo a tiempo1. presentación teoría del justo a tiempo
1. presentación teoría del justo a tiempo
 
Plan clase enciclopedia
Plan clase enciclopediaPlan clase enciclopedia
Plan clase enciclopedia
 
Agenda reunión maestros bibliotecarios 21 de agosto de 2015
Agenda reunión maestros bibliotecarios 21 de agosto de 2015Agenda reunión maestros bibliotecarios 21 de agosto de 2015
Agenda reunión maestros bibliotecarios 21 de agosto de 2015
 
Venture Cup 2016 - презентация команды 2го места
Venture Cup 2016 - презентация команды 2го места Venture Cup 2016 - презентация команды 2го места
Venture Cup 2016 - презентация команды 2го места
 
ISO 9000
ISO 9000ISO 9000
ISO 9000
 

Mais de Consonaute

Social selling day by social business makers du 16 janvier 2018
Social selling day by social business makers du 16 janvier 2018Social selling day by social business makers du 16 janvier 2018
Social selling day by social business makers du 16 janvier 2018Consonaute
 
100% textuel : le meilleur contenu pour être vu sur LinkedIn
100% textuel : le meilleur contenu pour être vu sur LinkedIn100% textuel : le meilleur contenu pour être vu sur LinkedIn
100% textuel : le meilleur contenu pour être vu sur LinkedInConsonaute
 
LinkedIn : Visibilité versus Viralité de vos publications
LinkedIn : Visibilité versus Viralité de vos publicationsLinkedIn : Visibilité versus Viralité de vos publications
LinkedIn : Visibilité versus Viralité de vos publicationsConsonaute
 
Obtenir de la visibilité avec vos contenus
Obtenir de la visibilité avec vos contenusObtenir de la visibilité avec vos contenus
Obtenir de la visibilité avec vos contenusConsonaute
 
Road show Mood Media des points de vente innovants à Londres
Road show Mood Media des points de vente innovants à LondresRoad show Mood Media des points de vente innovants à Londres
Road show Mood Media des points de vente innovants à LondresConsonaute
 
Les Français et la publicité sur les réseaux sociaux (ÉTUDE IFOP/GENERIX)
Les Français et la publicité sur les réseaux sociaux (ÉTUDE IFOP/GENERIX)Les Français et la publicité sur les réseaux sociaux (ÉTUDE IFOP/GENERIX)
Les Français et la publicité sur les réseaux sociaux (ÉTUDE IFOP/GENERIX)Consonaute
 
Analyse des résultats d'une campagne de messages privés sur Twitter
Analyse des résultats d'une campagne de messages privés sur TwitterAnalyse des résultats d'une campagne de messages privés sur Twitter
Analyse des résultats d'une campagne de messages privés sur TwitterConsonaute
 
Barometre des medias sociaux en France
Barometre des medias sociaux en FranceBarometre des medias sociaux en France
Barometre des medias sociaux en FranceConsonaute
 
Slides etude ifop octobre 2012
Slides etude ifop octobre 2012Slides etude ifop octobre 2012
Slides etude ifop octobre 2012Consonaute
 
24 new facebook timeline cover
24 new facebook timeline cover24 new facebook timeline cover
24 new facebook timeline coverConsonaute
 
25 termes pour comprendre l email marketing
25 termes pour comprendre l email marketing25 termes pour comprendre l email marketing
25 termes pour comprendre l email marketingConsonaute
 
15 bonnes pratiques conversationnelles
15 bonnes pratiques conversationnelles15 bonnes pratiques conversationnelles
15 bonnes pratiques conversationnellesConsonaute
 
Consonaute : Twitter Power
Consonaute : Twitter PowerConsonaute : Twitter Power
Consonaute : Twitter PowerConsonaute
 
61 Beautiful & Inspirational Timeline Cover on Facebook
61 Beautiful & Inspirational Timeline Cover on Facebook61 Beautiful & Inspirational Timeline Cover on Facebook
61 Beautiful & Inspirational Timeline Cover on FacebookConsonaute
 
Premiers resultats du broadcast "demande de RT"
Premiers resultats du broadcast "demande de RT"Premiers resultats du broadcast "demande de RT"
Premiers resultats du broadcast "demande de RT"Consonaute
 
Opportunité des réseaux sociaux pour les constructeurs auto
Opportunité des réseaux sociaux pour les constructeurs autoOpportunité des réseaux sociaux pour les constructeurs auto
Opportunité des réseaux sociaux pour les constructeurs autoConsonaute
 
Formulaire exemplaire
Formulaire exemplaireFormulaire exemplaire
Formulaire exemplaireConsonaute
 
Submate StartUp WeekEnd
Submate StartUp WeekEndSubmate StartUp WeekEnd
Submate StartUp WeekEndConsonaute
 
Constructeurs Auto Et Ecosysteme
Constructeurs Auto Et EcosystemeConstructeurs Auto Et Ecosysteme
Constructeurs Auto Et EcosystemeConsonaute
 
La Bataille Dans Le Cerveau
La Bataille Dans Le CerveauLa Bataille Dans Le Cerveau
La Bataille Dans Le CerveauConsonaute
 

Mais de Consonaute (20)

Social selling day by social business makers du 16 janvier 2018
Social selling day by social business makers du 16 janvier 2018Social selling day by social business makers du 16 janvier 2018
Social selling day by social business makers du 16 janvier 2018
 
100% textuel : le meilleur contenu pour être vu sur LinkedIn
100% textuel : le meilleur contenu pour être vu sur LinkedIn100% textuel : le meilleur contenu pour être vu sur LinkedIn
100% textuel : le meilleur contenu pour être vu sur LinkedIn
 
LinkedIn : Visibilité versus Viralité de vos publications
LinkedIn : Visibilité versus Viralité de vos publicationsLinkedIn : Visibilité versus Viralité de vos publications
LinkedIn : Visibilité versus Viralité de vos publications
 
Obtenir de la visibilité avec vos contenus
Obtenir de la visibilité avec vos contenusObtenir de la visibilité avec vos contenus
Obtenir de la visibilité avec vos contenus
 
Road show Mood Media des points de vente innovants à Londres
Road show Mood Media des points de vente innovants à LondresRoad show Mood Media des points de vente innovants à Londres
Road show Mood Media des points de vente innovants à Londres
 
Les Français et la publicité sur les réseaux sociaux (ÉTUDE IFOP/GENERIX)
Les Français et la publicité sur les réseaux sociaux (ÉTUDE IFOP/GENERIX)Les Français et la publicité sur les réseaux sociaux (ÉTUDE IFOP/GENERIX)
Les Français et la publicité sur les réseaux sociaux (ÉTUDE IFOP/GENERIX)
 
Analyse des résultats d'une campagne de messages privés sur Twitter
Analyse des résultats d'une campagne de messages privés sur TwitterAnalyse des résultats d'une campagne de messages privés sur Twitter
Analyse des résultats d'une campagne de messages privés sur Twitter
 
Barometre des medias sociaux en France
Barometre des medias sociaux en FranceBarometre des medias sociaux en France
Barometre des medias sociaux en France
 
Slides etude ifop octobre 2012
Slides etude ifop octobre 2012Slides etude ifop octobre 2012
Slides etude ifop octobre 2012
 
24 new facebook timeline cover
24 new facebook timeline cover24 new facebook timeline cover
24 new facebook timeline cover
 
25 termes pour comprendre l email marketing
25 termes pour comprendre l email marketing25 termes pour comprendre l email marketing
25 termes pour comprendre l email marketing
 
15 bonnes pratiques conversationnelles
15 bonnes pratiques conversationnelles15 bonnes pratiques conversationnelles
15 bonnes pratiques conversationnelles
 
Consonaute : Twitter Power
Consonaute : Twitter PowerConsonaute : Twitter Power
Consonaute : Twitter Power
 
61 Beautiful & Inspirational Timeline Cover on Facebook
61 Beautiful & Inspirational Timeline Cover on Facebook61 Beautiful & Inspirational Timeline Cover on Facebook
61 Beautiful & Inspirational Timeline Cover on Facebook
 
Premiers resultats du broadcast "demande de RT"
Premiers resultats du broadcast "demande de RT"Premiers resultats du broadcast "demande de RT"
Premiers resultats du broadcast "demande de RT"
 
Opportunité des réseaux sociaux pour les constructeurs auto
Opportunité des réseaux sociaux pour les constructeurs autoOpportunité des réseaux sociaux pour les constructeurs auto
Opportunité des réseaux sociaux pour les constructeurs auto
 
Formulaire exemplaire
Formulaire exemplaireFormulaire exemplaire
Formulaire exemplaire
 
Submate StartUp WeekEnd
Submate StartUp WeekEndSubmate StartUp WeekEnd
Submate StartUp WeekEnd
 
Constructeurs Auto Et Ecosysteme
Constructeurs Auto Et EcosystemeConstructeurs Auto Et Ecosysteme
Constructeurs Auto Et Ecosysteme
 
La Bataille Dans Le Cerveau
La Bataille Dans Le CerveauLa Bataille Dans Le Cerveau
La Bataille Dans Le Cerveau
 

Último

Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Aggregage
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfDanny Diep To
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxShruti Mittal
 
Types of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdfTypes of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdfASGITConsulting
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
Interoperability and ecosystems: Assembling the industrial metaverse
Interoperability and ecosystems:  Assembling the industrial metaverseInteroperability and ecosystems:  Assembling the industrial metaverse
Interoperability and ecosystems: Assembling the industrial metaverseSiemens
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdfChris Skinner
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxRakhi Bazaar
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 

Último (20)

Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
 
WAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdfWAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdf
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptx
 
Types of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdfTypes of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdf
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptxThe Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
 
Interoperability and ecosystems: Assembling the industrial metaverse
Interoperability and ecosystems:  Assembling the industrial metaverseInteroperability and ecosystems:  Assembling the industrial metaverse
Interoperability and ecosystems: Assembling the industrial metaverse
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 

25 keywords to understand email marketing slideshare

  • 1. 25 Keywords understand TO Email Marketing © lilufoto - Fotolia.com jeudi 19 juillet 2012
  • 2. Hatime Araki Email Data Analytics & Deliverability @matehi Bruno Fridlansky Social Media Marketing & Email Marketing © milachka - Fotolia.com @brunofridl jeudi 19 juillet 2012
  • 3. Your GOAL ? Reach your CLIENTS © rangizzz - Fotolia.com jeudi 19 juillet 2012
  • 4. Who are you talking to? Who are you? Gathering Identification Internet User Relevance Reputation What are you saying? What are you worth? jeudi 19 juillet 2012
  • 5. Who are you talking to? Who are your recipients? © Ints Vikmanis - Fotolia.com jeudi 19 juillet 2012
  • 6. #1 CNIL Conseil National de l’Informatique et des Libertés French National council for computers and freedom Monitors files and checks if the proprietors of the files respect the law © Helder Almeida - Fotolia.com jeudi 19 juillet 2012
  • 7. #2 OPTOUT The Internet user gives his email address in an online form without realizing that he will receive advertizing emails The CNIL authorizes OPTOUT for communicating to clients (loyalty) © arztsamui - Fotolia.com jeudi 19 juillet 2012
  • 8. #3 OPTIN The Internet user explicitly agrees to receive emails from the brand and/or its partners The CNIL imposes OPTIN for communicating to prospects in BtoC (recruitment) © ra2 studio - Fotolia.com jeudi 19 juillet 2012
  • 9. #4 DOUBLE OPTIN The Internet user explicitly agrees to receive emails AND confirms his email address Some European countries impose double optin for communicating to prospects. © Klaus-Peter Adler - Fotolia.com jeudi 19 juillet 2012
  • 10. Who are you? Identify yourself! © Stephen Coburn - Fotolia.com jeudi 19 juillet 2012
  • 11. #5 ICANN Internet Corporation for Assigned Names and Numbers Non-profit organization in charge of Internet Protocol addresses (IP) and the Domain Name System (DNS). jeudi 19 juillet 2012
  • 12. #6 CAN-SPAM ACT Controlling the Assault of Non-Solicited Pornography And Marketing Law established in 2003 in the USA with the first anti-SPAM rules © Gina Sanders - Fotolia.com jeudi 19 juillet 2012
  • 13. #7 PHISHING Identity fraud technique Username: STARLET 11 years old, looking for new friends ANYONE CAN HIDE BEHIND A USERNAME BE WATCHFUL ON THE INTERNET A crook takes the name of an announcer for a fraudulent scheme http://www.actioninnocence.org/ jeudi 19 juillet 2012
  • 14. #8 SPF SENDER ID or Sender Policy Framework An Email is sent by a domain via an IP. The SPF declares IPs which are authorized to send emails for this domain. © alphaspirit - Fotolia.com jeudi 19 juillet 2012
  • 15. #9 DMARC Domain-based Message Authentification, Reporting and Conformance The DMARC declares blocking and reporting rules for emails which do not comply to SPF © alphaspirit - Fotolia.com jeudi 19 juillet 2012
  • 16. #10 DKIM DOMAINS KEY or Domain Key Identifier Mail Authentification system based on a cryptographic signature of the message body jeudi 19 juillet 2012
  • 17. What are you saying? Is your message relevant? © Jean B. - Fotolia.com jeudi 19 juillet 2012
  • 18. #11 SENDER Designates the person or brand which addresses the recipient The sender is the first element considered for message filtering © Vladimir Melnikov - Fotolia.com jeudi 19 juillet 2012
  • 19. #12 SUBJECT Expresses the promise located in the message body Respect your audience and deliver what you promised © auremar - Fotolia.com jeudi 19 juillet 2012
  • 20. #13 OPENING The recipient opens the message and loads its images The sender and the subject have aroused curiosity and/or interest jeudi 19 juillet 2012
  • 21. #14 READ LENGTH Time spent to read the content This indicator is sometimes used by Web-Mail to measure the interest of the recipient © Yuri Arcurs - Fotolia.com jeudi 19 juillet 2012
  • 22. #15 CLICK The recipient clicks on a link in the message A recipient clicks to continue, proof that the content is relevant to his needs and interests © Szasz-Fabian Erika - Fotolia.com jeudi 19 juillet 2012
  • 23. #16 JUNKBOX Mail considered junk by the Internet provider, the Web-Mail or the message management system The message has arrived to the recipient as junk and can still be flagged as desirable © Richard Villalon - Fotolia.com jeudi 19 juillet 2012
  • 24. #17 SPAMFILTER Message rejected by Internet provider or Web-Mail as suspicious of spam If this suspicion is not cancelled, total blocking can occur! © Sebastian Wolf - Fotolia.com jeudi 19 juillet 2012
  • 25. #18 SOFT BOUNCE Message temporarily rejected for various reasons A recipient often in soft bounce can have a negative impact on deliverability © tiero - Fotolia.com jeudi 19 juillet 2012
  • 26. #19 HARD BOUNCE Message rejected because of invalid domain or unknown recipient A large volume of hard bounces is a sign of an unclean database © Alex_Mac - Fotolia.com jeudi 19 juillet 2012
  • 27. What are you worth? Why are you blocked? © Milan Surkala - Fotolia.com jeudi 19 juillet 2012
  • 28. #20 HONEY POT Adress specially created to trap spammers © Sinisa Botas - Fotolia.com jeudi 19 juillet 2012
  • 29. #21 SPAMTRAP Dead addresses used by recipient’s server to detect spammers © Rido - Fotolia.com jeudi 19 juillet 2012
  • 30. #22 SPAM REPORT The recipient declares the message as SPAM Some Web-Mails give notice to the sender via a FEED-BACK LOOP © Dron - Fotolia.com jeudi 19 juillet 2012
  • 31. #23 RBL BLACK LIST or Real-time Blackhole List Liste of senders considered as spammers ACCESS DENIED TO UNAUTHORIZED PERSONS © bricef - Fotolia.com jeudi 19 juillet 2012
  • 32. #24 SENDER SCORE REPU TATION Score established by Return Path Scale from 0 to 100 by IP and sender domain © Pavel Losevsky - Fotolia.com jeudi 19 juillet 2012
  • 33. #25 WARMING UP AN IP Progressively increase the volume of emails sent from an IP to build up its reputation © Guillaume Besnard - Fotolia.com jeudi 19 juillet 2012
  • 35. Download this presentation by participating to its distribution with Pay With A Tweet jeudi 19 juillet 2012

Notas do Editor

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n
  23. \n
  24. \n
  25. \n
  26. \n
  27. \n
  28. \n
  29. \n
  30. \n
  31. \n
  32. \n
  33. \n
  34. \n
  35. \n