Page 1

Policies for successful permissionbased e-mail marketing

Send e-mail only to those who have "opted-in" to receive it. ď Ź

ď Ź

ď Ź

Preferably you should utilize "confirmed" opt-in, in which a confirmation message must be delivered to the beneficiary, who in turn must reply to the message for that opt-directly into take effect. Avoid "opt-out," which causes the recipient to receive communications until he says no. The popular practice of opt-out seems to really suppress e-commerce, according to past studies, which discovered that many people have presented false information when filling out online forms. Bottom line: Consumer trust is something you've to make. One of the best approaches is always to respect consumers' needs as it pertains to email.

2. Always honor user requests to opt-out. ď Ź

ď Ź

Allow it to be an easy process and add a Web site URL in every information which allows an individual to opt-out. For many businesses, it may seem sensible to "down-offer" the conclusion consumer. For instance, a media website providing you with daily deliveries may have success in providing the user a chance to "limit" to regular digests. In the end, many opt-outs are simply just an allnatural a reaction to an excessive amount of email in general; a lowered stress is frequently welcome.

Confirm everything by e-mail: The initial opt-in, orders, shipping notification and changes in the customer profile. ď Ź

This blunts the situation of false info. If Your fake e-mail address has been inserted, the verification will either bounce or be brought to an individual who maybe has never heard of you, in which case he will contact you and let you know your database must be updated. Always include an opt-out process in these communications. As an extra bonus, use these messages as an up-sell option. Like, an airline could offer an individual a lowered price for renting a-car from the certain supporting dealer.

Allow users to specify their preferences. ď Ź

What type of information do they would like to receive? How frequently? Motivate the user to give you as much information as essential to allow you to successfully target them within your e-mail campaigns and other e-business activities. But avoid requesting her life story. Alternatively, structure your program so that you gain extra information overtime — along with her permission, needless to say!

Give and you shall receive. ď Ź

Customers don't give you their e-mail address and other personal information out of altruism. They do it in exchange for something of value. It could be information (on your Web site, via e-mail or through some other media), a free gift, a coupon or a chance to win a sweepstakes. Be creative, but also follow through by delivering real value to the recipient with every message.

Your list is an asset that only you can use; do not sell or rent it. ď Ź

If you want to realize incremental revenue beyond your own offerings, allow the users to opt-in to receive offers from your partners. If you do this, make sure you control the best bulk email sender, and that your brand "introduces" other brands. Example: "Because you opted to receive promotional offers from our valued partners, we at ABC Corp. are pleased to give you a special offer from XYZ Corp." Ask the company doing the promotion to give you an exclusive on the offer for a limited time; limiting the offer to only your customers increases the value of opting in.

Develop and post a privacy policy for your Web site. ď Ź

It reinforces how valuable they are to you and reminds them that there are real, live people "behind the scenes" of your Web site.

8. Respond to customer good bulk e-mail inquiries promptly. 9. Don't use rented lists.

Always remember the network effect. ď Ź

ď Ź

Bad news travels much faster than good on the Internet. An angry online customer can broadcast his ire to millions by creating an "I hate [your company]" Web site, e-mailing the experience to friends, posting it on message boards and other ways. Remember, in this economy the customer is in control. Do not make the mistake of treating e-mail and the Web like the telephone and snail mail.

Thanking you!!! For more info log on too...

Policies for successful permission based e mail marketing  

Preferably you should utilize "confirmed" opt-in, in which a confirmation message must be delivered to the individual, who subsequently must...

Read more
Read more
Similar to
Popular now
Just for you