Tips to Stay Out of the Spam Folder.
1. Be Compliant with the CAN-SPAM Act
If you are sending “any electronic mail message, the primary purpose of which is the commercial advertisement or promotion of a commercial product or service,” then you MUST comply with the following 7 main requirements.
· Do not: Use false or misleading header information
· Do not: Use deceptive subject lines
· Do: Identify the message as an ad
· Do: Tell recipients where you’re located
· Do: Tell recipients how to opt-out of receiving future email from you
· Do: Honor opt-out requests promptly
· Do: Monitor what others are doing on your behalf
· If your email contains transaction-based information or relationship content, then you are exempt from these rules however, you must still not include false or misleading routing information.
2. Avoid Spam Trigger Words and Phishing Phrases
Unfortunately, there is no complete list of spam trigger words. Further, it is not always the case that your email will end up in the spam filter simply by using a so-called trigger word.
The key thing to remember is that a spam filter is trying to remove commercial advertisements and promotions. So generally, words that are common in such emails should be avoided or used sparingly.
Phishing emails are designed to steal your identity by getting you to click on a fraudulent link. The most common method is for the email to be disguised as a legitimate email from a service you trust, such as your bank or a website you frequent. Thus, you want to avoid using phrases that are common to phishing attacks.
3. Include a Text Version of Your Email if You Are Sending HTML Emails
This is a common, and easily preventable, cause for landing in the spam folder. Not only is this a good practice for avoiding a spam filter, but it also covers you in the case where the recipient cannot view HTML emails.
4. Use Permission Marketing Techniques
Seth Godin coined the phrase “Permission Marketing,” and offers his thoughts here. There you will find sound advice on the ideas behind getting your customers or potential customers to give you the permission to email. Take it a step further at the point of subscription and ask to be placed on their whitelist.
5. Use Spam Checkers Before Sending Your Emails
Before sending emails out to your entire list, its worth the time to utilize a spam checking service such as IsNotSpam.com.
6. Get Off Blacklists
If your email server is on a blacklist, it becomes extremely difficult to reliably send email, especially to new people on your lists.
The first step is to check if your email server is on a blacklist, use the following search phrases to find free services online:
- Free Email Blacklist Lookup
- Email Blacklist Check
- Spam Database Lookup
Note: If you find that you are on a blacklist, you will need to follow up with the website that has added you to their blacklist. That information is provided by the tools listed above.
7. Maintain a Good Text to Image Ratio
It is usually best to not include images at all; however, if you must include images, here are some tips:
- Do not send any image-only emails
- We suggest that for every graphic, include at least two lines of text
- Optimize your images the best you can
- Use well-formed HTML for email
8. Avoid Spam Traps
Spam traps are email addresses that are flagged by ISPs as being no longer used by a human, so it then stands to reason that there could have been no opt-in. To avoid including a spam trap email in your mailing list, use an opt-in process and do not buy lists from email brokers.
9. Avoid Large Attachments and Certain Attachment Types
In general, .jpg, .gif, .png and .pdf attachments are safe to send, provided you include some content in the email as well. However, executable attachments such as .exe, .zip, .swf, etc. should be avoided entirely. Generally, you should not send attachments to people on your list that are not expecting them.
If you need to email a large attachment or an attachment type that usually can be flagged as spam or trigger virus scanners, we recommend a service such as DropBox.com. If the attachment contains sensitive data, you may consider using your company’s secure FTP server.
10. Make Sure Your DKIM, SPF, Sender-ID, and Domain Keys Are Set Up Properly
You will want to make sure your email server supports these protocols (DKIM, SPF, Sender-ID, and Domain Keys) and that they are properly implemented.
Note: This alphabet soup helps ISPs determine the authenticity of your email from a technical perspective. To make sure yours are set up properly try using the IsNotSpam.com checking service.