Email Marketing Overview
How Email Marketing Works
|
You can rely on JSender's long standing reputation
- Internet Service Providers (ISPs) trust emails that originate from JSender's IP addresses and domain name
We make sure your campaigns get delivered externally as well
- Our ISP Relations Team builds and nurtures relationships with all the major
Internet Service Providers so that we can respond and resolve any problems quickly
and amicably if our customers get flagged
- Our Compliance Team reviews email campaigns and lists to make sure that our customers
are compliant with legislation and current anti-spam technologies in order to prevent issues before they start
We hold our customers to high standards with good email marketing habits and practices
- We require customers to use permission-based email lists,
and prohibit the use of rented or purchased lists
- We educate our customers about permission-based lists, email subject lines, and related topics.
- We provide authentication of outbound campaigns to help prevent forgery so that your email stays unique to you
- All JSender customers must verify their email address before mailing a campaign for the first time
- Our Compliance team will contact you if your list appears to be purchased or "harvested"
from other sources to educate you on proper list practices
- Occasionally, we must close a customer account that uses bad practices.
We don't like doing this. But our No. 1 obligation to the rest of our customers is keeping JSender delivery rates high
Our delivery maximization tools help get your email campaigns to the inbox
- Anti-Spam Checker spots possible trouble in your emails and
suggests changes
- JSender's templates are format-tested in most email programs to ensure that the email you send -
whether HTML or text - is the email your customers see
- JSender Email Authentication assigns you a unique domain name that's tied to each email you send, so your emails are not grouped in with those of other customers
|