There are many vendors out there who sell lists or rent them (though renting means that the list seller maintains ownership and control of the email list). These are collections of email addresses that the vendors sell to any business or individual who can pay the fees. Your email list is considered to be a purchased or shared list if it’s provided to you by a third party, like an email list vendor or affiliate. There's a few ways that vendors build these non opt-in email lists.
Our Best Practices team doesn’t only catch bad actors using purchased lists — even well-intentioned businesses can fall into the trap of buying email lists. After all, a purchased list sounds like a great idea in theory: You can start marketing your product or service right away to a list of subscribers, instead of having to grow your list from scratch.

Most newly-minted marketers entering the workforce spent their college focus learning digital marketing – social media, mobile marketing, search engine marketing and possibly email. If you’re one of them, and are looking for ways to improve your overall marketing results, think about using direct mail. With everyone getting bombarded by digital campaigns, a well-done mailpiece can really stand out.
Electronic mail , often abbreviated as email or e-mail , is a method of exchanging digital messages, designed primarily for human use.. An electronic mail message consists of two components, the message header , and the message body , which is the email's content. The message header contains control information, including, minimally, an originator's email address and one or more recipient addresses. Usually additional information is added, such as a subject header field.. E-mail systems are based on a store-and-forward model in which e-mail computer server systems accept, forward, deliver and store messages on behalf of users, who only need to connect to the e-mail infrastructure, typically an e-mail server, with a network-enabled device (e.g., a personal computer) for the duration of message submission or retrieval. Rarely is e-mail transmitted directly from one user's device to another's. Wikipedia
Email marketing is now a very popular offshoot of direct mail marketing (See also Email Marketing). However, it’s worth bearing in mind that 37 states now have laws regarding “spam,” or unwanted junk email. Therefore, companies that wish to maintain a positive reputation use an “opt-in” policy for marketing email, targeting only interested customers.
Digital marketing methods such as search engine optimization (SEO), search engine marketing (SEM), content marketing, influencer marketing, content automation, campaign marketing, data-driven marketing,[6] e-commerce marketing, social media marketing, social media optimization, e-mail direct marketing, display advertising, e–books, and optical disks and games are becoming more common in our advancing technology. In fact, digital marketing now extends to non-Internet channels that provide digital media, such as mobile phones (SMS and MMS), callback, and on-hold mobile ring tones.[7] In essence, this extension to non-Internet channels helps to differentiate digital marketing from online marketing, another catch-all term for the marketing methods mentioned above, which strictly occur online.
Just like an ebook, a cheat sheet or guide is a very simple way to capture emails and generate more leads. In fact, if you’re familiar with DigitalMarketer you’ll know that they often promote this lead magnet over others. It’s actually performed so well for them it managed to generate 28,000 new leads for the business in its first month and a half.
Every ESP will give you tools to create an opt-in form for your site. Generally speaking, the less information you ask for (at this initial stage, at least), the better. The more information you ask for, the less likely your prospect is to complete the process. You’ll obviously need to ask for an email address, and I also highly recommended that you ask for a first name so you can personalize your emails. However, asking for any information beyond these two fields can decrease conversion rates significantly without adding much valuable data.
The concept is simple. If someone is reading an in-depth blog post of yours, chances are they’re very interested in what you have to say on the topic. The key is to then offer them something that is directly related to the topic they’re reading about. You know they’re already interested, so by offering instantaneous extra value it’s not difficult to see why people would gladly sign up.
Four months later, Laurence Canter and Martha Siegel, partners in a law firm, broadly promoted their legal services in a USENET posting titled "Green Card Lottery – Final One?"[15] Canter and Siegel's Green Card USENET spam raised the profile of online advertising, stimulating widespread interest in advertising via both Usenet and traditional email.[12] More recently, spam has evolved into a more industrial operation, where spammers use armies of virus-infected computers (botnets) to send spam remotely.[10]
Another disadvantage is that even an individual or small group of people can harm image of an established brand. For instance Dopplegnager is a term that is used to disapprove an image about a certain brand that is spread by anti-brand activists, bloggers, and opinion leaders. The word Doppelganger is a combination of two German words Doppel (double) and Ganger (walker), thus it means double walker or as in English it is said alter ego. Generally brand creates images for itself to emotionally appeal to their customers. However some would disagree with this image and make alterations to this image and present in funny or cynical way, hence distorting the brand image, hence creating a Doppelganger image, blog or content (Rindfleisch, 2016).
Search engine optimization, or SEO, attempts to improve a website's organic search rankings in SERPs by increasing the website content's relevance to search terms. Search engines regularly update their algorithms to penalize poor quality sites that try to game their rankings, making optimization a moving target for advertisers.[51][52] Many vendors offer SEO services.[24]:22
Transactional emails are usually triggered based on a customer's action with a company. To be qualified as transactional or relationship messages, these communications' primary purpose must be "to facilitate, complete, or confirm a commercial transaction that the recipient has previously agreed to enter into with the sender" along with a few other narrow definitions of transactional messaging.[2] Triggered transactional messages include dropped basket messages, password reset emails, purchase or order confirmation emails, order status emails, reorder emails, and email receipts.
Game advertising - In-Game advertising is defined as "inclusion of products or brands within a digital game."[50] The game allows brands or products to place ads within their game, either in a subtle manner or in the form of an advertisement banner. There are many factors that exist in whether brands are successful in their advertising of their brand/product, these being: Type of game, technical platform, 3-D and 4-D technology, game genre, congruity of brand and game, prominence of advertising within the game. Individual factors consist of attitudes towards placement advertisements, game involvement, product involvement, flow or entertainment. The attitude towards the advertising also takes into account not only the message shown but also the attitude towards the game. Dependent of how enjoyable the game is will determine how the brand is perceived, meaning if the game isn’t very enjoyable the consumer may subconsciously have a negative attitude towards the brand/product being advertised. In terms of Integrated Marketing Communication "integration of advertising in digital games into the general advertising, communication, and marketing strategy of the firm"[50] is an important as it results in a more clarity about the brand/product and creates a larger overall effect.

A disadvantage of digital advertising is the large amount of competing goods and services that are also using the same digital marketing strategies. For example, when someone searches for a specific product from a specific company online, if a similar company uses targeted advertising online then they can appear on the customer's home page, allowing the customer to look at alternative options for a cheaper price or better quality of the same product or a quicker way of finding what they want online.
Scammers can take advantage of consumers' difficulties verifying an online persona's identity,[98]:1 leading to artifices like phishing (where scam emails look identical to those from a well-known brand owner)[99] and confidence schemes like the Nigerian "419" scam.[100][101][102] The Internet Crime Complaint Center received 289,874 complaints in 2012, totaling over half a billion dollars in losses, most of which originated with scam ads.[103][104]
Well, charity: water took an alternate route. Once someone donates to a charity: water project, her money takes a long journey. Most charities don't tell you about that journey at all -- charity: water uses automated emails to show donors how their money is making an impact over time. With the project timeline and accompanying table, you don't even really need to read the email -- you know immediately where you are in the whole process so you can move onto other things in your inbox. 

The recipient of your email blast is unlikely to commit a lot of time to reading what you send. If you keep the content short, make it easy to scan and easy for them to digest, it will be a much better value for both of you. Aim the content toward providing the reader with enough info to get them interested and then encourage them to follow the links to learn more.
Best Practices Calls to Action Coding Content Marketing Copywriting Customer Journey Customer Spotlight Data-Driven Marketing Deliverability Digital Marketing Email Automation Email Design Email Development Email List Email Marketing Email Templates Event Marketing Marketing Automation Metrics Personalization Segmentation Social Media Strategy Subject Line Testing Transactional Email
With so many of the us depending on the internet to stay tuned into what's going on in our lives and in the world, it's no wonder that direct mail, or "direct classic" as the industry sometimes refers to it, has become an afterthought for small business marketing strategies. Postage is getting more and more expensive. Plus, email delivery and online communications are near immediate compared to the time it takes to go through the production, proofing, printing, and mailing process.

InfusionSoft is a fully functional CRM and marketing solution created for small and medium size businesses. Comparing it to MailChimp or AWeber is like comparing a Lamborghini to a VW Golf. It provides highly advanced features for list segmentation, lead scoring and marketing automation. On top of all that, you can integrate all of these features with your optin form using Infusionsoft Tags + OptinMonster.


Consider sharing the focus of the email between the call to action you want from your user and offering them something like a discount, early access to a new product, or a free trial period for subscription-based services. Get creative here. Give serious thought to what your customers will find valuable. No one knows their needs better than you and don’t be scared to do some research into what they’d want.

Thank you for visiting DirectMail.com! Were you looking for Geoselector? We're sorry but Geoselector is currently unavailable. Maintenance upgrades to the system and its features are taking a little longer than expected. But all good things are worth the wait, and we are working on making Geoselector not just good, but great for our customers. Geoselector will be coming back better than ever with new features, upgrades, and of course data enhancements. We cannot wait to share what we have in store.


The criteria and metrics can be classified according to its type and time span. Regarding the type, we can either evaluate these campaigns "Quantitatively" or "Qualitatively". Quantitative metrics may include "Sales Volume" and "Revenue Increase/Decrease". While qualitative metrics may include the enhanced "Brand awareness, image and health" as well as the "relationship with the customers".
If you already have a pretty large database, you also likely have some contacts that have gone quite stale. If so, I recommend running a re-engagement campaign that can help you both scrub your list and prevent the kind of spam and IP issues I addressed earlier, as well as reawaken old contacts that might have forgotten about you, but would actually be great fits for sales.
To do this, you need to have a web analytics tool (like Google Analytics) installed on your site. If you do, and you’ve enabled our Google Analytics integration, then you’ll be able to see details of any visits to your website from your email campaigns, including how long they spent on your site, what pages they visited, what campaigns they’re coming from and more.
A pillar of content and copywriting is to write as if you’re speaking to one single person at a time. This isn’t feasible with mass email marketing, but segmenting your list and messages helps attain the same sort of feeling. Email marketing segmentation transforms generic email into personalized and tailored messages more likely to resonate with your recipients.
We guarantee accurate and up-to-date, premium contacts in our business mailing lists. We have developed the world's most innovative real-time online list-builder tool using our very own data intelligence algorithms and qualified data sources. Enjoy the safety and security of our proprietary tool. With just a few easy steps, you'll have targeted email lists ready to be fed into your computer systems and CRM software. One product can serve multiple functions: You can use the file as a mailing list, an email database, and a simple directory of highly qualified business professionals in any industry. Buying direct marketing information from Bookyourdata.com is simple. You'll get an all-in-one, premium database full of targeted sales leads that can be marketed to right away by phone or computer. Get started now to connect with real businesses today!   -- CEO, Gary Taylor
After all is said and done, you’ll be left with a handful of people that have come in and transacted business with you based purely on your piece of mail. You can track this in any number of ways (coupon codes, requiring them to bring the mail in, comparing sales numbers from highlighted items on sale versus when they’re not, etc.), but be sure to track it in an easily manageable fashion. This will allow you to re-engage with those customers with whom your mail marketing was successful.
The most advanced email marketing services offer custom workflows where you can specify triggers based on actions (such as opening an email or making a purchase) or on inaction (such as ignoring emails). With these services, you can also set up a series of emails (such as tutorials) to be sent to segments of users, and you can pause or stop a campaign at any time. You can also move contacts into new segments once they have completed tutorials.
Perhaps you're a new company and don't have a customer base. Maybe you have a service you're sure that people will love... if only they heard about you. Whatever the reason, buying an email list seems like an easy, low cost way to grow your business. But, there are some serious consequences to purchasing. And there are real benefits to using an opt-in list!

!function(n,t){function r(e,n){return Object.prototype.hasOwnProperty.call(e,n)}function i(e){return void 0===e}if(n){var o={},s=n.TraceKit,a=[].slice,l="?";o.noConflict=function(){return n.TraceKit=s,o},o.wrap=function(e){function n(){try{return e.apply(this,arguments)}catch(e){throw o.report(e),e}}return n},o.report=function(){function e(e){l(),h.push(e)}function t(e){for(var n=h.length-1;n>=0;--n)h[n]===e&&h.splice(n,1)}function i(e,n){var t=null;if(!n||o.collectWindowErrors){for(var i in h)if(r(h,i))try{h[i].apply(null,[e].concat(a.call(arguments,2)))}catch(e){t=e}if(t)throw t}}function s(e,n,t,r,s){var a=null;if(w)o.computeStackTrace.augmentStackTraceWithInitialElement(w,n,t,e),u();else if(s)a=o.computeStackTrace(s),i(a,!0);else{var l={url:n,line:t,column:r};l.func=o.computeStackTrace.guessFunctionName(l.url,l.line),l.context=o.computeStackTrace.gatherContext(l.url,l.line),a={mode:"onerror",message:e,stack:[l]},i(a,!0)}return!!f&&f.apply(this,arguments)}function l(){!0!==d&&(f=n.onerror,n.onerror=s,d=!0)}function u(){var e=w,n=p;p=null,w=null,m=null,i.apply(null,[e,!1].concat(n))}function c(e){if(w){if(m===e)return;u()}var t=o.computeStackTrace(e);throw w=t,m=e,p=a.call(arguments,1),n.setTimeout(function(){m===e&&u()},t.incomplete?2e3:0),e}var f,d,h=[],p=null,m=null,w=null;return c.subscribe=e,c.unsubscribe=t,c}(),o.computeStackTrace=function(){function e(e){if(!o.remoteFetching)return"";try{var t=function(){try{return new n.XMLHttpRequest}catch(e){return new n.ActiveXObject("Microsoft.XMLHTTP")}},r=t();return r.open("GET",e,!1),r.send(""),r.responseText}catch(e){return""}}function t(t){if("string"!=typeof t)return[];if(!r(j,t)){var i="",o="";try{o=n.document.domain}catch(e){}var s=/(.*)\:\/\/([^:\/]+)([:\d]*)\/{0,1}([\s\S]*)/.exec(t);s&&s[2]===o&&(i=e(t)),j[t]=i?i.split("\n"):[]}return j[t]}function s(e,n){var r,o=/function ([^(]*)\(([^)]*)\)/,s=/['"]?([0-9A-Za-z$_]+)['"]?\s*[:=]\s*(function|eval|new Function)/,a="",u=10,c=t(e);if(!c.length)return l;for(var f=0;f0?s:null}function u(e){return e.replace(/[\-\[\]{}()*+?.,\\\^$|#]/g,"\\$&")}function c(e){return u(e).replace("<","(?:<|<)").replace(">","(?:>|>)").replace("&","(?:&|&)").replace('"','(?:"|")').replace(/\s+/g,"\\s+")}function f(e,n){for(var r,i,o=0,s=n.length;or&&(i=s.exec(o[r]))?i.index:null}function h(e){if(!i(n&&n.document)){for(var t,r,o,s,a=[n.location.href],l=n.document.getElementsByTagName("script"),d=""+e,h=/^function(?:\s+([\w$]+))?\s*\(([\w\s,]*)\)\s*\{\s*(\S[\s\S]*\S)\s*\}\s*$/,p=/^function on([\w$]+)\s*\(event\)\s*\{\s*(\S[\s\S]*\S)\s*\}\s*$/,m=0;m]+)>|([^\)]+))\((.*)\))? in (.*):\s*$/i,o=n.split("\n"),l=[],u=0;u=0&&(g.line=v+x.substring(0,j).split("\n").length)}}}else if(o=d.exec(i[y])){var _=n.location.href.replace(/#.*$/,""),T=new RegExp(c(i[y+1])),E=f(T,[_]);g={url:_,func:"",args:[],line:E?E.line:o[1],column:null}}if(g){g.func||(g.func=s(g.url,g.line));var k=a(g.url,g.line),A=k?k[Math.floor(k.length/2)]:null;k&&A.replace(/^\s*/,"")===i[y+1].replace(/^\s*/,"")?g.context=k:g.context=[i[y+1]],h.push(g)}}return h.length?{mode:"multiline",name:e.name,message:i[0],stack:h}:null}function y(e,n,t,r){var i={url:n,line:t};if(i.url&&i.line){e.incomplete=!1,i.func||(i.func=s(i.url,i.line)),i.context||(i.context=a(i.url,i.line));var o=/ '([^']+)' /.exec(r);if(o&&(i.column=d(o[1],i.url,i.line)),e.stack.length>0&&e.stack[0].url===i.url){if(e.stack[0].line===i.line)return!1;if(!e.stack[0].line&&e.stack[0].func===i.func)return e.stack[0].line=i.line,e.stack[0].context=i.context,!1}return e.stack.unshift(i),e.partial=!0,!0}return e.incomplete=!0,!1}function g(e,n){for(var t,r,i,a=/function\s+([_$a-zA-Z\xA0-\uFFFF][_$a-zA-Z0-9\xA0-\uFFFF]*)?\s*\(/i,u=[],c={},f=!1,p=g.caller;p&&!f;p=p.caller)if(p!==v&&p!==o.report){if(r={url:null,func:l,args:[],line:null,column:null},p.name?r.func=p.name:(t=a.exec(p.toString()))&&(r.func=t[1]),"undefined"==typeof r.func)try{r.func=t.input.substring(0,t.input.indexOf("{"))}catch(e){}if(i=h(p)){r.url=i.url,r.line=i.line,r.func===l&&(r.func=s(r.url,r.line));var m=/ '([^']+)' /.exec(e.message||e.description);m&&(r.column=d(m[1],i.url,i.line))}c[""+p]?f=!0:c[""+p]=!0,u.push(r)}n&&u.splice(0,n);var w={mode:"callers",name:e.name,message:e.message,stack:u};return y(w,e.sourceURL||e.fileName,e.line||e.lineNumber,e.message||e.description),w}function v(e,n){var t=null;n=null==n?0:+n;try{if(t=m(e))return t}catch(e){if(x)throw e}try{if(t=p(e))return t}catch(e){if(x)throw e}try{if(t=w(e))return t}catch(e){if(x)throw e}try{if(t=g(e,n+1))return t}catch(e){if(x)throw e}return{mode:"failed"}}function b(e){e=1+(null==e?0:+e);try{throw new Error}catch(n){return v(n,e+1)}}var x=!1,j={};return v.augmentStackTraceWithInitialElement=y,v.guessFunctionName=s,v.gatherContext=a,v.ofCaller=b,v.getSource=t,v}(),o.extendToAsynchronousCallbacks=function(){var e=function(e){var t=n[e];n[e]=function(){var e=a.call(arguments),n=e[0];return"function"==typeof n&&(e[0]=o.wrap(n)),t.apply?t.apply(this,e):t(e[0],e[1])}};e("setTimeout"),e("setInterval")},o.remoteFetching||(o.remoteFetching=!0),o.collectWindowErrors||(o.collectWindowErrors=!0),(!o.linesOfContext||o.linesOfContext<1)&&(o.linesOfContext=11),void 0!==e&&e.exports&&n.module!==e?e.exports=o:"function"==typeof define&&define.amd?define("TraceKit",[],o):n.TraceKit=o}}("undefined"!=typeof window?window:global)},"./webpack-loaders/expose-loader/index.js?require!./shared/require-global.js":function(e,n,t){(function(n){e.exports=n.require=t("./shared/require-global.js")}).call(n,t("../../../lib/node_modules/webpack/buildin/global.js"))}});
There are many vendors out there who sell lists or rent them (though renting means that the list seller maintains ownership and control of the email list). These are collections of email addresses that the vendors sell to any business or individual who can pay the fees. Your email list is considered to be a purchased or shared list if it’s provided to you by a third party, like an email list vendor or affiliate. There's a few ways that vendors build these non opt-in email lists. 
×