226:
Bob is being truthful (consciously or not) about the address. Alice sends a token to Bob's email address for an authentication request, asking Bob to click on a particular URL if and only if the recipient of the mail was making an account on Alice's website. Bob receives the mail and clicks the URL, demonstrating to Alice that he controls the email address he claimed to have. If instead a hostile party, Chuck, were to visit Alice's website attempting to masquerade as Bob, he would be unable to complete the account registration process because the confirmation would be sent to Bob's email address, to which Chuck does not have access. Knowledge uses this mechanism too.
179:. Some marketers call closed-loop opt-in "double opt-in". This term was coined by marketers in the late 90s to differentiate it from what they call "single opt-in", where a new subscriber to an email list gets a confirmation email telling them they will begin to receive emails if they take no action. Some marketers contend that "double opt-in" is like asking for permission twice and that it constitutes unnecessary interference with someone who has already said they want to hear from the marketer. However, it does drastically reduce the likelihood of someone being signed up to an email list by another person. Double opt-in method is used by
171:
back a reply email, it is difficult to establish that the e-mail address in question indeed belongs to the person who submitted the request to receive the e-mail. Using a confirmed opt-in (COI) (also known as a Double opt-in) procedure helps to ensure that a third party is not able to subscribe someone else accidentally, or out of malice, since if no action is taken on the part of the e-mail recipient, they will simply no longer receive any messages from the list operator. Mail system administrators and non-spam mailing list operators refer to this as
162:), but no steps are taken to make sure that this address belongs to the person submitting it. This can cause email from the mailing list to be considered spam because simple typos of the email address can cause the email to be sent to someone else. Malicious subscriptions are also possible, as are subscriptions that are due to spammers forging email addresses that are sent to the email address used to subscribe to the mailing list.
31:
225:
For example, suppose that one party, Alice, operates a website on which visitors can make accounts to participate or gain access to content. Another party, Bob, comes to that website and creates an account. Bob supplies an email address at which he can be contacted, but Alice does not yet know that
170:
A new subscriber asks to be subscribed to the mailing list, but unlike unconfirmed or single opt-in, a confirmation email is sent to verify it was really them. Generally, unless the explicit step is taken to verify the end-subscriber's e-mail address, such as clicking a special web link or sending
217:
Email address authentication is a technique for validating that a person claiming to possess a particular email address actually does so. This is normally done by sending an email containing a token to the address, and requiring that the party being authenticated supply that token before the
190:
does not require an opt-in approach, only an easy opt-out system. But opt-in is required by law in many
European countries and elsewhere. It turns out that confirmed opt-in is the only way that you can prove that a person actually opted in, if challenged legally.
218:
authentication proceeds. The email containing the token is usually worded so as to explain the situation to the recipient and discourage them from supplying the token (often via visiting a
205:
Instead of giving people the option to be put in the list, they are automatically put in and then have the option to request to be taken out. This approach is illegal in the
130:
is a term used when someone is not initially added to an emailing list and is instead given the option to join the emailing list. Typically, this is some sort of
114:
355:
134:, newsletter, or advertising. Opt-out emails do not ask for permission to send emails, these emails are typically criticized as
52:
95:
48:
67:
74:
251:
219:
81:
386:
281:
131:
41:
63:
187:
17:
436:
235:
373:
330:
256:
180:
88:
183:
to ensure the quality of their list by adding an extra stop in the verification process.
398:
441:
206:
430:
261:
331:"The Best Opt-in Email Example (Plus 6 Extra!) and the Perfect Places to Use Them"
239:
30:
135:
234:
The step of email address verification (confirmation) is considered by many
303:
159:
155:
418:
200:
238:
advocates to be the minimum degree necessary for any opt-in email
24:
304:"¿Qué es el Opt-in? - Diccionario de Marketing 40deFiebre"
222:) unless they in fact were attempting to authenticate.
55:. Unsourced material may be challenged and removed.
374:"Spam, Spam Bots, and Double Opt-in E-mail Lists"
356:"Everything You Need To Know About Double Opt-In"
154:Someone first gives an email address to the list
146:There are several common forms of opt-in email:
8:
166:Confirmed opt-in (COI)/double opt-in (DOI)
115:Learn how and when to remove this message
273:
242:or other ongoing email communication.
7:
53:adding citations to reliable sources
14:
150:Unconfirmed opt-in/single opt-in
29:
399:"Mailing Lists -vs- Spam Lists"
40:needs additional citations for
360:bestemailmarketingsoftware.com
209:and many other jurisdictions.
1:
284:. Comm100 Network Corporation
458:
252:Closed-loop authentication
198:
15:
419:Mailing House Birmingham
138:, better known as spam.
387:Help:Email confirmation
188:US CAN-SPAM Act of 2003
136:unsolicited bulk emails
213:Address authentication
173:confirmed subscription
158:(for instance, on a
49:improve this article
18:Opt (disambiguation)
16:For other uses, see
177:closed-loop opt-in
329:Minning, Lauren.
125:
124:
117:
99:
449:
421:
416:
410:
409:
407:
405:
395:
389:
384:
378:
377:
376:. 21 April 2010.
370:
364:
363:
352:
346:
345:
343:
341:
326:
320:
319:
317:
315:
300:
294:
293:
291:
289:
278:
120:
113:
109:
106:
100:
98:
57:
33:
25:
457:
456:
452:
451:
450:
448:
447:
446:
427:
426:
425:
424:
417:
413:
403:
401:
397:
396:
392:
385:
381:
372:
371:
367:
354:
353:
349:
339:
337:
335:Active Campaign
328:
327:
323:
313:
311:
302:
301:
297:
287:
285:
280:
279:
275:
270:
257:Email marketing
248:
232:
215:
203:
197:
181:email marketers
168:
152:
144:
121:
110:
104:
101:
58:
56:
46:
34:
21:
12:
11:
5:
455:
453:
445:
444:
439:
429:
428:
423:
422:
411:
390:
379:
365:
362:. 9 June 2020.
347:
321:
295:
282:"Email opt-in"
272:
271:
269:
266:
265:
264:
259:
254:
247:
244:
231:
228:
214:
211:
207:European Union
199:Main article:
196:
193:
167:
164:
151:
148:
143:
140:
123:
122:
64:"Opt-in email"
37:
35:
28:
13:
10:
9:
6:
4:
3:
2:
454:
443:
440:
438:
435:
434:
432:
420:
415:
412:
400:
394:
391:
388:
383:
380:
375:
369:
366:
361:
357:
351:
348:
336:
332:
325:
322:
309:
305:
299:
296:
283:
277:
274:
267:
263:
260:
258:
255:
253:
250:
249:
245:
243:
241:
237:
230:Best practice
229:
227:
223:
221:
212:
210:
208:
202:
194:
192:
189:
184:
182:
178:
174:
165:
163:
161:
157:
149:
147:
141:
139:
137:
133:
129:
119:
116:
108:
97:
94:
90:
87:
83:
80:
76:
73:
69:
66: –
65:
61:
60:Find sources:
54:
50:
44:
43:
38:This article
36:
32:
27:
26:
23:
19:
414:
402:. Retrieved
393:
382:
368:
359:
350:
338:. Retrieved
334:
324:
314:18 September
312:. Retrieved
310:(in Spanish)
307:
298:
286:. Retrieved
276:
262:Whitelisting
233:
224:
216:
204:
185:
176:
172:
169:
153:
145:
132:mailing list
128:Opt-in email
127:
126:
111:
102:
92:
85:
78:
71:
59:
47:Please help
42:verification
39:
22:
240:advertising
431:Categories
308:40deFiebre
268:References
75:newspapers
340:14 August
236:anti-spam
105:July 2020
437:Spamming
246:See also
160:Web page
156:software
201:opt-out
195:Opt-out
89:scholar
288:10 May
91:
84:
77:
70:
62:
442:Email
404:2 May
142:Forms
96:JSTOR
82:books
406:2012
342:2019
316:2020
290:2012
186:The
68:news
220:URL
175:or
51:by
433::
358:.
333:.
306:.
408:.
344:.
318:.
292:.
118:)
112:(
107:)
103:(
93:·
86:·
79:·
72:·
45:.
20:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.