Knowledge

Opt-in email

Source 📝

226:
Bob is being truthful (consciously or not) about the address. Alice sends a token to Bob's email address for an authentication request, asking Bob to click on a particular URL if and only if the recipient of the mail was making an account on Alice's website. Bob receives the mail and clicks the URL, demonstrating to Alice that he controls the email address he claimed to have. If instead a hostile party, Chuck, were to visit Alice's website attempting to masquerade as Bob, he would be unable to complete the account registration process because the confirmation would be sent to Bob's email address, to which Chuck does not have access. Knowledge uses this mechanism too.
179:. Some marketers call closed-loop opt-in "double opt-in". This term was coined by marketers in the late 90s to differentiate it from what they call "single opt-in", where a new subscriber to an email list gets a confirmation email telling them they will begin to receive emails if they take no action. Some marketers contend that "double opt-in" is like asking for permission twice and that it constitutes unnecessary interference with someone who has already said they want to hear from the marketer. However, it does drastically reduce the likelihood of someone being signed up to an email list by another person. Double opt-in method is used by 171:
back a reply email, it is difficult to establish that the e-mail address in question indeed belongs to the person who submitted the request to receive the e-mail. Using a confirmed opt-in (COI) (also known as a Double opt-in) procedure helps to ensure that a third party is not able to subscribe someone else accidentally, or out of malice, since if no action is taken on the part of the e-mail recipient, they will simply no longer receive any messages from the list operator. Mail system administrators and non-spam mailing list operators refer to this as
162:), but no steps are taken to make sure that this address belongs to the person submitting it. This can cause email from the mailing list to be considered spam because simple typos of the email address can cause the email to be sent to someone else. Malicious subscriptions are also possible, as are subscriptions that are due to spammers forging email addresses that are sent to the email address used to subscribe to the mailing list. 31: 225:
For example, suppose that one party, Alice, operates a website on which visitors can make accounts to participate or gain access to content. Another party, Bob, comes to that website and creates an account. Bob supplies an email address at which he can be contacted, but Alice does not yet know that
170:
A new subscriber asks to be subscribed to the mailing list, but unlike unconfirmed or single opt-in, a confirmation email is sent to verify it was really them. Generally, unless the explicit step is taken to verify the end-subscriber's e-mail address, such as clicking a special web link or sending
217:
Email address authentication is a technique for validating that a person claiming to possess a particular email address actually does so. This is normally done by sending an email containing a token to the address, and requiring that the party being authenticated supply that token before the
190:
does not require an opt-in approach, only an easy opt-out system. But opt-in is required by law in many European countries and elsewhere. It turns out that confirmed opt-in is the only way that you can prove that a person actually opted in, if challenged legally.
218:
authentication proceeds. The email containing the token is usually worded so as to explain the situation to the recipient and discourage them from supplying the token (often via visiting a
205:
Instead of giving people the option to be put in the list, they are automatically put in and then have the option to request to be taken out. This approach is illegal in the
130:
is a term used when someone is not initially added to an emailing list and is instead given the option to join the emailing list. Typically, this is some sort of
114: 355: 134:, newsletter, or advertising. Opt-out emails do not ask for permission to send emails, these emails are typically criticized as 52: 95: 48: 67: 74: 251: 219: 81: 386: 281: 131: 41: 63: 187: 17: 436: 235: 373: 330: 256: 180: 88: 183:
to ensure the quality of their list by adding an extra stop in the verification process.
398: 441: 206: 430: 261: 331:"The Best Opt-in Email Example (Plus 6 Extra!) and the Perfect Places to Use Them" 239: 30: 135: 234:
The step of email address verification (confirmation) is considered by many
303: 159: 155: 418: 200: 238:
advocates to be the minimum degree necessary for any opt-in email
24: 304:"¿Qué es el Opt-in? - Diccionario de Marketing 40deFiebre" 222:) unless they in fact were attempting to authenticate. 55:. Unsourced material may be challenged and removed. 374:"Spam, Spam Bots, and Double Opt-in E-mail Lists" 356:"Everything You Need To Know About Double Opt-In" 154:Someone first gives an email address to the list 146:There are several common forms of opt-in email: 8: 166:Confirmed opt-in (COI)/double opt-in (DOI) 115:Learn how and when to remove this message 273: 242:or other ongoing email communication. 7: 53:adding citations to reliable sources 14: 150:Unconfirmed opt-in/single opt-in 29: 399:"Mailing Lists -vs- Spam Lists" 40:needs additional citations for 360:bestemailmarketingsoftware.com 209:and many other jurisdictions. 1: 284:. Comm100 Network Corporation 458: 252:Closed-loop authentication 198: 15: 419:Mailing House Birmingham 138:, better known as spam. 387:Help:Email confirmation 188:US CAN-SPAM Act of 2003 136:unsolicited bulk emails 213:Address authentication 173:confirmed subscription 158:(for instance, on a 49:improve this article 18:Opt (disambiguation) 16:For other uses, see 177:closed-loop opt-in 329:Minning, Lauren. 125: 124: 117: 99: 449: 421: 416: 410: 409: 407: 405: 395: 389: 384: 378: 377: 376:. 21 April 2010. 370: 364: 363: 352: 346: 345: 343: 341: 326: 320: 319: 317: 315: 300: 294: 293: 291: 289: 278: 120: 113: 109: 106: 100: 98: 57: 33: 25: 457: 456: 452: 451: 450: 448: 447: 446: 427: 426: 425: 424: 417: 413: 403: 401: 397: 396: 392: 385: 381: 372: 371: 367: 354: 353: 349: 339: 337: 335:Active Campaign 328: 327: 323: 313: 311: 302: 301: 297: 287: 285: 280: 279: 275: 270: 257:Email marketing 248: 232: 215: 203: 197: 181:email marketers 168: 152: 144: 121: 110: 104: 101: 58: 56: 46: 34: 21: 12: 11: 5: 455: 453: 445: 444: 439: 429: 428: 423: 422: 411: 390: 379: 365: 362:. 9 June 2020. 347: 321: 295: 282:"Email opt-in" 272: 271: 269: 266: 265: 264: 259: 254: 247: 244: 231: 228: 214: 211: 207:European Union 199:Main article: 196: 193: 167: 164: 151: 148: 143: 140: 123: 122: 64:"Opt-in email" 37: 35: 28: 13: 10: 9: 6: 4: 3: 2: 454: 443: 440: 438: 435: 434: 432: 420: 415: 412: 400: 394: 391: 388: 383: 380: 375: 369: 366: 361: 357: 351: 348: 336: 332: 325: 322: 309: 305: 299: 296: 283: 277: 274: 267: 263: 260: 258: 255: 253: 250: 249: 245: 243: 241: 237: 230:Best practice 229: 227: 223: 221: 212: 210: 208: 202: 194: 192: 189: 184: 182: 178: 174: 165: 163: 161: 157: 149: 147: 141: 139: 137: 133: 129: 119: 116: 108: 97: 94: 90: 87: 83: 80: 76: 73: 69: 66: –  65: 61: 60:Find sources: 54: 50: 44: 43: 38:This article 36: 32: 27: 26: 23: 19: 414: 402:. Retrieved 393: 382: 368: 359: 350: 338:. Retrieved 334: 324: 314:18 September 312:. Retrieved 310:(in Spanish) 307: 298: 286:. Retrieved 276: 262:Whitelisting 233: 224: 216: 204: 185: 176: 172: 169: 153: 145: 132:mailing list 128:Opt-in email 127: 126: 111: 102: 92: 85: 78: 71: 59: 47:Please help 42:verification 39: 22: 240:advertising 431:Categories 308:40deFiebre 268:References 75:newspapers 340:14 August 236:anti-spam 105:July 2020 437:Spamming 246:See also 160:Web page 156:software 201:opt-out 195:Opt-out 89:scholar 288:10 May 91:  84:  77:  70:  62:  442:Email 404:2 May 142:Forms 96:JSTOR 82:books 406:2012 342:2019 316:2020 290:2012 186:The 68:news 220:URL 175:or 51:by 433:: 358:. 333:. 306:. 408:. 344:. 318:. 292:. 118:) 112:( 107:) 103:( 93:· 86:· 79:· 72:· 45:. 20:.

Index

Opt (disambiguation)

verification
improve this article
adding citations to reliable sources
"Opt-in email"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
mailing list
unsolicited bulk emails
software
Web page
email marketers
US CAN-SPAM Act of 2003
opt-out
European Union
URL
anti-spam
advertising
Closed-loop authentication
Email marketing
Whitelisting
"Email opt-in"
"¿Qué es el Opt-in? - Diccionario de Marketing 40deFiebre"
"The Best Opt-in Email Example (Plus 6 Extra!) and the Perfect Places to Use Them"
"Everything You Need To Know About Double Opt-In"

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.