237:
Bob is being truthful (consciously or not) about the address. Alice sends a token to Bob's email address for an authentication request, asking Bob to click on a particular URL if and only if the recipient of the mail was making an account on Alice's website. Bob receives the mail and clicks the URL, demonstrating to Alice that he controls the email address he claimed to have. If instead a hostile party, Chuck, were to visit Alice's website attempting to masquerade as Bob, he would be unable to complete the account registration process because the confirmation would be sent to Bob's email address, to which Chuck does not have access. Knowledge uses this mechanism too.
190:. Some marketers call closed-loop opt-in "double opt-in". This term was coined by marketers in the late 90s to differentiate it from what they call "single opt-in", where a new subscriber to an email list gets a confirmation email telling them they will begin to receive emails if they take no action. Some marketers contend that "double opt-in" is like asking for permission twice and that it constitutes unnecessary interference with someone who has already said they want to hear from the marketer. However, it does drastically reduce the likelihood of someone being signed up to an email list by another person. Double opt-in method is used by
182:
back a reply email, it is difficult to establish that the e-mail address in question indeed belongs to the person who submitted the request to receive the e-mail. Using a confirmed opt-in (COI) (also known as a Double opt-in) procedure helps to ensure that a third party is not able to subscribe someone else accidentally, or out of malice, since if no action is taken on the part of the e-mail recipient, they will simply no longer receive any messages from the list operator. Mail system administrators and non-spam mailing list operators refer to this as
173:), but no steps are taken to make sure that this address belongs to the person submitting it. This can cause email from the mailing list to be considered spam because simple typos of the email address can cause the email to be sent to someone else. Malicious subscriptions are also possible, as are subscriptions that are due to spammers forging email addresses that are sent to the email address used to subscribe to the mailing list.
42:
236:
For example, suppose that one party, Alice, operates a website on which visitors can make accounts to participate or gain access to content. Another party, Bob, comes to that website and creates an account. Bob supplies an email address at which he can be contacted, but Alice does not yet know that
181:
A new subscriber asks to be subscribed to the mailing list, but unlike unconfirmed or single opt-in, a confirmation email is sent to verify it was really them. Generally, unless the explicit step is taken to verify the end-subscriber's e-mail address, such as clicking a special web link or sending
228:
Email address authentication is a technique for validating that a person claiming to possess a particular email address actually does so. This is normally done by sending an email containing a token to the address, and requiring that the party being authenticated supply that token before the
201:
does not require an opt-in approach, only an easy opt-out system. But opt-in is required by law in many
European countries and elsewhere. It turns out that confirmed opt-in is the only way that you can prove that a person actually opted in, if challenged legally.
229:
authentication proceeds. The email containing the token is usually worded so as to explain the situation to the recipient and discourage them from supplying the token (often via visiting a
216:
Instead of giving people the option to be put in the list, they are automatically put in and then have the option to request to be taken out. This approach is illegal in the
141:
is a term used when someone is not initially added to an emailing list and is instead given the option to join the emailing list. Typically, this is some sort of
125:
366:
145:, newsletter, or advertising. Opt-out emails do not ask for permission to send emails, these emails are typically criticized as
63:
106:
59:
78:
85:
262:
230:
92:
397:
292:
142:
52:
74:
198:
28:
447:
246:
384:
341:
267:
191:
99:
194:
to ensure the quality of their list by adding an extra stop in the verification process.
409:
452:
217:
441:
272:
342:"The Best Opt-in Email Example (Plus 6 Extra!) and the Perfect Places to Use Them"
250:
41:
146:
245:
The step of email address verification (confirmation) is considered by many
17:
314:
170:
166:
429:
211:
249:
advocates to be the minimum degree necessary for any opt-in email
35:
315:"¿Qué es el Opt-in? - Diccionario de Marketing 40deFiebre"
233:) unless they in fact were attempting to authenticate.
66:. Unsourced material may be challenged and removed.
385:"Spam, Spam Bots, and Double Opt-in E-mail Lists"
367:"Everything You Need To Know About Double Opt-In"
165:Someone first gives an email address to the list
157:There are several common forms of opt-in email:
8:
177:Confirmed opt-in (COI)/double opt-in (DOI)
126:Learn how and when to remove this message
284:
253:or other ongoing email communication.
7:
64:adding citations to reliable sources
25:
161:Unconfirmed opt-in/single opt-in
40:
410:"Mailing Lists -vs- Spam Lists"
51:needs additional citations for
371:bestemailmarketingsoftware.com
220:and many other jurisdictions.
1:
295:. Comm100 Network Corporation
469:
263:Closed-loop authentication
209:
26:
430:Mailing House Birmingham
149:, better known as spam.
398:Help:Email confirmation
199:US CAN-SPAM Act of 2003
147:unsolicited bulk emails
224:Address authentication
184:confirmed subscription
169:(for instance, on a
60:improve this article
29:Opt (disambiguation)
27:For other uses, see
188:closed-loop opt-in
340:Minning, Lauren.
136:
135:
128:
110:
16:(Redirected from
460:
432:
427:
421:
420:
418:
416:
406:
400:
395:
389:
388:
387:. 21 April 2010.
381:
375:
374:
363:
357:
356:
354:
352:
337:
331:
330:
328:
326:
311:
305:
304:
302:
300:
289:
131:
124:
120:
117:
111:
109:
68:
44:
36:
21:
468:
467:
463:
462:
461:
459:
458:
457:
438:
437:
436:
435:
428:
424:
414:
412:
408:
407:
403:
396:
392:
383:
382:
378:
365:
364:
360:
350:
348:
346:Active Campaign
339:
338:
334:
324:
322:
313:
312:
308:
298:
296:
291:
290:
286:
281:
268:Email marketing
259:
243:
226:
214:
208:
192:email marketers
179:
163:
155:
132:
121:
115:
112:
69:
67:
57:
45:
32:
23:
22:
15:
12:
11:
5:
466:
464:
456:
455:
450:
440:
439:
434:
433:
422:
401:
390:
376:
373:. 9 June 2020.
358:
332:
306:
293:"Email opt-in"
283:
282:
280:
277:
276:
275:
270:
265:
258:
255:
242:
239:
225:
222:
218:European Union
210:Main article:
207:
204:
178:
175:
162:
159:
154:
151:
134:
133:
75:"Opt-in email"
48:
46:
39:
24:
14:
13:
10:
9:
6:
4:
3:
2:
465:
454:
451:
449:
446:
445:
443:
431:
426:
423:
411:
405:
402:
399:
394:
391:
386:
380:
377:
372:
368:
362:
359:
347:
343:
336:
333:
320:
316:
310:
307:
294:
288:
285:
278:
274:
271:
269:
266:
264:
261:
260:
256:
254:
252:
248:
241:Best practice
240:
238:
234:
232:
223:
221:
219:
213:
205:
203:
200:
195:
193:
189:
185:
176:
174:
172:
168:
160:
158:
152:
150:
148:
144:
140:
130:
127:
119:
108:
105:
101:
98:
94:
91:
87:
84:
80:
77: –
76:
72:
71:Find sources:
65:
61:
55:
54:
49:This article
47:
43:
38:
37:
34:
30:
19:
425:
413:. Retrieved
404:
393:
379:
370:
361:
349:. Retrieved
345:
335:
325:18 September
323:. Retrieved
321:(in Spanish)
318:
309:
297:. Retrieved
287:
273:Whitelisting
244:
235:
227:
215:
196:
187:
183:
180:
164:
156:
143:mailing list
139:Opt-in email
138:
137:
122:
113:
103:
96:
89:
82:
70:
58:Please help
53:verification
50:
33:
18:Opt in email
251:advertising
442:Categories
319:40deFiebre
279:References
86:newspapers
351:14 August
247:anti-spam
116:July 2020
448:Spamming
257:See also
171:Web page
167:software
212:opt-out
206:Opt-out
100:scholar
299:10 May
102:
95:
88:
81:
73:
453:Email
415:2 May
153:Forms
107:JSTOR
93:books
417:2012
353:2019
327:2020
301:2012
197:The
79:news
231:URL
186:or
62:by
444::
369:.
344:.
317:.
419:.
355:.
329:.
303:.
129:)
123:(
118:)
114:(
104:·
97:·
90:·
83:·
56:.
31:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.