Read the Full Case Study
When it comes to maintaining hundreds or thousands of customer email addresses, manual recordkeeping is bound to create errors and oversights. And with opt-out lists originating from different campaigns, on top of different sources, even the most organized teams would have trouble keeping files current.
Manually distributing your opt-out lists is another major concern. If you don’t have a tool in place to hash or encrypt the email addresses in your files, you are exposing yourself to rogue partners. These are bad actors who might sell, rent or otherwise exploit the plain-text data you are sharing, for their own financial gain.
So what happens if you (or one of your partners) accidentally (or intentionally) email an individual who has asked to be removed from your mailing lists? Each email sent in violation of the CAN-SPAM Act can incur penalties of up to $16,000. In certain cases, criminal penalties can be imposed.
In addition to our Marketo Certified integration, UnsubCentral has built-in integrations with many leading ESPs, including:
Don’t see your ESP listed? Talk to us!
Our different editions are based on the complexity of your email program. Review our pricing page to gauge which edition you may need.
MD5 is an algorithm, used for its cryptographic hash function. For the purposes of email marketing, MD5 is the industry standard for secure suppression file distribution. The application converts sensitive email data into “hashed” numbers. In this way, customer lists and opt-outs lists can be shared for scrubbing without compromising confidential addresses.
For starters, we provide unparalleled service. We work to fully understand your business model, your email program and your compliance needs. Then we take a consultative approach—even advising you on the most reputable affiliate networks.
Once you’re up and running, our full-service support team is always on call (24/7) and always in-house (Austin, TX). We’re ready to assist with opt-out management, suppression lists, affiliate issues or general email compliance questions.
Protecting your email data and providing secure data distribution are our top priorities. We work with a limited set of technology partners who have met rigorous security requirements and certifications. Our management and technology teams also follow a strict policy of ongoing security audits—including periodic customer security reviews—and applied controls.
To learn more about how we mitigate, identify and manage risks, visit our Email Data Security page.