Email tracking





Email tracking is an effective method for monitoring the email delivery to the intended recipient. Most tracking technologies use some form of digitally time-stamped record to reveal the exact time and date that an email was received or opened, as well the IP address of the recipient.


Email tracking is useful when the sender wants to know if the intended recipient actually received the email, or if they clicked the links. However, due to the nature of the technology, email tracking cannot be considered an absolutely accurate indicator that a message was opened or read by the recipient.


Most email marketing software provides tracking features, sometimes in aggregate (e.g., click-through rate), and sometimes on an individual basis.




Contents






  • 1 Read-receipts


  • 2 Return-receipts


  • 3 Email marketing and tracking


  • 4 Privacy issues


  • 5 HP email tracking scandal


  • 6 See also


  • 7 References





Read-receipts


Some email applications, such as Microsoft Office Outlook and Mozilla Thunderbird, employ a read-receipt tracking mechanism. The sender selects the receipt request option prior to sending the message, and then upon sending, each recipient has the option of notifying the sender that the message was received or read by the recipient.


However, requesting a receipt does not guarantee that one will get one, for several reasons. Not all email applications or services support read receipts, and users can generally disable the functionality if they so wish. Those that do support it are not necessarily compatible with or capable of recognizing requests from a different email service or application. Generally, read receipts are only useful within an organization where all employees/members are using the same email service and application.


Depending on the recipient's mail client and settings, they may be forced to click a notification button before they can move on with their work. Even though it is an opt-in process, a recipient might consider it inconvenient, discourteous, or invasive.


Read receipts are sent back to one's "Inbox" as email messages, but the location may be changed depending on the software used and its configuration. Additional technical information, such as who it is from, the email software they use, the IP addresses of the sender, and their email server is commonly available inside the Internet headers of the read receipt.


The technical term for these is "MDN - Message Disposition Notifications", and they are requested by inserting one or more of the following lines into the email headers: "X-Confirm-Reading-To:"; "Disposition-Notification-To:"; or "Return-Receipt-To:"


Several email tracking services also feature real-time notifications, producing an on-screen pop-up whenever the sender's email has been opened.[1]



Return-receipts







Another kind of receipt can be requested, which is called a DSN (delivery status notification), which is a request to the recipient's email server to send you a notification about the delivery of an email that you have just sent. The notification takes the form of an email, and will indicate whether the delivery succeeded, failed, or got delayed, and it will warn you if any email server involved was unable to give you a receipt. DSNs are requested at the time of sending by the sending application or server software (not inside the email or headers itself), and you can request to "Never" get any, or to "Always" get one, or (which most software does by default) only to get DSN if delivery fails (i.e.: not for success, delay, or relay DSNs). These failure DSNs are normally referred to as a "Bounce". Additionally, you can specify in your DSN request whether you want your receipt to contain a full copy of your original email, or just a summary of what happened. In the SMTP protocol, DSNs are requested at the end of the RCPT TO: command (e.g.: RCPT TO:<> NOTIFY=SUCCESS,DELAY) and the MAIL FROM: command (e.g.: MAIL FROM:<> RET=HDRS).



Email marketing and tracking


Some email marketing tools include tracking as a feature. Such email tracking is usually accomplished using standard web tracking devices known as cookies and web beacons. When an email message is sent, if it is a graphical HTML message (not a plain text message) the email marketing system may embed a tiny, invisible tracking image (a single-pixel gif, sometimes called a web beacon) within the content of the message. When the recipient opens the message, the tracking image is referenced. When they click a link or open an attachment, another tracking code is activated. In each case a separate tracking event is recorded by the system. These response events accumulate over time in a database, enabling the email marketing software to report metrics such as open-rate and click-through rates. Email marketing users can view reports on both aggregate response statistics and individual response over time.


Such email tracking services are used by many companies, but are also available for individuals as subscription services, either web-based or integrated into email clients such as Microsoft Outlook or Gmail
[2]


Email tracking services may also offer collations of tracked data, allowing users to analyze the statistics of their email performance.



Privacy issues


Email tracking is used by individuals, email marketers, spammers and phishers, to verify that emails are actually read by recipients, that email addresses are valid, and that the content of emails has made it past spam filters. It can also reveal if emails get forwarded (but not usually to whom).
When used maliciously, it can be used to collect confidential information about businesses and individuals and to create more effective phishing schemes.


The tracking mechanisms employed are typically first-party cookies and web bugs.



HP email tracking scandal


In the U.S. Congressional Inquiry investigating the
HP pretexting scandal
it was revealed that HP security used an email tracking service called
ReadNotify.com to investigate boardroom leaks.[3]
The California attorney general's office has said that this practice
was not part of the pretexting charges.
HP said they consider email tracking to be legitimate and will continue using it.[4]



See also




  • Document automation in supply chain management & logistics

  • Bounce message



References





  1. ^ https://www.mailcastr.com/


  2. ^ Gordon, Whitson. "How to Track the Emails You Send (and Avoid Being Tracked Yourself)". lifehacker. Retrieved 24 March 2014..mw-parser-output cite.citation{font-style:inherit}.mw-parser-output q{quotes:"""""""'""'"}.mw-parser-output code.cs1-code{color:inherit;background:inherit;border:inherit;padding:inherit}.mw-parser-output .cs1-lock-free a{background:url("//upload.wikimedia.org/wikipedia/commons/thumb/6/65/Lock-green.svg/9px-Lock-green.svg.png")no-repeat;background-position:right .1em center}.mw-parser-output .cs1-lock-limited a,.mw-parser-output .cs1-lock-registration a{background:url("//upload.wikimedia.org/wikipedia/commons/thumb/d/d6/Lock-gray-alt-2.svg/9px-Lock-gray-alt-2.svg.png")no-repeat;background-position:right .1em center}.mw-parser-output .cs1-lock-subscription a{background:url("//upload.wikimedia.org/wikipedia/commons/thumb/a/aa/Lock-red-alt-2.svg/9px-Lock-red-alt-2.svg.png")no-repeat;background-position:right .1em center}.mw-parser-output .cs1-subscription,.mw-parser-output .cs1-registration{color:#555}.mw-parser-output .cs1-subscription span,.mw-parser-output .cs1-registration span{border-bottom:1px dotted;cursor:help}.mw-parser-output .cs1-hidden-error{display:none;font-size:100%}.mw-parser-output .cs1-visible-error{font-size:100%}.mw-parser-output .cs1-subscription,.mw-parser-output .cs1-registration,.mw-parser-output .cs1-format{font-size:95%}.mw-parser-output .cs1-kern-left,.mw-parser-output .cs1-kern-wl-left{padding-left:0.2em}.mw-parser-output .cs1-kern-right,.mw-parser-output .cs1-kern-wl-right{padding-right:0.2em}


  3. ^ Evers, Joris (29 September 2006). "How HP bugged e-mail". CNET. Retrieved 6 April 2016.


  4. ^ McMillian, Robert (2006-10-09). Web Bugs Trained to Track Your E-Mail. PC World - Business Center, 9 October 2006.Retrieved from http://www.pcworld.com/article/id,127444-c,onlineprivacy/article.html.









Popular posts from this blog

Italian cuisine

Bulgarian cuisine

Carrot