{"id":834,"date":"2021-07-09T07:15:10","date_gmt":"2021-07-09T12:15:10","guid":{"rendered":"https:\/\/www.knownhost.com\/kb\/?p=834"},"modified":"2021-12-07T07:28:10","modified_gmt":"2021-12-07T13:28:10","slug":"an-introduction-to-email-best-practices","status":"publish","type":"post","link":"https:\/\/www.knownhost.com\/kb\/an-introduction-to-email-best-practices\/","title":{"rendered":"An introduction to Email Best Practices"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 ez-toc-wrap-right counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #212121;color:#212121\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #212121;color:#212121\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-toggle-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.knownhost.com\/kb\/an-introduction-to-email-best-practices\/#types_of_email\" >Types of Email<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.knownhost.com\/kb\/an-introduction-to-email-best-practices\/#spam_email\" >Spam Email<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.knownhost.com\/kb\/an-introduction-to-email-best-practices\/#transactional_email\" >Transactional Email<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.knownhost.com\/kb\/an-introduction-to-email-best-practices\/#promotional_email\" >Promotional Email<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.knownhost.com\/kb\/an-introduction-to-email-best-practices\/#sexually-explicit_email\" >Sexually-explicit Email<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.knownhost.com\/kb\/an-introduction-to-email-best-practices\/#spam_laws_vary_by_country_and_locality\" >Spam Laws Vary By Country and Locality<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.knownhost.com\/kb\/an-introduction-to-email-best-practices\/#the_can-spam_act_%e2%80%93_united_states_of_america\" >The CAN-SPAM Act &#8211; United States of America<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.knownhost.com\/kb\/an-introduction-to-email-best-practices\/#7_can-spam_act_rules\" >7 CAN-SPAM Act Rules<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.knownhost.com\/kb\/an-introduction-to-email-best-practices\/#the_european_unions_general_data_protection_regulation_gdpr\" >The European Union\u2019s General Data Protection Regulation (GDPR)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.knownhost.com\/kb\/an-introduction-to-email-best-practices\/#additional_requirements_to_consider\" >Additional Requirements to Consider<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.knownhost.com\/kb\/an-introduction-to-email-best-practices\/#local_laws\" >Local Laws<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.knownhost.com\/kb\/an-introduction-to-email-best-practices\/#hosting_provideremail_service_provider_acceptable_use_policies\" >Hosting Provider\/Email Service Provider Acceptable Use Policies<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<div class=\"kb-shortcode kb-shortcode_info\">\n                    <div class=\"kb-shortcode-icon\">\n                        <i class=\"fa fa-info-circle fa-2x\"><\/i>\n                    <\/div>\n                    <div class=\"kb-shortcode-content_info\"><center><\/p>\n<p>Email Best Practices 101:<\/p>\n<p><\/center><\/p>\n<ol>\n<li>Email Best Practices: Avoiding the Spam Box and Blacklists<\/li>\n<li><a href=\"https:\/\/www.knownhost.com\/kb\/mail-server-configuration\/\">Email Best Practices: Mail Server Configuration<\/a><\/li>\n<li><a href=\"https:\/\/www.knownhost.com\/kb\/ensuring-email-delivery-and-best-practices\/\">Email Best Practices: Email Design and Feedback Loops<\/a>\n<\/li>\n<\/ol>\n<\/div>\n                <\/div>\n\n\n\n<p>This article will be thoroughly detailed across the different areas of Email Best Practices; this page will focus on the different influences of email, what they do, and how they affect you.<\/p>\n\n\n\n<p>Email marketing is an integral component of many businesses, and KnownHost is here is to help you understand what is required in order to ensure your emails are reaching the inbox and not the spam box.<\/p>\n\n\n\n<p>First, let&#8217;s talk about spam. What is&nbsp;<em>spam<\/em>? I&#8217;m told that it is a delicious, meat-like substance that can be incorporated into many dishes or eaten alone. We won&#8217;t be discussing that spam, unfortunately.<\/p>\n\n\n\n<p>The spam we will discuss is unsolicited bulk email. Emails that are sent to several different recipients that never asked to receive such emails qualifies as spam. Nobody likes spam.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"600\" height=\"383\" src=\"https:\/\/www.knownhost.com\/kb\/wp-content\/uploads\/2021\/07\/idontlikespam_png.png\" alt=\"email best practices\" class=\"wp-image-836\" srcset=\"https:\/\/www.knownhost.com\/kb\/wp-content\/uploads\/2021\/07\/idontlikespam_png.png 600w, https:\/\/www.knownhost.com\/kb\/wp-content\/uploads\/2021\/07\/idontlikespam_png-300x192.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<p>There are several requirements that must be met to ensure that your emails are not labelled as spam. If these requirements are not met, and you continue to send spam emails, then your server can become blacklisted. This means that it will have a tarnished reputation and mail servers will stop accepting your mail. If you fix the error and get removed from the blacklist(s), but your server begins sending more spam that in turn results in your server becoming blacklisted again, major RBLs (Real-Time Blacklists) can choose to ignore your requests to delist the IP and\/or make the delisting process more involved.<\/p>\n\n\n\n<p>KnownHost strives to only assigns clean IPs to customers. You are given a clean IP, which you must build a good reputation for over time via responsible email practices. This situation can be thought of as analogous to building credit. You begin with no credit. You must then choose to make the right choices with your finances to build a good credit score. You build your mail server&#8217;s reputation is the same manner. You continue over time to implement best practices and not send spam, and your credibility as a legitimate mail server builds, resulting in a good IP reputation and more of your emails reaching your audience&#8217;s inbox.<\/p>\n\n\n\n<p>So, how do we start building our mail server&#8217;s credibility\/reputation? There are several ways, and each is just as important as the last.<\/p>\n\n\n\n<p>Let&#8217;s discus these in detail so that you have a comprehensive guide to follow when building your mail server&#8217;s reputation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"types_of_email\"><\/span>Types of Email<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>We should first distinguish between the types of email that are sent, as each will have different requirements that must be met per law. The law I am referring to is the CAN-SPAM Act, which we will discuss in more detail soon. Here are the major types of email:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Spam<\/li><li>Transactional<\/li><li>Promotional<\/li><li>Sexually-explicit<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"spam_email\"><\/span>Spam Email<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>We&#8217;ve already described spam emails as those are are sent in bulk without a user&#8217;s consent\/request. This is the type of email that we don&#8217;t want to receive nor send.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"transactional_email\"><\/span>Transactional Email<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Transactional emails are emails that are sent because of some interaction between the sender and the recipient. A few examples would include:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Receipts of Purchase\/Payment Received<\/li><li>Notifications of account activity (account creations, deletions, password reset requests, etc)<\/li><li>Social media notifications like friend requests, recent comments, likes, or shares, new followers, etc.<\/li><li>Billing Statements<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"promotional_email\"><\/span>Promotional Email<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>These are emails that contain commercial advertisement or promotion of a commercial product or service, Examples of these types of emails may include:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Notifications of Sales\/Special Offers<\/li><li>Notifications of New Product Availability<\/li><li>Any email with the primary purpose of selling something<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"sexually-explicit_email\"><\/span>Sexually-explicit Email<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>This should not need too much explanation, however, any email that contains sexual content falls within this category and is subject unique guidelines in order to comply with laws regarding electronic message transmission.<\/p>\n\n\n<div class=\"kb-shortcode kb-shortcode_alert\">\n                    <div class=\"kb-shortcode-icon\">\n                        <i class=\"fa fa-times-circle fa-2x\"><\/i>\n                    <\/div>\n                    <div class=\"kb-shortcode-content_alert\">KnownHost has expressly forbidden any pornographic content via the AUP\/TOS.<\/div>\n                <\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"spam_laws_vary_by_country_and_locality\"><\/span>Spam Laws Vary By Country and Locality<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Each country, state, and locality may have their own spam regulation laws. Many were created prior to the CAN SPAM Act implementation and may now be null and void, while many others may be extensions of the federal law. It is best to check any official regulations for your target audience and country of operation.<\/p>\n\n\n\n<p>Follow the guidelines below if you want to abide by the strictest of country requirements:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>double opt-in and keep records of this consent in a private location (must specify purpose and duration of data storage to the user in addition to how their data was obtained)<\/li><li>user&#8217;s data must not be shared (some locations permit sharing of user data for marketing purposes as long as the possibility of this occurring is disclosed to the user)<\/li><li>opt-in must be renewed every 2 years<\/li><li>clearly identify the sender, the sender&#8217;s location, and the sender&#8217;s reason for sending the communication in subject line (if the purpose is commercial in nature then you would make sure to include the word &#8216;ad&#8217; or &#8216;advertisement&#8217; in the subject line, etc)<\/li><li>ensure a clearly visible unsubscribe option exists in each email and is processed immediately (thanks to Vietnam)<\/li><li>appoint a data security officer if you are a company (Europe)<\/li><\/ul>\n\n\n\n<p>The data security officer requirement was formally for Germany only, but then the GDPR extended this requirement across all of Europe.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"the_can-spam_act_%e2%80%93_united_states_of_america\"><\/span>The CAN-SPAM Act &#8211; United States of America<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"7_can-spam_act_rules\"><\/span>7 CAN-SPAM Act Rules<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>There are 7 rules listed in the CAN-SPAM Act:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Don\u2019t use false or misleading header information<\/li><li>Don\u2019t use deceptive subject lines<\/li><li>Identify the message as an ad<\/li><li>Tell recipients where you\u2019re located<\/li><li>Tell recipients how to opt-out of receiving future email from you<\/li><li>Honor opt-out requests promptly<\/li><li>Monitor what others are doing on your behalf<\/li><\/ol>\n\n\n\n<p>So, how does the CAN-SPAM Act apply to the different types of email?<\/p>\n\n\n\n<p>For promotional emails, every single requirement must be met. However, transactional emails only need to comply with the provision to avoid false or misleading routing information. It is still beneficial to comply with all requirements, though, even for transactional emails, so that the emails are not erroneously marked as spam by automatic spam filters.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"the_european_unions_general_data_protection_regulation_gdpr\"><\/span>The European Union\u2019s General Data Protection Regulation (GDPR)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>It is important to note that many of the email best practices listed here are not only meant to help you maintain a good email reputation, but they are also legal regulations that you are required to follow if you choose to target those protected by the regulations in your email campaigns.<\/p>\n\n\n\n<p>GDPR guarantees European subjects the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Right to Access<\/li><li>Data Portability<\/li><li>Right to be Forgotten<\/li><li>Data Protection Officers<\/li><li>Privacy by Design<\/li><li>Breach Notification<\/li><\/ul>\n\n\n\n<p>This means that the client will have the right to privacy upfront, which means that you only gather the information that is absolutely necessary for the transactions\/communications (privacy by design). This could be applied to activities such as storing their emails on a mailing list and sending emails without any opt-in. They also have the right to revoke any permissions that they grant at any time (right to be forgotten) as well as request and review the information you have stored about them and how it is being used (data portability\/right to access). A D.P.O (Data Protection Officer) must be appointed so that a designated contact is available to enforce the rules and handle any requests pertaining to personal data. If a breach occurs that results in the client&#8217;s personal data being leaked, they must be notified within 72 hours (breach notification).<\/p>\n\n\n\n<p>You should review this with your lawyer to ensure compliance as the policies outlined here are not complete and should not be used in lieu of legal advice from a legal representative.<\/p>\n\n\n\n<p>You may also want to consult the CDPR&#8217;s site for more information.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"additional_requirements_to_consider\"><\/span>Additional Requirements to Consider<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"local_laws\"><\/span>Local Laws<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>There can be additional regulations that one must follow depending on their locality, such as a state within the United States of America. It is important to note, though, that many of the state regulations that were passed prior to 2003 when the CAN-SPAM Act passed, are no longer pertinent as the regulation may be covered under the CAN-SPAM Act. It is always best to check and confirm that no additional provisions are required under state regulations, though.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"hosting_provideremail_service_provider_acceptable_use_policies\"><\/span>Hosting Provider\/Email Service Provider Acceptable Use Policies<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>One must also check with their hosting providers to ensure that they are not in violation of the Terms of Service or Acceptable Usage Policy by sending bulk email. Though the Federal regulations impose no quantitative restrictions on the number of emails sent, your hosting provider may, and exceeding such limits may void your contract or constitute abuse according to the terms of the hosting provider&#8217;s contracts.<\/p>\n\n\n\n<p>You can find KnownHost&#8217;s Terms of Service here:<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/www.knownhost.com\/terms-of-service\">KnownHost Terms of Service<\/a><\/strong><\/p>\n\n\n\n<p>And the Acceptable Usage Policy here:<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/www.knownhost.com\/acceptable-use-policy\">KnownHost Acceptable Use Policy<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article will be thoroughly detailed across the different areas of Email Best Practices; this page will focus on the different influences of email, what they do, and how they affect you. Email marketing is an integral component of many businesses, and KnownHost is here is to help you understand what is required in order [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[93],"tags":[178,179,180],"class_list":["post-834","post","type-post","status-publish","format-standard","hentry","category-courses","tag-email","tag-email-best-practices","tag-understanding-email"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>An introduction to Email Best Practices - KnownHost<\/title>\n<meta name=\"description\" content=\"In this article we will walk you through what are email best practices when it comes to sending bulk emails to your clients.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.knownhost.com\/kb\/an-introduction-to-email-best-practices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"An introduction to Email Best Practices - KnownHost\" \/>\n<meta property=\"og:description\" content=\"In this article we will walk you through what are email best practices when it comes to sending bulk emails to your clients.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.knownhost.com\/kb\/an-introduction-to-email-best-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"KnownHost\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-09T12:15:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-07T13:28:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.knownhost.com\/kb\/wp-content\/uploads\/2021\/07\/idontlikespam_png.png\" \/>\n<meta name=\"author\" content=\"Jonathan K. W.\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jonathan K. W.\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/an-introduction-to-email-best-practices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/an-introduction-to-email-best-practices\\\/\"},\"author\":{\"name\":\"Jonathan K. W.\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/#\\\/schema\\\/person\\\/3db6e20d1f33519cd68fe0ba1230a48b\"},\"headline\":\"An introduction to Email Best Practices\",\"datePublished\":\"2021-07-09T12:15:10+00:00\",\"dateModified\":\"2021-12-07T13:28:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/an-introduction-to-email-best-practices\\\/\"},\"wordCount\":1488,\"image\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/an-introduction-to-email-best-practices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/idontlikespam_png.png\",\"keywords\":[\"email\",\"email best practices\",\"understanding email\"],\"articleSection\":[\"Courses\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/an-introduction-to-email-best-practices\\\/\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/an-introduction-to-email-best-practices\\\/\",\"name\":\"An introduction to Email Best Practices - KnownHost\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/an-introduction-to-email-best-practices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/an-introduction-to-email-best-practices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/idontlikespam_png.png\",\"datePublished\":\"2021-07-09T12:15:10+00:00\",\"dateModified\":\"2021-12-07T13:28:10+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/#\\\/schema\\\/person\\\/3db6e20d1f33519cd68fe0ba1230a48b\"},\"description\":\"In this article we will walk you through what are email best practices when it comes to sending bulk emails to your clients.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/an-introduction-to-email-best-practices\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/an-introduction-to-email-best-practices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/an-introduction-to-email-best-practices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/idontlikespam_png.png\",\"contentUrl\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/idontlikespam_png.png\",\"width\":600,\"height\":383},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/an-introduction-to-email-best-practices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"An introduction to Email Best Practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/#website\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/\",\"name\":\"KnownHost\",\"description\":\"KnownHost provides a comprehensive webhosting knowledge base to help answer many of your common webhosting and linux questions.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/#\\\/schema\\\/person\\\/3db6e20d1f33519cd68fe0ba1230a48b\",\"name\":\"Jonathan K. W.\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f432b99e6651fe8d1deb57a285bd84e806f1c9ae8b4c6c585d7e3a0b33789ad9?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f432b99e6651fe8d1deb57a285bd84e806f1c9ae8b4c6c585d7e3a0b33789ad9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f432b99e6651fe8d1deb57a285bd84e806f1c9ae8b4c6c585d7e3a0b33789ad9?s=96&d=mm&r=g\",\"caption\":\"Jonathan K. W.\"},\"sameAs\":[\"https:\\\/\\\/www.knownhost.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"An introduction to Email Best Practices - KnownHost","description":"In this article we will walk you through what are email best practices when it comes to sending bulk emails to your clients.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.knownhost.com\/kb\/an-introduction-to-email-best-practices\/","og_locale":"en_US","og_type":"article","og_title":"An introduction to Email Best Practices - KnownHost","og_description":"In this article we will walk you through what are email best practices when it comes to sending bulk emails to your clients.","og_url":"https:\/\/www.knownhost.com\/kb\/an-introduction-to-email-best-practices\/","og_site_name":"KnownHost","article_published_time":"2021-07-09T12:15:10+00:00","article_modified_time":"2021-12-07T13:28:10+00:00","og_image":[{"url":"https:\/\/www.knownhost.com\/kb\/wp-content\/uploads\/2021\/07\/idontlikespam_png.png","type":"","width":"","height":""}],"author":"Jonathan K. W.","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jonathan K. W.","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.knownhost.com\/kb\/an-introduction-to-email-best-practices\/#article","isPartOf":{"@id":"https:\/\/www.knownhost.com\/kb\/an-introduction-to-email-best-practices\/"},"author":{"name":"Jonathan K. W.","@id":"https:\/\/www.knownhost.com\/kb\/#\/schema\/person\/3db6e20d1f33519cd68fe0ba1230a48b"},"headline":"An introduction to Email Best Practices","datePublished":"2021-07-09T12:15:10+00:00","dateModified":"2021-12-07T13:28:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.knownhost.com\/kb\/an-introduction-to-email-best-practices\/"},"wordCount":1488,"image":{"@id":"https:\/\/www.knownhost.com\/kb\/an-introduction-to-email-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.knownhost.com\/kb\/wp-content\/uploads\/2021\/07\/idontlikespam_png.png","keywords":["email","email best practices","understanding email"],"articleSection":["Courses"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.knownhost.com\/kb\/an-introduction-to-email-best-practices\/","url":"https:\/\/www.knownhost.com\/kb\/an-introduction-to-email-best-practices\/","name":"An introduction to Email Best Practices - KnownHost","isPartOf":{"@id":"https:\/\/www.knownhost.com\/kb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.knownhost.com\/kb\/an-introduction-to-email-best-practices\/#primaryimage"},"image":{"@id":"https:\/\/www.knownhost.com\/kb\/an-introduction-to-email-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.knownhost.com\/kb\/wp-content\/uploads\/2021\/07\/idontlikespam_png.png","datePublished":"2021-07-09T12:15:10+00:00","dateModified":"2021-12-07T13:28:10+00:00","author":{"@id":"https:\/\/www.knownhost.com\/kb\/#\/schema\/person\/3db6e20d1f33519cd68fe0ba1230a48b"},"description":"In this article we will walk you through what are email best practices when it comes to sending bulk emails to your clients.","breadcrumb":{"@id":"https:\/\/www.knownhost.com\/kb\/an-introduction-to-email-best-practices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.knownhost.com\/kb\/an-introduction-to-email-best-practices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.knownhost.com\/kb\/an-introduction-to-email-best-practices\/#primaryimage","url":"https:\/\/www.knownhost.com\/kb\/wp-content\/uploads\/2021\/07\/idontlikespam_png.png","contentUrl":"https:\/\/www.knownhost.com\/kb\/wp-content\/uploads\/2021\/07\/idontlikespam_png.png","width":600,"height":383},{"@type":"BreadcrumbList","@id":"https:\/\/www.knownhost.com\/kb\/an-introduction-to-email-best-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.knownhost.com\/kb\/"},{"@type":"ListItem","position":2,"name":"An introduction to Email Best Practices"}]},{"@type":"WebSite","@id":"https:\/\/www.knownhost.com\/kb\/#website","url":"https:\/\/www.knownhost.com\/kb\/","name":"KnownHost","description":"KnownHost provides a comprehensive webhosting knowledge base to help answer many of your common webhosting and linux questions.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.knownhost.com\/kb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.knownhost.com\/kb\/#\/schema\/person\/3db6e20d1f33519cd68fe0ba1230a48b","name":"Jonathan K. W.","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f432b99e6651fe8d1deb57a285bd84e806f1c9ae8b4c6c585d7e3a0b33789ad9?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f432b99e6651fe8d1deb57a285bd84e806f1c9ae8b4c6c585d7e3a0b33789ad9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f432b99e6651fe8d1deb57a285bd84e806f1c9ae8b4c6c585d7e3a0b33789ad9?s=96&d=mm&r=g","caption":"Jonathan K. W."},"sameAs":["https:\/\/www.knownhost.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/posts\/834","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/comments?post=834"}],"version-history":[{"count":0,"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/posts\/834\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/media?parent=834"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/categories?post=834"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/tags?post=834"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}