Browse Definitions :
Definition

acceptable spam report rate

An acceptable spam report rate is a metric set for how many of a company's marketing or status emails are reported as spam, also known as "junk mail," or unsolicited bulk messages sent through email. For most email carriers, the highest number of emails that can be marked as spam is 0.1%. Once a particular IP address reaches a high number of spam reports, the subsequent emails sent from that address might include a warning message that alerts users that the email is likely spam or they will automatically be placed in a junk folder. The IP address might also be blacklisted if enough customers report its messages as spam. 

Companies try to stay under the acceptable spam report rate by limiting the frequency of their correspondences, avoiding certain keywords associated with spam messages, including a link that allows the receiver to unsubscribe from emails and by using proper grammar, professional typography and graphic design. Marketing professionals also try to make sure that their content is honest and that the distribution list goes to people who are actually interested in the message.

This was last updated in October 2018

Continue Reading About acceptable spam report rate

SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk profile

    A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces.

SearchSecurity
  • payload (computing)

    In computing, a payload is the carrying capacity of a packet or other transmission data unit.

  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

  • cipher

    In cryptography, a cipher is an algorithm for encrypting and decrypting data.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • object storage

    Object storage, also called object-based storage, is an approach to addressing and manipulating data storage as discrete units, ...

  • gigabyte (GB)

    A gigabyte (GB) -- pronounced with two hard Gs -- is a unit of data storage capacity that is roughly equivalent to 1 billion ...

  • MRAM (magnetoresistive random access memory)

    MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic states instead of the electrical ...

Close