55 min read

The Definitive Guide to Email Deliverability & Inbox Placement

How to Make Sure Your Emails Actually Get Read

S
Simon Mwangi

Content Contributor

The Definitive Guide to Email Deliverability & Inbox Placement

The Definitive Guide to Email Deliverability & Inbox Placement: How to Make Sure Your Emails Actually Get Read

A deep, technical, and practical guide for marketers, founders, sales teams, and anyone whose livelihood depends on emails arriving where they're supposed to — the inbox.


Introduction: The Email You Never Knew Was Never Read

You spent three hours writing it. You agonized over the subject line. You A/B tested the call to action. You hit send with genuine confidence, refreshed your dashboard every twenty minutes waiting for responses, and received almost none.

What went wrong?

The answer, far more often than most people realize, was not your copy. It was not your offer. It was not your targeting. It was something far more fundamental and far more invisible: your email never reached the inbox. It was silently rerouted to a spam folder, buried in a Promotions tab, or quietly rejected at the server level before the recipient ever had a chance to read a single word.

This is the dirty secret of email marketing and cold outreach: a staggering percentage of emails sent never reach their intended destination. Estimates vary, but industry research consistently suggests that somewhere between 10% and 20% of all legitimate commercial email fails to reach the primary inbox. For cold email operations with poorly configured infrastructure, that number can exceed 50%. In the worst cases — domains that have been blacklisted, IPs that have been flagged, content that triggers aggressive spam filters — nearly everything sent disappears into the void.

And the cruelest part? The sender usually has no idea. The email does not bounce. There is no error message. The dashboard shows "delivered" because technically, the email was received by the destination server. What it does not show is whether that server placed it in the inbox, the spam folder, or deleted it before it was ever displayed.

Email deliverability is the science and art of ensuring that your emails actually land where you intend them to — in the primary inbox, in front of a real human being who has a chance to read and act on them. It is one of the most technically complex, frequently misunderstood, and critically important disciplines in all of digital marketing.

This guide will teach you everything you need to know. Not just the surface-level advice you'll find on any marketing blog — SPF, DKIM, DMARC, don't use spam words — but the deep, granular, practitioner-level knowledge that separates operations with 80%+ inbox placement rates from those perpetually fighting deliverability fires.

We will cover: how email authentication actually works and why each layer matters, how email providers make inbox placement decisions, how sender reputation is built and destroyed, how to diagnose deliverability problems with precision, how to warm up new domains and inboxes correctly, how to write content that doesn't trigger filters, how to maintain list hygiene at scale, how to monitor and protect your deliverability proactively, and how to recover when things go wrong.

By the end, you will understand email deliverability at a level that most marketers — and even most technical teams — simply do not. And that understanding will translate directly into more emails read, more responses received, and more revenue generated.


Part One: How Email Actually Works

The Journey of an Email

Before you can understand what goes wrong with deliverability, you need to understand what goes right — the full technical journey an email takes from the moment you hit send to the moment it appears (or fails to appear) in someone's inbox.

Most people think of email as a simple two-step process: sender sends, recipient receives. The reality involves at least a dozen distinct steps, each of which represents a potential point of failure.

Step 1: Composition and sending. You write an email in your client (Gmail, Outlook, your ESP, your cold email tool) and hit send. Your client formats the email as an SMTP (Simple Mail Transfer Protocol) message — a standardized format that includes headers, body content, and metadata — and passes it to an outgoing mail server.

Step 2: DNS lookup. Your sending server needs to know where to deliver the email. It queries the Domain Name System (DNS) to find the MX (Mail Exchange) records for the recipient's domain. MX records are like a mailing address for email — they tell the sending server which mail server handles incoming email for that domain.

Step 3: SMTP connection. Your sending server establishes a connection to the recipient's mail server using SMTP. This connection involves a "handshake" — an exchange of identifying information — during which the receiving server begins its initial assessment of the sending server's reputation.

Step 4: Authentication checks. The receiving server performs a series of authentication checks — SPF, DKIM, and DMARC — to verify that the email is actually from who it claims to be from. We will go into enormous detail on these shortly. Authentication failure at this stage can result in immediate rejection or spam placement.

Step 5: Reputation checks. The receiving server queries external blacklists and reputation databases to check the sending IP and domain. If either appears on a significant blacklist, the email may be rejected or flagged.

Step 6: Content analysis. The receiving server (or a dedicated spam filtering layer) analyzes the email's content — subject line, body text, HTML, links, images, and metadata — looking for patterns associated with spam and phishing.

Step 7: Engagement signal analysis. Modern email providers like Google and Microsoft go further than rule-based content analysis. They consider the historical engagement signals of the sender — how recipients have interacted with previous emails from this sender and domain — as a strong signal of whether this email is wanted.

Step 8: Inbox placement decision. Based on the totality of all these signals, the receiving server makes a placement decision: primary inbox, spam folder, Promotions tab, Social tab, or (in some cases) rejected outright.

Step 9: Display. Assuming the email is accepted and placed in some folder, the recipient's email client renders it — displaying the subject line, sender name, and preview text in the inbox view, and the full formatted content when opened.

Each of these steps is a gate that your email must pass through. Understanding what happens at each gate is the foundation of understanding deliverability.

The Key Players in Email Deliverability

The deliverability landscape involves several distinct categories of players, each with its own role and its own impact on whether your emails reach the inbox.

Email Service Providers (ESPs) are the platforms used for high-volume email sending — tools like Mailchimp, Klaviyo, HubSpot, Marketo, Constant Contact, and SendGrid. ESPs handle the technical infrastructure of sending at scale: managing IPs, handling bounces and unsubscribes, providing analytics, and maintaining sending reputations. Your choice of ESP matters for deliverability because ESPs vary significantly in the quality of their shared IP pools, their anti-abuse policies, and the reputation they maintain with major inbox providers.

Inbox Providers (sometimes called Mailbox Providers or MBPs) are the companies that operate the email inboxes your recipients use. Google (Gmail), Microsoft (Outlook, Hotmail), Apple (iCloud Mail), Yahoo, and AOL are the major ones. Each inbox provider operates its own spam filtering system with its own rules, models, and behaviors. What works for Gmail deliverability does not necessarily translate perfectly to Outlook, and vice versa.

Blacklist Operators maintain lists of IP addresses and domains associated with spam. Major blacklists include Spamhaus (the most influential), SORBS, Barracuda, SpamCop, and URIBL (which focuses on domain blacklisting). Inbox providers query these blacklists as part of their filtering process. Appearing on a major blacklist — especially Spamhaus — is one of the fastest ways to destroy your deliverability.

Return Path and Certification Programs are reputation programs that allow legitimate high-volume senders to establish verified status with inbox providers. Being certified by these programs can improve inbox placement rates, particularly with providers that participate in the program.

Anti-Spam Vendors like Proofpoint, Mimecast, Barracuda, and Cisco IronPort provide enterprise-grade email filtering that many organizations layer on top of Gmail or Outlook. These systems have their own filtering logic and can be significantly more aggressive than consumer inbox providers. If your prospects work at large enterprise organizations, their emails may be filtered by one of these systems.


Part Two: Email Authentication — The Foundation of Deliverability

Why Authentication Exists

Email was not designed with security in mind. The original SMTP protocol, developed in the early 1980s, allowed anyone to send an email claiming to be from anyone. This fundamental vulnerability gave rise to phishing, email spoofing, and spam at industrial scale.

Email authentication protocols were developed to address this vulnerability by creating cryptographic and policy-based mechanisms that allow receiving servers to verify that an email is actually from the domain it claims to be from. Today, proper authentication is not optional — it is the absolute minimum baseline for maintaining inbox placement with major providers.

There are three primary authentication layers, each of which builds on the others: SPF, DKIM, and DMARC. Understanding what each does, how they interact, and how to implement them correctly is essential.

SPF: Sender Policy Framework

What it does: SPF allows a domain owner to specify which mail servers are authorized to send email on behalf of that domain. It works by publishing a DNS TXT record that lists the IP addresses or mail server hostnames allowed to send from the domain.

How it works in practice: When a receiving server gets an email claiming to be from you@yourdomain.com, it looks up the SPF record for yourdomain.com in DNS. The SPF record says something like: "Only these specific IP addresses are allowed to send email from this domain." If the email arrived from an IP address that is on that approved list, SPF passes. If it arrived from an unauthorized server, SPF fails.

Why it matters: SPF failure doesn't automatically mean your email goes to spam, but it significantly increases the probability. More importantly, SPF failure combined with DMARC failure can result in the email being rejected entirely.

How to implement it correctly:

Your SPF record should include every sending service you use. If you send email through Google Workspace, Mailchimp, SendGrid, and a cold email tool, all four need to be represented in your SPF record. Each of these services provides the SPF include value you need to add.

A typical SPF record looks like this:

v=spf1 include:_spf.google.com include:servers.mcsv.net include:sendgrid.net ~all

The ~all at the end is a "softfail" — it tells receiving servers that emails from unlisted servers should be treated with suspicion but not necessarily rejected. A -all (hard fail) tells receiving servers to reject emails from unlisted servers. Most senders use ~all initially to avoid accidental rejections from misconfiguration.

Common SPF mistakes:

The "too many lookups" problem. SPF records are limited to ten DNS lookups. Each include: statement counts as one lookup, and each included record may generate additional lookups. If your SPF record exceeds ten lookups, it technically fails, and many receiving servers will treat it as such. This is more common than you'd think with organizations that use many different sending services. Tools like Mxtoolbox's SPF checker can identify lookup count problems.

Forgetting to include all sending services. This is especially common when organizations adopt a new ESP or tool — they start sending from the new service but forget to update their SPF record.

Multiple SPF records. You can only have one SPF TXT record per domain. If you have multiple, only one will be evaluated (and which one depends on the receiving server), producing unpredictable results.

DKIM: DomainKeys Identified Mail

What it does: DKIM provides a cryptographic signature that proves two things: first, that the email was authorized by the domain it claims to be from; second, that the email content (or specified parts of it) was not altered in transit.

How it works in practice: DKIM works through public-key cryptography. The sending mail server generates a cryptographic signature using a private key and attaches it to the email as a header. The corresponding public key is published in the sending domain's DNS records. When a receiving server gets the email, it retrieves the public key from DNS and uses it to verify the signature. If the signature is valid, DKIM passes — proving both that the email came from an authorized sender and that the content wasn't tampered with.

Why it matters: DKIM is one of the strongest signals of email legitimacy. A valid DKIM signature tells the receiving server "this email is what it claims to be." Beyond spam filtering, DKIM is the foundation of DMARC alignment — a critical concept we'll explore shortly.

How to implement it correctly:

Every sending service you use will provide you with DKIM configuration instructions. The process involves:

  1. The sending service generates a public/private key pair

  2. You publish the public key in your domain's DNS as a TXT record (usually at a specific subdomain like google._domainkey.yourdomain.com)

  3. The sending service uses the private key to sign outgoing emails

  4. Receiving servers verify the signature using the public key you published

Most major email platforms make DKIM setup relatively straightforward through their dashboards. The key is actually completing the setup — many organizations configure DKIM for their primary ESP but fail to do so for secondary services like cold email tools or transactional email providers.

DKIM key length: Use 2048-bit keys rather than 1024-bit. 1024-bit keys are considered insufficient for modern cryptographic standards and can be a negative signal in some spam filters.

DKIM key rotation: Rotate your DKIM keys periodically — every six to twelve months is a reasonable practice. Key rotation limits the exposure window if a private key is ever compromised.

DMARC: Domain-based Message Authentication, Reporting, and Conformance

What it does: DMARC builds on SPF and DKIM by adding two critical capabilities: alignment checking and policy enforcement. Alignment means the domain in the "From" header (the address the recipient sees) must match the domain verified by SPF or DKIM. Policy enforcement means you can specify what should happen to emails that fail authentication.

How it works in practice: When a receiving server processes an email, it checks:

  1. Did SPF pass, and does the domain that passed SPF align with the From address?

  2. Did DKIM pass, and does the domain that signed the email align with the From address?

If neither SPF nor DKIM achieve alignment with the From domain, DMARC fails. The receiving server then looks at the sender's DMARC policy to determine what to do with the failing email.

DMARC policies come in three levels:

  • p=none: Monitor only. Do nothing with failing emails, but send reports to the domain owner. Used during initial setup and testing.

  • p=quarantine: Send failing emails to spam/quarantine.

  • p=reject: Reject failing emails entirely — they are not delivered at all.

Why it matters: DMARC does two things of tremendous importance. First, it closes the gap that SPF and DKIM leave open — without DMARC, a spammer could pass SPF and DKIM using a look-alike domain while spoofing your From address. DMARC's alignment requirement closes this loophole. Second, DMARC reporting gives you visibility into who is sending email from your domain — including unauthorized parties.

How to implement it correctly:

Start with a p=none policy while you audit your sending infrastructure:

v=DMARC1; p=none; rua=mailto:dmarc-reports@yourdomain.com; ruf=mailto:dmarc-failures@yourdomain.com

The rua tag specifies where aggregate reports are sent. These reports — sent daily by participating email providers — summarize which servers are sending email from your domain, and whether SPF and DKIM are passing for those emails. Tools like DMARC Analyzer, Postmark's DMARC analyzer, or Valimail can parse and visualize these reports.

Once you have confirmed that all legitimate sending sources are authenticated and passing, move to p=quarantine. After monitoring for a period with no legitimate emails being quarantined, move to p=reject — the strongest protection.

Google's 2024 requirements now mandate that bulk senders have a DMARC record published. Even if your policy is p=none, having the record is better than not having it.

The alignment requirement in practice: One commonly misunderstood aspect of DMARC is that it requires the authenticated domain to align with the visible From address. This becomes complicated when you send through an ESP using a shared sending infrastructure — the email may be signed with the ESP's DKIM key rather than yours. Make sure your ESP is configured to sign with your domain's DKIM key, not their own.

BIMI: Brand Indicators for Message Identification

BIMI is a newer standard that allows email senders to display their brand logo in the inbox — visible in the sender area before the email is even opened. While primarily a brand visibility feature, BIMI has a deliverability dimension: achieving BIMI requires implementing all the above authentication protocols at their strongest levels, and the process of getting there improves deliverability in multiple ways.

BIMI requires a p=quarantine or p=reject DMARC policy, a BIMI DNS record pointing to an SVG version of your logo, and (for full support including Gmail) a Verified Mark Certificate (VMC) from a certified provider. VMCs are currently available from Entrust and DigiCert.

BIMI support is growing: Gmail, Yahoo, Apple Mail, and Fastmail all support it to varying degrees. For high-volume senders with established brands, it is increasingly worth the implementation investment.


Part Three: Sender Reputation — The Invisible Score That Controls Everything

How Reputation Works

If authentication is the foundation of deliverability, sender reputation is the structure built on top of it. Reputation is the cumulative judgment that inbox providers have formed about your sending behavior — a dynamic, constantly-updated assessment of whether emails from your domain and IP deserve to be in the inbox or the spam folder.

Reputation operates at two levels simultaneously:

IP reputation is the assessment of the specific IP address from which your emails are sent. Every IP has a history — a record of the email it has sent, how recipients have engaged with it, and whether it has been associated with spam. An IP with a long history of high-quality, well-engaged email has strong reputation. An IP with a history of spam complaints, high bounce rates, or spammy content has poor reputation.

When you send through an ESP on a shared IP, you share reputation with all the other senders on that IP. This is why reputable ESPs with strict anti-abuse policies produce better deliverability than those who allow anyone to sign up and start blasting — the stricter the anti-abuse policy, the cleaner the shared IP pool.

Domain reputation is the assessment of your sending domain — the part after the @ in your email address. Domain reputation has become increasingly important relative to IP reputation over the past several years, as inbox providers have recognized that IPs can be changed easily but domains carry a longer-term signal.

Gmail, in particular, places enormous weight on domain reputation. This is why sending from a brand new domain — even with a perfect technical setup — starts with a disadvantage: there is no domain reputation to speak of, which means the inbox provider has no basis for trust.

What Builds Reputation

Reputation is built through signals that demonstrate your emails are wanted, legitimate, and engaged with. The most important positive signals are:

High open rates. When a significant percentage of your recipients open your emails, inbox providers interpret this as evidence that your emails are wanted. Recipients are making an active choice to read what you send.

High reply rates. Replies are an even stronger positive signal than opens. When someone replies to your email, they are not just acknowledging it — they are engaging with it. Gmail in particular treats replies as a very strong indicator that the sender deserves inbox placement.

Not spam complaints. When recipients mark your email as spam, this is a negative signal — but it is also a signal that you are tracking whether "not spam" classifications are happening. When someone receives an email in their spam folder and moves it to their inbox, this is a positive signal telling the inbox provider "this sender's emails deserve to be in my inbox."

Stable sending patterns. Consistent, predictable sending behavior builds reputation. Erratic patterns — sending nothing for weeks then suddenly sending thousands of emails — trigger suspicion.

Recipient list quality. Sending to valid, active email addresses signals list quality. High bounce rates and sends to inactive or recycled spam trap addresses signal the opposite.

What Destroys Reputation

The negative signals are in some ways more important to understand than the positive ones, because reputation damage is far easier to incur than reputation credit is to build. One bad campaign can erase weeks of good behavior.

Spam complaints. This is the most damaging negative signal. When a recipient clicks "Report spam" or "This is spam" in their email client, they are sending an explicit signal to the inbox provider that your email was unwanted. Gmail's threshold for flagging a sender is a spam complaint rate above approximately 0.1% (one complaint per thousand emails). Sustained complaint rates above 0.3% will result in emails being blocked. These are not theoretical numbers — Google's February 2024 enforcement made them explicit and actionable.

High bounce rates. Hard bounces (emails sent to addresses that do not exist) are a strong negative signal. They indicate that you are sending to lists without proper hygiene — which is a characteristic of spam operations. A bounce rate above 2-3% begins to attract negative attention from inbox providers.

Sending to spam traps. Spam traps are email addresses operated by blacklist operators and inbox providers specifically to identify senders with poor list hygiene. They come in two varieties: pristine traps (addresses that have never been used legitimately) and recycled traps (formerly valid addresses that were abandoned and repurposed as traps). Hitting a pristine trap is a significant negative event — it indicates you are either buying lists or scraping email addresses, both of which are associated with spam. Hitting recycled traps indicates you are not maintaining list hygiene and are still sending to addresses that haven't engaged in years.

Sudden volume spikes. Suddenly sending ten times your normal volume triggers suspicion. Legitimate email programs grow gradually. Sudden spikes look like a compromised account or a spam blast.

Low engagement. Persistently low open rates tell inbox providers that your emails are not wanted — even if recipients are not actively marking them as spam. Gmail is particularly responsive to this signal and will gradually route low-engagement senders to the Promotions tab or spam.

Content red flags. Certain content characteristics are strongly associated with spam: excessive links, URL shorteners pointing to unknown domains, certain spam trigger words, misleading subject lines, mismatches between the displayed link text and the actual URL, and heavy image-to-text ratios.

The Google Postmaster Tools: Your Window Into Gmail's Mind

Google Postmaster Tools is a free service that gives senders direct insight into how Gmail perceives their sending reputation. If you send any meaningful volume to Gmail addresses, you should be using it.

To set it up, verify your sending domain through Postmaster Tools at postmaster.google.com. Once verified, you will have access to dashboards showing:

Domain Reputation: Gmail's assessment of your domain, rated on a four-level scale: Bad, Low, Medium, and High. This is perhaps the single most important number in your Gmail deliverability picture.

IP Reputation: The reputation of the sending IPs associated with your domain.

Spam Rate: The percentage of your emails that Gmail users are marking as spam. This is an actual view into Gmail's perception of your spam complaint rate.

Delivery Errors: Specific error codes indicating why emails are being rejected or deferred.

Encryption: The percentage of your emails encrypted in transit.

Feedback Loop (FBL): For certain volume senders, Gmail provides complaint data that can be correlated back to specific mailings or list segments.

The Domain Reputation metric is the one to watch most closely. A High reputation with a consistently low spam rate means Gmail trusts you. A Low or Bad reputation means you have work to do.

Microsoft's Smart Network Data Services (SNDS)

Microsoft operates the Smart Network Data Services program for senders who want insight into how Outlook and Hotmail perceive their IP reputation. Like Postmaster Tools for Gmail, SNDS gives you direct visibility into:

  • IP address status (green, yellow, or red)

  • Spam trap hit rate

  • Spam filter complaint rate

  • Data from Microsoft's own spam trap network

If you send significant volume to Outlook or Hotmail addresses, registering for SNDS and checking it regularly is essential. Microsoft's filtering is different from Gmail's, and you can have excellent Gmail deliverability while struggling with Outlook — or vice versa.


Part Four: IP Addresses, Shared Infrastructure, and Warming

Shared IPs vs. Dedicated IPs

When you send email through an ESP or cold email tool, your emails are sent from an IP address controlled by that service. Most ESPs offer two options: shared IPs and dedicated IPs.

Shared IPs are used by many senders simultaneously. Your sending is mixed in with everyone else on the same IP. This has advantages and disadvantages.

The advantage: shared IPs on reputable ESPs come with pre-established reputation. A new sender on Mailchimp's well-maintained shared IPs starts with decent deliverability because the IP has a long, clean history. You are borrowing reputation you haven't yet earned.

The disadvantage: you share reputation with your neighbors. If someone else on the same shared IP starts sending aggressively spammy campaigns, their behavior negatively impacts your deliverability. With most major ESPs, the risk of this is mitigated by their anti-abuse policies, but it is never zero.

Dedicated IPs are assigned exclusively to you. Your reputation on that IP is entirely a product of your own sending behavior — for better and for worse.

The advantage: complete control. No other sender can damage your reputation. If you build excellent sending practices, your reputation reflects only your behavior.

The disadvantage: a brand new dedicated IP has no reputation at all. Starting from zero is actually a disadvantage compared to starting on a well-maintained shared IP. You have to build reputation from scratch, which requires a warming period.

The right choice depends on your situation:

  • Low volume senders (under ~50,000 emails/month) are almost always better on shared IPs

  • High volume senders with strong list hygiene and consistent sending patterns benefit from dedicated IPs

  • Cold email operations are different again — see the dedicated discussion below

IP Warming: The Process and the Science

Whether you are warming a brand new dedicated IP or a brand new sending account on a shared IP pool, the process is the same: gradually increase sending volume over several weeks, starting very low and building up.

Why warming is necessary: Inbox providers monitor the volume of email from any given IP. An IP that suddenly starts sending thousands of emails per day with no sending history looks like a newly compromised machine being used for a spam blast — because that is, in fact, one of the most common scenarios that looks exactly like that. Warming builds a history that gives inbox providers the context to distinguish legitimate new senders from spam operations.

The warming schedule: A typical dedicated IP warming schedule looks like this:

Week Daily Volume Recommended Engagement 1 200-500 Highly engaged list 2 500-1,000 Highly engaged list 3 1,000-2,000 Engaged list 4 2,000-5,000 Engaged list 5 5,000-10,000 Normal list 6-8 10,000-50,000 Normal list 8+ Scale gradually Full list

During warming, use only your most engaged recipients — people who have recently opened, clicked, or purchased. High engagement during the warming period builds reputation quickly. Sending to unengaged recipients during warming is counterproductive.

Warming for cold email tools: Cold email warming is slightly different from bulk email warming. Cold email tools like Instantly, Smartlead, and Lemlist have built-in warming networks — pools of real accounts that automatically exchange emails with each other, simulating legitimate email behavior. These warming networks improve deliverability by:

  • Building a positive open, reply, and not-spam engagement history for the inbox

  • Demonstrating to inbox providers that the account sends and receives legitimate correspondence

  • Gradually building the domain's reputation before real cold outreach begins

Keep warm-up running continuously — not just during an initial period. An inbox that abruptly stops receiving warm-up emails will see its reputation gradually erode.

Inbox Rotation

Even with perfectly warmed inboxes, there are limits to how many cold emails a single inbox should send per day. The general best practice is a maximum of 30-50 cold emails per day per inbox — some practitioners push to 80, but beyond that the risk of reputation damage increases sharply.

Inbox rotation is the practice of distributing your sending volume across multiple warmed inboxes (typically across multiple domains) so that no single inbox bears an excessive sending load. This is one of the most important operational practices in cold email at scale.

A practical example: if you want to send 500 cold emails per day, you should have at least 10-15 warmed inboxes in rotation, each sending 30-50 emails per day. These inboxes should be spread across multiple secondary domains (not your primary domain) to further distribute risk.

Modern cold email tools like Instantly and Smartlead make inbox rotation automatic once you've connected your accounts — the tool distributes sends evenly across all connected inboxes.


Part Five: List Hygiene and Engagement Management

Why List Hygiene Is a Deliverability Issue

Many email marketers think of list hygiene as primarily a cost issue — you are paying your ESP per contact or per send, so removing invalid contacts saves money. This is true but secondary. The primary reason to maintain rigorous list hygiene is deliverability.

Sending to invalid, inactive, or disengaged email addresses produces negative signals at every level:

  • Sending to non-existent addresses generates hard bounces

  • Sending to spam traps generates blacklist events

  • Sending to inactive addresses produces zero engagement, lowering your overall engagement rate

  • Sending to disengaged contacts who haven't opened in months or years is sending to people who, at best, don't care about your email and, at worst, will eventually mark it as spam out of frustration

The relationship between list quality and deliverability is direct and quantifiable. A clean list of 10,000 genuinely interested contacts will consistently outperform a dirty list of 50,000 mixed-quality contacts in terms of deliverability, engagement, and ultimately revenue.

Email Verification: Types and Tools

Email verification is the process of checking whether email addresses are valid before you send to them. There are several categories of validity:

Valid: The address exists, the mailbox is active, and emails can be delivered.

Invalid: The address does not exist or the domain does not accept email. Sending to these generates hard bounces.

Risky/Unknown: The server did not respond definitively to the verification check. These are not confirmed valid or invalid — some will deliver, some will bounce.

Catch-all domains: Some organizations configure their email servers to accept all email addressed to their domain, regardless of whether the specific address exists. This means verification tools cannot confirm whether a specific address at that domain is valid — they can only verify that the domain accepts email.

Role-based addresses: Addresses like info@, contact@, support@, admin@, and sales@ are typically managed by teams rather than individuals. They often have high spam complaint rates and low engagement, and they are frequently used as honeypots. Most senders should suppress these.

Disposable addresses: Temporary email addresses from services like Mailinator, Guerrilla Mail, or Temp-mail should always be removed.

Major verification tools: ZeroBounce, NeverBounce, BriteVerify (now part of Validity), Hunter's verification tool, and Kickbox are the most widely used. They vary in accuracy, speed, and pricing, but all of the major ones are considerably better than sending unverified.

Run verification on every new list before your first send. Re-verify lists that haven't been used in six months or more. And enable real-time verification on any form where people can sign up for your email list — catching invalid addresses at the point of entry is far cleaner than catching them after a bounce.

Bounce Management

Bounces come in two types:

Hard bounces occur when an email cannot be delivered permanently — the address does not exist, the domain does not exist, or the recipient has explicitly blocked you. Hard bounces should be removed from your list immediately and never emailed again. Continuing to send to hard bounce addresses is one of the fastest ways to damage your sender reputation.

Soft bounces are temporary delivery failures — the inbox was full, the server was temporarily unavailable, or the message was too large. Soft bounces should be retried automatically (most ESPs handle this), but if an address soft bounces consistently across multiple sends, it should be treated as a hard bounce and suppressed.

Good ESPs automatically manage bounce handling. Verify that your ESP has automatic hard bounce suppression enabled and that suppressed addresses are maintained in a global suppression list that prevents future sends.

Managing Engagement Segments

The most sophisticated deliverability practitioners think of their email lists not as monolithic entities but as engagement segments — subsets of the list defined by how recently and how frequently contacts have engaged.

A common segmentation framework:

Highly engaged (Active): Opened or clicked in the last 30-90 days. Send your full program with confidence.

Engaged (Warm): Opened or clicked in the last 90-180 days. Include in most sends but monitor engagement carefully.

At-risk (Cooling): Opened or clicked in the last 180-365 days. Consider a re-engagement campaign before continuing to send. Do not send high-frequency communications.

Inactive: Have not opened or clicked in over a year. Send only re-engagement campaigns — never include in regular marketing sends. If they don't re-engage after a re-engagement sequence, suppress them.

Unengaged: Have never opened or clicked since subscribing. Treat with extreme caution. A significant segment of never-engaged contacts is a list health red flag — it may indicate that many addresses were obtained without genuine opt-in, or that your content is fundamentally misaligned with what subscribers expected.

The sunset policy: A sunset policy defines the point at which you stop sending to an unengaged contact. Most senders should sunset contacts who haven't engaged in 12-18 months. It is counterintuitive to remove names from a list, but the deliverability and engagement rate improvements from sunsetting aggressively are consistently substantial.

Re-Engagement Campaigns

Before sunsetting unengaged contacts, run a re-engagement campaign — a specific sequence designed to reactivate interest or confirm disinterest.

A good re-engagement campaign typically consists of two to three emails over two to four weeks:

Email 1: Acknowledge the silence and ask if they still want to hear from you. Be direct and honest. "We've noticed you haven't opened our emails in a while — are you still interested in [what you send]?" gives them a clean, low-friction way to either re-engage or confirm they want to unsubscribe.

Email 2: If no response to the first, try a different angle. Different subject line, slightly different framing, perhaps a compelling offer or exclusive piece of content.

Email 3: The farewell email. "This will be our last email unless you'd like to stay subscribed — click here if you want to keep hearing from us. Otherwise, we'll stop sending." This is your final attempt, and it should be warmly worded rather than guilt-tripping.

Anyone who engages with the re-engagement campaign gets moved back into your active segment. Anyone who does not gets suppressed. You have lost some subscribers you wanted to keep, but you have protected your deliverability and improved your engagement metrics simultaneously.


Part Six: Content and Deliverability

How Spam Filters Analyze Content

Modern spam filters are not simple keyword matchers. The days when you could guarantee spam placement by including certain words are long gone — today's filters use machine learning models trained on billions of emails to identify spam characteristics at a level far more sophisticated than any keyword list.

That said, content still matters enormously for deliverability, both because simpler rule-based filters remain in use (particularly in enterprise anti-spam gateways) and because certain content characteristics are statistically correlated with spam regardless of the technology doing the filtering.

Natural language processing (NLP): Modern spam filters use NLP to understand the semantic content of emails, not just individual words. An email that reads naturally, contains coherent sentences, and makes logical sense will score better than one filled with disconnected phrases, excessive capitalization, or incoherent content — even if neither contains obvious spam keywords.

HTML structure analysis: Spam filters examine the HTML structure of emails as carefully as the text. Emails with extremely high image-to-text ratios (lots of images, very little text) look like image spam — a technique historically used to evade text-based filters by putting the spam content inside images. Emails with hidden text (white text on white background, for example) are flagged immediately as attempting to deceive filters.

Link analysis: Every URL in your email is analyzed. Links to known spam or phishing domains, links that redirect through URL shorteners to unknown destinations, and mismatches between displayed link text and actual URLs are all significant red flags. The number of unique domains linked to in a single email also matters — emails linking to many different domains look like phishing attempts.

Sender-content consistency: Spam filters consider whether the content of an email is consistent with the sender's historical content and with what recipients have engaged with in the past. A domain that has always sent newsletters about cooking and suddenly sends financial promotion content will be treated with suspicion.

Spam Trigger Words: The Reality

"Spam trigger words" are real but vastly overused as an explanation for deliverability problems. The truth is that most legitimate emails use words that appear on spam keyword lists — words like "free," "discount," "offer," "opportunity," and "click here" — and most of them are delivered to the inbox just fine.

The reason is that modern spam filters don't look at trigger words in isolation — they look at the combination of signals. A single instance of the word "free" in a context that makes obvious sense does not doom your email to spam. An email that combines a suspicious sender reputation, poor authentication, a misleading subject line, five calls to action, a link to an unfamiliar domain, and multiple instances of aggressive promotional language is a very different story.

That said, there are some language patterns worth genuinely avoiding:

All-caps subject lines or body text. ALL CAPS IS ASSOCIATED WITH SHOUTING AND SPAM AT SUCH A HIGH RATE THAT FILTERS PENALIZE IT CONSISTENTLY.

Excessive punctuation. Multiple exclamation marks!!!!! and question marks????? are statistical markers of low-quality promotional content.

Dollar signs and percentages in excess. "Save 50%! $$$$ FREE!!! Limited Time!!!" is a pattern so strongly associated with spam that no amount of authentic sending reputation entirely overcomes it.

Aggressive urgency language. "Act now," "Limited time offer," "You must respond within 24 hours," and similar phrases are not always spam, but they are used so frequently in spam that they carry a persistent negative signal.

Deceptive subject lines. Subject lines that claim a prior relationship that doesn't exist ("Re: our conversation last week"), that create false urgency, or that are completely unrelated to the email content are problematic both for spam filters and for the FTC/GDPR compliance reasons discussed in the legal section.

HTML Email Best Practices for Deliverability

For marketing email (as opposed to cold email, which should be plain text or near-plain text), HTML structure has a meaningful impact on deliverability.

Text-to-image ratio. Aim for at least 60% text content relative to images. Emails that are primarily images — a single large image with a header and button — are among the most suspicious to spam filters. If your design requires a strong visual, ensure there is substantial text content accompanying it.

Alt text on images. Always include alt text on images. Spam filters that can't load images (a common testing behavior) use alt text to understand what the image is. Missing alt text is a minor negative signal.

Clean HTML. Spam filters analyze HTML code quality. HTML generated from Microsoft Word, certain drag-and-drop builders, or copy-pasted from websites is often full of extraneous tags, inline styles, and code artifacts that spam filters associate with low-quality bulk email. Use clean, minimal HTML.

Text version. Every HTML email should include a plain text version (most ESPs generate this automatically, but verify it is correct and coherent). Spam filters that do not find a text version treat this as a suspicious characteristic.

Link hygiene. Every link in your email should go directly to a legitimate, recognizable domain. Avoid URL shorteners (bit.ly, tinyurl.com, etc.) — these are heavily used by spammers and are treated with significant suspicion. Use your own custom tracking domain for link tracking.

Unsubscribe link. An easy, functional unsubscribe link is both legally required (in most jurisdictions) and a deliverability best practice. Gmail's filtering algorithms look for the presence of unsubscribe links as a signal of legitimate bulk email. Emails without them are more likely to be treated as spam.

Plain Text vs. HTML

For cold email specifically, plain text (or what appears to be plain text — technically most cold email tools send multipart MIME with both a text and HTML version, but the visual appearance is plain text) consistently outperforms formatted HTML.

The reason is simple: spam is largely HTML-heavy. Personalized, human-written email is largely plain text. Spam filters have been trained on millions of examples of each, and the association between HTML formatting and spam is statistically robust. An email that looks like it was typed by a human into a Gmail window will consistently achieve better deliverability than one that looks like a marketing broadcast.

For cold email, strip out: logos, images, tracked links presented as graphic buttons, heavy signature blocks with multiple colors and icons, and HTML formatting beyond what is absolutely necessary. The more your email looks and feels like a message from a human being, the better it will perform.


Part Seven: Blacklists — What They Are and How to Deal With Them

Understanding Blacklists

Email blacklists (also called DNSBLs — DNS-based Blackhole Lists) are databases maintained by third-party organizations that track IP addresses and domains associated with spam activity. Inbox providers and corporate mail gateways query these databases as part of their filtering process — if your sending IP or domain appears on a significant blacklist, emails from that source will be treated with suspicion or rejected outright.

There are hundreds of blacklists in operation, but they vary enormously in their influence. Being on a minor, rarely-queried blacklist may have minimal impact on your deliverability. Being on Spamhaus's main blacklists can effectively shut down your ability to reach the inbox.

The major blacklists you need to monitor:

Spamhaus is the most influential blacklist in the world. Its main lists include:

  • SBL (Spamhaus Block List): IP addresses with recent spam activity

  • XBL (Exploits Block List): IP addresses of hijacked systems used for spam

  • DBL (Domain Block List): Domains used in spam email bodies or redirects

  • ZEN: A combined list that includes SBL, XBL, and PBL (Policy Block List)

The Spamhaus PBL (Policy Block List) is different from the others — it lists IP addresses that should not be sending email directly, typically because they are assigned to residential internet connections or ISPs with policies against direct SMTP sending. Being on the PBL is not a punishment — it just means you should be using a proper mail server rather than sending from a home IP. Most legitimate senders are not on the PBL.

Barracuda Reputation Block List (BRBL): Widely used by corporate email systems that use Barracuda's anti-spam products. Being on the BRBL can significantly impact deliverability to enterprise organizations.

SORBS (Spam and Open Relay Blocking System): Less influential than Spamhaus but still checked by many systems.

SpamCop: Operates based on user-submitted spam complaints. Can be triggered by legitimate senders who receive a burst of spam complaints.

URIBL and SURBL: Focus on domains mentioned in email bodies rather than sending IPs. Appearing on these can indicate that a domain in your email body (a link destination, for example) has been associated with spam.

How to Check If You Are Blacklisted

The easiest way to check your blacklist status is through aggregator tools:

MxToolbox Blacklist Check (mxtoolbox.com/blacklists.aspx): Checks your IP against over 100 blacklists simultaneously and shows which ones you appear on.

Multirbl.valli.org: Another aggregator that checks multiple blacklists.

Spamhaus's own lookup tool (spamhaus.org): Directly check whether a specific IP or domain appears on their lists.

Check these regularly — weekly if you send significant volume, monthly minimum for lower-volume senders. Do not wait until you notice deliverability problems to check. Proactive monitoring catches issues before they become crises.

Getting Delisted

If you find yourself on a blacklist, the delisting process depends on which blacklist you are on and why you got listed.

Spamhaus delisting: Spamhaus has a self-service delisting request process at spamhaus.org. For the SBL, you must first resolve whatever issue caused the listing — stop the spam behavior, secure any compromised systems, etc. Only after the underlying issue is resolved will Spamhaus remove the listing. Attempting to relist without addressing the cause will result in permanent rejection. Spamhaus will not respond to emotional appeals or lawyer letters — they respond to proof that the problem has been resolved.

Barracuda delisting: Barracuda provides a delisting request form at barracudacentral.org. Delisting requires that you demonstrate a low complaint rate and clean sending practices. It can take 24-48 hours to process.

SpamCop: Listings on SpamCop are temporary — they expire after approximately 24-48 hours if no new complaints are received for your IP. You can request early removal if you can demonstrate the issue has been resolved.

Prevention is always better than cure. Once you have been listed on a major blacklist, the listing can take days or weeks to resolve, and your deliverability during that period may be severely compromised. The best time to think about blacklist prevention is before you ever get listed.


Part Eight: Monitoring, Diagnostics, and Ongoing Maintenance

Building a Deliverability Monitoring System

Reactive deliverability management — checking things only after problems become obvious — is how organizations end up in deliverability crises that take weeks to recover from. Proactive monitoring catches issues early, when they are still manageable.

A complete deliverability monitoring system includes:

DMARC report monitoring. Your DMARC record should have an rua tag pointing to an address where aggregate reports are sent. Parse and review these reports regularly. DMARC reports tell you who is sending email from your domain, which is essential for spotting unauthorized use. Tools like DMARC Analyzer, Dmarcian, or Valimail can parse these reports into human-readable dashboards.

Google Postmaster Tools monitoring. Check your domain reputation and spam rate in Postmaster Tools weekly. Set up alerts if the service supports them.

Microsoft SNDS monitoring. If you send to significant Outlook/Hotmail audiences, check SNDS regularly for red status indicators.

Blacklist monitoring. Check MxToolbox weekly. Some monitoring services (including MxToolbox's paid tier) will send automatic alerts if your IP appears on a blacklist.

Bounce rate monitoring. Monitor your hard bounce rate in your ESP dashboard. A sudden increase in bounces may indicate a list quality issue or a technical problem.

Spam complaint rate monitoring. Monitor your spam complaint rate in your ESP dashboard and through any complaint feedback loops you have set up. A rising complaint rate is an early warning sign that deserves immediate investigation.

Inbox placement testing. Tools like GlockApps, MailTester.com, Litmus, or Email on Acid allow you to send test emails and see where they land across a variety of inbox providers. Regular placement tests (at least monthly) give you ground truth on where your emails are actually landing.

Seed list testing. Before major campaigns, send to a seed list — a set of real email addresses across the major inbox providers that you control — and check inbox placement manually. This is more labor-intensive than automated testing but produces very reliable results.

Diagnosing Deliverability Problems

When you have a deliverability problem — open rates drop suddenly, responses fall off a cliff, or your monitoring alerts trigger — a systematic diagnostic process produces faster resolution than throwing random fixes at the problem.

Step 1: Identify the scope. Is the problem affecting all inbox providers or specific ones? If your Gmail open rates have dropped but Outlook is fine, the issue is specific to Gmail. If all providers are affected simultaneously, the issue is likely at the IP or domain level.

Step 2: Check authentication. Verify that SPF, DKIM, and DMARC are still properly configured. DNS records can be accidentally modified or expire. Use MxToolbox's authentication checking tools.

Step 3: Check blacklists. Run your sending IPs and domains through MxToolbox's blacklist checker. If you are listed, that is likely your primary problem.

Step 4: Check Google Postmaster Tools. If the problem is Gmail-specific, Postmaster Tools will usually give you a clear indication of whether your domain reputation has dropped and whether your spam rate has increased.

Step 5: Analyze recent sending behavior. Has anything changed recently? New segment you started sending to? New email template you deployed? Increase in sending volume? Change in the ESP or sending configuration? Recent changes that correlate with the onset of deliverability problems are usually causal.

Step 6: Analyze complaint and bounce rates. Check your ESP dashboard for any spikes in complaints or bounces that correlate with the timing of your deliverability change.

Step 7: Test content. Use GlockApps or Mail-Tester to test your specific email content. If the placement problem is content-related, these tools will often identify the specific elements causing issues.

Step 8: Check your sending IP's history. If you are on a shared IP, it is possible that another sender on the same IP triggered a reputation problem. Contact your ESP for information.

Maintaining Deliverability Long-Term

Long-term deliverability health is not a project with an end date — it is an ongoing operational practice. Organizations that maintain consistently excellent deliverability do so through disciplined, systematic habits:

Monthly or quarterly list cleaning. Remove hard bounces immediately, suppress soft-bounce patterns, and sunset unengaged contacts on a defined schedule.

Regular authentication audits. Every time you add a new email service, update your SPF, DKIM, and DMARC configurations. Perform a quarterly audit to ensure everything is still correctly configured.

Engagement-based suppression. Set automatic suppression rules in your ESP for contacts who haven't engaged in a defined period (typically 12-18 months).

Consistent sending cadence. Maintain predictable sending patterns. Avoid long periods of inactivity followed by sudden volume spikes.

Content quality review. Before deploying major new templates or email copy, test them for spam score using testing tools. Make testing part of your standard launch checklist.

Segment by engagement. Never send to your entire list indiscriminately. Segment by engagement level and adjust frequency and content accordingly.


Part Nine: Advanced Deliverability Topics

The Role of Engagement in Gmail's Filtering

Gmail's filtering algorithm is more sophisticated than any other major inbox provider, and understanding its specific behavior is critical for senders who rely heavily on Gmail delivery.

Google uses what is effectively a machine learning model that weighs hundreds of signals — including deep engagement history — to make inbox placement decisions. What makes Gmail uniquely powerful and uniquely challenging is that it personalizes these decisions at the individual recipient level.

This means: your email may land in the primary inbox for recipients who have historically engaged with your emails, in the Promotions tab for recipients who have never opened one of your emails, and in spam for recipients who have previously marked your emails as spam — even though these are all the same email, from the same sender, at the same time.

The practical implication is that Gmail deliverability is not binary. Aggregate open rates, even at the campaign level, may mask significant variation in inbox placement across different recipient segments.

One of the most effective strategies for improving Gmail deliverability is to actively cultivate engagement with your most active recipients — getting them to open, click, reply, and (most powerfully) move your emails from Promotions to Primary when applicable. These explicit positive signals teach Gmail's model that your emails deserve inbox placement.

The Promotions Tab: Friend or Foe?

Gmail's Promotions tab is often treated as a failure state — something to avoid at all costs. The reality is more nuanced.

The Promotions tab is not the spam folder. It is a sorting feature that Gmail uses to keep promotional email organized rather than cluttering the primary inbox. For marketing emails — newsletters, promotional campaigns, transactional receipts — Promotions tab placement is increasingly normal and may not significantly impact engagement rates for audiences that have learned to check the tab.

Where Promotions tab placement is genuinely damaging is for cold email and one-to-one communications that should feel personal. An email that lands in the Promotions tab is visually grouped with marketing emails, reducing the sense of personal relevance and likely reducing the open rate.

Several factors contribute to Promotions tab placement:

  • Marketing-style HTML formatting

  • Multiple links

  • Presence of an unsubscribe link (paradoxically, this signals bulk email)

  • Domain reputation patterns associated with marketing email

  • Content patterns that match Gmail's understanding of "promotional" content

For cold email, the best mitigation is to send plain-text or near-plain-text emails with minimal links, no unsubscribe mechanism in the email body (address unsubscribe compliance differently for cold email), and copy that reads like personal correspondence rather than marketing.

For marketing email, accept that Promotions tab placement may be inevitable for some recipients and segment and message accordingly. Including "add us to your primary inbox" instructions in your onboarding emails can help move engaged subscribers out of Promotions.

Deliverability for Transactional Email

Transactional email — order confirmations, password resets, shipping notifications, invoice receipts — has different deliverability characteristics and requirements than marketing email or cold outreach.

The most important principle for transactional email: send it from a completely separate infrastructure than your marketing email. Different domain, different IP, different ESP (many organizations use a dedicated transactional email service like Postmark, SendGrid's transactional tier, or Mandrill for exactly this reason).

Why the separation? Transactional email is among the most important email your organization sends — a customer who can't receive their password reset email has a terrible experience. If your marketing email activities degrade your sender reputation, you do not want that degradation to affect your transactional email deliverability.

Transactional email also tends to receive very high engagement — recipients are actively looking for these emails, and they will search spam folders or contact support if they don't arrive promptly. This engaged behavior can actually support sender reputation, but only if the transactional email is on infrastructure separate from lower-engagement marketing sends.

Subdomains as Deliverability Architecture

Using subdomains for different sending purposes is an effective way to isolate reputation across different email programs. Instead of sending everything from yourdomain.com, you might use:

  • marketing.yourdomain.com for bulk marketing email

  • mail.yourdomain.com for transactional email

  • outreach.yourdomain.com (or a different root domain) for cold email

This architecture ensures that a deliverability event in one program does not affect others. If your marketing email has a bad week — high unsubscribes after a poorly received campaign — it affects only the marketing subdomain's reputation, not your transactional or outreach sending.

The tradeoff is complexity: each subdomain requires its own authentication setup, warming period, and reputation management. But for organizations with meaningful email programs across multiple use cases, the separation pays off in reduced cross-contamination risk.

Feedback Loops

A Feedback Loop (FBL) is a mechanism by which inbox providers share spam complaint data directly with the sender. When a recipient marks your email as spam at a provider that operates an FBL, the provider sends you a notification — allowing you to identify the specific recipient and suppress them from future sends before their complaint further damages your reputation.

Major providers that operate FBLs include Yahoo, AOL, Comcast, and Microsoft (via SNDS). Gmail does not operate a traditional FBL but provides aggregate spam rate data through Postmaster Tools.

To use FBLs, you register with each provider's FBL program. Most require that you control the sending IPs and have an established sending relationship with the provider. Many ESPs handle FBL processing automatically and will suppress FBL complainers from future sends.

If your ESP does not process FBL complaints automatically, set up processing manually. Every FBL complaint that results in a suppression is a future spam complaint (and future reputation damage) prevented.


Part Ten: Legal Compliance and Deliverability

How Compliance Affects Deliverability

Legal compliance and deliverability are often treated as separate concerns — compliance as a legal and business risk issue, deliverability as a technical and operational one. In practice, they are deeply intertwined.

The practices that regulators require — permission-based lists, honest subject lines, easy unsubscribe mechanisms, physical address disclosure — are also practices that inbox providers reward with better deliverability. The practices that regulators prohibit — buying lists, deceptive subject lines, making unsubscribe difficult — are also practices that inbox providers punish with worse deliverability.

This alignment is not coincidental. Both regulators and inbox providers are trying to achieve the same thing: ensuring that people receive only the emails they want. The tools are different — legal enforcement vs. technical filtering — but the objective is the same.

CAN-SPAM in Practice

The U.S. CAN-SPAM Act applies to commercial email. Its practical requirements for deliverability:

Accurate header information. The From, To, and Reply-To headers must accurately identify the sender. This means no spoofing, no using someone else's domain, and no sending through infrastructure that obscures the true sender.

Honest subject lines. Subject lines cannot be deceptive. Fake "Re:" prefixes, subject lines that promise things the email doesn't deliver, and misleading urgency claims are all violations. They are also spam filter triggers.

Identification as an advertisement. If your email is an advertisement or promotion, it must be identified as such — though this identification does not have to be prominent.

Physical address. You must include a valid physical postal address in every commercial email. This can be your current street address, a PO box, or a private mailbox registered through a commercial mail receiving agency.

Opt-out mechanism. You must provide a clear and obvious mechanism for recipients to opt out of future commercial email. This mechanism must be valid for at least 30 days after you send the email.

Honor opt-outs promptly. Opt-out requests must be honored within 10 business days. You cannot charge a fee for opting out, require recipients to take more than visiting a single website page to opt out, or require the recipient to provide information beyond their email address.

GDPR's Impact on Email Marketing

GDPR fundamentally changes the lawful basis for processing email addresses of EU residents. For marketing email, explicit consent is the most reliable legal basis — meaning someone must have actively opted in to receive your email.

The consent must be:

  • Freely given (not a condition of service when that makes no sense)

  • Specific (they consented to emails from you, not just marketing in general)

  • Informed (they understood what they were consenting to)

  • Unambiguous (a clear affirmative action — pre-ticked boxes do not count)

The deliverability implication is significant: lists built under GDPR-compliant consent practices tend to be highly engaged because they consist of people who genuinely wanted to be there. This engagement translates directly into better deliverability.

GDPR also gives recipients the right to access the data you hold on them, correct inaccurate data, and have their data deleted. Building robust data management processes around these rights is good practice regardless of legal obligation — and having clean, accurate, recently-verified contact data is good for deliverability.

Building a Compliant Permission Architecture

The safest legal and deliverability approach is to build an email program on the foundation of genuine, documented permission. This means:

Double opt-in for marketing lists. After someone fills out your email signup form, send a confirmation email and require them to click a link to confirm their subscription. Double opt-in produces smaller lists than single opt-in but dramatically higher engagement rates, lower spam complaint rates, and much cleaner compliance with GDPR and CASL. The deliverability improvement from double opt-in consistently outweighs the reduced list size.

Clear at-signup disclosure. Tell people exactly what they are signing up for, how often you will email them, and what kind of content to expect. Setting accurate expectations at signup reduces the likelihood that subscribers will eventually mark your emails as spam when the reality doesn't match their expectations.

Maintain a consent audit trail. Record when and how each subscriber gave consent, from which source, through which form, and what they were told at the time. This documentation is your legal protection if challenged and your data quality assurance for deliverability.

Honor preferences at the individual level. Allow subscribers to manage the frequency and type of emails they receive rather than forcing a binary subscribe/unsubscribe choice. Offering a preference center — where recipients can say "I want weekly emails but not daily ones" or "I want product updates but not promotional emails" — reduces unsubscribes and spam complaints while improving the relevance of what you send.


Part Eleven: Pulling It All Together — A Deliverability Audit Checklist

Technical Foundation

  • [ ] Sending domains are separate from primary business domain (for cold email)

  • [ ] SPF record is published, includes all sending services, and is under ten DNS lookups

  • [ ] DKIM is configured with 2048-bit keys for all sending services

  • [ ] DMARC record is published with at minimum p=none and reporting addresses set

  • [ ] DMARC reports are being received and reviewed regularly

  • [ ] Custom tracking domain is configured (instead of ESP's default)

  • [ ] All new inboxes are warmed before cold email use

  • [ ] Sending volume is within daily limits per inbox (50-80 cold, appropriate rates for marketing)

  • [ ] For dedicated IPs: warming schedule has been completed

List Health

  • [ ] Email verification has been run on all lists (bounce rate target: <3%)

  • [ ] Hard bounce suppression is configured and working

  • [ ] Spam complaint suppression is configured and working

  • [ ] Spam traps are being avoided through proper list sourcing

  • [ ] Engagement segments are defined and sending strategy respects them

  • [ ] Sunset policy is defined and implemented

  • [ ] Re-engagement campaigns are in use for at-risk contacts

  • [ ] No role-based or disposable email addresses on the list

  • [ ] No purchased lists in use

Content

  • [ ] Subject lines are honest, relevant, and avoid spam patterns

  • [ ] For marketing email: text-to-image ratio is at least 60/40

  • [ ] All HTML is clean and properly coded

  • [ ] No URL shorteners in email body; all links use legitimate, recognizable domains

  • [ ] Custom click tracking domain is in use

  • [ ] Unsubscribe link is present and functional (where required)

  • [ ] Alt text is included on all images

  • [ ] Plain text version is present and coherent

  • [ ] For cold email: email is plain text or near-plain text

Monitoring

  • [ ] Google Postmaster Tools is set up and being reviewed weekly

  • [ ] Microsoft SNDS is registered (if sending to significant Outlook/Hotmail volume)

  • [ ] Blacklist monitoring is in place (MxToolbox or equivalent)

  • [ ] DMARC aggregate reports are being processed and reviewed

  • [ ] Bounce rate is being tracked and investigated when elevated

  • [ ] Spam complaint rate is being tracked

  • [ ] Inbox placement testing is performed monthly or before major campaigns

  • [ ] Feedback loop complaints are being processed and suppressed

Legal and Compliance

  • [ ] CAN-SPAM requirements are met (physical address, unsubscribe, honest from/subject)

  • [ ] GDPR consent documentation is in place for EU recipients

  • [ ] CASL compliance assessed for Canadian recipients

  • [ ] Opt-out requests are being honored within required timeframes

  • [ ] Suppression list is maintained and applied to all future sends


Conclusion: Deliverability Is a Practice, Not a Setup

Email deliverability is not a box you check once and move on from. It is a continuous practice — a discipline that requires ongoing attention, systematic monitoring, and a commitment to the principles that make email work: relevance, permission, engagement, and technical integrity.

The organizations that consistently achieve 90%+ inbox placement rates are not doing anything magical. They are doing the fundamentals extremely well, every day, without exception. Clean lists. Properly authenticated sending infrastructure. Engaged recipient bases. Content that is relevant and wanted. Monitoring that catches problems early. Compliance that reflects genuine respect for the recipient's inbox.

These are not secrets. They are practices. And practices, unlike secrets, are available to anyone willing to invest the effort.

The good news is that investment in deliverability is among the highest-ROI activities available to any email-reliant business. An email program that achieves 90% inbox placement generates nearly twice the value of one achieving 50% inbox placement — from the same list, the same content, the same effort — simply because the emails are actually being seen.

Your emails deserve to be read. The people you send them to deserve to receive only the emails they find valuable. Deliverability is the discipline that honors both of those truths simultaneously.

Do the technical work. Earn the trust. Maintain the standards. The inbox will follow.


Appendix: Glossary of Email Deliverability Terms

Blacklist (DNSBL): A database of IP addresses or domains associated with spam activity, queried by receiving servers during the filtering process.

Bounce Rate: The percentage of emails that could not be delivered. Hard bounces are permanent failures; soft bounces are temporary.

BIMI (Brand Indicators for Message Identification): A standard that allows brand logos to display in the inbox, requiring strong authentication and a Verified Mark Certificate.

CAN-SPAM: U.S. federal law governing commercial email, setting requirements for honest headers, opt-out mechanisms, and physical address disclosure.

DKIM (DomainKeys Identified Mail): A cryptographic authentication protocol that verifies email was sent from an authorized server and was not tampered with in transit.

DMARC (Domain-based Message Authentication, Reporting, and Conformance): An email authentication policy that builds on SPF and DKIM, adding alignment requirements and policy enforcement.

DNS (Domain Name System): The internet's address book, used to look up email server locations (MX records) and authenticate email (SPF, DKIM, DMARC records).

Engagement: The degree to which email recipients open, click, reply to, and otherwise interact with received emails. A primary signal used by modern inbox providers for filtering decisions.

ESP (Email Service Provider): A platform used for sending marketing or transactional email at scale (Mailchimp, Klaviyo, SendGrid, etc.).

FBL (Feedback Loop): A mechanism by which inbox providers notify senders when recipients mark their emails as spam.

GDPR: EU General Data Protection Regulation, governing the processing of personal data including email addresses of EU residents.

Hard Bounce: A permanent email delivery failure, typically because the address does not exist.

IP Warming: The process of gradually increasing sending volume from a new IP address to build sending reputation before scaling up.

Inbox Placement: The final destination of a delivered email — primary inbox, spam folder, Promotions tab, etc.

MBP (Mailbox Provider): Companies that operate email inboxes — Gmail, Outlook, Yahoo, etc.

MX Record: A DNS record specifying the mail server responsible for accepting email for a domain.

Postmaster Tools: Google's tool for senders to monitor their domain reputation and spam rate with Gmail.

Sender Reputation: The cumulative assessment by inbox providers of a sender's trustworthiness, based on authentication, engagement signals, complaint rates, and technical behavior.

Soft Bounce: A temporary email delivery failure, such as a full inbox or temporary server unavailability.

Spam Complaint Rate: The percentage of delivered emails that recipients mark as spam. A critical negative signal for sender reputation.

Spam Trap: An email address operated to identify senders with poor list hygiene. Hitting spam traps negatively impacts sender reputation and can trigger blacklist listings.

SPF (Sender Policy Framework): A DNS record that specifies which mail servers are authorized to send email on behalf of a domain.

Sunset Policy: A defined policy for suppressing contacts who have not engaged with email over a specific time period.

Warm Email: An email sent to someone with a prior relationship or referral, as opposed to a cold email sent to a stranger.


This guide reflects best practices as understood at the time of writing. Email deliverability is a rapidly evolving field; specific technical details, platform behaviors, and legal requirements change regularly. Always verify current platform documentation and consult legal counsel for jurisdiction-specific compliance questions.

Comments(0)

Join the conversation

You need to sign in to leave a comment.

Sign In to Comment
Loading comments...