We wanted to thank everyone who joined us last week for our holiday card webinar: How to Avoid Turning Into the Grinch This Holiday Season. The webinar covered best practices with list management, creative, physical cards and e-cards, how to stand out from the crowd, and most importantly timing. After the webinar we got numerous requests for the presentation and notes. So to better help you through your holiday card work we created a holiday card guide! Request your copy by emailing email@example.com.
It’s that time of year again! Summer is officially over and the season for holiday cards is looming around the corner. Join ContactEase for our upcoming holiday card webinar: How to Avoid Turning into the Grinch This Holiday Season.
This thought leadership webinar will provide best practices related to list management, creative concepts, physical v. e-cards, standing out amongst the crowd, and how to manage the timing needed to complete your holiday cards this season.
This webinar will be hosted on Tuesday, September 23rd at 12:00PM CST. >>REGISTER TODAY
Already a ContactEase client?
Learn how to use ContactEase from our resident trainer and an expert on holiday card management, David Chatburn. He will demonstrate how to use ContactEase fields, categories, assignments and Mailing List Manager to support your holiday card programs. This live session also allows you to ask questions and participate in the discussion. Learn more about the training webinar or request a recording by emailing firstname.lastname@example.org.
Last month our entire ContactEase team had the opportunity to attend the 2014 ILTA Annual Conference in Nashville, Tennessee themed Imagine. The four-day conference had over 200 peer-developed educational sessions, numerous networking opportunities, and provided our team with the insights and inspirations to better partner with our clients and prospects.
Having our entire team at the conference also allowed us to come together afterwards and discuss the sessions we attended. These sessions varied from creating marketing and business development ROI to implementation and deployment best practices. With so many sessions and an overwhelming amount of content, we have decided launch a new blog series “ILTA Reflections.” Once a week until the end of October we will be reflecting on one of the sessions a team member has attended. Next week the series will kick off with the blog post “ILTA Reflections: Using Big Data To Measure Marketing and Business Development ROI.”
If you also attended the conference and are interested in sharing your take on a session we would love to share it here. Just send an email to email@example.com with your session recap and we will post it here with you as our guest author!
As the summer is winding down we are preparing for the 37th ILTA Annual Conference in Nashville, TN! This year’s theme “Imagine” promises to bring together ILTA’s community, and the collective power of imagination will take everyone – as professionals and organizations – to new heights.
In conjunction with the Conference the entire ContactEase team will be in Nashville for our annual company retreat.
This will be a great opportunity to meet the team in person and catch-up on what’s new at Cole Valley Software. If your interested in grabbing a coffee or meeting up with us for dinner let us know by emailing firstname.lastname@example.org.
So far in our series about Canada’s Anti-Spam Legislation (CASL) we have covered the basics and commercial electronic messages. In this post we will cover the different types of consent and the burden of proof.
Consent = Permission
There are two different types of consent that apply to CASL, express and implied. Express consent means an individual must take affirmative action to “opt-in” to your list willingly. Implied consent is when a relationship exists, but the recipient is added to your list without any affirmative action.
With both types of consent there a is “burden of proof” that is required. This means that it is your responsibility to track, record, and document the information necessary to prove that you have consent to be contacting that person. Best practices include ensuring that all records of your compliance procedures and policies are maintained, and that proof of consent is documented and tracked. This information may support a due diligence defense at a later point in time if your firm is ever called into question.
So let’s see this in action….
You collect someone’s business card and after meeting them send an email to confirm that you met them and they have requested more information or to be added to a list. This allows you to have the necessary information needed for the burden of proof.
Someone fills out a form on your website with the intent of being placed on your list. A confirmation email would then be sent which requires a recipient to click a link to confirm they wish to be placed on the list. When they click the link, the date/time and IP stamp should be recorded.
A person gives you their email address over the phone with the intent of being placed on your list. The same process of sending a confirmation email applies, but express consent could be proven if you recorded the conversation for each recipient.
If someone expresses interest in your business as part of the sales process or enters their email address on your website to download educational material, they are to be considered “prospects” and implied consent is given to send commercial electronic messages for a period of 6 months only.
If a recipient is added automatically or is required to un-check a box to opt-out during a process, this method is considered implied and not express consent under CASL. As a best practice this should be avoided anyways as it will typically generate a large volume of emails flagged as spam which negatively affects your reputation as a sender. In order for it to be express consent, a recipient must go through an opt-in mechanism, as opposed to opt-out. The end-user must take a positive action to indicate their consent.
Check back as our next post will cover the fine print of CASL and processes that can be used during the three-year transition period in case you are not going to meet the July 1st deadline!
In our previous post about Canada’s Anti-Spam Legislation we briefly covered the law and provided some recommendations and considerations. In this post we will cover Commercial Electronic Messages. As defined by the law a Commercial Electronic Message (CEM) is any electronic message that “encourages participation in a commercial activity” regardless of whether there in an expectation to profit. CEMs include:
Any other electronic correspondence
Examples of CEMs:
Offers to purchase, sell, barter or lease a product, goods, a service
Offers to provide a business, investment or gaming opportunity
Promoting a person, including the public image of a person, as being a person who does anything referred to above, or who intends to do so
Parts of a message to examine to determine if it encourages participation in a commercial activity include:
Content of the message
Hyperlinks in the message to website content or a database
Contact information in the message
Accordingly, businesses should consider removing all promotional messaging, including messaging promoting the business itself (e.g. an award or ranking) from electronic messages that are not categorized by the business as being a CEM to avoid having such messages caught by CASL.
In our post next week we will cover the four key requirements of CASL and specifically the types of consent and the burden of proof.
With Canada’s Anti-Spam Legislation entering into effect in two weeks, this blog series will focus on how to become and remain compliant. Once the law is in force, it will help to protect Canadians while ensuring that business can continue to compete in the global marketplace.
If you haven’t already determined if the law applies to your firm, it is critical to understand that CASL applies to any commercial electronic messages (CEMS) where a computer system located in Canada is used to send or access the electronic message. Here is a great infographic created by CakeMail to help you determine if CASL applies to your firm:
With the impact of CASL and the scope of its liability, it is crucial for firms who are impacted to have a strategy in place. Here are a few recommendations we suggest considering if you haven’t already:
Review all existing communication practices internally
Assess whether your communications are CEMs and whether they are subject to CASL
Determine which entity in your organization should “own” the consents
Take steps to collect necessary express consents in the next two weeks. This cannot be done after July 1, 2014 using CEMs
Identify such communications where consents are not required but the informational requirements and formalities are still required
Develop a database of your contacts that enables all consents to be tracked, retained and retrievable; and allows any waiver or variation of such consent to be readily tracked and implemented
Maintain policies to ensure that CEMs are not sent where there is no consent or where implied consent has expired
Create and maintain an easy-to-use and effective unsubscribe mechanism for the CEMs
Ensure that all records of your compliance procedures and policies are maintained (as such documentation may support a due diligence defense at a later point in time)
To learn more about the key requirements of CASL and how to become and remain compliant check back for our latest post in the series.
Is your firm getting a return on your relationships? Last month we had the opportunity to present on the topic at the ALA Annual conference in Toronto. The session highlighted how to build genuine and lasting business and personal relationships for your firm; as well as how to evolve the impact you have with your prospects and clients.
The most common challenges while building relationships is not being sure where to start, a lack of defined processes, and under utilizing technology to assist with creating and maintaining relationships.
An easy way to start building genuine relationships is to incorporate relationship management into practice area/group plans as well as introduce individual plans for attorneys. Make sure to provide easy to use templates, ideas on the type of information to send out to stay top of mind with contacts, and set goals to measure success. An easy touch point is to review a client or prospects business and suggest three ways you can help them grow.
Coming up with a defined process can be as simple or elaborate as you like, but providing a general framework will help create consistency. It is also key to review relationships and identify where they could be in jeopardy. If someone hasn’t reached out to connect in more than 6-9 months your losing touch with the contact and could be missing out on opportunities.
By using technology to assist with relationship management, data can be consolidated and shared throughout your firm. Make sure to evaluate current outreach such as mailings and events and how the firm is capturing that data. Make sure to utilize Contact Relationship Management Systems to capture the data for a full view of your activities with clients and prospects. If your firm doesn’t have such a system in place make sure to review tools with IT teams and explore different options that are available. It is also important to work with your vendor for an audit of your current system to learn about features and new technology you may not be utilizing.
Once data is consolidated it is easier to establish metrics around outreach programs, win/losses on prospecting, and the success of individual plans. Start today by using utilizing existing IT resources for reporting, auditing your technology, capturing processes in writing, implementing pilot groups, and celebrating success. Lastly, make sure to utilize your vendors as a resource. Ask them for latest trends, technologies, and processes to make your firm successful.
Tomorrow we will be joining The Remsen Group as they host their 23rd Annual Managing Partner Forum. The leadership conference brings together managing partners and leaders of mid-size US law firms.
What’s unique about this conference compared to others is their breakout sessions called Managing Partner Idea Exchanges (MPIEs). The breakouts provide a highly interactive format during which managing partners share ideas and practical solutions to the challenges of leading a successful law firm. The discussion points for this year will be:
Proven Strategies to Improve Firm Profitability
Marketing and Business Development Trends and Best Practices
Tackling the Really Tough Issues – Bad Behavior and Under Performance
Strategic Planning – Including Succession
Stop back later and checkout our recap of the conference and the key takeaways!
Recently, a major security vulnerability named “Heartbleed” has made headlines around the world. This is a severe vulnerability stemming from a coding mistake in a widely-used security utility called OpenSSL. The bug affects the encryption technology designed to protect your sensitive data on the Internet, like usernames, passwords and emails. This is a flaw in the OpenSSL encryption code itself and not a virus that can be stopped by any consumer security/virus scan software.
With that being said, please note that ContactEase is not impacted by Heartbleed. Our web add-on components (such as Mobile Solutions, Mailing List Manager, Change Tracker, Online Update and RSVP Forms) are required to be installed on IIS web servers, which do not by default rely on OpenSSL.
It is still recommended that you check with your hosting provider or IT professionals to ensure your servers are not using OpenSSL. In addition, you may want to check with any online services that you use.
What You Should Do:
Confirm that both your internal web servers and hosted web servers are using a safe version of OpenSSL.
You can check which major online services have been effected using the list provided by Mashable.
Reset your password for every online service affected by Heartbleed. But beware: you should only change your password after the afflicted business has fixed its servers to remove the Heartbleed vulnerability. Changing your passwords before a company’s servers are updated will not protect your credentials from being leaked.
Follow best practices for creating passwords, using strong passwords.
Ask an IT professional inside your organization for additional tips to keep your accounts secure.