World Library  
Flag as Inappropriate
Email this Article

Email tracking

Article Id: WHEBN0003115123
Reproduction Date:

Title: Email tracking  
Author: World Heritage Encyclopedia
Language: English
Subject: Email, IMail
Collection: Email
Publisher: World Heritage Encyclopedia

Email tracking

Email tracking is a method for monitoring the email delivery to intended recipient. Most tracking technologies use some form of digitally time-stamped record to reveal the exact time and date that an email was received or opened, as well the IP address of the recipient.

Email tracking is useful when the sender wants to know if the intended recipient actually received the email, or if they clicked the links. However, due to the nature of the technology, email tracking cannot be considered an absolutely accurate indicator that a message was opened or read by the recipient.

Most email marketing software provides tracking features, sometimes in aggregate (e.g., click-through rate), and sometimes on an individual basis.


  • Read-receipts 1
  • Return-receipts 2
  • Email marketing and tracking 3
  • Privacy issues 4
  • Opt-out 5
  • HP email tracking scandal 6
  • See also 7
  • References 8
  • External links 9


Some email applications, such as Microsoft Office Outlook and Mozilla Thunderbird, employ a read-receipt tracking mechanism. The sender selects the receipt request option prior to sending the message, and then upon sending, each recipient has the option of notifying the sender that the message was received or read by the recipient.

However, requesting a receipt does not guarantee that you will get one, for several reasons. Not all email applications or services support read receipts, and users can generally disable the functionality if they so wish. Those that do support it are not necessarily compatible with or capable of recognizing requests from a different email service or application. Generally, read receipts are only useful within an organization where all employees/members are using the same email service and application.

Depending on the recipient's mail client and settings, they may be forced to click a notification button before they can move on with their work. Even though it is an opt-in process, a recipient might consider it inconvenient, discourteous, or invasive.

Read receipts are sent back to one's "Inbox" as email messages, but the location may be changed depending on the software used and its configuration. Additional technical information, such as who it is from, the email software they use, the IP addresses of the sender, and their email server is commonly available inside the Internet headers of the read receipt.

The technical term for these is "MDN - Message Disposition Notifications", and they are requested by inserting one or more of the following lines into the email headers: "X-Confirm-Reading-To:"; "Disposition-Notification-To:"; or "Return-Receipt-To:".


Another kind of receipt can be requested, which is called a DSN (delivery status notification), which is a request to the recipient's email server to send you a notification about the delivery of an email that you have just sent. The notification takes the form of an email, and will indicate whether the delivery succeeded, failed, or got delayed, and it will warn you if any email server involved was unable to give you a receipt. DSNs are requested at the time of sending by the sending application or server software (not inside the email or headers itself), and you can request to "Never" get any, or to "Always" get one, or (which most software does by default) only to get DSN if delivery fails (i.e.: not for success, delay, or relay DSNs). These failure DSNs are normally referred to as a "Bounce". Additionally, you can specify in your DSN request whether you want your receipt to contain a full copy of your original email, or just a summary of what happened. In the SMTP protocol, DSNs are requested at the end of the RCPT TO: command (e.g.: RCPT TO:<> NOTIFY=SUCCESS,DELAY) and the MAIL FROM: command (e.g.: MAIL FROM:<> RET=HDRS).

Email marketing and tracking

Some email marketing tools include tracking as a feature. Such email tracking is usually accomplished using standard web tracking devices known as cookies and web beacons. When an email message is sent, if it is a graphical HTML message (not a plain text message) the email marketing system may embed a tiny, invisible tracking image (a single-pixel gif, sometimes called a web beacon) within the content of the message. When the recipient opens the message, the tracking image is referenced. When they click a link or open an attachment, another tracking code is activated. In each case a separate tracking event is recorded by the system. These response events accumulate over time in a database, enabled the email marketing software to report metrics such as open-rate and click-through rates. Email marketing users can view reports on both aggregate response statistics and individual response over time.

Such email tracking services are used by many companies, but are also available for individuals as subscription services, either web-based or integrated into email clients such as Microsoft Outlook or Gmail [1] .[2]

Privacy issues

Email tracking is used by individuals, email marketers, spammers and phishers, to verify that emails are actually read by recipients, that email addresses are valid, and that the content of emails has made it past spam filters. It can sometimes reveal if emails get forwarded (but not usually to whom). When used maliciously, it can be used to collect confidential information about businesses and individuals and to create more effective phishing schemes.

The tracking mechanisms employed are typically first-party cookies and web bugs.

If you are using email tracking or email marketing software, your company's privacy policy should state that you may use tracking devices such as cookies and web beacons.

In 2015, new tools such as Trackbuster provide protective solutions against email tracking.


Although it is possible to opt-out of email tracking, doing so does not come without sacrifice. Within one's individual email client, one can turn off images and decline any read-receipt requests. (Note that some trackers use audio files.)

One should note that there are email-tracking services which convert the email message into an image before delivering the message. One obviously cannot read the message contained in the image if image display is disabled in one's email client.

HP email tracking scandal

In the U.S. Congressional Inquiry investigating the HP pretexting scandal it was revealed that HP security used an email tracking service called to investigate boardroom leaks.[3] The California attorney general’s office has said that this practice was not part of the pretexting charges.[4] HP said they consider email tracking to be legitimate and will continue using it.[5]

See also


  1. ^
  2. ^
  3. ^ Evers, Joris (2006-09-28). How HP bugged e-mail. CNET, 28 September 2006. Retrieved from
  4. ^ iCubes (2014-10-31). HP E-Mail Tracer Commonly Used (UPDATED). Retrieved from
  5. ^ McMillian, Robert (2006-10-09). Web Bugs Trained to Track Your E-Mail. PC World - Business Center, 9 October 2006.Retrieved from,127444-c,onlineprivacy/article.html.

External links

This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.

Copyright © World Library Foundation. All rights reserved. eBooks from World Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.