Taking Money From Clients by ACH and Wire Transfers

We operate globally and so to keep our costs down we have pretty tight control on our credit card payment processing. To pay us not only must you have a CVV code match with your credit card but an AVS X and Y match. That means that the street name and zip code must match what is on file with your credit card company.

For some global clients this has caused problems when there bank does not support AVS matching. This is where a wire transfer may be preferable. But how is a wire transfer different from an ACH or direct deposit transaction. A wire transfer is done by the paying party – the client. You the business owner supply your bank address, routing number and account number. The payee, the client, then goes to their bank and processes the transfer. The client will typically be assessed a currency transaction charge and other fees. Here in Maryland for me to send a wire transfer my bank charges me $60. For me to receive a wire transfer my bank charges a $12 fee even if the sending party has said they will pay all charges. Wire transfers are safe to do and my bank says that they are one way transactions into my bank account, meaning that the client cannot withdraw money from my account after I have shared my account information.

Now ACH is different. I am very careful who I allow ACH access to my checking account. I have one long term client and my credit card processing companies. With ACH it is possible for a party to remove money from your account tht you have not authorized. I found out however if you as a business report a fraudulent ACH withdraw in two days, you will get your money refunded to you and the bank where the fraudulent charge originated from will have to collect the money back from their client which originated the charge. Good reason if you allow ACH access to your checking to be vigilant in regards to reviewing account transactions daily or every other day.

Why Vetting Your E-Newsletter Subscriber List is Important

So you’d like to start sending out an e-newsletter, that is great, and I highly recommend it. The person who reads your e-newsletter is very different from the person who reads your blog. It is important before you start to understand that you just can’t start your e-newsletter with names you buy from a service or harvest from website or for that matter take off of business cards. There is criteria for the people to whom you can include on your e-newsletter list.

First, I recommend that all websites have a privacy policy and whether you have an e-newsletter now or not, that you cover in your online privacy policy that if someone contacts you by email, you will be adding their email to your newsletter list.

Second, the rule by the FTC, in very simplified terms, is that if you have a business relationship with a person, that means you have estimated something, sold them something, or chatted with them about one of your services or products then you can email them a promotional notice about your services. This does not cover you getting their business card at a mixer or from a bulletin board. There has to be a real “business relationship”.

The FTC clearly states that no emails that are harvested, even by hand, from the Web can be used in creating your new e-newsletter mailing list. There is simply no way around this no matter how creative you think you can be, you will still be in violation. With pretty serious fines for violations, it just isn’t worth the risk of trying to bend the rules for your benefit in trying to start out with a big list.

If your list is over about 1,000 subscribers you will trigger all the filters of any firm you are using to send out your e-newsletter. You may end up finding that they will allow the first email send, but then may force you to validate  your subscribers, by double opt-in confirmation, all your subscribers for your second send or they may ban you all together.

It is by far better to build your list over time starting now from legitimate clients than to try to break the rules and start with a big untargeted list especially when you have so much to lose in regards to your reputation and a CAN Spam Act violation hanging over your head.

How Do You Know if Your Twitter Account is Hacked?

Twitter is an important marketing tool and you want to make sure to protect your followers from blocking you or not trusting you by watching your tweets. Having your Twitter account be hacked can create havoc with your ability to have an authoritative voice in your arena.

You will not always know your account has been hacked but here are some tips to help you keep tabs.

1. Use a Twitter application like HootSuite or TweetDeck and make one of the columns set to show all your own published tweets. You know what you’ve written, so if you start to see tweets that are not yours take immediate action. If you use a tweet ghost writer, make sure that you yourself periodically go to Twitter.com and check your tweet list and direct messages. Sometimes you will see problems or tweets with links that do not belong.

2. Guard your Twitter password and be very careful with the third party applications that you give access to your Twitter account and Twitter password to. If you suspect a problem, just immediately change your Twitter password to lock out potential problem applications.

3. If your blog is hacked and you are using any Twitter plug-ins, most likely your Twitter account has been hacked as well. Now’s the time to change your password on your blog AND on Twitter.

4. Watch your direct messages in Twitter. In many cases followers will let you know that you sent them something weird and out of the ordinary. Don’t blow that off, start digging as most likely you have been hacked. In many cases the tweets from a hacked account will go out in the middle of the night so you may not see them first thing in the morning unless you have a column set up as in number one.

I recommend vigilance. Just watch what is happening on your Twitter account. You don’t want to lose the loyal following you’ve created with a hacked account that posts garbage alienating your followers.

Do Double Duty With Your Blog Posts

If you have a blog writer or are writing for your own blog, it is time to “think outside the box” when it comes to using your content. Here are just a few of my suggestions. Now before you start though, if you pay a writer to write for your blog, you must make sure you have the rights to use your blog content in the ways I am suggesting.

1. For well received blog posts consider taking them and posting them on Google Knoll or American Chronicle as well as a few well chosen article syndication sites. Your blog posts should be at least 275 to 300 words long and should not be just on selling your own products and services.

2. Consider using your best blog posts as content for a quarterly e-newsletter. Choose the posts you really like or check your website statistics to see which blog posts got the most traffic then consider expounding on that topic further in your e-newsletter. As many blog readers will not be e-newsletter subscribers and vice versa you are pretty safe with reusing some content, just try to add fresh ideas to your newsletter as well.

3. If you’ve had great traffic with a blog post think on maybe paying your blog writer to do a mini whitepaper on the same topic that you can offer as a free download on your website. Better yet provide the download only after you have gotten the readers email address to start creating your own list for your own marketing uses.

There are lots of ways you can creatively re-use your content, but just make sure you have the proper rights to do so before you start.