Method and system for monitoring e-mail and website behavior of an e-mail recipient

ABSTRACT

A system for monitoring email and website behavior of an email recipient is provided. According to one exemplary embodiment, the system includes a mail enhancement server and a logging server. The mail enhancement server is configured to intercept all outgoing emails from a mail server. The mail enhancement server then modifies each outgoing email to include a tracking code. The tracking code is embedded in an image call which in turn is also inserted into the outgoing email. If the outgoing email contains hyperlinks, each hyperlink is also modified to include the tracking code. The tracking code is uniquely associated with the outgoing email. The image call (and the tracking code) is used to detect when the recipient of the outgoing email has opened that email. The tracking code, when embedded in a hyperlink, is also used to monitor whether the recipient has opened the email and/or clicked through on one or more of the hyperlinks in the email. The logging server associates a cookie with the recipient of the outgoing email. When the logging server receives an image call, the corresponding image and the cookie are concurrently delivered to the recipient. The cookie is used to monitor the behavior of the recipient at a website, regardless of how the recipient arrives at that website, be it through a click-through from the email or otherwise. The logging server is configured to capture and store relevant information relating to the outgoing email thereby allowing the sender of the outgoing email and the recipient to be linked and the behavior of the recipient to be monitored via the tracking code, the image call and the cookie.

CROSS-REFERENCES TO RELATED APPLICATION

The present application claims the benefit of priority under 35 U.S.C. §119 from U.S. Provisional Patent Application Ser. No. 60/333,287,entitled “METHOD AND SYSTEM FOR MONITORING EMAIL AND WEBSITE BEHAVIOR OFAN EMAIL RECIPIENT” filed on Nov. 6, 2001, the disclosure of which ishereby incorporated by reference in its entirety for all purposes.

BACKGROUND OF THE INVENTION

The present invention generally relates to email management, and morespecifically, to a method and system for monitoring email and websitebehavior of an email recipient.

Due to their convenience and popularity, emails have become a majorchannel for communications amongst individuals and businesses. Sinceemails can be used to reach a much wider audience in a short period oftime, emails have also been utilized regularly as a tool in marketingcampaigns. There is a number of email marketing companies which haveestablished a market for tracked email campaigns. These companiesprovide feedback to the email sender when an email was opened by itsintended recipient. Generally, this is accomplished via the inclusion ofa ‘web beacon’ (or a single-pixel gif) which is uniquely coded andlinked to the particular recipient of the email. More specifically, inorder to generate and send emails for a tracked campaign, an end usergoes through a multi-step workflow that typically includes: (1)recipient list creation/selection—loading into a mass-mail tool a listof possible recipients and creating a recipient list containing selectedrecipients for a particular campaign; (2) template authoring—using themass-mail tool to author the HTML email according to one or morepredefined templates; and (3) mail merge and execution (send)—mergingthe recipient list into the predefined templates, thereby creatingseparate emails which contain unique tracking codes in the form ofreferences to an image on a remote server. These emails are then sent bya mail bursting engine. When the recipient opens the email in anHTML-enabled email client, the email client contacts the remote serverto retrieve the desired image. Because each image is uniquely coded, theremote server is able to track when the email intended for a particularrecipient was opened.

The foregoing method of tracking status of an email for a marketingcampaign has its shortcomings, however. For example, a list of specificrecipients whose behavior is to be monitored needs to be created oridentified prior to the creation of the emails. Furthermore, while sometechnologies exist to monitor behavior of an email recipient, such as,whether an email has been opened, who clicked through via an email andwhat part of a website an individual has visited, there is relativelylittle correlation between the behavior of the email recipient and thesender. Hence, it would be desirable to provide a method and system thatis capable of monitoring behavior of an email recipient in relation to asender.

Moreover, the conventional way of processing and distributing emailsmakes it difficult to monitor the individual behavior of an emailrecipient. Typically, an email server processes emails on aper-recipient-domain basis. For example, if a user sends an email tothree recipients respectively identified by three email addresses:a@one.com, b@one.com, and c@two.com, then the user's email server willsplit the single email on the basis of unique recipient domains (in thiscase, one.com and two.com) and process accordingly. In this example, theuser's email server would connect to the email server for one.com anddeliver a single copy of the email. It is then up to the email serverfor one.com to create and deliver two copies of the email to botha@one.com and b@one.com simultaneously. The user's email server wouldalso separately connect to the email server for two.com and deliver aseparate copy of the email to c@two.com. Since emails are processed on aper-recipient-domain basis, respective behavior of the recipients withina single domain is difficult to monitor. It is not unusual for a singledomain to have thousands, if not millions, of recipients. Therefore, itwould also be desirable to provide a method and system that is capableof monitoring behavior of email recipients within a single domain.

BRIEF SUMMARY OF THE INVENTION

A system for monitoring email and website behavior of an email recipientis provided. According to one exemplary embodiment, the system includesa mail enhancement server and a logging server. The mail enhancementserver is configured to intercept all outgoing emails from a mailserver. The mail enhancement server does not interfere with the workflowof the mail server or the email client that is used to compose theoutgoing mails. The mail enhancement server modifies each outgoing emailto include a tracking code. The tracking code is embedded within animage call which is also included in the outgoing email. In addition, ifthe outgoing email contains hyperlinks, each hyperlink is also modifiedto include the tracking code. The tracking code is uniquely associatedwith the outgoing email, each individual recipient of the outgoing email(in the case where the outgoing email is addressed to multipleindividuals, for example, using the “cc” field of an email), the senderof the outgoing email, or the sender's business association, or acombination thereof. The image call (and the embedded tracking code) isused to detect when the recipient of the outgoing email has opened thatemail. When the tracking code is embedded in a hyperlink in the outgoingemail, the tracking code is also used to monitor whether the recipienthas opened the outgoing email and/or clicked through on one or more ofthe hyperlinks in the outgoing email.

The logging server associates a cookie with the recipient of theoutgoing email. When the logging server receives an image call (therebyindicating that the recipient has opened the outgoing email), thecorresponding image and the cookie are concurrently delivered to therecipient. The cookie is used to monitor the behavior of the recipientat a website, regardless of how the recipient arrives at that website,be it through a click-through from the email or otherwise.

The logging server is configured to capture and store relevantinformation relating to the outgoing email thereby allowing the senderof the outgoing email and the recipient to be linked and the behavior ofthe recipient to be monitored via the tracking code, the image call andthe cookie.

The mail enhancement server forwards the modified outgoing emails totheir intended recipients. When a recipient opens the email (which meansan image call is relayed to the logging server), the logging serverforwards the cookie associated with the recipient and the correspondingimage to the recipient. The tracking code, the image call and thecookie, where appropriate, are used by the logging server to monitor theactivities of the recipient in relation to the email as well as websitesvisited by the recipient. The activities of the recipient can then becaptured by the logging server and reported to the sender of the email.

Reference to the remaining portions of the specification, including thedrawings and claims, will realize other features and advantages of thepresent invention. Further features and advantages of the presentinvention, as well as the structure and operation of various embodimentsof the present invention, are described in detail below with respect toaccompanying drawings, like reference numbers indicate identical orfunctionally similar elements.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a simplified block diagram illustrating an exemplaryembodiment of the present invention;

FIG. 2 is an exemplary embodiment of an user interface in accordancewith the present invention; and

FIG. 3 is a table illustrating the state transition of a cookie based onprior cookie state and type of email event that took place according toone exemplary method of the present invention.

DETAILED DESCRIPTION OF THE INVENTION

The present invention in the form of one or more exemplary embodimentswill now be described. FIG. 1 is a simplified block diagram illustratingan exemplary embodiment of the present invention. Referring to FIG. 1,an exemplary embodiment of the present invention includes a system 10having a mail enhancement server 12, a logging server 14, an applicationserver 16 and a database 18. The exemplary operations of the system 10are further described below.

The system 10 operates in the following exemplary manner. A user orsender composes an email to a recipient using an email client 20. Theemail originates from an email account belonging to the sender. Theemail account is associated with a single domain which in a businesscontext is typically owned by the sender's company or corporation. Inother situations, the email account can be a personal account associatedwith another single domain, such as, Yahoo. The recipient uses acorresponding email account to receive the email after it has beenprocessed as further described below. The email account of the recipientis associated with a domain that is different from that of the sender'semail account. The email client 20 can be application- or web-based andincludes any device that can be used by the user or sender to send andreceive his/her personal and/or corporate email correspondence. Examplesof the email client 20 include but are not limited to Microsoft Outlook,Outlook Express, Outlook Web Access, Netscape Email, Eudora, Lotus NotesMail, Yahoo Mail, as well as Blackberry and other similar portabledevices. As will be further described below, in one exemplaryembodiment, the system 10 is transparent to the user and functionsseamlessly in cooperation with the email client 20 without altering theworkflow of the user. In other words, the user is able to continue toutilize the various functions offered by the email client 20 withouthaving to deviate from the routines associated with using suchfunctions.

The email is then sent by the email client 20 to its associated mailserver 22. Rather than sending the email directly to the recipient, theemail client's mail server 22 routes the outgoing email to the system10, more specifically, the mail enhancement server 12. In other words,the mail enhancement server 12 intercepts the outgoing email coming fromthe email client's mail server 22. Optionally, the mail enhancementserver 12 has the capability to determine how the outgoing mail is to beprocessed. For example, based on a company “opt-out” policy, certainrecipients may be excluded from receiving emails from the sender. Thissituation occurs, for instance, when a first company decides not toforward promotional or marketing emails to individuals associated with asecond company. As a result, salespersons from the first company areprevented by the mail enhancement server 12 to send any emails toindividuals in the second company. This capability of the mailenhancement server 12 can be controlled by a system administrator, forexample.

If the outgoing email is to be processed, then transparent to the userand the recipient, the mail enhancement server 12 edits the outgoingemail to contain a tracking code or mechanism that uniquely identifiesthe outgoing email, the user who originated the outgoing mail, theuser's business association (such as the user's employer) or therecipient, or a combination thereof. Using the tracking code, outgoingemails originated from a single domain or business entity can bemonitored. For example, outgoing emails from individuals within acompany or corporation can be monitored. Alternatively, the trackingcode can also be used to monitor outgoing emails originated fromindividuals respectively associated with a group of related businessentities.

The tracking code can be inserted into the outgoing email in number ofways. For example, any hyperlink(s) to a website associated with theuser are modified to contain this tracking code. The hyperlink can bemodified in a number of ways to include the tracking code. For example,the tracking code can be embedded in or appended to the hyperlink. As aresult, when the recipient clicks through on a modified hyperlink withinthe modified outgoing email to a corresponding website, thecorresponding website which is equipped to monitor the tracking code isthen able to detect that the modified outgoing email has been opened anda click-through from within the modified outgoing email has occurred.

In another example, the mail enhancement server 12 inserts the trackingcode into an image call which, in turn, is inserted into the email. Thisimage call is uniquely associated with the email, specifically, theassociation being with a single recipient of the email, and is directedto the logging server 14. The situation in which the email has multiplerecipients will be further described below. Also, as will be furtherdescribed, when the email is opened, the image call is activated. Uponactivation, the image call is relayed to the logging server 14 toretrieve the corresponding image associated with that image call. Theimage can be, for example, a zero-pixel gif or the user's (or usercompany's) logo. More importantly, since the image call contains thetracking code, the receipt of the tracking code represents an indicationthat the email has been opened.

Optionally, the logging server 14 associates a cookie (or an identifiercontaining identification information) with the recipient of the email.For example, when the logging server 14 receives an image call (therebyindicating that the email has been opened), the corresponding image andthe cookie are concurrently delivered to the recipient. If a cookieassociated with the recipient has been previously sent, then only thecorresponding image is delivered to the recipient. Alternatively, if acookie is already present on a device being used by the recipient butthe cookie is otherwise not associated with the recipient, the loggingserver 14 then can simply establish an association between the cookieand the recipient.

In addition, the logging server 14 can also forward a cookie to therecipient when the recipient clicks on a modified hyperlink in theemail. One situation in which the logging server 14 delivers the cookiein this manner is when the recipient's email client rejects cookies buthis/her browser accepts them.

The cookie is uniquely coded to identify the recipient. It should benoted that the cookie does not identify the recipient per se. Rather,the cookie identifies the recipient's browser or an agent used by therecipient to access the Internet. If the recipient's browser or agent isunder almost exclusive control of the recipient, then the behaviorexhibited by the recipient's browser or agent should closely approximatethe actual behavior of the recipient. As will be further describedbelow, when the recipient visits a website that is equipped to detectand monitor the cookie, the cookie given to the recipient is transmittedby the recipient's browser to the website thereby allowing the websiteto identify the recipient. Since the cookie is stored on the recipient'sbrowser, the recipient's behavior at the website can still be monitoredeven though the recipient did not click through a hyperlink in theemail. As a result, an otherwise anonymous website visit can be reliablyidentified as one belonging to the recipient of the email.

In an alternative embodiment, the mail enhancement server 12, instead ofinserting the tracking code into an outgoing mail, posts the outgoingemail onto the logging server 14 and informs the recipient that theoutgoing email is available at the logging server 14. It should be notedthat alternatively the outgoing email can be posted onto other httplocations for access. Upon the recipient accessing the logging server 14to retrieve the email, the logging server 14 similarly forwards a cookie(or an identifier containing identification information) to therecipient. The cookie can then be used to monitor the email and/orwebsite behavior of the recipient.

As described above, the mail enhancement server 12 can be a Simple MailTransfer Protocol (SMTP) server that is compatible with any combinationof mails servers and email clients. It should be understood that theinsertion of the tracking code and the image call into the email can beperformed at any time prior to its delivery to the recipient.Furthermore, it should be noted that the functionality of the mailenhancement server 12 as described above can be implemented in a numberof different ways. In alternative embodiments, the functionality of themail enhancement server 12 including insertion of the tracking code andimage call can be performed, for example, by the mail server 22associated with the email client 20, a mail relay server, the emailclient 20 itself, a plug-in to the email client 20 or an email clientutility.

The mail enhancement server 12 is also equipped to handle a single emailwith multiple recipients so as to allow each recipient to be monitoredindividually. The mail enhancement server 12 examines the email anddetermines whether the email has multiple recipients. If there aremultiple recipients, the mail enhancement server 12 creates as manycopies of the email as there are recipients. Each copy of the email isthen modified with its own unique tracking code, image call and cookie,as described above. Each copy of the email is treated as if it was anoriginal. The recipient identity fields (such as, “To”, “Cc” and “Bcc”,etc.) for each copy of the email is maintained the same as the original.This is done to allow each recipient to know that the email is alsodelivered to other recipient(s).

After the email is modified to include the tracking code and the imagecall, the mail enhancement server 12 forwards the email to the recipientvia a recipient mail server 24 and sends information regarding thisemail to the logging server 14. The logging server 14 collects andrecords information relating to the email including, for example,identity of the user who sends the email, identity of the emailrecipient, the associated tracking code and image call. Also, thelogging server 14 associates a cookie with the recipient, whereappropriate, when the recipient opens the email signified by theactivation of the image call in the email. Alternatively, the loggingserver 14 can also associate a cookie with the recipient, whereappropriate, when the recipient clicks on a modified hyperlink in theemail. Using the information relating to the email and the cookie, thelogging server 14 can then monitor the behavior of the email recipientin a number of different ways, as further described below.

Optionally, the logging server 14 can examine the information relatingto the email and classify the email based on certain predeterminedcriteria. For example, in an exemplary embodiment where the system 10 isconfigured to handle emails from various mail servers, the emails can beclassified and grouped based on the respective sender domains, recipientdomains or individual senders. This facilitates subsequent reporting ofinformation. For instance, the monitored email and website activities ofrecipients belonging to a specific single domain can be reported, thatis, activities resulting from emails originated from a particularcompany or corporation can be monitored and reported; alternatively,those activities of recipients receiving emails from a specific sendercan also be reported. In another example, the email can be classified as“as definitely not spam” and “possibly spam”. Based on the disclosureand teachings provided herein, a person of ordinary skill in the artwill know of the various ways to classify the emails in accordance withthe present invention. In an alternative embodiment, the presentinvention can also be used to classify incoming emails. For example,incoming emails can be examined to classify external contacts as “knownbusiness contacts” for reporting or for classification as “not spam” forfuture outgoing emails to these contacts.

Optionally, the mail enhancement server 12 can also forward a copy ofthe email to a contact management database that is used to maintain anarchival history of emails sent to various recipients. The contactmanagement database can then associate that copy of the email with theappropriate recipient.

When the recipient opens the email using an email client 26, theassociated image call is activated and sent to the logging server 14. Byexamining the associated image call (which contains the associatedtracking code), the logging server 14 is then able to determine that theemail has been opened. Optionally, the logging server 14 can alsomonitor cookies received at a website to identify their respectiverecipients thereby allowing additional information about theserecipients to be collected. The process of using the cookie to collectadditional information about the recipient will be further describedbelow. With or without the cookie, the logging server 14 can also usethe tracking code to monitor the website browsing behavior exhibited bythe recipient. When the recipient activates or clicks through on one ormore of the hyperlinks in the email, a browser 28 is used to contact therelevant website. Since the tracking code is embedded in or appended tothe hyperlink(s) and if the logging server 14 is given access to monitoractivities on the website, the behavior of the recipient with respect tothe website can be monitored using the associated tracking code. The useof the tracking code allows the recipient's behavior at a website to bemonitored and reported. As mentioned above, the use of the tracking codeembedded in a clicked-on hyperlink also allows a cookie to be associatedwith the recipient. Alternatively, the website can be enhanced toinclude scripts that are able to recognize the tracking code and monitorthe subsequent behavior of the recipient associated with the trackingcode. The website can then report the monitored behavior to the loggingserver 14 which, in turn, can take appropriate actions to report to thesender of the email.

As mentioned above, a cookie can be used to collect information aboutthe recipient of an email. In this context, a cookie can be viewed asunique identification information associated with an agent (e.g., a PC)used by a recipient to access an email. For purposes of illustration andsimplicity, a cookie is described herein as accessing an email. An imageresides on a server and the cookie contacts the server to retrieve theimage using the image call which is included in the email. As a result,when a cookie accesses an email, information can be recorded linking thecookie to that email. Since a recipient primarily uses the same agent toaccess different emails, the cookie belonging to that agent can beassociated with one or more emails. The fact that the cookie isassociated with these different emails does not mean that all the emailsare originally intended for that cookie (or more accurately, therecipient associated with that cookie). For example, the cookie mayaccess an email that is forwarded from that email's original recipient.

An exemplary method of the present invention allows the behavior withrespect to each email to be monitored more precisely. More specifically,according to the exemplary method, the first cookie seen in conjunctionwith an email is marked as a primary cookie for the recipient of thatemail. In other words, when an email is opened for the first time by acookie, that cookie is viewed as the cookie primarily used by therecipient of that email to access his/her emails. This is based on therationale that the intended recipient is almost always the first one toaccess an email.

Subsequent cookies seen in conjunction with that email are considered tobe secondary cookies for that recipient. That is, cookies that access anemail that has already been previously accessed or opened are viewed assecondary for the original recipient of that email. As a result, when acookie accesses a forwarded email, that cookie is considered to besecondary for the original recipient of the forwarded email.

A cookie is considered as primary for only one recipient, whilesecondary cookies can be shared amongst many recipients. In other words,a cookie cannot be both primary and secondary. Once a cookie is accordedprimary status, subsequent secondary events for that cookie including,for example, events related to other recipient's emails, are construedas the recipient associated with that cookie opening an email forwardedfrom another recipient.

The foregoing describes new cookies that access emails. With cookiesthat have already been seen (i.e., they are already accorded either aprimary or secondary status), FIG. 3 is a table illustrating the statetransition of a cookie based on prior cookie state and type of emailevent that took place according to one exemplary method of the presentinvention. As shown in FIG. 3, the first column represents the variousprior cookie states, the second and third columns respectively representthe two types of email events that can be used to classify the emailaccess by a cookie. The recipient that is originally intended to receivethe email is referred to as “Recipient A”; another email recipient isreferred to as “Recipient B”; and the cookie accessing the email isreferred to as “Cookie C”. As will be further described below, when acookie accesses an email, the current state of the cookie and the typeof email event associated with that email access are used to determinethe new state of the cookie according to the state transition tableshown in FIG. 3. Information relating to the new state of the cookie(i.e., recipient information) can then be reported to the sender of theemail.

Referring to FIG. 3, the first row illustrates the situation describedabove when an email intended for Recipient A is accessed by Cookie Cthat is new. A new cookie means that this cookie has not been seen orrecorded before. There are two possible outcomes depending on how theemail access is classified. First, if the email to be accessed has notbeen previously accessed (i.e., the email is to be accessed for thefirst time by Cookie C), then Cookie C is accorded a primary status withrespect to Recipient A. That is, Cookie C is considered to be an agentused primarily by Recipient A to access his/her emails. This is based onthe rationale that the first access to an email to Recipient A is likelyto be performed by a cookie that is in fact representative of RecipientA. Alternatively, if the email to be accessed has already beenpreviously accessed, then Cookie C is accorded a secondary status withrespect to Recipient A. That is, Cookie C is considered to be an agentthat has received the email originally intended for Recipient A, butwhich may represent either Recipient A or another individual to whom Ahas forwarded the email. For example, the email that was originallyintended for Recipient A has been forwarded by Recipient A to Cookie C.The primary and secondary status can be viewed as two differentconfidence levels with respect to the association between Recipient Aand Cookie C. With the primary status, it can be stated with relativelyhigh confidence that Cookie C is an agent used primarily by Recipient Ato access his/her emails; and, conversely, with the secondary status, itcan be interpreted that Cookie C is not an agent used primarily byRecipient A to access his/her emails but Cookie C is possibly an agentthat has received forwarded emails originally intended for Recipient A.

The second row illustrates the situation where Cookie C accesses anemail intended for Recipient A and the current status of Cookie C showsit as being secondary with respect to Recipient A. If the email to beaccessed has not been previously accessed (i.e., the email is to beaccessed for the first time by Cookie C), then the status of Cookie C isupdated to primary with respect to Recipient A. This provides for thesituation in which Recipient A uses two agents to access his/her emails.One agent is often used by Recipient A to open emails first and thesecond agent is used by Recipient A to subsequently access alreadyopened emails. However, occasionally, the second agent is used byRecipient A to open some emails first. The foregoing allows the secondagent to be also identified as an agent linked to Recipient A foraccessing his/her emails. Alternatively, if the email to be accessed hasalready been accessed, then the status of Cookie C remains the same,i.e., it stays as secondary with respect to Recipient A. In other words,Cookie C continues to be construed as having received forwarded emailsoriginally intended for Recipient A.

The third row illustrates the situation where Cookie C accesses anotheremail intended for Recipient A and the current status of Cookie C showsit as being primary with respect to Recipient A. In this situation, noaction is to be taken with respect to the status of the Cookie C,regardless of the type of email access performed. This is because CookieC has already been accorded a primary status, therefore, there is nofurther need to determine the nature of the association between Cookie Cand Recipient A.

The fourth row illustrates a situation where the current status ofCookie C shows it as being secondary with respect to Recipient B andCookie C accesses an email intended for Recipient A. Similarly, asdescribed above, if the email to be accessed has not been previouslyaccessed (i.e., the email is to be accessed for the first time by CookieC), then the status of Cookie C is updated to primary with respect toRecipient A. Again, this is based on the rationale that if Cookie Crepresents Recipient A, Cookie C is likely to be first to access anemail intended for Recipient A. Cookie C continues to maintain itssecondary status with respect to Recipient B. Alternatively, if theemail to be accessed has already been accessed, then the status ofCookie C is updated to secondary with respect to Recipient A also. Inother words, the situation can be interpreted as Cookie C receivingforwarded emails originally intended for Recipient A. Likewise, Cookie Ccontinues to maintain its secondary status with respect to Recipient B.

The fifth row illustrates a situation where the current status of CookieC shows it as being primary with respect to Recipient B and Cookie Cattempts to access an email intended for Recipient A. With Cookie Cshowing a primary status with respect to Recipient B, it means thatCookie C has already been determined to be an agent used primarily byRecipient B to access his/her emails. If the email intended forRecipient A and to be accessed by Cookie C has never been previouslyaccessed, then it could possibly mean that Cookie C is an agent usedprimarily by both Recipients A and B to access their respective emails.To eliminate confusion and resolve this situation, the followingtie-breaking rules can be employed to decide between Recipients A and Bwho should have Cookie C being associated as primary. In the situationwhere Recipients A and B both have the same number of primary events(i.e., number of times emails being opened for the first time), thefollowing rule can be applied—whoever does not have a cookie withprimary status gets to claim Cookie C as its primary cookie. In otherwords, if Recipient A does not yet have a primary cookie and Recipient Balready has one, then Cookie C is updated to primary with respect toRecipient A; otherwise, status of Cookie C remains the same, i.e.,Cookie C continues to maintain its primary status with respect toRecipient B. In the situation where Recipients A and B do not have thesame number of primary events, a voting structure can be applied—whoeverhas the higher number of primary events gets Cookie C. This is based onthe rationale that if Cookie C is used more often by Recipient A toaccess first-time emails when compared to Recipient B, then Recipient Ashould get Cookie C as its primary cookie. Alternatively, if the emailto be accessed has already been accessed, then the status of Cookie C isupdated to secondary with respect to Recipient A. In other words, thesituation can be interpreted as Cookie C accessing a forwarded emailoriginally intended for Recipient A, i.e., the email originally intendedfor Recipient A has been forwarded to Recipient B and is now beingaccessed by Recipient B via Cookie C.

Using the logic as described above, the system 10 is able to classify anemail open event by a recipient to provide various types of informationwith respect to the email and the recipient opening the email. Suchinformation includes, for example, confidence levels representingindications as to the estimated relationship between the email and therecipient opening the email, such as, whether the recipient opening theemail is an intended recipient of that email or whether the email hasbeen forwarded to the recipient by the intended recipient of that email.Such information can be displayed in different fashions or formatsdepending on the classification.

Also, such information can also include, for example, confidence levelsrepresenting indications as to the estimated relationship between acookie and a recipient of the email, such as, whether the cookie isassociated with the recipient in that the cookie is used primarily bythe recipient to access his/her emails. This information can bedisplayed at a website in the following manner. When a cookie contacts awebsite that is capable of monitoring the cookie, relevant informationrelating to that cookie, such as, the cookie-recipient association, canbe queried to display that cookie's behavior at that website withrespect to the recipient associated with that cookie.

Furthermore, the foregoing logic described in connection with the cookiewhen an email is accessed can also take into account website behaviorincurred as a result of a click-through of a modified hyperlink in anemail as described above. For example, a hyperlink having a trackingcode is clicked through to the pertinent website. The tracking code canbe used to identify a specific email. The click-through is treated as ifit was a secondary email open for that email, i.e., the email has beenaccessed before. The same logic as described above is then invoked toupdate the information relating to the cookie, such as, thecookie-recipient association.

Based on the disclosure and teachings provided herein, it will be clearto a person of ordinary skill in the art that the information relatingto cookies as described above can be used to monitor and determineapproximate email behavior as well as the corresponding web behavior ofcookies. Applying the foregoing to typical situations, a cookie withprimary status with respect to a particular recipient indicates thatthat cookie is more likely than not used primarily by the particularrecipient to access his/her emails, and a cookie with secondary statuswith respect to one or more recipients indicates that that cookie ismore likely than not receiving forwarded emails from the one or morerecipients. Such cookie information can be reported to senders of emailsfor evaluation to determine the effectiveness of their emails.

Referring back to FIG. 1, upon the opening of the email or thecommencement of a website session activated from one of the hyperlinksin the email, the logging server 14 collects the relevant information ordata and forwards it to the database 18. The database 18, in turn,generates and sends a real-time alert to the sender alerting the senderof pertinent recipient activities. It should be understood that theactions of the database 18 is controlled by control logic.

Alerts can be provided in a number of different ways. For example, analert can be delivered via an email to the sender. The emailrepresenting the alert may directly include pertinent recipientinformation; or alternatively, the email may contain hyperlinks to auser interface 30 provided by the system 10. The user interface 30 ismanaged by the application server 16. Relevant recipient information canbe displayed by the user interface 30. FIG. 2 is an exemplary embodimentof the user interface in accordance with the present invention. The userinterface 30 provides the user or sender with up-to-the-secondinformation across all recipients of his/her emails. Optionally, theuser interface 30 allows the recipient information to be displayed orreported differently. For example, information for one group ofrecipients can be displayed in one manner, and information for anothergroup of recipients can be displayed in a second manner. Furthermore,the user interface 30 can also allow the user to adjust and customizethe reporting patterns of different recipients. For example, a user candecide to receive alerts for selected recipients.

In an exemplary implementation, the system 10 communicates over standardInternet protocols (SMTP & HTTP) and are compliant with well knowncorporate standards and firewall practices.

The system 10 including its various components as described aboverepresents only one exemplary embodiment of the present invention and isprovided for illustrative purposes only. It should be understood thatthe various functionality of the system 10 as described above can beimplemented using a number of different component configurations, in anintegrated or non-integrated manner. For example, in an alternativeembodiment, the collective functionality of the mail enhancement server12 and the logging server 14 can be provided by a single server.Furthermore, it should also be understood that the present invention canbe realized using control logic implemented in software, hardware or acombination of both, in a modular or integrated manner. Based on thedisclosure and teachings provided herein, a person of ordinary skill inthe art will know of other ways and/or methods to implement the presentinvention.

In an exemplary application, the system 10 can be deployed to complementa sales force automation system of a company. As described above, thesystem 10 can be used to monitor email behavior attributed to emailsoriginated from a single business entity. It should be noted that asingle business entity may have one or more related Internet domains.The system 10 enables salespersons to monitor their business contactsand/or customers and improve productivity. For example, as describedabove, using a tracking code and an image call that specificallyidentify each email, the email behavior attributed to emails originatedfrom Company X can be monitored. Emails sent by the salespersons ofCompany X can be monitored to determine the respective responses of therecipients, such as, number and identity of recipients opening and/orforwarding their emails. Furthermore, the system 10 allows websitebehavior of the recipients to be monitored. For example, an emailoriginated from Company X may contain a hyperlink to Company X'swebsite, or any website associated with Company X. Such hyperlinkcontains a tracking code that allows Company X's website to identifythat email and determine that the recipient reached Company X's websiteby clicking through on the hyperlink from within that email. Also, anemail originated from Company X has an associated cookie that uniquelyidentifies the recipient of that email. When that cookie visits CompanyX's website (where it is considered to be a first party cookie), thewebsite behavior of that cookie can be monitored by Company X's websiteto obtain the approximate website behavior of the recipient. Moreover,the system 10 provides real-time alerts. Salespeople are promptlyalerted when emails they have sent are opened and/or forwarded, and whentheir contacts begin browsing the corporate website. This functionalityapplies to one-to-one correspondence as well as sales campaigns sent toa large distribution list.

The system 10 also provides automated contact management. The system 10can update a contact database or a customer relations management system.For example, contact records are created and updated automatically foreach contact to whom the salesperson sends an email.

The system 10 further provide behavior reports. Salespeople have accessto reports specifying when their contacts open or forward their emails,as well as detailing activities conducted on the corporate website, suchas, pages viewed etc. Such reports may also include web behavioranalysis allowing salespeople to know exactly what pages of thecorporate website each prospect visited and for how long.

In another exemplary application, the system 10 can also be deployed ina cross-promotional or partnering arrangement between two companies,Company X and Company Y. For example, emails originated from Company Xmay contain corresponding hyperlinks to its own website as well as toCompany Y's website. Similarly, the hyperlinks include a tracking codethat identifies each email originated from Company X. When the recipientof the email clicks through on the hyperlink associated with Company Y'swebsite, the tracking code can be used to identify that email anddetermine that the click-through came from an email originated fromCompany X. Likewise, each email originated from Company X also has anassociated cookie that uniquely identifies the recipient of that email.When that cookie visits Company Y's website, that cookie can beidentified as being associated with an email originated from Company Xand the website behavior of that cookie at Company Y's website can bemonitored to obtain the approximate website behavior of the recipient.The website behavior at Company Y's website resulting from the emailoriginated from Company X can be reported to both Company X and CompanyY. As a result, Company Y is not only able to obtain informationrelating to the website behavior of certain individuals but is also ableto determine Company X's contribution in directing traffic to CompanyY's website.

Based on the disclosure and teachings provided herein, a person ofordinary skill in the art will know of other ways and/or methods todeploy the present invention in other applications and contexts.

It is understood that the examples and embodiments described herein arefor illustrative purposes only and that various modifications or changesin light thereof will be suggested to persons skilled in the art and areto be included within the spirit and purview of this application andscope of the appended claims. All publications, patents, and patentapplications cited herein are hereby incorporated by reference for allpurposes in their entirety.

1. A system for monitoring email behavior of an email recipient, theemail recipient being associated with a first email domain, comprising:control logic configured to modify an outgoing email addressed to theemail recipient and sent using an email client configured to allow asender to send the outgoing email and access one or more personal orcorporate emails belonging to the sender, wherein the control logicconfigured to modify the outgoing email is further configured to editthe outgoing email to include a tracking code, wherein the tracking codeis uniquely associated with the outgoing email, the email recipient, thesender or the business entity associated with the sender or acombination thereof; and control logic configured to monitor the emailbehavior of the email recipient with respect to the modified outgoingemail; wherein the monitoring of the email behavior is performed withinan Internet domain related to the sender or a business entity associatedwith the sender; wherein the first email domain and the Internet domainrelated to the sender or the business entity associated with the senderare different; wherein upon the email recipient opening the modifiedoutgoing email, a connection to a remote server is made in which thetracking code is transmitted to the remote server; wherein theconnection to the remote server is an image call inserted into themodified outgoing email; wherein the tracking code is embedded withinthe image call; and wherein upon receipt of the tracking code by theremote server, the remote server is able to determine whether themodified outgoing email has been opened by the email recipient.
 2. Thesystem of claim 1 wherein the control logic configured to modify theoutgoing email is embedded within a mail server, a mail relay server ora mail enhancement server.
 3. The system of claim 1 wherein the controllogic configured to modify the outgoing email is embedded within theemail client, a plug-in to the email client or an email client utility.4. The system of claim 1 further comprising: control logic configured toexamine the outgoing email to determine if there is a plurality ofrecipients; and control logic configured to generate a copy of theoutgoing email for each recipient if it is determined that there is aplurality of recipients; and wherein if one or more copies of theoutgoing email are generated for the plurality of recipients, each copyof the outgoing email is modified to allow email behavior of thecorresponding recipient to be monitored.
 5. The system of claim 1further comprising: control logic configured to determine whether theoutgoing email is to be processed before making any modifications. 6.The system of claim 1 further comprising: control logic configured toevaluate the outgoing email in accordance with an opt-out policy todetermine whether or not if any modification is to be made to theoutgoing email.
 7. The system of claim 1 further comprising: a userinterface configured to allow the sender to review monitored emailbehavior of the email recipient.
 8. The system of claim 1 furthercomprising: control logic configured to update a contact database withinformation relating to the email recipient.
 9. A system for monitoringemail behavior of an email recipient, the email recipient beingassociated with a first email domain, comprising: control logicconfigured to modify an outgoing email addressed to the email recipientand sent using an email client configured to allow a sender to send theoutgoing email and access one or more personal or corporate emailsbelonging to the sender, wherein the control logic configured to modifythe outgoing email is further configured to edit the outgoing email toinclude a tracking code, wherein the tracking code is uniquelyassociated with the outgoing email, the email recipient, the sender orthe business entity associated with the sender or a combination thereof;and control logic configured to monitor the email behavior of the emailrecipient with respect to the modified outgoing email; wherein themonitoring of the email behavior is performed within an Internet domainrelated to the sender or a business entity associated with the sender;wherein the first email domain and the Internet domain related to thesender or the business entity associated with the sender are different;wherein upon the email recipient opening the modified outgoing email, aconnection to a remote server is made in which the tracking code istransmitted to the remote server; wherein the connection to the remoteserver is established via a hyperlink in the modified outgoing email;wherein the tracking code is embedded within the hyperlink; and whereinupon receipt of the tracking code by the remote server, the remoteserver is able to determine whether the modified outgoing email has beenopened by the email recipient.
 10. A system for monitoring emailbehavior of an email recipient, the email recipient being associatedwith a first email domain, comprising: control logic configured tomodify an outgoing email addressed to the email recipient and sent usingan email client configured to allow a sender to send the outgoing emailand access one or more personal or corporate emails belonging to thesender, wherein the control logic configured to modify the outgoingemail is further configured to post the modified outgoing email to aremote location and inform the email recipient to access the modifiedoutgoing email at the remote location; and control logic configured tomonitor the email behavior of the email recipient with respect to themodified outgoing email; wherein the monitoring of the email behavior isperformed within an Internet domain related to the sender or a businessentity associated with the sender; and wherein the first email domainand the Internet domain related to the sender or the business entityassociated with the sender are different; wherein upon the emailrecipient contacting the remote location to access the modified outgoingemail, an identifier is associated with the email recipient or an agentof the email recipient; and wherein the identifier is uniquelyassociated with the email recipient or its agent and is used inconnection with monitoring the email behavior of the email recipient.11. The system of claim 10 wherein the association between theidentifier and the email recipient or its agent is established by theremote location transmitting the identifier to the agent being used bythe email recipient to establish contact with the remote location.
 12. Asystem for monitoring email behavior of email recipients, each emailrecipient being associated with an email domain, comprising: a pluralityof email clients configured for use by a plurality of correspondingsenders to send a plurality of outgoing emails and access a plurality ofincoming personal or corporate emails, the plurality of sendersrespectively having a plurality of email accounts for sending theplurality of outgoing emails and accessing the plurality of incomingpersonal or corporate emails, the plurality of email accounts beingassociated with an Internet domain or a business entity associated withthe plurality of senders; control logic configured to modify theplurality of outgoing emails, wherein the control logic configured tomodify the plurality of outgoing emails is further configured to editone or more of the plurality of outgoing emails to each include atracking code, wherein each tracking code is uniquely associated withits corresponding modified outgoing email, recipient, sender or abusiness entity associated with the sender or a combination thereof; andcontrol logic configured to monitor email behavior of correspondingrecipients with respect to the plurality of modified outgoing emails;wherein the monitoring of the email behavior is performed within theInternet domain, and wherein the Internet domain is related to theplurality of senders or the business entity associated with theplurality of senders; wherein the corresponding email domains of theemail recipients are different from the Internet domain that is relatedto the plurality of senders or the business entity associated with theplurality of senders; wherein upon a recipient opening a correspondingmodified outgoing email, a connection to a remote server is made inwhich the associated tracking code is transmitted to the remote server;wherein the connection to the remote sever is an image call insertedinto the corresponding modified outgoing email; wherein the associatedtracking code is embedded within the image call; and wherein uponreceipt of the associated tracking code by the remote server, the remoteserver is able to determine whether the corresponding modified outgoingemail has been opened by the recipient.
 13. The system of claim 12wherein the control configured to modify the plurality of outgoingemails is embedded within a mail server, a mail relay server or a mailenhancement server.
 14. The system of claim 12 wherein the control logicconfigured to modify the plurality of outgoing emails is embedded withinan email client, a plug-in to the email client or an email clientutility.
 15. The system of claim 12 further comprising: control logicconfigured to examine one or more of the plurality of outgoing emails todetermine if each examined outgoing email has a plurality of recipients;and control logic configured to, for each examined outgoing email thatis determined to have a plurality of recipients, generate a copy of theexamined outgoing email for each recipient; and wherein for eachexamined outgoing email, if one or more copies of the examined outgoingemail are generated for the plurality of recipients, each copy of theexamined outgoing email is modified to allow email behavior of thecorresponding recipient to be monitored.
 16. The system of claim 12further comprising: control logic to determine whether one or more ofthe plurality of outgoing emails are to be processed before making anymodifications.
 17. The system of claim 12 further comprising: controllogic configured to evaluate one or more of the plurality of outgoingemails in accordance with an opt-out policy to determine whether or notif any modification is to be made.
 18. The system of claim 12 furthercomprising: a user interface configured to allow the plurality ofsenders to review monitored email behavior of the correspondingrecipients.
 19. The system of claim 12 further comprising: control logicconfigured to update a contact database with information relating to oneor more of the corresponding recipients of the plurality of modifiedoutgoing emails.
 20. A system for monitoring email behavior of emailrecipients, each email recipient being associated with an email domain,comprising: a plurality of email clients configured for use by aplurality of corresponding senders to send a plurality of outgoingemails and access a plurality of incoming personal or corporate emails,the plurality of senders respectively having a plurality of emailaccounts for sending the plurality of outgoing emails and accessing theplurality of incoming personal or corporate emails, the plurality ofemail accounts being associated with an Internet domain or a businessentity associated with the plurality of senders; control logicconfigured to modify the plurality of outgoing emails, wherein thecontrol logic configured to modify the plurality of outgoing emails isfurther configured to edit one or more of the plurality of outgoingemails to each include a tracking code, wherein each tracking code isuniquely associated with its corresponding modified outgoing email,recipient, sender or a business entity associated with the sender or acombination thereof; and control logic configured to monitor emailbehavior of corresponding recipients with respect to the plurality ofmodified outgoing emails; wherein the monitoring of the email behavioris performed within the Internet domain, and wherein the Internet domainis related to the plurality of senders or the business entity associatedwith the plurality of senders; wherein the corresponding email domainsof the email recipients are different from the Internet domain that isrelated to the plurality of senders or the business entity associatedwith the plurality of senders; wherein upon a recipient opening acorresponding modified outgoing email, a connection to a remote serveris made in which the associated tracking code is transmitted to theremote server; wherein the connection to the remote server isestablished via a hyperlink in the corresponding modified outgoingemail; wherein the associated tracking code is embedded within thehyperlink; and wherein upon receipt of the associated tracking code bythe remote server, the remote server is able to determine whether thecorresponding modified outgoing email has been opened by the recipient.21. A system for monitoring email behavior of email recipients, eachemail recipient being associated with an email domain, comprising: aplurality of email clients configured for use by a plurality ofcorresponding senders to send a plurality of outgoing emails and accessa plurality of incoming personal or corporate emails, the plurality ofsenders respectively having a plurality of email accounts for sendingthe plurality of outgoing emails and accessing the plurality of incomingpersonal or corporate emails, the plurality of email accounts beingassociated with an Internet domain or a business entity associated withthe plurality of senders; control logic configured to modify theplurality of outgoing emails, wherein the control logic configured tomodify the outgoing emails is further configured to post the modifiedoutgoing emails to a remote location and inform the correspondingrecipients to access their respective modified outgoing emails at theremote location; and control logic configured to monitor email behaviorof corresponding recipients with respect to the plurality of modifiedoutgoing emails; wherein the monitoring of the email behavior isperformed within the Internet domain, and wherein the Internet domain isrelated to the plurality of senders or the business entity associatedwith the plurality of senders; wherein the corresponding email domainsof the email recipients are different from the Internet domain that isrelated to the plurality of senders or the business entity associatedwith the plurality of senders; wherein upon a recipient contacting theremote location to access the corresponding modified outgoing email, anidentifier is associated with the recipient or an agent of therecipient; and wherein the identifier is uniquely associated with therecipient or its agent and is used in connection with monitoring theemail behavior of the recipient.
 22. The system of claim 21 wherein theassociation between the identifier and the email recipient or its agentis established by the remote location transmitting the identifier to theagent being used by the email recipient to establish contact with theremote location.
 23. A method for monitoring email behavior of an emailrecipient, the email recipient being associated with a first emaildomain, comprising: modifying an outgoing email addressed to the emailrecipient and sent using an email client configured to allow a sender tosend the outgoing email and access one or more personal or corporateemails belonging to the sender, wherein modifying includes editing theoutgoing email to include a tracking code, wherein the tracking code isuniquely associated with the outgoing email, the email recipient, thesender or the business entity associated with the sender or acombination thereof; monitoring the email behavior of the emailrecipient with respect to the modified outgoing email; wherein themonitoring of the email behavior is performed within an Internet domainrelated to the sender or a business entity associated with the sender;and wherein the first email domain and the Internet domain related tothe sender or the business entity associated with the sender aredifferent; and upon the email recipient opening the modified outgoingemail, establishing a connection to a remote server in which thetracking code is transmitted to the remote server, wherein theconnection to the remote server is an image call inserted into themodified outgoing email, and wherein the tracking code is embeddedwithin the image call and upon receipt of the tracking code by theremote server, determining whether the modified outgoing email has beenopened by the email recipient.
 24. A mail server, a mail relay server ora mail enhancement server utilizing the method of claim
 23. 25. An emailclient, a plug-in to the email client or an email client utilityutilizing the method of claim
 23. 26. The method of claim 23 furthercomprising: examining the outgoing email to determine if there is aplurality of recipients; and generating a copy of the outgoing email foreach recipient if it is determined that there is a plurality ofrecipients; and if one or more copies of the outgoing email aregenerated for the plurality of recipients, modifying each copy of theoutgoing email to allow email behavior of the corresponding recipient tobe monitored.
 27. The method of claim 23 further comprising: determiningwhether the outgoing email is to be processed before making anymodifications.
 28. The method of claim 23 further comprising: evaluatingthe outgoing email in accordance with an opt-out policy to determinewhether or not if any modification is to be made to the outgoing email.29. The method of claim 23 further comprising: providing a userinterface configured to allow the sender to review monitored emailbehavior of the email recipient.
 30. The method of claim 23 furthercomprising: updating a contact database with information relating to theemail recipient.
 31. A method for monitoring email behavior of an emailrecipient, the email recipient being associated with a first emaildomain, comprising: modifying an outgoing email addressed to the emailrecipient and sent using an email client configured to allow a sender tosend the outgoing email and access one or more personal or corporateemails belonging to the sender, wherein modifying includes editing theoutgoing email to include a tracking code, wherein the tracking code isuniquely associated with the outgoing email, the email recipient, thesender or the business entity associated with the sender or acombination thereof; monitoring the email behavior of the emailrecipient with respect to the modified outgoing email; wherein themonitoring of the email behavior is performed within an Internet domainrelated to the sender or a business entity associated with the sender;and wherein the first email domain and the Internet domain related tothe sender or the business entity associated with the sender aredifferent; and upon the email recipient opening the modified outgoingemail, establishing a connection to a remote server in which thetracking code is transmitted to the remote server; wherein theconnection to the remote server is established via a hyperlink in themodified outgoing email; and wherein the tracking code is embeddedwithin the hyperlink; and upon receipt of the tracking code by theremote server, determining whether the modified outgoing email has beenopened by the email recipient.
 32. A method for monitoring emailbehavior of an email recipient, the email recipient being associatedwith a first email domain, comprising; modifying an outgoing emailaddressed to the email recipient and sent using an email clientconfigured to allow a sender to send the outgoing email and access oneor more personal or corporate emails belonging to the sender; andmonitoring the email behavior of the email recipient with respect to themodified outgoing email, wherein the monitoring of the email behavior isperformed within an Internet domain related to the sender or a businessentity associated with the sender, and wherein the first email domainand the Internet domain related to the sender or the business entityassociated with the sender are different; and posting the modifiedoutgoing email to a remote location and informing the email recipient toaccess the modified outgoing email at the remote location; and upon theemail recipient contacting the remote location to access the modifiedoutgoing email, associating an identifier with the email recipient or anagent of the email recipient; wherein the identifier is uniquelyassociated with the email recipient or its agent and is used inconnection with monitoring the website behavior of the email recipient.33. The method of claim 32 wherein the association between theidentifier and the email recipient or its agent is established by theremote location transmitting the identifier to the agent being used bythe email recipient to establish contact with the remote location.
 34. Amethod for monitoring email behavior of email recipients, each emailrecipient being associated with an email domain, comprising: modifying aplurality of outgoing emails respectively sent by a plurality of emailclients, the plurality of email clients configured for use by aplurality of corresponding senders to send the plurality of outgoingemails and access a plurality of incoming personal or corporate emails,the plurality of senders respectively having a plurality of emailaccounts for sending the plurality of outgoing emails and accessing theplurality of incoming personal or corporate emails, the plurality ofemail accounts being associated with an Internet domain or a businessentity associated with the plurality of senders; wherein modifying theplurality of outgoing emails further includes editing one or more of theplurality of outgoing emails to each include a tracking code, whereineach tracking code is uniquely associated with its correspondingmodified outgoing email, recipient, sender or a business entityassociated with the sender or a combination thereof; monitoring emailbehavior of corresponding recipients with respect to the plurality ofmodified outgoing emails; wherein the monitoring of the email behavioris performed within the Internet domain, and wherein the Internet domainis related to the plurality of senders or the business entity associatedwith the plurality of senders; and wherein the corresponding emaildomains of the email recipients are different from the Internet domainthat is related to the plurality of senders or the business entityassociated with the plurality of senders; upon a recipient opening acorresponding modified outgoing email, establishing a connection to aremote server in which the associated tracking code is transmitted tothe remote server, wherein the connection to the remote server is animage call inserted into the corresponding modified outgoing email,wherein the associated tracking code is embedded within the image call;and upon receipt of the associated tracking code by the remote server,determining whether the corresponding modified outgoing email has beenopened by the recipient.
 35. A mail server, a mail relay server or amail enhancement server utilizing the method of claim
 34. 36. An emailclient, a plug-in to the email client or an email client utilityutilizing the method of claim
 34. 37. The method of claim 34 furthercomprising: examining one or more of the plurality of outgoing emails todetermine if each examined outgoing email has a plurality of recipients;for each examined outgoing email that is determined to have a pluralityof recipients, generating a copy of the examined outgoing email for eachrecipient; and for each examined outgoing email, if one or more copiesof the examined outgoing email are generated for the plurality ofrecipients, modifying each copy of the examined outgoing email to allowemail behavior of the corresponding recipient to be monitored.
 38. Themethod of claim 34 further comprising: determining whether one or moreof the plurality of outgoing emails are to be processed before makingany modifications.
 39. The method of claim 34 further comprising:evaluating one or more of the plurality of outgoing emails in accordancewith an opt-out policy to determine whether or not if any modificationis to be made.
 40. The method of claim 34 further comprising: providinga user interface configured to allow the plurality of senders to reviewmonitored email behavior of the corresponding recipients.
 41. The methodof claim 34 further comprising: updating a contact database withinformation relating to one or more of the corresponding recipients ofthe plurality of modified outgoing emails.
 42. A method for monitoringemail behavior of email recipients, each email recipient beingassociated with an email domain, comprising: modifying a plurality ofoutgoing emails respectively sent by a plurality of email clients, theplurality of email clients configured for use by a plurality ofcorresponding senders to send the plurality of outgoing emails andaccess a plurality of incoming personal or corporate emails, theplurality of senders respectively having a plurality of email accountsfor sending the plurality of outgoing emails and accessing the pluralityof incoming personal or corporate emails, the plurality of emailaccounts being associated with an Internet domain or a business entityassociated with the plurality of senders; wherein modifying theplurality of outgoing emails further includes editing one or more of theplurality of outgoing emails to each include a tracking code, whereineach tracking code is uniquely associated with its correspondingmodified outgoing email, recipient, sender or a business entityassociated with the sender or a combination thereof; monitoring emailbehavior of corresponding recipients with respect to the plurality ofmodified outgoing emails; wherein the monitoring of the email behavioris performed within the Internet domain, and wherein the Internet domainis related to the plurality of senders or the business entity associatedwith the plurality of senders; and wherein the corresponding emaildomains of the email recipients are different from the Internet domainthat is related to the plurality of senders or the business entityassociated with the plurality of senders; upon a recipient opening acorresponding modified outgoing email, establishing a connection to aremote server in which the associated tracking code is transmitted tothe remote server, wherein the connection to the remote server isestablished via a hyperlink in the corresponding modified outgoingemail; and wherein the associated tracking code is embedded within thehyperlink; and upon receipt of the associated tracking code by theremote server, determining whether the corresponding modified outgoingemail has been opened by the recipient.
 43. A method for monitoringemail behavior of email recipients, each email recipient beingassociated with an email domain, comprising: modifying a plurality ofoutgoing emails respectively sent by a plurality of email clients, theplurality of email clients configured for use by a plurality ofcorresponding senders to send the plurality of outgoing emails andaccess a plurality of incoming personal or corporate emails, theplurality of senders respectively having a plurality of email accountsfor sending the plurality of outgoing emails and accessing the pluralityof incoming personal or corporate emails, the plurality of emailaccounts being associated with an Internet domain or a business entityassociated with the plurality of senders; monitoring email behavior ofcorresponding recipients with respect to the plurality of modifiedoutgoing emails, wherein the monitoring of the email behavior isperformed within the Internet domain, and wherein the Internet domain isrelated to the plurality of senders or the business entity associatedwith the plurality of senders, and wherein the corresponding emaildomains of the email recipients are different from the Internet domainthat is related to the plurality of senders or the business entityassociated with the plurality of senders; posting the modified outgoingemails to a remote location and informing the corresponding recipientsto access their respective modified outgoing emails at the remotelocation; and upon a recipient contacting the remote location to accessthe corresponding modified outgoing email, associating an identifierwith the recipient or an agent of the recipient; wherein the identifieris uniquely associated with the recipient or its agent and is used inconnection with monitoring the email behavior of the recipient.
 44. Themethod of claim 43 wherein the association between the identifier andthe recipient or its agent is established by the remote locationtransmitting the identifier to the agent being used by the recipient toestablish contact with the remote location.