We occasionally may need to make changes to our Services without notice. Though we do our best to make the Services operate smoothly, like in any other service or software, we cannot guarantee that Loop will always run uninterrupted, or be immune from errors or bugs. In those cases, we will do all we can to fix things immediately but cannot guarantee this will always be possible.
Your account ("Account") is automatically created when you sign in to our Services by using the log-in details to your existing email account (i.e. email and password). The best way to keep your account secure is to make sure that no other person uses your Account or knows your password. Our Services are designed for work and by using our Services, you are representing that you are over 13 and that you have the legal ability to use our Services.
We collect, store and use the following types of information and data: 1. Personally identifiable information (PII); 2. Non-personal information (NPI); 3. Your private email data including metadata and email content. Personally identifiable information Personally identifiable information (PII) is information that can be used to identify an individual person and includes information such as IP addresses, Account details, emails addresses, names, contact lists and all similar information retrieved by any other email client when accessing public email exchange information.
We collect, store, and use PII for the sole purpose of being able to deliver our Services to you.
Accounts are added to Loop through OAuth 2.0 protocol where possible. OAuth 2.0 is an open standard authorization protocol that allows third parties to access user data without needing to know or store user passwords. Also, OAuth 2.0 authentication allows users to revoke app access at any moment in app settings. If a user revokes Loop app access, our Services do not have access to any of the user data anymore.
Where OAuth 2.0 is not supported, we keep your account username and password secure in our Services. To ensure the greatest possible levels of security, user passwords are never stored in our databases. For secure storage of user credentials, we use a certified secure storage service called MS Azure Key Vault, with special purpose Hardware Security Modules (HSMs) accessed using a 2048 bit digital certificate. We then use the authorization provided to download your emails to our cloud servers and push to your device.
We use Amazon Web Services (AWS) infrastructure to store your data. Apart from AWS security policies, we take a number of measures to ensure that your data is never read by anyone else. We ensure that all transmission is secured with HTTPS so that no one else can access your data. For this, we use a strong protocol (TLS 1.2), a strong key exchange (ECDHE_RSA), and a strong cipher (AES_128_GCM) with industry standard 256 bit encryption using TLS/SSL (HTTPS). Non-personal information Non-personal information (NPI) is information which cannot be used to identify an individual person, such as technical information about your device, location, time zone, activity usage, performance metrics, configuration settings, anonymous behavioral information and other aggregated information.
Additionally, whenever you interact with our Services, we automatically receive and record ‘cookie’ information from your browser or device. ‘Cookies’ are identifiers we transfer to your browser or device that allow us to recognize your browser or device and tell us how and when pages and features in our Services are visited and by how many people. You may be able to change the preferences on your browser or device to prevent or limit these, but this may prevent you from taking advantage of some of our features.
We use NPI to customize content for you and to provide the functionality of the Services, such as email follow-ups and categorization, based on your usage patterns. We also use NPI in order to improve your user experience when using our Services. We may use internal and third party processing and analytic systems to analyze user experience, behavior and trends with NPI.
Private emails (message headers, subject, body, attachments and other metadata) are stored by Loop's cloud service and some of that content is stored locally on your device. They are used exclusively to provide you with our Services.
You can request the deletion of your data from Loop by writing to firstname.lastname@example.org. Email content stored locally on your device can be removed by deleting the Loop apps. Access to data Except as described elsewhere in these Terms, no Loop employees, contractors, agents or other personnel (collectively ‘Loop personnel’) will access or use your data in a manner that would identify you as an individual.
We have strict controls and processes in place which are designed to limit access to and use of your data by Loop personnel. We have technical controls and audit policies in place which are designed to ensure that any access to such data by Loop personnel is logged. All Loop personnel who may have or require access to your data as part of their services to Loop are bound to our policies regarding your data and we treat the privacy and security of your data with utmost respect.
Loop personnel may need to access your data in connection with troubleshooting or responding to a problem, system maintenance or upgrades, or other activities in the ordinary course of operating our Services. In most cases, we will notify you and ask for your permission prior to giving Loop personnel permission to access your data. However, we may access and disclose certain data if we have a good-faith belief that such access, use, preservation or disclosure of your data is reasonably necessary to:
Loop considers the security, confidentiality and availability of your information to be of the upmost importance. It is policy that manifests itself through all aspects of the delivery of our Services, including the infrastructure our Services run on and all Loop personnel. Loop’s approach to information security management is based on adherence to best practice methodologies such as ISO 27001, regular third-party penetration testing and close monitoring of customer security requirements.
Loop is a web, mobile & desktop email client that works with other email providers (Gmail, Office 365 and Microsoft Exchange accounts). In order to send and receive user emails, our Services need to have access to user email accounts.
When you log into your email account through our Services, you are granting Loop permission to securely access the information contained in or associated with that account. The whole process is similar to connecting any other email client.
In order for our Services to achieve this, we need to store user email account access tokens:
To ensure safe and reliable operations of our Services, we rely on the most advanced and secure solution available in the industry – Amazon Web Services (AWS). Apart from AWS security policies, we encrypt all data between the client and our service. For client encryption and authentication, we user a strong protocol (TLS 1.2), a strong key exchange (ECDHE_RSA), and a strong cipher (AES_128_GCM) with industry standard 256 bit encryption using TLS/SSL (HTTPS).
Our Services are made available to you only for your personal or internal business use, which must be in compliance with all applicable laws, rules and regulations and must not infringe or violate third party rights. You may not make commercial use of our Services, including but not limited to selling or distributing our Services to any third party.
You may not register with Loop Services using existing email account information that you do not have the right to use, or another person’s existing email account information with the intent to impersonate that person. You represent and warrant that you are of legal age to form a binding contract (or if not, you have received your parents’ or guardian’s permission to use our Services and gotten your parent or guardian to agree to these Terms on your behalf).
If you are agreeing to these Terms on behalf of an organization or entity, you represent and warrant that you are authorized to agree to these Terms on that organization or entity’s behalf and bind them to these Terms (in which case, the references to “you” and “your” in these Terms, except for in this sentence, refer to that organization or entity). You will only use our Services in a manner that complies with all laws that apply to you.
You further represent, warrant, and agree that you will not use our Services or interact with our Services in a manner that:
Any violation of any of the aforementioned is grounds for termination of your right to use or access our Services. Any unauthorized use of any Loop Services is a violation of these Terms and such violations may subject the unauthorized user and his or her agents to civil and criminal penalties.
Loop Services are currently free. We reserve the right to charge for our Services in the future. We will notify you a reasonable period before any of our Services you are using begin carrying a fee. Changing these Terms We are constantly trying to improve our Services, so these Terms may change occasionally too. We reserve the right to change the Terms at any time. When we do, we will update the date to make it clear that a new version has been created and we will bring the update to your attention in a timely manner by sending you an email or by some other means within the app.
On a daily basis, we receive, process and forward a staggering 34GB worth of information! This is equivalent to 105,000 words or 23 words per second for half a day. With such a large flow of information, it is not uncommon for a busy person to mistakenly ignore or miss some emails. Writing a punchy email can be hard – but we have prepared a few tricks to help you stand out from the rest.
Before the recipient starts to even read an email, the subject line is the one important thing that catches his or her eye. Experts know, that writing a good subject line is an art form. You don’t have to become the next Shakespeare to make sure your next subject line stands out, just take note of the following:
“It should be short, to the point and describing the email content. Using 5-10 words, you should sum up the written email and use concise, direct and easily searchable keywords.”
Depending on what the purpose of writing your email is, here are some crucial elements that your subject line could include: urgency, curiosity, offers, personalization, relevance and timeliness, name recognition, cool stories.
Being straightforward isn’t just limited to the email subject. If you’ve grabbed the attention of a busy person and have made him open your email, that is only the beginning of the challenge.
Start with “Hi Peter” or “Hi Mr. Peterson” and then use 3-5 lines of personalized formality, like congratulating the recipient on their achievements or mentioning something specific about them or their company.
Since the emails we send out require gathering or sharing information about a specific topic, it is also useful to question the six Ws: who, what, where, when, why, how. Checking these will make sure you included all the information needed in a way that is easy to understand.
Write short paragraphs and keep your sentences brief. When possible, use bullet points as it makes the email easier to digest. The suitable length of an email, according to a study carried out by Boomerang, is between 75 to 100 words. Your email should read like a summary, and it shouldn’t take more than a minute to read, since that’s the attention span your email will typically get.
To avoid having to introduce yourself in a long paragraph at the beginning and cluttering your email, make sure your signature contains all the crucial information. According to “The Essentials of Business Etiquette” by Barbara Pachter, those are; your full name, title, the company name, and your contact information, including a phone number. Also, don’t let your flashy signature upstage the contents of the email; “Don’t go overboard with any sayings or artwork. Use the same font, type size, and color as the rest of the email.”
Our internal research showed that 65% of internal emails are shorter than 160 characters – which is about the length of a text message. So why clutter the inbox and not just simply message that person? Researches show that text messages, for instance, get opened up to 98% of the times while the average email open rate is only about 20%. It’s not a surprise – our inboxes are loaded with spam and unnecessary email content since we have little control over what will be coming into our inbox.
At Loop Email we took our cue from this fact and elevated email to a new level. We built an inbox with integrated chat function so that you can message with anyone in your email network. If a person doesn’t have Loop, they’ll still receive your chats as regular emails. At the same time, our Loop Inbox groups emails per contact and enables you to mute the contact if it’s grabbing unnecessary attention. This offers you full control over who gets your attention.
For a company working on Loop Email instead of regular email clients like Gmail or Outlook, this means real time messaging and a significantly increased probability that people on the other end are reading your emails or messages. Allow your “Inbox” to have a faithful companion in form of “Messages”, enabling you to work on email in real time and get better results.
We hope these tips are helpful for when you write your next email. And remember, when nothing goes right, go left: find a way to talk to your recipients personally through chat or face to face.