{"id":54143,"date":"2026-02-01T12:22:49","date_gmt":"2026-02-01T18:22:49","guid":{"rendered":"https:\/\/heartbeat.ai\/healthcare\/data-ethics-acceptable-use\/"},"modified":"2026-02-27T13:31:19","modified_gmt":"2026-02-27T19:31:19","slug":"data-ethics-acceptable-use","status":"publish","type":"post","link":"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/","title":{"rendered":"Data ethics acceptable use for recruiting outreach (boundaries, do\/don\u2019t, provenance)"},"content":{"rendered":"<p><img decoding=\"async\" loading=\"false\" class=\"aligncenter\" src=\"http:\/\/hc.heartbeat.ai\/wp-content\/webp-express\/webp-images\/uploads\/2026\/02\/data-ethics-acceptable-use-5d49dc32.png.webp\" alt=\"54142\" \/><\/p>\n<h1>Data ethics acceptable use<\/h1>\n<p><strong>By Ben Argeband, Founder &amp; CEO of Heartbeat.ai<\/strong> \u2014 Concrete do\/don\u2019t examples; no moralizing.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_65 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\r\n<div class=\"ez-toc-title-container\">\r\n<p class=\"ez-toc-title\" >What&rsquo;s on this page:<\/p>\r\n<span class=\"ez-toc-title-toggle\"><\/span><\/div>\r\n<nav><ul class='ez-toc-list ez-toc-list-level-1' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#Who_this_is_for\" title=\"Who this is for\">Who this is for<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#Quick_Answer\" title=\"Quick Answer\">Quick Answer<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#Acceptable_use_in_6_rules_copypaste\" title=\"Acceptable use in 6 rules (copy\/paste)\">Acceptable use in 6 rules (copy\/paste)<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#Framework_The_%E2%80%9CDont_be_a_creep%E2%80%9D_standard_practical_examples\" title=\"Framework: The \u201cDon\u2019t be a creep\u201d standard (practical examples)\">Framework: The \u201cDon\u2019t be a creep\u201d standard (practical examples)<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#What_acceptable_use_is_not\" title=\"What acceptable use is not\">What acceptable use is not<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#Do_Dont_fast_reference\" title=\"Do \/ Don\u2019t (fast reference)\">Do \/ Don\u2019t (fast reference)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#Step-by-step_method\" title=\"Step-by-step method\">Step-by-step method<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#Step_1_Write_a_one-page_acceptable-use_SOP_your_team_will_actually_follow\" title=\"Step 1: Write a one-page acceptable-use SOP your team will actually follow\">Step 1: Write a one-page acceptable-use SOP your team will actually follow<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#Stop_rules_examples_use_in_training\" title=\"Stop rules examples (use in training)\">Stop rules examples (use in training)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#Step_2_Separate_identity_sources_from_contact_channels_provenance\" title=\"Step 2: Separate identity sources from contact channels (provenance)\">Step 2: Separate identity sources from contact channels (provenance)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#What_to_say_if_asked_%E2%80%9CWhere_did_you_get_my_info%E2%80%9D\" title=\"What to say if asked \u201cWhere did you get my info?\u201d\">What to say if asked \u201cWhere did you get my info?\u201d<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#Step_3_Build_opt-out_and_suppression_into_the_workflow_not_as_an_afterthought\" title=\"Step 3: Build opt-out and suppression into the workflow (not as an afterthought)\">Step 3: Build opt-out and suppression into the workflow (not as an afterthought)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#Step_4_Set_channel_rules_that_protect_deliverability_and_reputation\" title=\"Step 4: Set channel rules that protect deliverability and reputation\">Step 4: Set channel rules that protect deliverability and reputation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#Step_5_Define_and_track_the_metrics_that_show_youre_staying_within_bounds\" title=\"Step 5: Define and track the metrics that show you\u2019re staying within bounds\">Step 5: Define and track the metrics that show you\u2019re staying within bounds<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#Diagnostic_Table\" title=\"Diagnostic Table:\">Diagnostic Table:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#Weighted_Checklist\" title=\"Weighted Checklist:\">Weighted Checklist:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#Outreach_Templates\" title=\"Outreach Templates:\">Outreach Templates:<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#Email_template_initial\" title=\"Email template (initial)\">Email template (initial)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#SMS_template_only_if_your_policy_supports_it\" title=\"SMS template (only if your policy supports it)\">SMS template (only if your policy supports it)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#Voicemail_template\" title=\"Voicemail template\">Voicemail template<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#Common_pitfalls\" title=\"Common pitfalls\">Common pitfalls<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#How_to_improve_results\" title=\"How to improve results\">How to improve results<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-23\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#1_Improve_targeting_before_you_improve_copy\" title=\"1) Improve targeting before you improve copy\">1) Improve targeting before you improve copy<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-24\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#2_Reduce_wasted_touches_with_verification_and_ranking\" title=\"2) Reduce wasted touches with verification and ranking\">2) Reduce wasted touches with verification and ranking<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-25\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#3_Measurement_instructions_weekly_ops_routine\" title=\"3) Measurement instructions (weekly ops routine)\">3) Measurement instructions (weekly ops routine)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-26\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#4_Tighten_your_stop_rules\" title=\"4) Tighten your stop rules\">4) Tighten your stop rules<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-27\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#Legal_and_ethical_use\" title=\"Legal and ethical use\">Legal and ethical use<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-28\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#Evidence_and_trust_notes\" title=\"Evidence and trust notes\">Evidence and trust notes<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-29\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#FAQs\" title=\"FAQs\">FAQs<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-30\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#What_does_acceptable_use_mean_for_recruiting_contact_data\" title=\"What does acceptable use mean for recruiting contact data?\">What does acceptable use mean for recruiting contact data?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-31\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#What_counts_as_an_opt-out\" title=\"What counts as an opt-out?\">What counts as an opt-out?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-32\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#Can_I_contact_clinicians_by_text\" title=\"Can I contact clinicians by text?\">Can I contact clinicians by text?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-33\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#How_fast_should_opt-outs_be_applied\" title=\"How fast should opt-outs be applied?\">How fast should opt-outs be applied?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-34\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#Is_it_acceptable_to_call_a_clinicians_workplace_line\" title=\"Is it acceptable to call a clinician\u2019s workplace line?\">Is it acceptable to call a clinician\u2019s workplace line?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-35\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#What_should_I_say_if_a_candidate_asks_where_I_got_their_information\" title=\"What should I say if a candidate asks where I got their information?\">What should I say if a candidate asks where I got their information?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-36\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#How_do_I_keep_outreach_ethical_without_killing_speed\" title=\"How do I keep outreach ethical without killing speed?\">How do I keep outreach ethical without killing speed?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-37\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#Next_steps\" title=\"Next steps\">Next steps<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-38\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#About_the_Author\" title=\"About the Author\">About the Author<\/a><\/li><\/ul><\/nav><\/div>\r\n<h2><span class=\"ez-toc-section\" id=\"Who_this_is_for\"><\/span>Who this is for<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>This is for recruiters and recruiting ops leaders who need clear boundaries for outreach that protect deliverability, brand, and candidate relationships while keeping workflow speed. If you need something you can hand to leadership, compliance, or procurement, this is written to be operational and auditable.<\/p>\n<p>One non-negotiable: <strong>you own compliance<\/strong>. Tools can help you execute, but they can\u2019t own your policies, training, or decisions.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Quick_Answer\"><\/span>Quick Answer<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<dl>\n<dt>Core Answer<\/dt>\n<dd>Use contact data only for relevant recruiting outreach, with clear identity context, limited retention, an <strong>easy opt-out<\/strong>, and strict opt-out enforcement via a <strong>suppression list<\/strong>.<\/dd>\n<dt>Key Insight<\/dt>\n<dd>Ethical outreach is operational: provenance, relevance, frequency caps, and opt-out enforcement matter more than the channel you use.<\/dd>\n<dt>Best For<\/dt>\n<dd>Recruiters + ops wanting clear boundaries<\/dd>\n<\/dl>\n<blockquote>\n<p><strong>Compliance &amp; Safety<\/strong><\/p>\n<p>This method is for legitimate recruiting outreach only. Always respect candidate privacy, opt-out requests, and local data laws. Heartbeat does not provide medical advice or legal counsel.<\/p>\n<\/blockquote>\n<h3><span class=\"ez-toc-section\" id=\"Acceptable_use_in_6_rules_copypaste\"><\/span>Acceptable use in 6 rules (copy\/paste)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li><strong>Be relevant:<\/strong> Only contact people who plausibly match the role (specialty\/setting\/location\/seniority).<\/li>\n<li><strong>Be transparent:<\/strong> Say who you are, why you\u2019re reaching out, and what the next step is.<\/li>\n<li><strong>Be restrained:<\/strong> Use frequency caps and stop rules; don\u2019t pile on across channels.<\/li>\n<li><strong>Make it easy to stop:<\/strong> Every message includes an <strong>easy opt-out<\/strong>.<\/li>\n<li><strong>Honor opt-outs everywhere:<\/strong> Centralize and enforce via a <strong>suppression list<\/strong> across all tools and channels.<\/li>\n<li><strong>No patient data:<\/strong> Recruiting outreach never uses or implies access to patient information.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Framework_The_%E2%80%9CDont_be_a_creep%E2%80%9D_standard_practical_examples\"><\/span>Framework: The \u201cDon\u2019t be a creep\u201d standard (practical examples)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>I\u2019ve watched teams lose weeks of productivity because they got flagged, blocked, or publicly called out. The \u201cDon\u2019t be a creep\u201d standard is a fast filter before any outreach goes out the door:<\/p>\n<ul>\n<li><strong>Respect:<\/strong> Treat the person like a professional, not a lead. No harassment, no pressure, no guilt trips.<\/li>\n<li><strong>Relevance:<\/strong> Your message should make sense for their specialty, licensure, geography, and career stage.<\/li>\n<li><strong>Transparency:<\/strong> Say who you are and why you\u2019re reaching out.<\/li>\n<li><strong>Control:<\/strong> Give a clear <strong>easy opt-out<\/strong> and honor it immediately across channels.<\/li>\n<li><strong>Restraint:<\/strong> Frequency caps and quiet hours. If you wouldn\u2019t want it done to you during personal time, don\u2019t do it to them.<\/li>\n<li><strong>Separation:<\/strong> Recruiting outreach is not patient outreach. No patient data, no clinical context, no insinuations.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"What_acceptable_use_is_not\"><\/span>What acceptable use is not<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li><strong>Not<\/strong> permission to spam: volume doesn\u2019t replace relevance.<\/li>\n<li><strong>Not<\/strong> a reason to ignore gatekeepers or keep pushing after a \u201cno.\u201d<\/li>\n<li><strong>Not<\/strong> patient outreach: don\u2019t reference care events, cases, or anything that implies clinical surveillance.<\/li>\n<\/ul>\n<p>Examples you can use in training:<\/p>\n<ul>\n<li><strong>Acceptable:<\/strong> \u201cDr. Patel \u2014 I recruit hospitalists in the Midwest. Are you open to hearing about a 7-on\/7-off role in Dayton? If not, reply \u2018no\u2019 and I\u2019ll stop.\u201d<\/li>\n<li><strong>Not acceptable:<\/strong> \u201cI saw you treated a patient at X hospital\u2026\u201d<\/li>\n<li><strong>Acceptable:<\/strong> One follow-up after no response, then stop or switch to a lower-friction channel with a single touch.<\/li>\n<li><strong>Not acceptable:<\/strong> Calling, texting, emailing, and messaging the same day with escalating language.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Do_Dont_fast_reference\"><\/span>Do \/ Don\u2019t (fast reference)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li><strong>Do<\/strong> lead with relevance: role + location + why them. <strong>Don\u2019t<\/strong> send generic blasts that force the candidate to guess why you contacted them.<\/li>\n<li><strong>Do<\/strong> identify yourself and your organization. <strong>Don\u2019t<\/strong> use deceptive subject lines or fake familiarity.<\/li>\n<li><strong>Do<\/strong> include an <strong>easy opt-out<\/strong> in every channel you use. <strong>Don\u2019t<\/strong> bury opt-out language or make people jump through hoops.<\/li>\n<li><strong>Do<\/strong> treat any \u201cstop\/remove\/unsubscribe\u201d as an opt-out and enforce it via a <strong>suppression list<\/strong>. <strong>Don\u2019t<\/strong> rely on individual recruiters to remember.<\/li>\n<li><strong>Do<\/strong> set frequency caps and stop rules per role. <strong>Don\u2019t<\/strong> multi-channel pile-on within 24\u201348 hours.<\/li>\n<li><strong>Do<\/strong> keep content strictly recruiting-related. <strong>Don\u2019t<\/strong> reference patient care, cases, or anything that implies you\u2019re tracking clinical activity.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Step-by-step_method\"><\/span>Step-by-step method<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"Step_1_Write_a_one-page_acceptable-use_SOP_your_team_will_actually_follow\"><\/span>Step 1: Write a one-page acceptable-use SOP your team will actually follow<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Keep it short and enforceable. Your SOP should answer:<\/p>\n<ul>\n<li><strong>Purpose:<\/strong> \u201cWe use contact data to communicate about employment opportunities and career conversations.\u201d<\/li>\n<li><strong>In-scope audience:<\/strong> Who you recruit and what \u201crelevant\u201d means for your org.<\/li>\n<li><strong>Channels allowed:<\/strong> Email, phone, SMS, voicemail, professional social (if used), and who can use each.<\/li>\n<li><strong>Frequency caps:<\/strong> Max attempts per person per role and quiet hours.<\/li>\n<li><strong>Stop rules:<\/strong> When to stop after no response, and when to stop immediately (any opt-out, any negative response).<\/li>\n<li><strong>Opt-out enforcement:<\/strong> How opt-outs are captured and applied via a <strong>suppression list<\/strong>.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"Stop_rules_examples_use_in_training\"><\/span>Stop rules examples (use in training)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li><strong>Immediate stop:<\/strong> Any opt-out language (\u201cstop,\u201d \u201cremove,\u201d \u201cunsubscribe,\u201d \u201cdon\u2019t contact\u201d).<\/li>\n<li><strong>Immediate stop:<\/strong> Any explicit negative response (\u201cnot interested,\u201d \u201cdo not call\/text\/email\u201d).<\/li>\n<li><strong>Stop and correct:<\/strong> Wrong person\/wrong specialty\/wrong location (fix targeting; don\u2019t keep trying).<\/li>\n<li><strong>Stop and route:<\/strong> Gatekeeper requests a different channel or contact point (follow that instruction once, then stop if declined).<\/li>\n<li><strong>Stop after cap:<\/strong> No response after your defined attempt cap for that role.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"Step_2_Separate_identity_sources_from_contact_channels_provenance\"><\/span>Step 2: Separate identity sources from contact channels (provenance)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Procurement and compliance teams don\u2019t just want \u201cwhere did you get the data?\u201d They want structure: what establishes identity, what enables contact, and what transformations you apply.<\/p>\n<p><strong>Procurement-friendly provenance one-pager (outline):<\/strong><\/p>\n<ul>\n<li><strong>Identity sources:<\/strong> What you use to establish professional identity (name, specialty, license\/NPI context).<\/li>\n<li><strong>Contact channels:<\/strong> Email\/phone\/SMS endpoints used for outreach (acknowledge these decay).<\/li>\n<li><strong>Transformations you apply:<\/strong> verification, refresh, deduping, and suppression enforcement (describe at a high level).<\/li>\n<li><strong>Refresh reality:<\/strong> How often you re-check contactability and remove bad endpoints.<\/li>\n<li><strong>Suppression governance:<\/strong> Where the <strong>suppression list<\/strong> lives, who owns it, and how it propagates to tools.<\/li>\n<li><strong>Audit artifacts:<\/strong> What you can show (opt-out logs, campaign settings, template versions).<\/li>\n<\/ul>\n<p>This is the clean way to answer due diligence questions without exposing sensitive sourcing details.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_to_say_if_asked_%E2%80%9CWhere_did_you_get_my_info%E2%80%9D\"><\/span>What to say if asked \u201cWhere did you get my info?\u201d<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Keep it simple and factual. Don\u2019t argue. Don\u2019t overshare. Use your provenance structure:<\/p>\n<ul>\n<li><strong>Identity context:<\/strong> \u201cWe recruit in [specialty\/region] and use professional registries to confirm identity and credentials.\u201d<\/li>\n<li><strong>Contact channel:<\/strong> \u201cWe use business contact channels to reach out about roles.\u201d<\/li>\n<li><strong>Control:<\/strong> \u201cIf you\u2019d like, I can remove you from outreach. Just reply \u2018stop\u2019 and I\u2019ll add you to our suppression list.\u201d<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"Step_3_Build_opt-out_and_suppression_into_the_workflow_not_as_an_afterthought\"><\/span>Step 3: Build opt-out and suppression into the workflow (not as an afterthought)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Opt-out is a system, not a promise. Your operating rules should include:<\/p>\n<ul>\n<li>Every outbound email includes an <strong>easy opt-out<\/strong> instruction.<\/li>\n<li>Every SMS includes a clear stop instruction (and you honor it).<\/li>\n<li>Any opt-out request updates your <strong>suppression list<\/strong> and is applied across all sequences and tools.<\/li>\n<li>Ops audits suppression enforcement weekly (spot checks across campaigns).<\/li>\n<\/ul>\n<p>If you need the mechanics and failure modes, use: <a href=\"http:\/\/heartbeat.ai\/resources\/recruiting-ops\/suppression-lists-opt-out-management\/\">suppression lists and opt-out management for recruiting ops<\/a>.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Step_4_Set_channel_rules_that_protect_deliverability_and_reputation\"><\/span>Step 4: Set channel rules that protect deliverability and reputation<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li><strong>Email:<\/strong> Use role-relevant messaging, avoid deceptive subject lines, and stop after a small number of attempts.<\/li>\n<li><strong>Phone:<\/strong> Call during reasonable local hours; leave a short voicemail once; don\u2019t hammer the same number.<\/li>\n<li><strong>SMS:<\/strong> Use sparingly and only when your organization\u2019s policy supports it; include stop language; don\u2019t send long multi-part texts.<\/li>\n<\/ul>\n<p>The trade-off is\u2026 you can increase short-term touches by being aggressive, but you\u2019ll pay for it in blocks, complaints, and brand damage that slows hiring.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Step_5_Define_and_track_the_metrics_that_show_youre_staying_within_bounds\"><\/span>Step 5: Define and track the metrics that show you\u2019re staying within bounds<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>You don\u2019t manage ethics with vibes. You manage it with controls and audits. Track a small set of metrics that indicate whether your outreach is respectful and effective.<\/p>\n<p><strong>Canonical metric definitions (use these consistently):<\/strong><\/p>\n<ul>\n<li><strong>Connect Rate<\/strong> = connected calls \/ total dials (e.g., per 100 dials).<\/li>\n<li><strong>Answer Rate<\/strong> = human answers \/ connected calls (e.g., per 100 connected calls).<\/li>\n<li><strong>Deliverability Rate<\/strong> = delivered emails \/ sent emails (e.g., per 100 sent emails).<\/li>\n<li><strong>Bounce Rate<\/strong> = bounced emails \/ sent emails (e.g., per 100 sent emails).<\/li>\n<li><strong>Reply Rate<\/strong> = replies \/ delivered emails (e.g., per 100 delivered emails).<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Diagnostic_Table\"><\/span>Diagnostic Table:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Use this to diagnose whether your outreach program is operating inside acceptable use.<\/strong><\/p>\n<div class=\"table-scroll\" style=\"overflow:auto;-webkit-overflow-scrolling:touch;width:100%\">\n<table class=\"separated-content\">\n<thead>\n<tr>\n<th>Area<\/th>\n<th>What acceptable use looks like<\/th>\n<th>Red flag<\/th>\n<th>What to do next<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Relevance<\/td>\n<td>Role + geography + specialty match is explicit in the first message<\/td>\n<td>Generic blast copy; unclear why they were selected<\/td>\n<td>Require a relevance line in templates; tighten list inclusion rules<\/td>\n<\/tr>\n<tr>\n<td>Opt-out handling<\/td>\n<td>Opt-outs captured same day and applied across tools via a <strong>suppression list<\/strong><\/td>\n<td>They opt out but still get contacted<\/td>\n<td>Centralize suppression; audit sequences and dialer queues weekly<\/td>\n<\/tr>\n<tr>\n<td>Frequency<\/td>\n<td>Documented caps; stop rules after no response<\/td>\n<td>Multi-channel pile-on in 24\u201348 hours<\/td>\n<td>Set caps by persona; enforce in CRM\/sequence tool<\/td>\n<\/tr>\n<tr>\n<td>Transparency<\/td>\n<td>Clear sender identity, company, and purpose<\/td>\n<td>Misleading subject lines or fake familiarity<\/td>\n<td>Rewrite templates; require sender signature block<\/td>\n<\/tr>\n<tr>\n<td>Content boundaries<\/td>\n<td>No patient data; no clinical insinuations; no sensitive inferences<\/td>\n<td>Any mention of patient care events or protected contexts<\/td>\n<td>Immediate stop; retrain; add approval gate for new templates<\/td>\n<\/tr>\n<tr>\n<td>Provenance (procurement-friendly)<\/td>\n<td>Documented separation: identity sources vs contact channels vs what Heartbeat adds (verification, ranking, refresh)<\/td>\n<td>&#8220;It\u2019s all public&#8221; with no structure<\/td>\n<td>Publish a provenance one-pager; review quarterly with ops + procurement<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p><em>Visual note:<\/em> Sources table visual note: Source \u2192 What it provides \u2192 What it doesn\u2019t \u2192 Update reality \u2192 Recruiter use.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Weighted_Checklist\"><\/span>Weighted Checklist:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Score each campaign before launch.<\/strong> If you score under 80, fix it before you hit send.<\/p>\n<ul>\n<li><strong>(25 points)<\/strong> Relevance is explicit: specialty\/role + location + why them.<\/li>\n<li><strong>(20 points)<\/strong> Opt-out is clear and simple (email + SMS where applicable) and routes into a centralized <strong>suppression list<\/strong>.<\/li>\n<li><strong>(15 points)<\/strong> Frequency caps are set (per person, per role) and enforced in tooling.<\/li>\n<li><strong>(10 points)<\/strong> Provenance one-pager exists (identity sources vs contact channels vs transformations).<\/li>\n<li><strong>(10 points)<\/strong> No sensitive content: no patient data, no clinical event references, no insinuations.<\/li>\n<li><strong>(10 points)<\/strong> Sender transparency: real name, company, and a direct reply path.<\/li>\n<li><strong>(10 points)<\/strong> Metrics plan exists (deliverability, bounce, reply, connect, answer) with thresholds and stop rules.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Outreach_Templates\"><\/span>Outreach Templates:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>These are intentionally plain.<\/strong> They are designed to be respectful, relevant, and easy to stop. Replace bracketed fields and keep your frequency cap consistent with your SOP.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Email_template_initial\"><\/span>Email template (initial)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>Subject:<\/strong> Quick question about your next role<\/p>\n<p>Hi Dr. [Last Name] \u2014 I\u2019m [Name], a recruiter with [Org]. I\u2019m reaching out because we\u2019re hiring a [Role\/Specialty] in [City\/Region] and your background in [relevant signal] looks aligned.<\/p>\n<p>Are you open to a 5-minute call this week to see if it\u2019s worth a longer conversation? If not, reply \u201cno\u201d and I\u2019ll stop reaching out.<\/p>\n<p><em>Follow-up rule:<\/em> If I don\u2019t hear back, I\u2019ll only follow up up to [YOUR CAP] times for this role.<\/p>\n<p>\u2014 [Name], [Title], [Org] | [Phone] | [Email]<\/p>\n<h3><span class=\"ez-toc-section\" id=\"SMS_template_only_if_your_policy_supports_it\"><\/span>SMS template (only if your policy supports it)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Hi Dr. [Last Name] \u2014 [Name] recruiting for [Org]. Are you open to hearing about a [Role] in [Location]? Reply STOP to opt out.<\/p>\n<p><em>Follow-up rule:<\/em> If no response, I\u2019ll stop after [YOUR CAP] attempts for this role.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Voicemail_template\"><\/span>Voicemail template<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Hi Dr. [Last Name], this is [Name] with [Org]. I\u2019m calling about a [Role] opportunity in [Location]. If you\u2019re open to a quick chat, call me back at [Number]. If not interested, no problem.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Common_pitfalls\"><\/span>Common pitfalls<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li><strong>Assuming a list equals permission.<\/strong> Buying static lists is risky because contact data decays. The modern standard is Access + Refresh + Verification + Suppression.<\/li>\n<li><strong>Opt-out that doesn\u2019t actually stop outreach.<\/strong> If someone opts out and still gets contacted, you created the worst outcome: you proved you can\u2019t be trusted.<\/li>\n<li><strong>Over-contacting across channels.<\/strong> Multi-channel is fine; pile-on is not. Set caps and stop rules.<\/li>\n<li><strong>Using sensitive context.<\/strong> Even if you think you \u201csaw it publicly,\u201d don\u2019t reference patient care, cases, or anything that implies you\u2019re tracking clinical activity.<\/li>\n<li><strong>Confusing identity with contactability.<\/strong> A stable identifier (like a professional registry record) doesn\u2019t mean the email\/phone you found is current or appropriate for outreach.<\/li>\n<li><strong>Policy without enforcement.<\/strong> If ops can\u2019t audit it, it\u2019s not a policy, it\u2019s a hope.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"How_to_improve_results\"><\/span>How to improve results<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Ethical outreach should also perform. If it doesn\u2019t, teams tend to compensate with volume and pressure. Improve performance by tightening relevance and improving channel hygiene, not by escalating persistence.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"1_Improve_targeting_before_you_improve_copy\"><\/span>1) Improve targeting before you improve copy<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Make sure each outreach list has a clear inclusion rule (specialty, geography, setting, seniority). If you can\u2019t explain why a person is on the list in one sentence, your recruiters will compensate with volume.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"2_Reduce_wasted_touches_with_verification_and_ranking\"><\/span>2) Reduce wasted touches with verification and ranking<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>When you reduce wrong numbers and dead inboxes, you reduce the temptation to over-contact. Heartbeat.ai supports workflows that include <strong>ranked mobile numbers by answer probability<\/strong> so recruiters can start with the most connectable path instead of brute force.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"3_Measurement_instructions_weekly_ops_routine\"><\/span>3) Measurement instructions (weekly ops routine)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Measure this by\u2026 running a weekly outreach health review across your last 7 days of activity:<\/p>\n<ul>\n<li><strong>Email:<\/strong> Deliverability Rate (delivered emails \/ sent emails, per 100 sent), Bounce Rate (bounced emails \/ sent emails, per 100 sent), Reply Rate (replies \/ delivered emails, per 100 delivered). Track by campaign and by sender domain.<\/li>\n<li><strong>Phone:<\/strong> Connect Rate (connected calls \/ total dials, per 100 dials) and Answer Rate (human answers \/ connected calls, per 100 connected). Track by time-of-day and by list category.<\/li>\n<li><strong>Opt-out enforcement:<\/strong> Count opt-out requests and confirm they are present in the centralized <strong>suppression list<\/strong> within the same business day. Spot-check opted-out records against active sequences and dialer queues.<\/li>\n<li><strong>Complaint signals:<\/strong> Track spam complaints, negative replies, and \u201cstop contacting me\u201d messages. Any spike triggers a template and targeting review.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"4_Tighten_your_stop_rules\"><\/span>4) Tighten your stop rules<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Define a maximum number of attempts per person per role, and a cool-down period before any future outreach. This protects your brand and keeps your team focused on reachable, relevant candidates.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Legal_and_ethical_use\"><\/span>Legal and ethical use<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>This page is about acceptable use boundaries and operational controls; consult your counsel for jurisdiction-specific requirements. If you want a broader overview of recruiting compliance topics and internal controls, start here: <a href=\"http:\/\/heartbeat.ai\/resources\/recruiting-compliance\/\">recruiting compliance resources<\/a>.<\/p>\n<p>Your obligations depend on jurisdiction, channel, and your organization\u2019s policies. At a minimum, build your program to respect:<\/p>\n<ul>\n<li><strong>TCPA:<\/strong> Especially relevant for calling\/texting practices and consent requirements. Treat SMS as higher-risk than email and govern it accordingly.<\/li>\n<li><strong>CAN-SPAM:<\/strong> Use accurate sender information, avoid deceptive subject lines, and provide a clear opt-out mechanism for commercial email.<\/li>\n<li><strong>Opt-out:<\/strong> If someone opts out in any channel, honor it across channels using a centralized <strong>suppression list<\/strong>.<\/li>\n<li><strong>No patient data:<\/strong> Recruiting outreach should never involve patient information or imply access to it.<\/li>\n<\/ul>\n<p>For clarity on what we do and don\u2019t handle, see: <a href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/not-hipaa-no-patient-data\/\">Not HIPAA: no patient data<\/a>.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Evidence_and_trust_notes\"><\/span>Evidence and trust notes<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When we reference professional identity context, we anchor to authoritative registries and licensing bodies. These sources help establish identity and credentials; they do not guarantee contactability.<\/p>\n<ul>\n<li><a href=\"https:\/\/nppes.cms.hhs.gov\/\">NPPES NPI Registry<\/a> (identity and NPI context)<\/li>\n<li><a href=\"https:\/\/www.cms.gov\/medicare\/regulations-guidance\/administrative-simplification\/national-provider-identifier-npi\">CMS: National Provider Identifier (NPI) overview<\/a><\/li>\n<li><a href=\"https:\/\/www.fsmb.org\/\">Federation of State Medical Boards (FSMB)<\/a> (licensure context)<\/li>\n<\/ul>\n<p>Channel rules are governed by laws and guidance that vary by jurisdiction and use case. If you need primary references, start with official sources:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.ftc.gov\/business-guidance\/resources\/can-spam-act-compliance-guide-business\">FTC: CAN-SPAM Act compliance guide<\/a><\/li>\n<li><a href=\"https:\/\/www.fcc.gov\/general\/telemarketing-and-robocalls\">FCC: Telemarketing and robocalls (TCPA-related overview)<\/a><\/li>\n<\/ul>\n<p>How Heartbeat evaluates and communicates trust: <a href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/\">Trust methodology<\/a>.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"FAQs\"><\/span>FAQs<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"What_does_acceptable_use_mean_for_recruiting_contact_data\"><\/span>What does acceptable use mean for recruiting contact data?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>It means you use contact data for relevant recruiting outreach with transparency, reasonable frequency, and a clear opt-out, and you enforce opt-outs through a centralized suppression process.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_counts_as_an_opt-out\"><\/span>What counts as an opt-out?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Any message that reasonably indicates \u201cstop\u201d (for example: \u201cremove me,\u201d \u201cdon\u2019t contact,\u201d \u201cunsubscribe,\u201d \u201cSTOP\u201d). Treat it as immediate and apply it across channels via your suppression list.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_I_contact_clinicians_by_text\"><\/span>Can I contact clinicians by text?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>SMS can be higher-risk than email. If your organization allows it, keep it minimal, identify yourself, include STOP language, and honor opt-outs immediately. Align your process with policies reviewed for TCPA considerations.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_fast_should_opt-outs_be_applied\"><\/span>How fast should opt-outs be applied?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Operationally, same business day is the standard you should enforce so you don\u2019t re-contact someone who already told you to stop. Make it automatic via a centralized suppression list, not dependent on individual recruiters.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Is_it_acceptable_to_call_a_clinicians_workplace_line\"><\/span>Is it acceptable to call a clinician\u2019s workplace line?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>It can be acceptable when the outreach is relevant and respectful, and you follow your stop rules. Expect gatekeepers, keep the message short, and don\u2019t keep calling if you\u2019re told to stop or route elsewhere. If the clinician opts out (directly or through their office), capture it and enforce it via your suppression list.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_should_I_say_if_a_candidate_asks_where_I_got_their_information\"><\/span>What should I say if a candidate asks where I got their information?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Keep it factual and brief: you recruit in their specialty\/region, you use professional identity context to confirm you\u2019re contacting the right person, and you use business contact channels for outreach. Offer an easy opt-out and enforce it via your suppression list.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_do_I_keep_outreach_ethical_without_killing_speed\"><\/span>How do I keep outreach ethical without killing speed?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Make relevance and suppression automatic: tight targeting rules, short templates, frequency caps, and centralized opt-out enforcement. That reduces wasted touches and keeps recruiters focused on reachable candidates.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Next_steps\"><\/span>Next steps<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>Operationalize opt-outs: implement (or fix) your <a href=\"http:\/\/heartbeat.ai\/resources\/recruiting-ops\/suppression-lists-opt-out-management\/\">suppression list and opt-out management workflow<\/a>.<\/li>\n<li>Standardize templates and guardrails: pull from <a href=\"http:\/\/heartbeat.ai\/resources\/templates-scripts\/\">recruiting templates and scripts<\/a> and enforce relevance + stop rules.<\/li>\n<li>Document trust: align your internal policy with the <a href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/\">Heartbeat trust methodology<\/a> so ops can audit it.<\/li>\n<li>If you want to implement verification, refresh, and suppression in one workflow, <a href=\"https:\/\/heartbeat.ai\/signup\">create a Heartbeat account<\/a>.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"About_the_Author\"><\/span><b>About the Author<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><a href=\"http:\/\/heartbeat.ai\/resources\/author\/ben-argeband\"><span style=\"font-weight: 400;\">Ben Argeband<\/span><\/a><span style=\"font-weight: 400;\"> is the Founder and CEO of Swordfish.ai and Heartbeat.ai. With deep expertise in data and SaaS, he has built two successful platforms trusted by over 50,000 sales and recruitment professionals. Ben&#8217;s mission is to help teams find direct contact information for hard-to-reach professionals and decision-makers, providing the shortest route to their next win. Connect with Ben on <\/span><a href=\"https:\/\/www.linkedin.com\/in\/ben-m-argeband-2427a8a3\/\"><span style=\"font-weight: 400;\">LinkedIn<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><script type=\"application\/ld+json\">{\"@context\":\"https:\/\/schema.org\",\"@type\":\"Article\",\"author\":{\"@type\":\"Person\",\"jobTitle\":\"Founder & CEO of Heartbeat.ai\",\"name\":\"Ben Argeband\"},\"description\":\"Operational acceptable-use boundaries for recruiting outreach: relevance, restraint, easy opt-out, suppression list enforcement, and procurement-friendly provenance. Includes do\/don\u2019t, templates, metrics, and stop rules.\",\"headline\":\"Data ethics acceptable use\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/\",\"@type\":\"WebPage\"},\"publisher\":{\"@type\":\"Organization\",\"name\":\"Heartbeat.ai\"}}<\/script><br \/>\n<script type=\"application\/ld+json\">{\"@context\":\"https:\/\/schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"It means you use contact data for relevant recruiting outreach with transparency, reasonable frequency, and a clear opt-out, and you enforce opt-outs through a centralized suppression process.\"},\"name\":\"What does acceptable use mean for recruiting contact data?\"},{\"@type\":\"Question\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Any message that reasonably indicates \u201cstop\u201d (for example: \u201cremove me,\u201d \u201cdon\u2019t contact,\u201d \u201cunsubscribe,\u201d \u201cSTOP\u201d). Treat it as immediate and apply it across channels via your suppression list.\"},\"name\":\"What counts as an opt-out?\"},{\"@type\":\"Question\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"SMS can be higher-risk than email. If your organization allows it, keep it minimal, identify yourself, include STOP language, and honor opt-outs immediately. Align your process with policies reviewed for TCPA considerations.\"},\"name\":\"Can I contact clinicians by text?\"},{\"@type\":\"Question\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Operationally, same business day is the standard you should enforce so you don\u2019t re-contact someone who already told you to stop. Make it automatic via a centralized suppression list, not dependent on individual recruiters.\"},\"name\":\"How fast should opt-outs be applied?\"},{\"@type\":\"Question\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"It can be acceptable when the outreach is relevant and respectful, and you follow your stop rules. Expect gatekeepers, keep the message short, and don\u2019t keep calling if you\u2019re told to stop or route elsewhere. If the clinician opts out (directly or through their office), capture it and enforce it via your suppression list.\"},\"name\":\"Is it acceptable to call a clinician\u2019s workplace line?\"},{\"@type\":\"Question\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Keep it factual and brief: you recruit in their specialty\/region, you use professional identity context to confirm you\u2019re contacting the right person, and you use business contact channels for outreach. Offer an easy opt-out and enforce it via your suppression list.\"},\"name\":\"What should I say if a candidate asks where I got their information?\"},{\"@type\":\"Question\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Make relevance and suppression automatic: tight targeting rules, short templates, frequency caps, and centralized opt-out enforcement. That reduces wasted touches and keeps recruiters focused on reachable candidates.\"},\"name\":\"How do I keep outreach ethical without killing speed?\"}]}<\/script><\/p>","protected":false},"excerpt":{"rendered":"<p>Operational acceptable-use boundaries for recruiting outreach: relevance, restraint, easy opt-out, suppression list enforcement, and procurement-friendly provenance. Includes do\/don\u2019t, templates, metrics, and stop rules.<\/p>","protected":false},"author":5,"featured_media":54142,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"data ethics acceptable use","_yoast_wpseo_title":"Data ethics acceptable use (recruiting outreach do\/don\u2019t + provenance)","_yoast_wpseo_metadesc":"Practical acceptable-use boundaries for recruiting outreach: relevance, easy opt-out, suppression list enforcement, provenance, stop rules, and metrics. Includes do\/don\u2019t and templates.","_custom_permalink":"trust-methodology\/data-ethics-acceptable-use","footnotes":""},"categories":[1],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Data ethics acceptable use (recruiting outreach do\/don\u2019t + provenance)<\/title>\r\n<meta name=\"description\" content=\"Practical acceptable-use boundaries for recruiting outreach: relevance, easy opt-out, suppression list enforcement, provenance, stop rules, and metrics. Includes do\/don\u2019t and templates.\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Data ethics acceptable use (recruiting outreach do\/don\u2019t + provenance)\" \/>\r\n<meta property=\"og:description\" content=\"Practical acceptable-use boundaries for recruiting outreach: relevance, easy opt-out, suppression list enforcement, provenance, stop rules, and metrics. Includes do\/don\u2019t and templates.\" \/>\r\n<meta property=\"og:url\" content=\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Heartbeat.ai\" \/>\r\n<meta property=\"article:published_time\" content=\"2026-02-01T18:22:49+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2026-02-27T19:31:19+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/hc.heartbeat.ai\/wp-content\/uploads\/2026\/02\/data-ethics-acceptable-use-5d49dc32.png\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\r\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\r\n<meta name=\"author\" content=\"Ben Argeband\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ben Argeband\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#article\",\"isPartOf\":{\"@id\":\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/\"},\"author\":{\"name\":\"Ben Argeband\",\"@id\":\"http:\/\/heartbeat.ai\/resources\/#\/schema\/person\/7b323ddce9b211907423482e2f9db173\"},\"headline\":\"Data ethics acceptable use for recruiting outreach (boundaries, do\/don\u2019t, provenance)\",\"datePublished\":\"2026-02-01T18:22:49+00:00\",\"dateModified\":\"2026-02-27T19:31:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/\"},\"wordCount\":2925,\"commentCount\":0,\"publisher\":{\"@id\":\"http:\/\/heartbeat.ai\/resources\/#organization\"},\"image\":{\"@id\":\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hc.heartbeat.ai\/wp-content\/uploads\/2026\/02\/data-ethics-acceptable-use-5d49dc32.png\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/\",\"url\":\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/\",\"name\":\"Data ethics acceptable use (recruiting outreach do\/don\u2019t + provenance)\",\"isPartOf\":{\"@id\":\"http:\/\/heartbeat.ai\/resources\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#primaryimage\"},\"image\":{\"@id\":\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hc.heartbeat.ai\/wp-content\/uploads\/2026\/02\/data-ethics-acceptable-use-5d49dc32.png\",\"datePublished\":\"2026-02-01T18:22:49+00:00\",\"dateModified\":\"2026-02-27T19:31:19+00:00\",\"description\":\"Practical acceptable-use boundaries for recruiting outreach: relevance, easy opt-out, suppression list enforcement, provenance, stop rules, and metrics. Includes do\/don\u2019t and templates.\",\"breadcrumb\":{\"@id\":\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#primaryimage\",\"url\":\"https:\/\/hc.heartbeat.ai\/wp-content\/uploads\/2026\/02\/data-ethics-acceptable-use-5d49dc32.png\",\"contentUrl\":\"https:\/\/hc.heartbeat.ai\/wp-content\/uploads\/2026\/02\/data-ethics-acceptable-use-5d49dc32.png\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/heartbeat.ai\/healthcare\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data ethics acceptable use for recruiting outreach (boundaries, do\/don\u2019t, provenance)\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/heartbeat.ai\/resources\/#website\",\"url\":\"http:\/\/heartbeat.ai\/resources\/\",\"name\":\"Heartbeat.ai\",\"description\":\"\",\"publisher\":{\"@id\":\"http:\/\/heartbeat.ai\/resources\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/heartbeat.ai\/resources\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"http:\/\/heartbeat.ai\/resources\/#organization\",\"name\":\"Heartbeat.ai\",\"url\":\"http:\/\/heartbeat.ai\/resources\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/heartbeat.ai\/resources\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hc.heartbeat.ai\/wp-content\/uploads\/2021\/04\/Heartbeat.ai-logo.png\",\"contentUrl\":\"https:\/\/hc.heartbeat.ai\/wp-content\/uploads\/2021\/04\/Heartbeat.ai-logo.png\",\"width\":704,\"height\":126,\"caption\":\"Heartbeat.ai\"},\"image\":{\"@id\":\"http:\/\/heartbeat.ai\/resources\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"http:\/\/heartbeat.ai\/resources\/#\/schema\/person\/7b323ddce9b211907423482e2f9db173\",\"name\":\"Ben Argeband\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/heartbeat.ai\/resources\/#\/schema\/person\/image\/\",\"url\":\"http:\/\/0.gravatar.com\/avatar\/6356f96884d5a313d758128b3d9aaef7?s=96&d=mm&r=g\",\"contentUrl\":\"http:\/\/0.gravatar.com\/avatar\/6356f96884d5a313d758128b3d9aaef7?s=96&d=mm&r=g\",\"caption\":\"Ben Argeband\"},\"url\":\"http:\/\/heartbeat.ai\/resources\/author\/ben-argeband\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data ethics acceptable use (recruiting outreach do\/don\u2019t + provenance)","description":"Practical acceptable-use boundaries for recruiting outreach: relevance, easy opt-out, suppression list enforcement, provenance, stop rules, and metrics. Includes do\/don\u2019t and templates.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/","og_locale":"en_US","og_type":"article","og_title":"Data ethics acceptable use (recruiting outreach do\/don\u2019t + provenance)","og_description":"Practical acceptable-use boundaries for recruiting outreach: relevance, easy opt-out, suppression list enforcement, provenance, stop rules, and metrics. Includes do\/don\u2019t and templates.","og_url":"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/","og_site_name":"Heartbeat.ai","article_published_time":"2026-02-01T18:22:49+00:00","article_modified_time":"2026-02-27T19:31:19+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/hc.heartbeat.ai\/wp-content\/uploads\/2026\/02\/data-ethics-acceptable-use-5d49dc32.png","type":"image\/png"}],"author":"Ben Argeband","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ben Argeband","Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#article","isPartOf":{"@id":"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/"},"author":{"name":"Ben Argeband","@id":"http:\/\/heartbeat.ai\/resources\/#\/schema\/person\/7b323ddce9b211907423482e2f9db173"},"headline":"Data ethics acceptable use for recruiting outreach (boundaries, do\/don\u2019t, provenance)","datePublished":"2026-02-01T18:22:49+00:00","dateModified":"2026-02-27T19:31:19+00:00","mainEntityOfPage":{"@id":"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/"},"wordCount":2925,"commentCount":0,"publisher":{"@id":"http:\/\/heartbeat.ai\/resources\/#organization"},"image":{"@id":"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#primaryimage"},"thumbnailUrl":"https:\/\/hc.heartbeat.ai\/wp-content\/uploads\/2026\/02\/data-ethics-acceptable-use-5d49dc32.png","articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#respond"]}]},{"@type":"WebPage","@id":"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/","url":"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/","name":"Data ethics acceptable use (recruiting outreach do\/don\u2019t + provenance)","isPartOf":{"@id":"http:\/\/heartbeat.ai\/resources\/#website"},"primaryImageOfPage":{"@id":"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#primaryimage"},"image":{"@id":"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#primaryimage"},"thumbnailUrl":"https:\/\/hc.heartbeat.ai\/wp-content\/uploads\/2026\/02\/data-ethics-acceptable-use-5d49dc32.png","datePublished":"2026-02-01T18:22:49+00:00","dateModified":"2026-02-27T19:31:19+00:00","description":"Practical acceptable-use boundaries for recruiting outreach: relevance, easy opt-out, suppression list enforcement, provenance, stop rules, and metrics. Includes do\/don\u2019t and templates.","breadcrumb":{"@id":"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#primaryimage","url":"https:\/\/hc.heartbeat.ai\/wp-content\/uploads\/2026\/02\/data-ethics-acceptable-use-5d49dc32.png","contentUrl":"https:\/\/hc.heartbeat.ai\/wp-content\/uploads\/2026\/02\/data-ethics-acceptable-use-5d49dc32.png","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"http:\/\/heartbeat.ai\/resources\/trust-methodology\/data-ethics-acceptable-use\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/heartbeat.ai\/healthcare\/"},{"@type":"ListItem","position":2,"name":"Data ethics acceptable use for recruiting outreach (boundaries, do\/don\u2019t, provenance)"}]},{"@type":"WebSite","@id":"http:\/\/heartbeat.ai\/resources\/#website","url":"http:\/\/heartbeat.ai\/resources\/","name":"Heartbeat.ai","description":"","publisher":{"@id":"http:\/\/heartbeat.ai\/resources\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/heartbeat.ai\/resources\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"http:\/\/heartbeat.ai\/resources\/#organization","name":"Heartbeat.ai","url":"http:\/\/heartbeat.ai\/resources\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/heartbeat.ai\/resources\/#\/schema\/logo\/image\/","url":"https:\/\/hc.heartbeat.ai\/wp-content\/uploads\/2021\/04\/Heartbeat.ai-logo.png","contentUrl":"https:\/\/hc.heartbeat.ai\/wp-content\/uploads\/2021\/04\/Heartbeat.ai-logo.png","width":704,"height":126,"caption":"Heartbeat.ai"},"image":{"@id":"http:\/\/heartbeat.ai\/resources\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"http:\/\/heartbeat.ai\/resources\/#\/schema\/person\/7b323ddce9b211907423482e2f9db173","name":"Ben Argeband","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/heartbeat.ai\/resources\/#\/schema\/person\/image\/","url":"http:\/\/0.gravatar.com\/avatar\/6356f96884d5a313d758128b3d9aaef7?s=96&d=mm&r=g","contentUrl":"http:\/\/0.gravatar.com\/avatar\/6356f96884d5a313d758128b3d9aaef7?s=96&d=mm&r=g","caption":"Ben Argeband"},"url":"http:\/\/heartbeat.ai\/resources\/author\/ben-argeband\/"}]}},"_links":{"self":[{"href":"http:\/\/heartbeat.ai\/resources\/wp-json\/wp\/v2\/posts\/54143"}],"collection":[{"href":"http:\/\/heartbeat.ai\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/heartbeat.ai\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/heartbeat.ai\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"http:\/\/heartbeat.ai\/resources\/wp-json\/wp\/v2\/comments?post=54143"}],"version-history":[{"count":2,"href":"http:\/\/heartbeat.ai\/resources\/wp-json\/wp\/v2\/posts\/54143\/revisions"}],"predecessor-version":[{"id":54448,"href":"http:\/\/heartbeat.ai\/resources\/wp-json\/wp\/v2\/posts\/54143\/revisions\/54448"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/heartbeat.ai\/resources\/wp-json\/wp\/v2\/media\/54142"}],"wp:attachment":[{"href":"http:\/\/heartbeat.ai\/resources\/wp-json\/wp\/v2\/media?parent=54143"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/heartbeat.ai\/resources\/wp-json\/wp\/v2\/categories?post=54143"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/heartbeat.ai\/resources\/wp-json\/wp\/v2\/tags?post=54143"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}