which of the following best describes permission-based e-mail marketing?

which of the following best describes permission-based e-mail marketing?