Why Identity Matters
Company-level identification tells you “someone from Acme Corp visited pricing.” User-level identification tells you “Sarah Chen, VP Marketing at Acme Corp, visited pricing for the third time this week.” Benefits of identified traffic:- 100% accurate: No guessing—you know exactly who visited
- Privacy-friendly: Users opted in by providing their email
- Perfect match rate: Identified users stay identified across sessions
- Person-level detail: See individual behavior, not just company aggregates
Snitcher does not use third-party cookies or any third-party data in our Identity Layer. All identification comes from first-party interactions on your website.
How Users Get Identified
Snitcher captures user identity through several methods:1. Automatic Form Tracking
When enabled, Snitcher automatically detects form submissions containing email addresses. This includes:- Demo request forms
- Newsletter signups
- Gated content downloads
- Contact forms
- Webinar registrations
2. Manual Identification via identify()
For logins, signups, and non-standard flows, call Snitcher.identify():
identify() whenever a user:
- Signs up for your product
- Logs in
- Provides their email in a form you control
- Completes onboarding
3. OAuth and SSO Logins
For Google Sign-In, GitHub OAuth, SSO, and similar flows, you’ll need to callidentify() manually after successful authentication:
4. Email Link Tracking
When you send outbound emails, you can embed identification parameters that reveal who clicked through. Snitcher supports both plain email and base64-encoded formats:- Sales outreach emails (Outreach, Salesloft, Apollo)
- Marketing campaigns (HubSpot, Mailchimp, Marketo)
- Transactional emails
sn_trait_first_name and sn_trait_company.
Identify Email Recipients
See the complete guide with platform-specific setup instructions for HubSpot, Apollo, Salesloft, and more.
Cross-Session Identity Persistence
Once a user is identified, their identity persists across sessions (as long as cookies aren’t cleared):| Session | Status | Activity |
|---|---|---|
| Week 1 | Anonymous | Visited blog, read 3 articles |
| Week 2 | Anonymous | Returned, viewed pricing |
| Week 3 | Identified | Filled out demo form as [email protected] |
| Week 4 | Identified | Returned, viewed case studies |
Profile Merging
Snitcher automatically handles complex scenarios:Same Person, Multiple Devices
When Sarah visits from her laptop and phone, she creates two device IDs. Once she identifies on both devices (e.g., logs in), Snitcher merges the activity:Company + User Linking
If Sarah visits from Acme Corp’s office, we identify both:- Company: Acme Corp (from IP intelligence)
- User: [email protected] (from identification)
Improving Your Identification Rate
Want more identified traffic? Try these strategies:Install the tracker on your app
Install the tracker on your app
When users log in to your product, call
identify(). This links their in-app behavior with website visits, giving you a complete picture of the customer journey.Gate your best content
Gate your best content
Require email for high-value content: ebooks, webinars, industry reports. Use progressive profiling to collect more data over time.
Use email link tracking
Use email link tracking
Add tracking parameters to outbound emails. When prospects click through, you’ll know exactly who they are—no form required. See the complete setup guide for HubSpot, Apollo, Salesloft, and more.
Integrate with chat widgets
Integrate with chat widgets
Connect Snitcher with Intercom, Drift, or other chat tools. When visitors provide their email in chat, identify them in Snitcher.
Track webinar registrations
Track webinar registrations
Host valuable webinars and capture emails at registration. Install Snitcher wherever registrations happen.
Privacy Considerations
The Identity Layer is built on first-party data and user consent:- No third-party cookies: All data comes from your website
- User-initiated: Identification only happens when users provide their email
- Transparent: Users know they’re submitting a form or logging in
- GDPR-compatible: Works with consent management when configured