SlideShare una empresa de Scribd logo
1 de 30
By Team Approachjob, Bangalore
1
““9 common9 common
e-mail habits that waste timee-mail habits that waste time
and cause problems”and cause problems”
1. Vague or nonexistent subject line.
2. Changing the topic without changing
the subject.
3. Including multiple subjects in one
note.
4. Sending before thinking.
2
9 habits contd.9 habits contd.
5. Inadvertent replying to all.
6. Omitting the context of a reply.
7. Misaddressed recipients.
8. Displaying addresses of recipients
who are strangers to each other.
9. Replying vs. forwarding.
3
AgendaAgenda
1. Addressing
2. Subject Line
3. Message Text
4. Signature Line
5. Attachments
6. Style
7. Confidentiality and Security
8. Managing Email
9. References
10. Discussion
4
AddressingAddressing
 Limit to who really needs to know.
 Make it clear in text who has action and
who is info addressee.
 Use BCC to protect Email addresses
unless everyone knows each other.
 Watch Reply All.
5
Addressing (contd.)Addressing (contd.)
 Use address book with mail groups &
validate often.
Avoid typing addresses free hand; many
addresses are similar; watch auto fill.
Send same message to multiple recipients
by editing message as new or cutting and
pasting.
6
Addressing (contd.)Addressing (contd.)
 Make sure forward does not embarrass
sender.
Get permission if in doubt.
Never “diss” sender in forward or reply.
 Fill in addresses last to avoid sending
an incomplete Email by mistake.
7
Subject LineSubject Line
 Headline (think newspaper).
 Grab Attention.
 Summarize message.
8
Rate These Subject LinesRate These Subject Lines
1. Subject: Important! Read
Immediately!!
2. Subject: Meeting
3. Subject: Follow-up About Meeting
4. Subject: Announcement
5. Subject: Do we need a larger room for
Social meeting on May 14?
9
Message TextMessage Text
 Keep the message focused and readable.
 Keep it short.
 Use inverted pyramid (newspaper).
 Break into paragraphs; skip lines between.
 Use short sentences and active voice.
 Use plain text editor, not MS Word.
 Avoid HTML.
 Avoid fancy typefaces.
10
Message Text (contd.)
 Write in standard professional English
with Capitalization and correct spelling.
Don’t try to impress.
Avoid chat speak, e.g., CUL8R & emoticons, .
 Don’t type in All Caps – like yelling.
 Avoid using URGENT and IMPORTANT.
 Use * * to highlight text if you must.
 Proofread & spell check.
11
Message Text (contd.)Message Text (contd.)
 Quote back selectively when replying to
long messages.
“Yes, I agree.” is useless without context.
Top quote vs. bottom quote – no consensus.
Avoid “Fisking,” replying line by line in an
argumentative manner.
 For URL links use SNIPURL to shorten
long URLs or enclose in < >.
Free service http://snipurl.com/
12
Message Text (contd.)Message Text (contd.)
 Identify yourself clearly to cold
contacts.
Hello, I am…The reason I am writing…
Hello, so-in-so suggested I contact you…
 Respond Promptly.
Apologize if you don’t.
Interim reply when too busy.
 Don’t shoot the messenger.
13
Attachments
 Use sparingly.
 Cut and paste relevant parts of attachment
into text of Email.
 Use URL links instead.
Upload attachments to website and cite URL.
 Recipients who do not know you may be
reluctant to open attachments or click URLs.
14
Attachments (contd.)Attachments (contd.)
 Post attachment first to avoid “Oops,
here’s the attachment.”
 Trend is posting large attachments into
blogs followed by Email announcement.
Gives people a chance to comment on
attachment without a series of “Reply All”
messages.
Those interested can check comments or
use RSS feed to be notified.
15
Signature LineSignature Line
 Include (if you want people to contact you)
Your name
Title
Organization
Email address (especially on listservs)
Website
Phones
 Can be shortened for frequent
correspondents or placed in header of
Email stationery.
16
Signature Line (contd.)
 If you must include a quote in signature
keep it short.
 “This message is intended for…”
Clutters up Email.
Often longer than message.
Omit unless your company requires it.
 Avoid vCards because some readers
treat them as attachments.
17
StyleStyle
 Threads
Multiple replies can get out of hand, but
continue them to maintain the tread.
When they start to drift start a new thread
with explanation.
 Be true to venue.
Formal vs. informal
 Don’t Flame
More common in chats and blogs, but still
wrong.
18
Style (contd.)Style (contd.)
 Forwarding stuff, e.g., chain letters
Avoid; annoys most people.
Check address list before forwarding a ”Did you
see this?” - They may have received it.
If you must forward, strip out addresses and
use BCC to hide your address list.
19
Style (contd.)Style (contd.)
 Do not overuse high priority option.
 Avoid delivery and read receipts.
 Do not ask to recall a message.
Just apologize and correct.
 Do not copy a message or attachment
without permission.
 Do not scoop someone else’s message.
20
Style (contd.)Style (contd.)
 Chill out!
Avoid sending a snarky reply to a pissy
Email.
Wait 24 hours.
Write, but don’t send.
Don’t reply at all and let them wonder.
Offer to speak by phone or in person; Email
is not a good tool for “clearing the air.”
21
Style (contd.)Style (contd.)
 Chill out (contd.)
Leave no record of sensitive or emotional
responses.
Never say in Email what you wouldn’t say
in person or would not like to see in the
press or defend in court.
Once you hit “Send” you have lost control of
the Email.
○ You can never be certain that it was erased
from all locations. Think of all Email as
Permanent.
22
Confidentiality and Security
Don’t assume privacy.
Unencrypted Email is not secure and may be
monitored.
Don’t include in an unencrypted Email
anything you would not want a third party to
read.
Details of encrypting and digitally signing
Email is beyond the scope of this
presentation.
23
Confidentiality and SecurityConfidentiality and Security
(contd.)(contd.)
Protecting yourself
1. Have a separate free Email account for
newsletters, white paper registration, etc.
2. Delete browser history, cache, cookies,
userids and passwords after using a public
Internet connection.
3. Logout and close all Apps after using a public
Internet connection. (Restart if possible.)
4. Don’t conduct company business on non-
secure personal computer.
5. Back up your Email.
24
Confidentiality and SecurityConfidentiality and Security
(contd.)(contd.)
Protecting yourself (contd.)
6. Beware of spam.
– If it sounds too good, it is.
– Report it.
6. Beware of Phishing attacks.
– Forward them to customer service.
6. Never include personal or financial info in an
Email.
7. Don’t unsubscribe from anything you did not
subscribe to.
8. Beware of friend’s Emails.
25
Confidentiality and SecurityConfidentiality and Security
(contd.)(contd.)
Protecting yourself (contd.)
11. Install a good security suite on your personal
computer.
– Many ISPs, e.g., COMCAST, provide them free.
11. Never share account info, even with family.
12. Use strong passwords.
– Encrypt them on a password protected thumb drive.
11. Encrypt wireless connections.
12. Use encryption and digital signatures for
important Email.
26
Managing EmailManaging Email
 Organize Email into folders.
Use company file plan for in-house Email.
 Keep a copy of all sent Email.
 Review and clean out folders periodically.
Good for rainy day or slow day at work.
Comply with company retention schedule.
 Don’t print Email unless you need to refer
to it remotely.
27
Managing Email (contd.)Managing Email (contd.)
 Declare Email bankruptcy
Inbox clogged with overdue responses.
Send Email to all correspondents
apologizing for not replying and asking
them to resend important Email.
Delete all old messages in Inbox.
Then check your inboxes daily.
28
Managing Email (contd.)Managing Email (contd.)
 Use separate Email channels for
separate communities:
Professional
Business
In-house
Family and friends
Hobbies and interests
Listservs
 Use “out of office” agent when away.
29
DiscussionDiscussion
Questions and Comments?
30

Más contenido relacionado

La actualidad más candente

Effective E Mail Communication
Effective E Mail CommunicationEffective E Mail Communication
Effective E Mail CommunicationVivek Ghiria
 
Email Etiquette: Tips For Better Communication
Email Etiquette: Tips For Better CommunicationEmail Etiquette: Tips For Better Communication
Email Etiquette: Tips For Better CommunicationMonica Dhoundiyal
 
Effective email communication
Effective email communicationEffective email communication
Effective email communicationZeeshan Ahmad
 
Writing Effective Emails
Writing Effective EmailsWriting Effective Emails
Writing Effective EmailsAshit Jain
 
Email Etiquette Workshop
Email Etiquette WorkshopEmail Etiquette Workshop
Email Etiquette Workshopsusan_denny
 
Effective Email communication
Effective Email communicationEffective Email communication
Effective Email communicationChetana Mehta
 
Email Writing Tips
Email Writing TipsEmail Writing Tips
Email Writing TipsRaúl Robles
 
Tips on Effective Email Writing
Tips on Effective Email WritingTips on Effective Email Writing
Tips on Effective Email WritingPOOJA SHARMA
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email EtiquetteMamun Khan
 
Writing Effective Business EMails!
Writing Effective Business EMails!Writing Effective Business EMails!
Writing Effective Business EMails!lorzinian
 
Email etiquette- The sweetest way to learn!
Email etiquette- The sweetest way to learn!Email etiquette- The sweetest way to learn!
Email etiquette- The sweetest way to learn!hari3350
 
Email Writing Skills Slideshare
Email Writing Skills SlideshareEmail Writing Skills Slideshare
Email Writing Skills SlideshareKapil Sharma
 
DOs and DON'Ts in Corporate Emails
DOs and DON'Ts in Corporate EmailsDOs and DON'Ts in Corporate Emails
DOs and DON'Ts in Corporate EmailsArjun Kumar
 
Effective email communication
Effective email communicationEffective email communication
Effective email communicationKaren Eckberg
 

La actualidad más candente (20)

Effective E Mail Communication
Effective E Mail CommunicationEffective E Mail Communication
Effective E Mail Communication
 
Business Email Etiquette
Business Email EtiquetteBusiness Email Etiquette
Business Email Etiquette
 
Email Etiquette: Tips For Better Communication
Email Etiquette: Tips For Better CommunicationEmail Etiquette: Tips For Better Communication
Email Etiquette: Tips For Better Communication
 
Effective email communication
Effective email communicationEffective email communication
Effective email communication
 
Writing Effective Emails
Writing Effective EmailsWriting Effective Emails
Writing Effective Emails
 
Effective email writing
Effective email writing Effective email writing
Effective email writing
 
Email Etiquette Workshop
Email Etiquette WorkshopEmail Etiquette Workshop
Email Etiquette Workshop
 
Effective Email communication
Effective Email communicationEffective Email communication
Effective Email communication
 
How to write a good business email
How to write a good business emailHow to write a good business email
How to write a good business email
 
Email Writing Tips
Email Writing TipsEmail Writing Tips
Email Writing Tips
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
Tips on Effective Email Writing
Tips on Effective Email WritingTips on Effective Email Writing
Tips on Effective Email Writing
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
Writing Effective Business EMails!
Writing Effective Business EMails!Writing Effective Business EMails!
Writing Effective Business EMails!
 
Email etiquette- The sweetest way to learn!
Email etiquette- The sweetest way to learn!Email etiquette- The sweetest way to learn!
Email etiquette- The sweetest way to learn!
 
Email Writing Skills Slideshare
Email Writing Skills SlideshareEmail Writing Skills Slideshare
Email Writing Skills Slideshare
 
DOs and DON'Ts in Corporate Emails
DOs and DON'Ts in Corporate EmailsDOs and DON'Ts in Corporate Emails
DOs and DON'Ts in Corporate Emails
 
Effective email communication
Effective email communicationEffective email communication
Effective email communication
 
Email etiquette
Email etiquetteEmail etiquette
Email etiquette
 
Email Writing Skills
Email Writing SkillsEmail Writing Skills
Email Writing Skills
 

Similar a 9 common e-mail habits that waste time

New powerpoint file
New powerpoint fileNew powerpoint file
New powerpoint fileUmesh Majhi
 
Email etiquette august 2010
Email etiquette august 2010Email etiquette august 2010
Email etiquette august 2010Dr .E. J. Sarma
 
email etiquette by rohit sharma
email etiquette by rohit sharmaemail etiquette by rohit sharma
email etiquette by rohit sharmaRohit Sharma
 
Email etiquette
Email etiquetteEmail etiquette
Email etiquettePradnag
 
Effective Emails Presentation
Effective Emails PresentationEffective Emails Presentation
Effective Emails PresentationAkhtaboot
 
Presentation On Email Etiquettes
Presentation On Email EtiquettesPresentation On Email Etiquettes
Presentation On Email EtiquettesKetan Raval
 
Introduction to Business Emails
Introduction to Business EmailsIntroduction to Business Emails
Introduction to Business EmailsDebopriyo Roy
 
E mail etiquettes (1)
E mail  etiquettes (1)E mail  etiquettes (1)
E mail etiquettes (1)Imran Ansari
 
Email etiquette and effective email use guidance for staff and associates
Email etiquette and effective email use guidance for staff and associatesEmail etiquette and effective email use guidance for staff and associates
Email etiquette and effective email use guidance for staff and associatesThe Pathway Group
 
Writing effective emails
Writing effective emailsWriting effective emails
Writing effective emailsRajesh Mandhare
 
Email protocol & courtesy
Email protocol & courtesyEmail protocol & courtesy
Email protocol & courtesyNB0208
 
Business Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptxBusiness Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptxDr Ganesh Saini
 
E mails.pptx KNOELWDESE THGDFDHGDJHFKJGKH
E mails.pptx KNOELWDESE THGDFDHGDJHFKJGKHE mails.pptx KNOELWDESE THGDFDHGDJHFKJGKH
E mails.pptx KNOELWDESE THGDFDHGDJHFKJGKHshilparaghuwanshi4
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquettemoodledevs
 
Email &amp; Social Media Training
Email &amp; Social Media TrainingEmail &amp; Social Media Training
Email &amp; Social Media TrainingWilliam Mann
 
Instruction designing
Instruction designingInstruction designing
Instruction designingSujian00
 

Similar a 9 common e-mail habits that waste time (20)

New powerpoint file
New powerpoint fileNew powerpoint file
New powerpoint file
 
Email etiquette august 2010
Email etiquette august 2010Email etiquette august 2010
Email etiquette august 2010
 
email etiquette by rohit sharma
email etiquette by rohit sharmaemail etiquette by rohit sharma
email etiquette by rohit sharma
 
Email etiquette
Email etiquetteEmail etiquette
Email etiquette
 
Effective Emails Presentation
Effective Emails PresentationEffective Emails Presentation
Effective Emails Presentation
 
Presentation On Email Etiquettes
Presentation On Email EtiquettesPresentation On Email Etiquettes
Presentation On Email Etiquettes
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
Introduction to Business Emails
Introduction to Business EmailsIntroduction to Business Emails
Introduction to Business Emails
 
E mail etiquettes (1)
E mail  etiquettes (1)E mail  etiquettes (1)
E mail etiquettes (1)
 
Written BiZeti
Written BiZetiWritten BiZeti
Written BiZeti
 
Email etiquette and effective email use guidance for staff and associates
Email etiquette and effective email use guidance for staff and associatesEmail etiquette and effective email use guidance for staff and associates
Email etiquette and effective email use guidance for staff and associates
 
Writing effective emails
Writing effective emailsWriting effective emails
Writing effective emails
 
101 email etiquette tips
101 email etiquette tips101 email etiquette tips
101 email etiquette tips
 
Email protocol & courtesy
Email protocol & courtesyEmail protocol & courtesy
Email protocol & courtesy
 
Business Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptxBusiness Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptx
 
E mails.pptx KNOELWDESE THGDFDHGDJHFKJGKH
E mails.pptx KNOELWDESE THGDFDHGDJHFKJGKHE mails.pptx KNOELWDESE THGDFDHGDJHFKJGKH
E mails.pptx KNOELWDESE THGDFDHGDJHFKJGKH
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
Email &amp; Social Media Training
Email &amp; Social Media TrainingEmail &amp; Social Media Training
Email &amp; Social Media Training
 
E Mail Ethics and Etiquettes
E Mail Ethics and EtiquettesE Mail Ethics and Etiquettes
E Mail Ethics and Etiquettes
 
Instruction designing
Instruction designingInstruction designing
Instruction designing
 

Más de Dixita S

Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud Dixita S
 
Annual Budget
Annual Budget Annual Budget
Annual Budget Dixita S
 
Annual Budget
Annual BudgetAnnual Budget
Annual BudgetDixita S
 
Outsourcing best practices
Outsourcing best practicesOutsourcing best practices
Outsourcing best practicesDixita S
 
Provident fund ppt
Provident fund pptProvident fund ppt
Provident fund pptDixita S
 
Civilservices
CivilservicesCivilservices
CivilservicesDixita S
 
Performance Appraisal
Performance AppraisalPerformance Appraisal
Performance AppraisalDixita S
 
The art of Interview
The art of InterviewThe art of Interview
The art of InterviewDixita S
 

Más de Dixita S (8)

Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 
Annual Budget
Annual Budget Annual Budget
Annual Budget
 
Annual Budget
Annual BudgetAnnual Budget
Annual Budget
 
Outsourcing best practices
Outsourcing best practicesOutsourcing best practices
Outsourcing best practices
 
Provident fund ppt
Provident fund pptProvident fund ppt
Provident fund ppt
 
Civilservices
CivilservicesCivilservices
Civilservices
 
Performance Appraisal
Performance AppraisalPerformance Appraisal
Performance Appraisal
 
The art of Interview
The art of InterviewThe art of Interview
The art of Interview
 

Último

Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 

Último (20)

Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 

9 common e-mail habits that waste time

  • 1. By Team Approachjob, Bangalore 1
  • 2. ““9 common9 common e-mail habits that waste timee-mail habits that waste time and cause problems”and cause problems” 1. Vague or nonexistent subject line. 2. Changing the topic without changing the subject. 3. Including multiple subjects in one note. 4. Sending before thinking. 2
  • 3. 9 habits contd.9 habits contd. 5. Inadvertent replying to all. 6. Omitting the context of a reply. 7. Misaddressed recipients. 8. Displaying addresses of recipients who are strangers to each other. 9. Replying vs. forwarding. 3
  • 4. AgendaAgenda 1. Addressing 2. Subject Line 3. Message Text 4. Signature Line 5. Attachments 6. Style 7. Confidentiality and Security 8. Managing Email 9. References 10. Discussion 4
  • 5. AddressingAddressing  Limit to who really needs to know.  Make it clear in text who has action and who is info addressee.  Use BCC to protect Email addresses unless everyone knows each other.  Watch Reply All. 5
  • 6. Addressing (contd.)Addressing (contd.)  Use address book with mail groups & validate often. Avoid typing addresses free hand; many addresses are similar; watch auto fill. Send same message to multiple recipients by editing message as new or cutting and pasting. 6
  • 7. Addressing (contd.)Addressing (contd.)  Make sure forward does not embarrass sender. Get permission if in doubt. Never “diss” sender in forward or reply.  Fill in addresses last to avoid sending an incomplete Email by mistake. 7
  • 8. Subject LineSubject Line  Headline (think newspaper).  Grab Attention.  Summarize message. 8
  • 9. Rate These Subject LinesRate These Subject Lines 1. Subject: Important! Read Immediately!! 2. Subject: Meeting 3. Subject: Follow-up About Meeting 4. Subject: Announcement 5. Subject: Do we need a larger room for Social meeting on May 14? 9
  • 10. Message TextMessage Text  Keep the message focused and readable.  Keep it short.  Use inverted pyramid (newspaper).  Break into paragraphs; skip lines between.  Use short sentences and active voice.  Use plain text editor, not MS Word.  Avoid HTML.  Avoid fancy typefaces. 10
  • 11. Message Text (contd.)  Write in standard professional English with Capitalization and correct spelling. Don’t try to impress. Avoid chat speak, e.g., CUL8R & emoticons, .  Don’t type in All Caps – like yelling.  Avoid using URGENT and IMPORTANT.  Use * * to highlight text if you must.  Proofread & spell check. 11
  • 12. Message Text (contd.)Message Text (contd.)  Quote back selectively when replying to long messages. “Yes, I agree.” is useless without context. Top quote vs. bottom quote – no consensus. Avoid “Fisking,” replying line by line in an argumentative manner.  For URL links use SNIPURL to shorten long URLs or enclose in < >. Free service http://snipurl.com/ 12
  • 13. Message Text (contd.)Message Text (contd.)  Identify yourself clearly to cold contacts. Hello, I am…The reason I am writing… Hello, so-in-so suggested I contact you…  Respond Promptly. Apologize if you don’t. Interim reply when too busy.  Don’t shoot the messenger. 13
  • 14. Attachments  Use sparingly.  Cut and paste relevant parts of attachment into text of Email.  Use URL links instead. Upload attachments to website and cite URL.  Recipients who do not know you may be reluctant to open attachments or click URLs. 14
  • 15. Attachments (contd.)Attachments (contd.)  Post attachment first to avoid “Oops, here’s the attachment.”  Trend is posting large attachments into blogs followed by Email announcement. Gives people a chance to comment on attachment without a series of “Reply All” messages. Those interested can check comments or use RSS feed to be notified. 15
  • 16. Signature LineSignature Line  Include (if you want people to contact you) Your name Title Organization Email address (especially on listservs) Website Phones  Can be shortened for frequent correspondents or placed in header of Email stationery. 16
  • 17. Signature Line (contd.)  If you must include a quote in signature keep it short.  “This message is intended for…” Clutters up Email. Often longer than message. Omit unless your company requires it.  Avoid vCards because some readers treat them as attachments. 17
  • 18. StyleStyle  Threads Multiple replies can get out of hand, but continue them to maintain the tread. When they start to drift start a new thread with explanation.  Be true to venue. Formal vs. informal  Don’t Flame More common in chats and blogs, but still wrong. 18
  • 19. Style (contd.)Style (contd.)  Forwarding stuff, e.g., chain letters Avoid; annoys most people. Check address list before forwarding a ”Did you see this?” - They may have received it. If you must forward, strip out addresses and use BCC to hide your address list. 19
  • 20. Style (contd.)Style (contd.)  Do not overuse high priority option.  Avoid delivery and read receipts.  Do not ask to recall a message. Just apologize and correct.  Do not copy a message or attachment without permission.  Do not scoop someone else’s message. 20
  • 21. Style (contd.)Style (contd.)  Chill out! Avoid sending a snarky reply to a pissy Email. Wait 24 hours. Write, but don’t send. Don’t reply at all and let them wonder. Offer to speak by phone or in person; Email is not a good tool for “clearing the air.” 21
  • 22. Style (contd.)Style (contd.)  Chill out (contd.) Leave no record of sensitive or emotional responses. Never say in Email what you wouldn’t say in person or would not like to see in the press or defend in court. Once you hit “Send” you have lost control of the Email. ○ You can never be certain that it was erased from all locations. Think of all Email as Permanent. 22
  • 23. Confidentiality and Security Don’t assume privacy. Unencrypted Email is not secure and may be monitored. Don’t include in an unencrypted Email anything you would not want a third party to read. Details of encrypting and digitally signing Email is beyond the scope of this presentation. 23
  • 24. Confidentiality and SecurityConfidentiality and Security (contd.)(contd.) Protecting yourself 1. Have a separate free Email account for newsletters, white paper registration, etc. 2. Delete browser history, cache, cookies, userids and passwords after using a public Internet connection. 3. Logout and close all Apps after using a public Internet connection. (Restart if possible.) 4. Don’t conduct company business on non- secure personal computer. 5. Back up your Email. 24
  • 25. Confidentiality and SecurityConfidentiality and Security (contd.)(contd.) Protecting yourself (contd.) 6. Beware of spam. – If it sounds too good, it is. – Report it. 6. Beware of Phishing attacks. – Forward them to customer service. 6. Never include personal or financial info in an Email. 7. Don’t unsubscribe from anything you did not subscribe to. 8. Beware of friend’s Emails. 25
  • 26. Confidentiality and SecurityConfidentiality and Security (contd.)(contd.) Protecting yourself (contd.) 11. Install a good security suite on your personal computer. – Many ISPs, e.g., COMCAST, provide them free. 11. Never share account info, even with family. 12. Use strong passwords. – Encrypt them on a password protected thumb drive. 11. Encrypt wireless connections. 12. Use encryption and digital signatures for important Email. 26
  • 27. Managing EmailManaging Email  Organize Email into folders. Use company file plan for in-house Email.  Keep a copy of all sent Email.  Review and clean out folders periodically. Good for rainy day or slow day at work. Comply with company retention schedule.  Don’t print Email unless you need to refer to it remotely. 27
  • 28. Managing Email (contd.)Managing Email (contd.)  Declare Email bankruptcy Inbox clogged with overdue responses. Send Email to all correspondents apologizing for not replying and asking them to resend important Email. Delete all old messages in Inbox. Then check your inboxes daily. 28
  • 29. Managing Email (contd.)Managing Email (contd.)  Use separate Email channels for separate communities: Professional Business In-house Family and friends Hobbies and interests Listservs  Use “out of office” agent when away. 29

Notas del editor

  1. Email has become so common and so easy to use that it is easy for us to become careless and fall into bad Email habits. This presentation will provide some guidelines that will Make you look more professional, Make it easier for your correspondents to understand and respond to your Email, and Keep you and your organization out of trouble.
  2. This is the outline of a TechRepublic newsletter article that sparked this presentation. It is a good summary of the presentation. These points will be covered in more detail later in the presentation.
  3. Now, none of us are guilty of any of these habits, but we have probably received Emails from those who are.
  4. Most of the articles on writing E-mail that I referenced were unorganized lists of tips. I organized them into the following topics for presentation.
  5. It is all to easy to send shotgun messages to a long list of people hoping that someone has the information you need or will take the action you want. It is much more effective and less annoying to the recipients when you limit your addressees and make it clear who has the action. When our membership director sends out Eblasts to the chapter membership she is careful to use BCC. If someone is trying to organize coverage of an event then a reply all is useful in order to see who is available when. (Use coffee duty reply as good example of Reply All.)
  6. Nothing is more devastating to an Email user than losing part or all of an address book. Use one of the address book fields to link people in a mail group, e.g., family, ARMA chapter. Then you can sort on this field to group all the names together when you want to build a list. Add new correspondents to your address book as you receive Email from them. (Use example of sending seminar RFP to several addressees as separate Emails.)
  7. There is not much to add to this.
  8. This is the area where most of us could do better. Many of your correspondents are faced with large numbers of Emails when they check their inboxes. You need to make your message standout and make it easy for the person to decide when to read your message. A good subject line also makes it easier to locate you message later. (Use Email to Region announcing election loss as example of last bullet.)
  9. All but the last are too brief and general to determine what the message is about.
  10. The purpose of your Email text or body is to convey a message to your addressees as quickly and clearly as possible. Take the time to craft the text using all the rules of good writing that you learned in school. Remember that some of your addressees my have Email readers that only handle plain text. They are the lowest common denominator. Others, who use high end Email applications like MS Outlook, may be able to read Rich Text Format and HTML messages.
  11. The bottom line is to write like a professional.
  12. Top quote is when you quote the portion of the original message that you are replying to above your reply. Bottom quote is just the opposite. Line by line or question by question responses are OK, just don’t make them argumentative. (Use example of long .gov job listing URL)
  13. (Use example of Chicago speaker Email with no intro.)
  14. (Use Tina’s Attorney-Client Email as a good example of imbedded attachment.) Scribd.com is recommended by Peter Kurilecz, CRM, CA of the RM Listserv.
  15. Most of us have been guilty of forgetting attachments or sending large attachments that take forever to download. There are enough free blog and wiki sites on the Internet that we can avoid sending attachments. Trend in most businesses is to post meeting agendas, presentations, and minutes on in-house blogs or wikis and just use Emails to announce their posting. This reduces the communication bandwidth needed for large distribution lists and the Email storage needed for multiple copies of Email with large attachments. (Use example of CRM Workshop announcement with link to website brochure.)
  16. (use example of ARMA vendor follow up Email.)
  17. How many times have you received a message where the signature block was longer than the message? Be selective with your signature line. VCards are standard contact information that can be shared on the Internet. They are convenient for sharing contact information. But they may be difficult for some Email readers to handle. Use sparingly. (Use example of Region Assessment Email for large signature block.)
  18. (Use example of dialogue with ICRM on obtaining CRM credits.)
  19. (Use example of driver’s license Email hoax.)
  20. The things on this list tend to annoy other people. Protect your reputation as a courteous Email user.
  21. Mother always told you to count to ten.
  22. Except in rare cases with internal Email, you really can not recall an Email. So be careful what you send.
  23. Check your company policy if you are using their Email server. Secure socket layer (https) provides encryption of information exchanged via web browser. Safer than giving credit card info via phone or fax.
  24. May become clogged with spam if you don’t use a service with a good filter, like Hotmail or Gmail. A later user can track back your activity and collect info on you. Leave nothing behind. Working from home may be tempting but it is dangerous. Some websites offer a free automatic service. Do it every 3 months.
  25. 6. Most of know what it is. 7. Call or write customer service when in doubt. 8. Online commerce sites will have a secure socket layer (https) form for collecting this info, not Email. 9. Unsubscribing confirms your Email address. 10. Friends may pass along malware and viruses unintentionally.
  26. 11. Firewall, virus checker, spyware blocker, spam filter, etc. 12. Once used on another computer consider it compromised. 13. Like wearing your seat belt. 14. Unless your wireless access port is in the middle of nowhere. 15. All other Email is subject to compromise.
  27. (Use Netscape folders as example.) For personal Email folders need to make sense to the user. For official company Email the company file plan should be used.
  28. Once in a while we all get overwhelmed with the unread messages in our inboxes. Here is a way to start over. Another, less honest way is to claim that you had a computer malfunction that lost your Email.
  29. Most companies and agencies permit a limited amount of unofficial Email correspondence at work. To avoid overwhelming your office inbox with outside Email, or having the office firewall trap outside Email, use other Email accounts for non-business correspondence.