SlideShare a Scribd company logo
1 of 30
Email Strategies
AHaller
You’ve Got Mail
What About Email?
 Write a one minute paper - what email address do
you use?
 If you have more than one email list them and
comment what led you to chose that email address
 What is the story behind the name(s) you selected?
What does an email address mean?
 It is an unique name that consists of a user name and
domain name that identifies the user
 A plain ordinary email address why is it best?
Next
The World Wide Web
 What takes place when we sign on?
How does email travel?
Step 4.
When recipient uses
e-mail software to check
for e-mail messages, the
message transfers from
incoming mail server to
recipient’s computer
Step 2.
Your software
contacts software
on your service
provider’s
outgoing mail
server
Step 3.
Software on outgoing mail server
determines best route for data and sends
message, which travels along Internet
routers to recipient’s incoming mail server
Step 1.
Using e-mail
software, you
create and send
message
A number uniquely identifies each computer or device connected to
Internet
The IP address informs where to
send and transmit information
Every email carries an IP address
What is IP Addressing?
 The client (your computer) has a network interface
card (NIC card) with a MAC address
 Your router has a unique IP address with your Internet
Service Provider.
 Every email we transmit carries our IP address and our
NIC card or MAC address that uniquely identifies our
computer
 www.ipchicken.com
 www.whatismyipaddress.com
How to trace an email
IP Address 124.6.63.102
Email Trace
IP Address 124.6.63.102
Western Union often is a transfer point for fraudulent purposes
Or
Divulging One’s Bank Account Information
Sending Email
Unless encrypted more than just the sender and receiver
have access to the transmission
 Does the Internet service provider retain a copy?
 Can a hacker capture a copy with a packet snooper?
 Can the government capture a copy?
 If sent from work can our employer can read it?
 Does our email remain indefinitely somewhere on any
of the above computers? What of Sarbanes Oxley?
How many years?
Employer/Employee Activity
Because an employee uses the employer’s machine, web
connection, desk, time, etc do we have any privacy
rights?
Whatever web searches we do while at work can they
be monitored by management? In fact will they?
 Every Company has Employees who Abuse the Internet, some of whom spend
hours per day surfing news, shopping, sports, gambling and sex sites. Others leak
confidential information, engage in personal email and chats, download software
and music illegally, hog network bandwidth or harass coworkers.
 This abuse by employees is costing their companies huge amounts of money. For
example, a company with just ten employees who each waste an hour a day on the
Internet is losing $50,000 per year in lost productivity.
 But consider this: If you investigate just ONE EMPLOYEE and find that your
suspicions about bad behavior are correct, you will have easily paid for Spector
CNE Investigator many times over.
Where to Encrypt in Word to send as an Attached file
16
Netiquette – what is it?
Golden Rule: Treat others as
you would like them to treat you.
 Code of acceptable behaviors users should
follow while on the Internet
All Email is Mood Sensitive
SAD GLAD FUNNY
MAD FACTUAL INTENTIONAL
MISINFORMING
All Email is Mood Sensitive
SAD GLAD FUNNY
MAD FACTUAL INTENTIONAL
MISINFORMING
When On the Receiving End of Inappropriate
Email
SAD – be sympathetic as needed FUNNY – Bear with the
crudeness and possible
insult – be cool – write
nothing – if needed phone
saying they crossed the line
FUNNY
MAD – Avoid responding in like
kind – give them what they don’t
deserve - grace “It is my offense I can do
what I want to with it”
THREATS THAT ARE
NOT JUST VEILED
THREATS – take it up
the chain of command
– do not respond
Email Systems
 Email Etiquette
 Determine whether email is the proper communication
method
 Do not use all caps, which indicates SHOUTING
 Do not respond with strong language or insults
 Flaming
 Use emoticons and emojis sparingly
 Emoticons and emojis are rarely appropriate for business
email
Chapter 4: Communicating
Online 21
 Netiquette is the code of acceptable Internet behavior
22
Email Signature
 What is an email signature?
 It is a predetermined banner or statement at
the end of a message. Sometimes it can be
our contact address or salutation.
 In business usually the email signature will
be a disclaimer prohibiting the unauthorized
reuse of the message or attachment without
approval of the sender.
EMAIL DISCLAIMER
This email message and all attachments transmitted with it may
contain legally privileged and confidential information intended
solely for the use of the addressee.
If the reader of this message is not the intended recipient, you
are hereby notified that any reading, dissemination, distribution,
copying, or other use of this message or its attachments is strictly
prohibited.
If you have received this message in error, please notify the
sender immediately by telephone (561-xxx-xxxx) or by electronic
mail, and delete this message and all copies and backups
thereof.
Thank you
 Don't Send That Email. Pick up the Phone!
 1. It is hard to get the EQ (emotional intelligence) right in email. Tone
and context are easy to misread. In a live conversation, how one says
something, with modulations and intonations. With email it is hard to
get the feelings behind the words.
 2.Email and text often promote reactive responses, as opposed to
progress and action to move forward. It is hard for people to pause and
think about what they should say. Avoid reacting to any incendiary
message. Always take the higher ground over email. It can save your job.
 3.Email prolongs debate. Because of the two reasons above, debates
continue well beyond the point of usefulness. Situations which start
relatively benignly over email, only to escalate. Misstatements and
misreads abound. When I ask people if they have called or asked to meet
the counterpart to try and reach a resolution, there is usually a pause,
then a sad answer of "no.“
 4.Avoid digital conflict resolution.
Harvard Business Review on Email
Your Computer Can Get You Fired
 A) Blog it up. Most company policy is that employees must first get permission to write for a
non company outlet. Never write about work on the Internet unless your boss knows. Example
Cisco.
 B) Play A Way: New York City Mayor Michael Bloomberg caught sight of a solitaire game on a
city employee's computer screen and fired him. Employees who use a company computer for
personal matters on company time are stealing.
 C) Look at pics. One third of bosses have fired workers for misusing the Internet. The reason
was the viewing, downloading, or uploading of inappropriate or offensive content.
 D) Post your pics. Employers monitor social networking sites. Not only do companies fear
employees posting proprietary information, but they also don't want to find photos of the boss
dancing on the table drunk at the holiday party. Opinions posted that run contrary to company
values get employees fired.
 E) Write R-rated E-mails. Over 25% of employers have fired an employee for E-mail-related
offenses said it was for inappropriate or offensive language. Assume that someone inside the
company is reading it..
Employers are concerned with their legal liability, companies archive
electronically stored information, rather than erase it, and it's subject to
discovery in a federal lawsuit. Most companies monitor E-mail
automatically
What email needs to be avoided?
Any transmission of sensitive information
Any strongly held opinions, strong emotions (anger,
fear, sadness, arrogance) , off colored jokes, cynical
statements, slander, exaggerations, intentional
misstating of fact, words that convey double
meanings. Demotions and sudden job loss can occur
 For trying moments send an email that reads – “we
need to talk – I will be available at 3PM” or “we need
to talk let me know what time is best for me to call
you to discuss your concerns?”
Doctor Resigns Over Obama
E-Mail
By A Local Newspaper - Sunday, July 26, 2009
The president-elect of the … County Medical Association
stepped down Friday, apologizing profusely for forwarding
an e-mail image that portrayed President Obama as a witch
doctor ….as news of the e-mail spread, leaders of
prominent medical institutions distanced themselves from
his actions…"The ….. County Medical Association regrets
and is appalled by the statements accepting his resignation.
Substitute telephoning for
sensitive email
Personal Application:
 Should I change my current email name?
 If a distinguished neurosurgeon can be forced to resign
and disgraced over ONE email who else could a job loss
occur happen to?
 Could my emails possibly invite a legal attack or even
personal attack one day if I am not careful?
 Should I have an email disclaimer as my email signature?
 For sensitive information – what is an alternative means
to communicate more effectively?

More Related Content

What's hot

Web 2.0: Making Email a Useful Web App
Web 2.0: Making Email a Useful Web AppWeb 2.0: Making Email a Useful Web App
Web 2.0: Making Email a Useful Web AppAndy Denmark
 
Benefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer CentreBenefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer Centrejatin batra
 
Tutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: EmailTutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: Emaildpd
 
Tech Training - Session 8
Tech Training - Session 8Tech Training - Session 8
Tech Training - Session 8William Mann
 
email basics for yahoo
email basics for yahooemail basics for yahoo
email basics for yahooLisa Lindsay
 
7 module web based email
7 module web based email7 module web based email
7 module web based emailRozell Sneede
 
Internet and Email 101 v1
Internet and Email 101 v1Internet and Email 101 v1
Internet and Email 101 v1Adam Ripsam
 
Email explained in 2 minutes
Email explained in 2 minutesEmail explained in 2 minutes
Email explained in 2 minutesPauly Ting
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammerguest2e06031d
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammerguest2e06031d
 
creation of personal e-mail id
creation of personal e-mail idcreation of personal e-mail id
creation of personal e-mail idakhila prasanth
 

What's hot (19)

Ass6
Ass6Ass6
Ass6
 
Email etiquette
Email etiquetteEmail etiquette
Email etiquette
 
Web 2.0: Making Email a Useful Web App
Web 2.0: Making Email a Useful Web AppWeb 2.0: Making Email a Useful Web App
Web 2.0: Making Email a Useful Web App
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Benefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer CentreBenefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer Centre
 
Tutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: EmailTutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: Email
 
Tech Training - Session 8
Tech Training - Session 8Tech Training - Session 8
Tech Training - Session 8
 
email basics for yahoo
email basics for yahooemail basics for yahoo
email basics for yahoo
 
E mail features
E mail featuresE mail features
E mail features
 
7 module web based email
7 module web based email7 module web based email
7 module web based email
 
7 module web based email
7 module web based email7 module web based email
7 module web based email
 
Email basics
Email basicsEmail basics
Email basics
 
E Mail
E MailE Mail
E Mail
 
Internet and Email 101 v1
Internet and Email 101 v1Internet and Email 101 v1
Internet and Email 101 v1
 
Email explained in 2 minutes
Email explained in 2 minutesEmail explained in 2 minutes
Email explained in 2 minutes
 
Email
EmailEmail
Email
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammer
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammer
 
creation of personal e-mail id
creation of personal e-mail idcreation of personal e-mail id
creation of personal e-mail id
 

Similar to Email strategies

A Quick Email Etiquette Education
A Quick Email Etiquette EducationA Quick Email Etiquette Education
A Quick Email Etiquette EducationChelse Benham
 
E-mail Etiquette.ppt
E-mail Etiquette.pptE-mail Etiquette.ppt
E-mail Etiquette.pptJaved883411
 
email etiquette by rohit sharma
email etiquette by rohit sharmaemail etiquette by rohit sharma
email etiquette by rohit sharmaRohit Sharma
 
E mail etiquette
E mail etiquetteE mail etiquette
E mail etiquettejmbenak
 
Essentials of Business Email
Essentials of Business EmailEssentials of Business Email
Essentials of Business Emailpavansriram
 
Final paper
Final paperFinal paper
Final paperJDonpfd3
 
Business Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptxBusiness Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptxDr Ganesh Saini
 
E mail etiquettes
E mail etiquettesE mail etiquettes
E mail etiquettesJpRawat
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSlesteraporado16
 
Email campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxEmail campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxPatricia Rountree
 
Is employer monitoring of employee email justified
Is employer monitoring of employee email justifiedIs employer monitoring of employee email justified
Is employer monitoring of employee email justifiedParker Donat
 
Did you get my email?
Did you get my email?Did you get my email?
Did you get my email?Tayfun TEK
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitssuser64f8f8
 

Similar to Email strategies (20)

A Quick Email Etiquette Education
A Quick Email Etiquette EducationA Quick Email Etiquette Education
A Quick Email Etiquette Education
 
Email Essentials
Email EssentialsEmail Essentials
Email Essentials
 
E-mail Etiquette.ppt
E-mail Etiquette.pptE-mail Etiquette.ppt
E-mail Etiquette.ppt
 
email etiquette by rohit sharma
email etiquette by rohit sharmaemail etiquette by rohit sharma
email etiquette by rohit sharma
 
E mail etiquette
E mail etiquetteE mail etiquette
E mail etiquette
 
email_
email_email_
email_
 
Essentials of Business Email
Essentials of Business EmailEssentials of Business Email
Essentials of Business Email
 
Final paper
Final paperFinal paper
Final paper
 
Email basics
Email basicsEmail basics
Email basics
 
E‑mail
E‑mailE‑mail
E‑mail
 
Business Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptxBusiness Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptx
 
Spam!
Spam!Spam!
Spam!
 
Safe Email Practices
Safe Email PracticesSafe Email Practices
Safe Email Practices
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
 
E mail etiquettes
E mail etiquettesE mail etiquettes
E mail etiquettes
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
Email campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxEmail campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docx
 
Is employer monitoring of employee email justified
Is employer monitoring of employee email justifiedIs employer monitoring of employee email justified
Is employer monitoring of employee email justified
 
Did you get my email?
Did you get my email?Did you get my email?
Did you get my email?
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 

More from Alan Haller

SALVATION-vs-Discipleship.pdf
SALVATION-vs-Discipleship.pdfSALVATION-vs-Discipleship.pdf
SALVATION-vs-Discipleship.pdfAlan Haller
 
SALVATION-vs-Discipleship.pdf
SALVATION-vs-Discipleship.pdfSALVATION-vs-Discipleship.pdf
SALVATION-vs-Discipleship.pdfAlan Haller
 
Just War Theory Using Zoom (3).pptx
Just War Theory Using Zoom (3).pptxJust War Theory Using Zoom (3).pptx
Just War Theory Using Zoom (3).pptxAlan Haller
 
Walking on Water.pptx
Walking on Water.pptxWalking on Water.pptx
Walking on Water.pptxAlan Haller
 
Luke 15 Older Son.pptx
Luke 15 Older Son.pptxLuke 15 Older Son.pptx
Luke 15 Older Son.pptxAlan Haller
 
Just War Theory Using Zoom (2).pptx
Just War Theory Using Zoom (2).pptxJust War Theory Using Zoom (2).pptx
Just War Theory Using Zoom (2).pptxAlan Haller
 
Manuscripts.pptx
Manuscripts.pptxManuscripts.pptx
Manuscripts.pptxAlan Haller
 
Seven psychololgical aspects of Gaming
Seven psychololgical aspects of GamingSeven psychololgical aspects of Gaming
Seven psychololgical aspects of GamingAlan Haller
 
Rich young ruler
Rich young rulerRich young ruler
Rich young rulerAlan Haller
 
Luke 12 bigger barns (2)
Luke 12  bigger barns (2)Luke 12  bigger barns (2)
Luke 12 bigger barns (2)Alan Haller
 
Every worldview explains
Every worldview explainsEvery worldview explains
Every worldview explainsAlan Haller
 
Decisions that define
Decisions that defineDecisions that define
Decisions that defineAlan Haller
 
Eq versus iq iceberg
Eq versus iq icebergEq versus iq iceberg
Eq versus iq icebergAlan Haller
 
In hoc anno domini
In hoc anno dominiIn hoc anno domini
In hoc anno dominiAlan Haller
 
Cloud computing 2021
Cloud computing 2021Cloud computing 2021
Cloud computing 2021Alan Haller
 
Values virtue clarification second edition
Values virtue clarification second editionValues virtue clarification second edition
Values virtue clarification second editionAlan Haller
 

More from Alan Haller (20)

SALVATION-vs-Discipleship.pdf
SALVATION-vs-Discipleship.pdfSALVATION-vs-Discipleship.pdf
SALVATION-vs-Discipleship.pdf
 
SALVATION-vs-Discipleship.pdf
SALVATION-vs-Discipleship.pdfSALVATION-vs-Discipleship.pdf
SALVATION-vs-Discipleship.pdf
 
Just War Theory Using Zoom (3).pptx
Just War Theory Using Zoom (3).pptxJust War Theory Using Zoom (3).pptx
Just War Theory Using Zoom (3).pptx
 
Walking on Water.pptx
Walking on Water.pptxWalking on Water.pptx
Walking on Water.pptx
 
Luke 15 Older Son.pptx
Luke 15 Older Son.pptxLuke 15 Older Son.pptx
Luke 15 Older Son.pptx
 
Buddhism.pptx
Buddhism.pptxBuddhism.pptx
Buddhism.pptx
 
Just War Theory Using Zoom (2).pptx
Just War Theory Using Zoom (2).pptxJust War Theory Using Zoom (2).pptx
Just War Theory Using Zoom (2).pptx
 
Manuscripts.pptx
Manuscripts.pptxManuscripts.pptx
Manuscripts.pptx
 
Luke 15.docx
Luke 15.docxLuke 15.docx
Luke 15.docx
 
Seven psychololgical aspects of Gaming
Seven psychololgical aspects of GamingSeven psychololgical aspects of Gaming
Seven psychololgical aspects of Gaming
 
Rich young ruler
Rich young rulerRich young ruler
Rich young ruler
 
John chapter 8
John chapter 8John chapter 8
John chapter 8
 
Luke 12 bigger barns (2)
Luke 12  bigger barns (2)Luke 12  bigger barns (2)
Luke 12 bigger barns (2)
 
Every worldview explains
Every worldview explainsEvery worldview explains
Every worldview explains
 
Decisions that define
Decisions that defineDecisions that define
Decisions that define
 
Justice
JusticeJustice
Justice
 
Eq versus iq iceberg
Eq versus iq icebergEq versus iq iceberg
Eq versus iq iceberg
 
In hoc anno domini
In hoc anno dominiIn hoc anno domini
In hoc anno domini
 
Cloud computing 2021
Cloud computing 2021Cloud computing 2021
Cloud computing 2021
 
Values virtue clarification second edition
Values virtue clarification second editionValues virtue clarification second edition
Values virtue clarification second edition
 

Recently uploaded

Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Sheetaleventcompany
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...allensay1
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture conceptP&CO
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 

Recently uploaded (20)

Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 

Email strategies

  • 3. What About Email?  Write a one minute paper - what email address do you use?  If you have more than one email list them and comment what led you to chose that email address  What is the story behind the name(s) you selected?
  • 4. What does an email address mean?  It is an unique name that consists of a user name and domain name that identifies the user  A plain ordinary email address why is it best? Next
  • 5. The World Wide Web  What takes place when we sign on?
  • 6. How does email travel? Step 4. When recipient uses e-mail software to check for e-mail messages, the message transfers from incoming mail server to recipient’s computer Step 2. Your software contacts software on your service provider’s outgoing mail server Step 3. Software on outgoing mail server determines best route for data and sends message, which travels along Internet routers to recipient’s incoming mail server Step 1. Using e-mail software, you create and send message
  • 7. A number uniquely identifies each computer or device connected to Internet The IP address informs where to send and transmit information Every email carries an IP address
  • 8. What is IP Addressing?  The client (your computer) has a network interface card (NIC card) with a MAC address  Your router has a unique IP address with your Internet Service Provider.  Every email we transmit carries our IP address and our NIC card or MAC address that uniquely identifies our computer  www.ipchicken.com  www.whatismyipaddress.com
  • 9. How to trace an email IP Address 124.6.63.102
  • 10. Email Trace IP Address 124.6.63.102 Western Union often is a transfer point for fraudulent purposes Or Divulging One’s Bank Account Information
  • 11. Sending Email Unless encrypted more than just the sender and receiver have access to the transmission  Does the Internet service provider retain a copy?  Can a hacker capture a copy with a packet snooper?  Can the government capture a copy?  If sent from work can our employer can read it?  Does our email remain indefinitely somewhere on any of the above computers? What of Sarbanes Oxley? How many years?
  • 12. Employer/Employee Activity Because an employee uses the employer’s machine, web connection, desk, time, etc do we have any privacy rights? Whatever web searches we do while at work can they be monitored by management? In fact will they?
  • 13.  Every Company has Employees who Abuse the Internet, some of whom spend hours per day surfing news, shopping, sports, gambling and sex sites. Others leak confidential information, engage in personal email and chats, download software and music illegally, hog network bandwidth or harass coworkers.  This abuse by employees is costing their companies huge amounts of money. For example, a company with just ten employees who each waste an hour a day on the Internet is losing $50,000 per year in lost productivity.  But consider this: If you investigate just ONE EMPLOYEE and find that your suspicions about bad behavior are correct, you will have easily paid for Spector CNE Investigator many times over.
  • 14.
  • 15. Where to Encrypt in Word to send as an Attached file
  • 16. 16
  • 17. Netiquette – what is it? Golden Rule: Treat others as you would like them to treat you.  Code of acceptable behaviors users should follow while on the Internet
  • 18. All Email is Mood Sensitive SAD GLAD FUNNY MAD FACTUAL INTENTIONAL MISINFORMING
  • 19. All Email is Mood Sensitive SAD GLAD FUNNY MAD FACTUAL INTENTIONAL MISINFORMING
  • 20. When On the Receiving End of Inappropriate Email SAD – be sympathetic as needed FUNNY – Bear with the crudeness and possible insult – be cool – write nothing – if needed phone saying they crossed the line FUNNY MAD – Avoid responding in like kind – give them what they don’t deserve - grace “It is my offense I can do what I want to with it” THREATS THAT ARE NOT JUST VEILED THREATS – take it up the chain of command – do not respond
  • 21. Email Systems  Email Etiquette  Determine whether email is the proper communication method  Do not use all caps, which indicates SHOUTING  Do not respond with strong language or insults  Flaming  Use emoticons and emojis sparingly  Emoticons and emojis are rarely appropriate for business email Chapter 4: Communicating Online 21
  • 22.  Netiquette is the code of acceptable Internet behavior 22
  • 23. Email Signature  What is an email signature?  It is a predetermined banner or statement at the end of a message. Sometimes it can be our contact address or salutation.  In business usually the email signature will be a disclaimer prohibiting the unauthorized reuse of the message or attachment without approval of the sender.
  • 24. EMAIL DISCLAIMER This email message and all attachments transmitted with it may contain legally privileged and confidential information intended solely for the use of the addressee. If the reader of this message is not the intended recipient, you are hereby notified that any reading, dissemination, distribution, copying, or other use of this message or its attachments is strictly prohibited. If you have received this message in error, please notify the sender immediately by telephone (561-xxx-xxxx) or by electronic mail, and delete this message and all copies and backups thereof. Thank you
  • 25.  Don't Send That Email. Pick up the Phone!  1. It is hard to get the EQ (emotional intelligence) right in email. Tone and context are easy to misread. In a live conversation, how one says something, with modulations and intonations. With email it is hard to get the feelings behind the words.  2.Email and text often promote reactive responses, as opposed to progress and action to move forward. It is hard for people to pause and think about what they should say. Avoid reacting to any incendiary message. Always take the higher ground over email. It can save your job.  3.Email prolongs debate. Because of the two reasons above, debates continue well beyond the point of usefulness. Situations which start relatively benignly over email, only to escalate. Misstatements and misreads abound. When I ask people if they have called or asked to meet the counterpart to try and reach a resolution, there is usually a pause, then a sad answer of "no.“  4.Avoid digital conflict resolution. Harvard Business Review on Email
  • 26. Your Computer Can Get You Fired  A) Blog it up. Most company policy is that employees must first get permission to write for a non company outlet. Never write about work on the Internet unless your boss knows. Example Cisco.  B) Play A Way: New York City Mayor Michael Bloomberg caught sight of a solitaire game on a city employee's computer screen and fired him. Employees who use a company computer for personal matters on company time are stealing.  C) Look at pics. One third of bosses have fired workers for misusing the Internet. The reason was the viewing, downloading, or uploading of inappropriate or offensive content.  D) Post your pics. Employers monitor social networking sites. Not only do companies fear employees posting proprietary information, but they also don't want to find photos of the boss dancing on the table drunk at the holiday party. Opinions posted that run contrary to company values get employees fired.  E) Write R-rated E-mails. Over 25% of employers have fired an employee for E-mail-related offenses said it was for inappropriate or offensive language. Assume that someone inside the company is reading it.. Employers are concerned with their legal liability, companies archive electronically stored information, rather than erase it, and it's subject to discovery in a federal lawsuit. Most companies monitor E-mail automatically
  • 27. What email needs to be avoided? Any transmission of sensitive information Any strongly held opinions, strong emotions (anger, fear, sadness, arrogance) , off colored jokes, cynical statements, slander, exaggerations, intentional misstating of fact, words that convey double meanings. Demotions and sudden job loss can occur  For trying moments send an email that reads – “we need to talk – I will be available at 3PM” or “we need to talk let me know what time is best for me to call you to discuss your concerns?”
  • 28. Doctor Resigns Over Obama E-Mail By A Local Newspaper - Sunday, July 26, 2009 The president-elect of the … County Medical Association stepped down Friday, apologizing profusely for forwarding an e-mail image that portrayed President Obama as a witch doctor ….as news of the e-mail spread, leaders of prominent medical institutions distanced themselves from his actions…"The ….. County Medical Association regrets and is appalled by the statements accepting his resignation.
  • 30. Personal Application:  Should I change my current email name?  If a distinguished neurosurgeon can be forced to resign and disgraced over ONE email who else could a job loss occur happen to?  Could my emails possibly invite a legal attack or even personal attack one day if I am not careful?  Should I have an email disclaimer as my email signature?  For sensitive information – what is an alternative means to communicate more effectively?

Editor's Notes

  1. 2