SlideShare a Scribd company logo
1 of 17
A professional & personal communication need
‘Leadership and communication are
inseparable. You can’t have one without the
other.’ ---Claude I. Taylor
   email - a system of world-wide electronic
    communication in which a computer user can
    compose a message at one terminal that can
    be regenerated at the recipient's terminal
    when the recipient logs in; "you cannot send
    packages by electronic mail"
   Information Exchange
   Brainstorming and Problem Solving
   Record Keeping
   Group Work
   Staying in Touch Professionally
   Staying in Touch Socially
   Transmitting Documents
   The practices and forms prescribed by social
    convention or by authority.
   ALL CAPS IS CONSIDERED SHOUTING
   So is over punctuating!!!!!!
   Not using capitalization or punctuation makes e-mail hard to read
   Text messaging abbreviations r confusing 2 ur co-workers
   Avoid emoticons
   Explain Acronyms
   Check spelling and grammar before sending
   Keep slang at a minimum
   Intimation email prior sharing of huge attachments
   Acknowledgment for received emails
   E-mail continuity
   Formatting
   Use of appropriate Subject
   Strengthen the Subject
   Sculpt the body
   Use Keywords in Subject line
     Action: Prepare Reports for Sales Meeting on January 13.

     Info: Update on Reports

     Confirmed: Reports will be ready for review on January 8th

     Delivery: Reports for January 13th Sales Meeting

   Entire message in subject line
     January 13th Sales Meeting Reports looks good (eom)
   Break message into sections

     Action summary – What is the point of the e-mail

     Background – Detail, but organize into

       ▪ Key points

       ▪ Definitions

       ▪ If audience is in the know do not go into complete history

     Close – Next steps or actions items

   If you include attachments give explanation of what they are.
   3 Volley Rule
     If a topic is bounced back and forth more than 3 times it is time to pick up the

       phone or schedule a meeting.
   24 Hour Rule
     It is okay to write a heated e-mail, just wait 24 hours before you send it.
Daily approximately 180 billion emails are sent
An estimated 100 billion of these emails may be unsolicited
Unwanted email
    Phishing
       Appear to be from legitimate site, businesses
       Request personal or financial information
       Only work if you click or respond, best to just delete
    Spam
       Ads and scams
       Replying or unsubscribing validates your address for more spam
       Do not reply, delete email
    Virus
       Installed software without knowledge or consent
       Computer use monitored and controlled
       You must click or open program to infect
   What is the point of these E-Mails?
     Money - #1 reason
     Selling information on black market
      ▪ Health Care – approximately $50 per account
      ▪ Credit Cards – approximately $2-3 per account
   Who is behind this?
     Average hackers/scammers
     Organized criminals
Wording to make you
   feel that you have to
   comply or you cannot
    access your money.


                 No specific time to
                      comply

Leaves no way to contact someone
      to verify authenticity.
When you hover over
links you see that they
don’t go to where you
     expect them.
Never open an
  attachment from
someone you do not
       know.
Support groups will never ask for
  you to send you user id and
     password via e-mail
Hi All,

Hope you have enjoyed this Program. 

Thanks & Regards,
You Know me!!

More Related Content

Similar to Professional & personal communication needs covered in 40 essential tips

E-mail Etiquette.ppt
E-mail Etiquette.pptE-mail Etiquette.ppt
E-mail Etiquette.pptJaved883411
 
E mail etiquette
E mail etiquetteE mail etiquette
E mail etiquettejmbenak
 
E mail etiquette-1 For Students who are in Sem III... Useful for Business Com...
E mail etiquette-1 For Students who are in Sem III... Useful for Business Com...E mail etiquette-1 For Students who are in Sem III... Useful for Business Com...
E mail etiquette-1 For Students who are in Sem III... Useful for Business Com...Pooja Rasal
 
Email & Social Media Training
Email & Social Media TrainingEmail & Social Media Training
Email & Social Media TrainingWilliam Mann
 
Lecture 4 document preparation 1
Lecture 4  document preparation 1Lecture 4  document preparation 1
Lecture 4 document preparation 1MarketingAcademy2
 
Email Etiquette Tips For Professionals
Email Etiquette Tips For ProfessionalsEmail Etiquette Tips For Professionals
Email Etiquette Tips For ProfessionalsBuzz Marketing Pros
 
Digital Marketing 101 for Arts Presenters: Connecting in the inbox with ema...
Digital Marketing 101 for Arts Presenters: Connecting in the inbox with ema...Digital Marketing 101 for Arts Presenters: Connecting in the inbox with ema...
Digital Marketing 101 for Arts Presenters: Connecting in the inbox with ema...TechSoup Canada
 
Business Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptxBusiness Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptxDr Ganesh Saini
 
The Art of Effective Communication within an organization
The Art of Effective Communication within an organizationThe Art of Effective Communication within an organization
The Art of Effective Communication within an organizationGumeBerldon
 
Designing Your Email Program From Online Outreach To Welcome Email- Dylan Boy...
Designing Your Email Program From Online Outreach To Welcome Email- Dylan Boy...Designing Your Email Program From Online Outreach To Welcome Email- Dylan Boy...
Designing Your Email Program From Online Outreach To Welcome Email- Dylan Boy...Online Marketing Summit
 
Email ppt
Email pptEmail ppt
Email pptmelgade
 
Designing Your Email Program From Online Outreach To Welcome Email- Alex Will...
Designing Your Email Program From Online Outreach To Welcome Email- Alex Will...Designing Your Email Program From Online Outreach To Welcome Email- Alex Will...
Designing Your Email Program From Online Outreach To Welcome Email- Alex Will...Online Marketing Summit
 
Instruction designing
Instruction designingInstruction designing
Instruction designingSujian00
 
4 business communication etiquette
4 business communication etiquette4 business communication etiquette
4 business communication etiquetteArun E
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitssuser64f8f8
 
Google & Yahoo's Email Update: Your Must-Do Checklist
Google & Yahoo's Email Update: Your Must-Do ChecklistGoogle & Yahoo's Email Update: Your Must-Do Checklist
Google & Yahoo's Email Update: Your Must-Do ChecklistBloomerang
 

Similar to Professional & personal communication needs covered in 40 essential tips (20)

E-mail Etiquette.ppt
E-mail Etiquette.pptE-mail Etiquette.ppt
E-mail Etiquette.ppt
 
E mail etiquette
E mail etiquetteE mail etiquette
E mail etiquette
 
E mail etiquette-1 For Students who are in Sem III... Useful for Business Com...
E mail etiquette-1 For Students who are in Sem III... Useful for Business Com...E mail etiquette-1 For Students who are in Sem III... Useful for Business Com...
E mail etiquette-1 For Students who are in Sem III... Useful for Business Com...
 
How to Detect Email Fraud
How to Detect Email FraudHow to Detect Email Fraud
How to Detect Email Fraud
 
Email & Social Media Training
Email & Social Media TrainingEmail & Social Media Training
Email & Social Media Training
 
Lecture 4 document preparation 1
Lecture 4  document preparation 1Lecture 4  document preparation 1
Lecture 4 document preparation 1
 
Email Etiquette Tips For Professionals
Email Etiquette Tips For ProfessionalsEmail Etiquette Tips For Professionals
Email Etiquette Tips For Professionals
 
Common Email Security Mistakes
Common Email Security MistakesCommon Email Security Mistakes
Common Email Security Mistakes
 
Digital Marketing 101 for Arts Presenters: Connecting in the inbox with ema...
Digital Marketing 101 for Arts Presenters: Connecting in the inbox with ema...Digital Marketing 101 for Arts Presenters: Connecting in the inbox with ema...
Digital Marketing 101 for Arts Presenters: Connecting in the inbox with ema...
 
email_
email_email_
email_
 
Business Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptxBusiness Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptx
 
The Art of Effective Communication within an organization
The Art of Effective Communication within an organizationThe Art of Effective Communication within an organization
The Art of Effective Communication within an organization
 
Designing Your Email Program From Online Outreach To Welcome Email- Dylan Boy...
Designing Your Email Program From Online Outreach To Welcome Email- Dylan Boy...Designing Your Email Program From Online Outreach To Welcome Email- Dylan Boy...
Designing Your Email Program From Online Outreach To Welcome Email- Dylan Boy...
 
Email ppt
Email pptEmail ppt
Email ppt
 
Designing Your Email Program From Online Outreach To Welcome Email- Alex Will...
Designing Your Email Program From Online Outreach To Welcome Email- Alex Will...Designing Your Email Program From Online Outreach To Welcome Email- Alex Will...
Designing Your Email Program From Online Outreach To Welcome Email- Alex Will...
 
Instruction designing
Instruction designingInstruction designing
Instruction designing
 
How to write an email that gets results
How to write an email that gets resultsHow to write an email that gets results
How to write an email that gets results
 
4 business communication etiquette
4 business communication etiquette4 business communication etiquette
4 business communication etiquette
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
Google & Yahoo's Email Update: Your Must-Do Checklist
Google & Yahoo's Email Update: Your Must-Do ChecklistGoogle & Yahoo's Email Update: Your Must-Do Checklist
Google & Yahoo's Email Update: Your Must-Do Checklist
 

Recently uploaded

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 

Recently uploaded (20)

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 

Professional & personal communication needs covered in 40 essential tips

  • 1. A professional & personal communication need
  • 2. ‘Leadership and communication are inseparable. You can’t have one without the other.’ ---Claude I. Taylor
  • 3. email - a system of world-wide electronic communication in which a computer user can compose a message at one terminal that can be regenerated at the recipient's terminal when the recipient logs in; "you cannot send packages by electronic mail"
  • 4. Information Exchange  Brainstorming and Problem Solving  Record Keeping  Group Work  Staying in Touch Professionally  Staying in Touch Socially  Transmitting Documents
  • 5. The practices and forms prescribed by social convention or by authority.
  • 6. ALL CAPS IS CONSIDERED SHOUTING  So is over punctuating!!!!!!  Not using capitalization or punctuation makes e-mail hard to read  Text messaging abbreviations r confusing 2 ur co-workers  Avoid emoticons  Explain Acronyms  Check spelling and grammar before sending  Keep slang at a minimum  Intimation email prior sharing of huge attachments  Acknowledgment for received emails  E-mail continuity  Formatting  Use of appropriate Subject
  • 7. Strengthen the Subject  Sculpt the body
  • 8. Use Keywords in Subject line  Action: Prepare Reports for Sales Meeting on January 13.  Info: Update on Reports  Confirmed: Reports will be ready for review on January 8th  Delivery: Reports for January 13th Sales Meeting  Entire message in subject line  January 13th Sales Meeting Reports looks good (eom)
  • 9. Break message into sections  Action summary – What is the point of the e-mail  Background – Detail, but organize into ▪ Key points ▪ Definitions ▪ If audience is in the know do not go into complete history  Close – Next steps or actions items  If you include attachments give explanation of what they are.
  • 10. 3 Volley Rule  If a topic is bounced back and forth more than 3 times it is time to pick up the phone or schedule a meeting.  24 Hour Rule  It is okay to write a heated e-mail, just wait 24 hours before you send it.
  • 11. Daily approximately 180 billion emails are sent An estimated 100 billion of these emails may be unsolicited Unwanted email  Phishing  Appear to be from legitimate site, businesses  Request personal or financial information  Only work if you click or respond, best to just delete  Spam  Ads and scams  Replying or unsubscribing validates your address for more spam  Do not reply, delete email  Virus  Installed software without knowledge or consent  Computer use monitored and controlled  You must click or open program to infect
  • 12. What is the point of these E-Mails?  Money - #1 reason  Selling information on black market ▪ Health Care – approximately $50 per account ▪ Credit Cards – approximately $2-3 per account  Who is behind this?  Average hackers/scammers  Organized criminals
  • 13. Wording to make you feel that you have to comply or you cannot access your money. No specific time to comply Leaves no way to contact someone to verify authenticity.
  • 14. When you hover over links you see that they don’t go to where you expect them.
  • 15. Never open an attachment from someone you do not know.
  • 16. Support groups will never ask for you to send you user id and password via e-mail
  • 17. Hi All, Hope you have enjoyed this Program.  Thanks & Regards, You Know me!!