SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
GAELIC SUMMER CAMP
E-MAIL ETIQUETTE
University of the Witwatersrand
Simon Mofokeng
OBJECTIVES
For the purpose of this document “Mail” will refer to “Email”
Electronic mail, or “Mail”, provides an easy-to use, efficient means of
communicating with other members of workgroups and the External
Internet Communities.
The purpose of this presentation is to ensure the proper use of email
system and make users aware of what is deemed as acceptable and
unacceptable use of the system.
E-MAIL ETIQUETTE
E-MAIL ETIQUETTE
RESPONSIBILITIES OF THE USER
Legal Risks: email is a business communication tool and users are
obliged to use this tool in a responsible, effective and lawful manner.
Although by its nature email seems to be less formal than other
written communication, the same laws apply.
The following guidelines for working with “Mail” are designed to ensure
that you and your colleagues get the maximum benefit from the
system.
The following information is included in the pages that follow:
* Responsibilities of the user
* Activities to avoid
* Hints and tips
E-MAIL ETIQUETTE
RESPONSIBILITIES OF THE USER
Limited
“Mail” must not be used as a forum of political, religious, or other
debates, or as a form of entertainment or broadcasting, or for sending
chain letters or advertisements or jokes or non- business related
issue. Each message occupies valuable time on the network, and
discretion must be used when using “Mail”.
Length
When using “Mail”, keep your message as brief and to the point as
possible.
Long messages tend to lose their point. Rather send a message
requesting a meeting to discuss lengthy issues.
E-MAIL ETIQUETTE
RESPONSIBILITIES OF THE USER
Title
Give every message a title
Make sure the subject line of your message provide a brief, clear
description of the contents of the message
Effectiveness
Read “Mail” message regularly and respond timeously where necessary.
The effectiveness of a “Mail” system in improving productivity and
communication is based on responsiveness. Read your message
regularly and reply as soon as possible.
E-MAIL ETIQUETTE
RESPONSIBILITIES OF THE USER
E-MAIL ETIQUETTE
RESPONSIBILITIES OF THE USER
Selective
Be selective when forwarding or replying to a “Mail” message.
Consider who really need to see the message. Forward it only to those who need
information.
Protect
Your user passwords are the gateway to your PC and systems resources
including mail, Protect it all the time.
You are responsible for actions taken under your user ID. Once your user ID is
logged on, it is impossible to tell whether it is really you or someone else
sending the message. Do not use passwords that would be obvious to others,
and change it immediately if you think it has been compromised.
Activate your Windows screen saver password to kick in automatically when idle
after a few minutes.
E-MAIL ETIQUETTE
RESPONSIBILITIES OF THE USER
Size
Keep your mailbox and “Mail” files as small as possible
Delete message from your mailbox after you have read or filed them. File
only those messages that really need to be recorded.
Housekeeping
Carry out regular housekeeping on your files
A facility exists “Mail” to archive messages to free up space on the
system. If at a later date you need to refer to them, it is possible to
access them. Another option will be to create a ‘personal folder’ and
move the important “Mail” items to the personal folder. Delete or
archive messages from the sent item folder regularly.
E-MAIL ETIQUETTE
RESPONSIBILITIES OF THE USER
Logging off
Exit and log off on your mail system if you will be away for an extended
period and when you leave at the end of the day.
Certain maintenance might be done overnight on the server, and this is
only possible if you have logged out of your computer.
Privacy
“Mail” message are considered private correspondence. As such,
messages are viewed as the private property of the receiver and will
not be made available to Management. Although privacy and security
are of the utmost importance, auditors, or investigators are authorized
to investigate misuse of the network, such as theft, pornography,
harassment, excessive private use, etc.
E-MAIL ETIQUETTE
ACTIVITIES TO AVOID
Misuse
Do not send any obscene, racist, defamatory or otherwise offensive material via
“Mail”
The use of vulgar language is expressly forbidden over the network, be it on
company business, or in a private capacity.
Personal use
Note- Sending and receiving excessive non-business related messages is
prohibited.
E-MAIL ETIQUETTE
ACTIVITIES TO AVOID
Confrontation
Do not use “Mail” to avoid confrontation.
In certain instances, such as disciplinary or explosive circumstances, the
sending of “Mail” messages is inappropriate. Do not send rude or
argumentative messages. These situations can only be dealt within in a
face to- face confrontation and “Mail” should not be used.
Large files
Do not send large files as attachment.
Be selective in the files you send to others via “Mail”. Within your own work group, it is better
to share the file and send a message regarding the file name to the recipients. Attached
files dramatically increase the network overhead as well as the size of the “Mail” file.
Priority
Do not flag all messages as high priority
Do not send “Mail” as the highest priority unless it really merits that priority. High –priority
“Mails” message should only be used for the most important message and when you
need an immediately response.
E-MAIL ETIQUETTE
ACTIVITIES TO AVOID
Password
Do not give your password/s to others
You are responsible for any mail message originating from your machine.
Giving other employees access to your system could result in
fraudulent use of “Mail”.
Confidential Information
Avoid sending confidential information by “Mail”. If you do, you must
secure the information by including it in a Microsoft Word file
protecting it with a password. Then provide the recipient with the
password by means of other communication, for instance by
telephone.
E-MAIL ETIQUETTE
HINTS AND TIPS
Requirements
Set the options to suit your requirements
Check for messages every 15 - 60 minutes. Sound the chime when a
new message arrives. Flash the envelope when a new message
arrives.
Receipt
Use the return receipt option
If you are not sure whether the addressees are receiving messages, use
the return receipt option. This will send a message back to you,
informing you that the recipient has got the message.
E-MAIL ETIQUETTE
HINTS AND TIPS
Backing up
Your “Mail” files should be backed-up periodically; otherwise users carry
the responsibility if not provided by business.
Tip
Include a signature that contains other methods by which others can
contact you. This usually includes your full name, job title, and
company name and telephone numbers.
Do not send messages all in capital as it will appear as if you are
shouting. Use bold lettering or underlining for emphasis, e.g., use that
is what I meant, rather than that IS what I meant.
E-MAIL ETIQUETTE
Questions
simon.mofokeng@wits.ac.za
Thank you once again for adhering to guidelines.
E-MAIL ETIQUETTE

Más contenido relacionado

La actualidad más candente

Email use in business ppt
Email use in business pptEmail use in business ppt
Email use in business pptJason Roy
 
History of Email PowerPoint presentation
History of Email PowerPoint presentationHistory of Email PowerPoint presentation
History of Email PowerPoint presentationSaad Zeeshan
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)Wissam Abdel Baki
 
Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User. Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User. Empowerhosting
 
Parent quick-guides
Parent quick-guidesParent quick-guides
Parent quick-guidesthsieh
 
Email privacy issues and Netiquette
Email privacy issues and NetiquetteEmail privacy issues and Netiquette
Email privacy issues and NetiquetteSomeone Else
 
Internet and Email 101 v1
Internet and Email 101 v1Internet and Email 101 v1
Internet and Email 101 v1Adam Ripsam
 

La actualidad más candente (18)

Introduction To Email
Introduction To EmailIntroduction To Email
Introduction To Email
 
E Mail Basic
E Mail BasicE Mail Basic
E Mail Basic
 
Email use in business ppt
Email use in business pptEmail use in business ppt
Email use in business ppt
 
Welcome to email
Welcome to emailWelcome to email
Welcome to email
 
Email Essentials
Email EssentialsEmail Essentials
Email Essentials
 
History of Email PowerPoint presentation
History of Email PowerPoint presentationHistory of Email PowerPoint presentation
History of Email PowerPoint presentation
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
E-Mail Basics
E-Mail BasicsE-Mail Basics
E-Mail Basics
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Basics of E-Mail
Basics of E-MailBasics of E-Mail
Basics of E-Mail
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)
 
E‑mail
E‑mailE‑mail
E‑mail
 
Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User. Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User.
 
Parent quick-guides
Parent quick-guidesParent quick-guides
Parent quick-guides
 
Email privacy issues and Netiquette
Email privacy issues and NetiquetteEmail privacy issues and Netiquette
Email privacy issues and Netiquette
 
E Mail
E MailE Mail
E Mail
 
Internet and Email 101 v1
Internet and Email 101 v1Internet and Email 101 v1
Internet and Email 101 v1
 
Email Basics
Email BasicsEmail Basics
Email Basics
 

Destacado

Email etiquette
Email etiquetteEmail etiquette
Email etiquetteamu1
 
Email Etiquette ( Final) by Roma Kaur Rana
Email Etiquette ( Final) by Roma Kaur RanaEmail Etiquette ( Final) by Roma Kaur Rana
Email Etiquette ( Final) by Roma Kaur RanaRoma Kaur Rana
 
Propper Email Etiquette
Propper Email EtiquettePropper Email Etiquette
Propper Email EtiquetteSt John
 
Email etiquette and effective email use guidance for staff and associates
Email etiquette and effective email use guidance for staff and associatesEmail etiquette and effective email use guidance for staff and associates
Email etiquette and effective email use guidance for staff and associatesThe Pathway Group
 
Emailing Insight : An essential element for career
Emailing Insight : An essential element for careerEmailing Insight : An essential element for career
Emailing Insight : An essential element for careerRahul Thakur
 
7 Email Etiquettes for Effective Email Communication
7 Email Etiquettes for Effective Email Communication 7 Email Etiquettes for Effective Email Communication
7 Email Etiquettes for Effective Email Communication Wizdumb
 
Email Etiquette_ OutworX
Email Etiquette_ OutworXEmail Etiquette_ OutworX
Email Etiquette_ OutworXpanjiarpraveen
 
Email Etiquette's for Professional & business profiles
Email Etiquette's for Professional & business profilesEmail Etiquette's for Professional & business profiles
Email Etiquette's for Professional & business profilesHR ULTIMEZ TECHNOLOGY
 
5 essential tips for business email etiquette.ppt
5 essential tips for business email etiquette.ppt5 essential tips for business email etiquette.ppt
5 essential tips for business email etiquette.pptSherin Thomas
 
Email Etiquette Presentation
Email Etiquette PresentationEmail Etiquette Presentation
Email Etiquette PresentationUNH Upward Bound
 
Presentation on Email Etiquette
Presentation on Email Etiquette Presentation on Email Etiquette
Presentation on Email Etiquette OpenDev
 
Email Etiquette: Tips For Better Communication
Email Etiquette: Tips For Better CommunicationEmail Etiquette: Tips For Better Communication
Email Etiquette: Tips For Better CommunicationMonica Dhoundiyal
 

Destacado (20)

Email etiquette
Email etiquetteEmail etiquette
Email etiquette
 
Email Etiquette ( Final) by Roma Kaur Rana
Email Etiquette ( Final) by Roma Kaur RanaEmail Etiquette ( Final) by Roma Kaur Rana
Email Etiquette ( Final) by Roma Kaur Rana
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
Propper Email Etiquette
Propper Email EtiquettePropper Email Etiquette
Propper Email Etiquette
 
E mail etiquette
E mail etiquetteE mail etiquette
E mail etiquette
 
Email etiquette and effective email use guidance for staff and associates
Email etiquette and effective email use guidance for staff and associatesEmail etiquette and effective email use guidance for staff and associates
Email etiquette and effective email use guidance for staff and associates
 
Email Etiquette
Email Etiquette Email Etiquette
Email Etiquette
 
Emailing Insight : An essential element for career
Emailing Insight : An essential element for careerEmailing Insight : An essential element for career
Emailing Insight : An essential element for career
 
7 Email Etiquettes for Effective Email Communication
7 Email Etiquettes for Effective Email Communication 7 Email Etiquettes for Effective Email Communication
7 Email Etiquettes for Effective Email Communication
 
Email Etiquette_ OutworX
Email Etiquette_ OutworXEmail Etiquette_ OutworX
Email Etiquette_ OutworX
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
Email Etiquette's for Professional & business profiles
Email Etiquette's for Professional & business profilesEmail Etiquette's for Professional & business profiles
Email Etiquette's for Professional & business profiles
 
Email etiquette
Email etiquette Email etiquette
Email etiquette
 
Email etiquette
Email etiquetteEmail etiquette
Email etiquette
 
5 essential tips for business email etiquette.ppt
5 essential tips for business email etiquette.ppt5 essential tips for business email etiquette.ppt
5 essential tips for business email etiquette.ppt
 
Email Etiquette Presentation
Email Etiquette PresentationEmail Etiquette Presentation
Email Etiquette Presentation
 
Presentation on Email Etiquette
Presentation on Email Etiquette Presentation on Email Etiquette
Presentation on Email Etiquette
 
Email Etiquette: Tips For Better Communication
Email Etiquette: Tips For Better CommunicationEmail Etiquette: Tips For Better Communication
Email Etiquette: Tips For Better Communication
 
Email etiquette
Email etiquetteEmail etiquette
Email etiquette
 

Similar a Mofokeng email etiquette

An email policy for your employeesA clear email policy hel.docx
An email policy for your employeesA clear email policy hel.docxAn email policy for your employeesA clear email policy hel.docx
An email policy for your employeesA clear email policy hel.docxgreg1eden90113
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentationWan Solo
 
Hhs en09 email_security
Hhs en09 email_securityHhs en09 email_security
Hhs en09 email_securityShoaib Sheikh
 
23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquettebtanwar74
 
23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquetteNamita Singh
 
23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquetteNamita Singh
 
Tech Training - Session 8
Tech Training - Session 8Tech Training - Session 8
Tech Training - Session 8William Mann
 
Email Security Solutions | Seclore
Email Security Solutions | SecloreEmail Security Solutions | Seclore
Email Security Solutions | SecloreSeclore
 
Email etiquette[1]
Email etiquette[1]Email etiquette[1]
Email etiquette[1]101jennyj
 
Internet Tutorial 02
Internet  Tutorial 02Internet  Tutorial 02
Internet Tutorial 02dpd
 
A Quick Email Etiquette Education
A Quick Email Etiquette EducationA Quick Email Etiquette Education
A Quick Email Etiquette EducationChelse Benham
 
Electronic Mail Security (University of Jeddah, Saudi Arabia)
Electronic Mail Security (University of Jeddah, Saudi Arabia)Electronic Mail Security (University of Jeddah, Saudi Arabia)
Electronic Mail Security (University of Jeddah, Saudi Arabia)IJCSIS Research Publications
 
PCC Training - Security
PCC Training - SecurityPCC Training - Security
PCC Training - SecurityRobin Hastings
 

Similar a Mofokeng email etiquette (20)

An email policy for your employeesA clear email policy hel.docx
An email policy for your employeesA clear email policy hel.docxAn email policy for your employeesA clear email policy hel.docx
An email policy for your employeesA clear email policy hel.docx
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentation
 
Filing Client Email
Filing Client EmailFiling Client Email
Filing Client Email
 
Hhs en09 email_security
Hhs en09 email_securityHhs en09 email_security
Hhs en09 email_security
 
Email
EmailEmail
Email
 
Email
EmailEmail
Email
 
Junk Email
Junk EmailJunk Email
Junk Email
 
23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette
 
23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette
 
23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette
 
Electrnic mail
Electrnic mailElectrnic mail
Electrnic mail
 
Tech Training - Session 8
Tech Training - Session 8Tech Training - Session 8
Tech Training - Session 8
 
Email Security Solutions | Seclore
Email Security Solutions | SecloreEmail Security Solutions | Seclore
Email Security Solutions | Seclore
 
Email etiquette[1]
Email etiquette[1]Email etiquette[1]
Email etiquette[1]
 
Using E-mail In The Office
Using E-mail In The OfficeUsing E-mail In The Office
Using E-mail In The Office
 
Internet Tutorial 02
Internet  Tutorial 02Internet  Tutorial 02
Internet Tutorial 02
 
A Quick Email Etiquette Education
A Quick Email Etiquette EducationA Quick Email Etiquette Education
A Quick Email Etiquette Education
 
Electronic Mail Security (University of Jeddah, Saudi Arabia)
Electronic Mail Security (University of Jeddah, Saudi Arabia)Electronic Mail Security (University of Jeddah, Saudi Arabia)
Electronic Mail Security (University of Jeddah, Saudi Arabia)
 
PCC Training - Security
PCC Training - SecurityPCC Training - Security
PCC Training - Security
 
7 module web based email
7 module web based email7 module web based email
7 module web based email
 

Más de FOTIM

Mofokeng email etiquette
Mofokeng email etiquetteMofokeng email etiquette
Mofokeng email etiquetteFOTIM
 
Madondo our journey down the self check road
Madondo our journey down the self check roadMadondo our journey down the self check road
Madondo our journey down the self check roadFOTIM
 
Sithole & mofokeng support staff in the library getting involved
Sithole & mofokeng support staff in the library   getting involvedSithole & mofokeng support staff in the library   getting involved
Sithole & mofokeng support staff in the library getting involvedFOTIM
 
Sithole & mofokeng support staff in the library getting involved
Sithole & mofokeng support staff in the library   getting involvedSithole & mofokeng support staff in the library   getting involved
Sithole & mofokeng support staff in the library getting involvedFOTIM
 
Madondo our journey down the self check road
Madondo our journey down the self check roadMadondo our journey down the self check road
Madondo our journey down the self check roadFOTIM
 
Erasmus man gaelic & innovative an overview
Erasmus man gaelic & innovative an overviewErasmus man gaelic & innovative an overview
Erasmus man gaelic & innovative an overviewFOTIM
 
Sithole it support in the library help desk
Sithole it support in the library   help desk Sithole it support in the library   help desk
Sithole it support in the library help desk FOTIM
 
Van wyk trends and changes in technical services and the impact on cataloguing
Van wyk trends and changes in technical services and the impact on cataloguingVan wyk trends and changes in technical services and the impact on cataloguing
Van wyk trends and changes in technical services and the impact on cataloguingFOTIM
 
Selematsela re orienting the role of the informaiton specialist in the knowle...
Selematsela re orienting the role of the informaiton specialist in the knowle...Selematsela re orienting the role of the informaiton specialist in the knowle...
Selematsela re orienting the role of the informaiton specialist in the knowle...FOTIM
 
Le roux library assoc in unisa archives
Le roux library assoc in unisa archivesLe roux library assoc in unisa archives
Le roux library assoc in unisa archivesFOTIM
 
Johnson ru shing @ wits
Johnson ru shing @ witsJohnson ru shing @ wits
Johnson ru shing @ witsFOTIM
 
Ehlers assessement of information literacy skills circle
Ehlers assessement of information literacy skills circleEhlers assessement of information literacy skills circle
Ehlers assessement of information literacy skills circleFOTIM
 
Van vuuren communal reading as a way to foster a reading culture
Van vuuren communal reading as a way to foster a reading cultureVan vuuren communal reading as a way to foster a reading culture
Van vuuren communal reading as a way to foster a reading cultureFOTIM
 
Snyman unisa battle to build an ebook collection
Snyman unisa battle to build an ebook collectionSnyman unisa battle to build an ebook collection
Snyman unisa battle to build an ebook collectionFOTIM
 
Mbonambi library orientation strategy sharing experiences
Mbonambi library orientation strategy sharing experiencesMbonambi library orientation strategy sharing experiences
Mbonambi library orientation strategy sharing experiencesFOTIM
 
Malan world cat
Malan world catMalan world cat
Malan world catFOTIM
 
Bester marketing strategies
Bester marketing strategiesBester marketing strategies
Bester marketing strategiesFOTIM
 
Xanko libguides @ wits
Xanko libguides @ witsXanko libguides @ wits
Xanko libguides @ witsFOTIM
 
Wiggell librarians academic collaboration
Wiggell librarians   academic collaborationWiggell librarians   academic collaboration
Wiggell librarians academic collaborationFOTIM
 
Lessing & swanepoel roi university of pretoria
Lessing & swanepoel roi university of pretoriaLessing & swanepoel roi university of pretoria
Lessing & swanepoel roi university of pretoriaFOTIM
 

Más de FOTIM (20)

Mofokeng email etiquette
Mofokeng email etiquetteMofokeng email etiquette
Mofokeng email etiquette
 
Madondo our journey down the self check road
Madondo our journey down the self check roadMadondo our journey down the self check road
Madondo our journey down the self check road
 
Sithole & mofokeng support staff in the library getting involved
Sithole & mofokeng support staff in the library   getting involvedSithole & mofokeng support staff in the library   getting involved
Sithole & mofokeng support staff in the library getting involved
 
Sithole & mofokeng support staff in the library getting involved
Sithole & mofokeng support staff in the library   getting involvedSithole & mofokeng support staff in the library   getting involved
Sithole & mofokeng support staff in the library getting involved
 
Madondo our journey down the self check road
Madondo our journey down the self check roadMadondo our journey down the self check road
Madondo our journey down the self check road
 
Erasmus man gaelic & innovative an overview
Erasmus man gaelic & innovative an overviewErasmus man gaelic & innovative an overview
Erasmus man gaelic & innovative an overview
 
Sithole it support in the library help desk
Sithole it support in the library   help desk Sithole it support in the library   help desk
Sithole it support in the library help desk
 
Van wyk trends and changes in technical services and the impact on cataloguing
Van wyk trends and changes in technical services and the impact on cataloguingVan wyk trends and changes in technical services and the impact on cataloguing
Van wyk trends and changes in technical services and the impact on cataloguing
 
Selematsela re orienting the role of the informaiton specialist in the knowle...
Selematsela re orienting the role of the informaiton specialist in the knowle...Selematsela re orienting the role of the informaiton specialist in the knowle...
Selematsela re orienting the role of the informaiton specialist in the knowle...
 
Le roux library assoc in unisa archives
Le roux library assoc in unisa archivesLe roux library assoc in unisa archives
Le roux library assoc in unisa archives
 
Johnson ru shing @ wits
Johnson ru shing @ witsJohnson ru shing @ wits
Johnson ru shing @ wits
 
Ehlers assessement of information literacy skills circle
Ehlers assessement of information literacy skills circleEhlers assessement of information literacy skills circle
Ehlers assessement of information literacy skills circle
 
Van vuuren communal reading as a way to foster a reading culture
Van vuuren communal reading as a way to foster a reading cultureVan vuuren communal reading as a way to foster a reading culture
Van vuuren communal reading as a way to foster a reading culture
 
Snyman unisa battle to build an ebook collection
Snyman unisa battle to build an ebook collectionSnyman unisa battle to build an ebook collection
Snyman unisa battle to build an ebook collection
 
Mbonambi library orientation strategy sharing experiences
Mbonambi library orientation strategy sharing experiencesMbonambi library orientation strategy sharing experiences
Mbonambi library orientation strategy sharing experiences
 
Malan world cat
Malan world catMalan world cat
Malan world cat
 
Bester marketing strategies
Bester marketing strategiesBester marketing strategies
Bester marketing strategies
 
Xanko libguides @ wits
Xanko libguides @ witsXanko libguides @ wits
Xanko libguides @ wits
 
Wiggell librarians academic collaboration
Wiggell librarians   academic collaborationWiggell librarians   academic collaboration
Wiggell librarians academic collaboration
 
Lessing & swanepoel roi university of pretoria
Lessing & swanepoel roi university of pretoriaLessing & swanepoel roi university of pretoria
Lessing & swanepoel roi university of pretoria
 

Último

JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 

Último (20)

JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 

Mofokeng email etiquette

  • 1. GAELIC SUMMER CAMP E-MAIL ETIQUETTE University of the Witwatersrand Simon Mofokeng
  • 2. OBJECTIVES For the purpose of this document “Mail” will refer to “Email” Electronic mail, or “Mail”, provides an easy-to use, efficient means of communicating with other members of workgroups and the External Internet Communities. The purpose of this presentation is to ensure the proper use of email system and make users aware of what is deemed as acceptable and unacceptable use of the system. E-MAIL ETIQUETTE
  • 4. RESPONSIBILITIES OF THE USER Legal Risks: email is a business communication tool and users are obliged to use this tool in a responsible, effective and lawful manner. Although by its nature email seems to be less formal than other written communication, the same laws apply. The following guidelines for working with “Mail” are designed to ensure that you and your colleagues get the maximum benefit from the system. The following information is included in the pages that follow: * Responsibilities of the user * Activities to avoid * Hints and tips E-MAIL ETIQUETTE
  • 5. RESPONSIBILITIES OF THE USER Limited “Mail” must not be used as a forum of political, religious, or other debates, or as a form of entertainment or broadcasting, or for sending chain letters or advertisements or jokes or non- business related issue. Each message occupies valuable time on the network, and discretion must be used when using “Mail”. Length When using “Mail”, keep your message as brief and to the point as possible. Long messages tend to lose their point. Rather send a message requesting a meeting to discuss lengthy issues. E-MAIL ETIQUETTE
  • 6. RESPONSIBILITIES OF THE USER Title Give every message a title Make sure the subject line of your message provide a brief, clear description of the contents of the message Effectiveness Read “Mail” message regularly and respond timeously where necessary. The effectiveness of a “Mail” system in improving productivity and communication is based on responsiveness. Read your message regularly and reply as soon as possible. E-MAIL ETIQUETTE
  • 7. RESPONSIBILITIES OF THE USER E-MAIL ETIQUETTE
  • 8. RESPONSIBILITIES OF THE USER Selective Be selective when forwarding or replying to a “Mail” message. Consider who really need to see the message. Forward it only to those who need information. Protect Your user passwords are the gateway to your PC and systems resources including mail, Protect it all the time. You are responsible for actions taken under your user ID. Once your user ID is logged on, it is impossible to tell whether it is really you or someone else sending the message. Do not use passwords that would be obvious to others, and change it immediately if you think it has been compromised. Activate your Windows screen saver password to kick in automatically when idle after a few minutes. E-MAIL ETIQUETTE
  • 9. RESPONSIBILITIES OF THE USER Size Keep your mailbox and “Mail” files as small as possible Delete message from your mailbox after you have read or filed them. File only those messages that really need to be recorded. Housekeeping Carry out regular housekeeping on your files A facility exists “Mail” to archive messages to free up space on the system. If at a later date you need to refer to them, it is possible to access them. Another option will be to create a ‘personal folder’ and move the important “Mail” items to the personal folder. Delete or archive messages from the sent item folder regularly. E-MAIL ETIQUETTE
  • 10. RESPONSIBILITIES OF THE USER Logging off Exit and log off on your mail system if you will be away for an extended period and when you leave at the end of the day. Certain maintenance might be done overnight on the server, and this is only possible if you have logged out of your computer. Privacy “Mail” message are considered private correspondence. As such, messages are viewed as the private property of the receiver and will not be made available to Management. Although privacy and security are of the utmost importance, auditors, or investigators are authorized to investigate misuse of the network, such as theft, pornography, harassment, excessive private use, etc. E-MAIL ETIQUETTE
  • 11. ACTIVITIES TO AVOID Misuse Do not send any obscene, racist, defamatory or otherwise offensive material via “Mail” The use of vulgar language is expressly forbidden over the network, be it on company business, or in a private capacity. Personal use Note- Sending and receiving excessive non-business related messages is prohibited. E-MAIL ETIQUETTE
  • 12. ACTIVITIES TO AVOID Confrontation Do not use “Mail” to avoid confrontation. In certain instances, such as disciplinary or explosive circumstances, the sending of “Mail” messages is inappropriate. Do not send rude or argumentative messages. These situations can only be dealt within in a face to- face confrontation and “Mail” should not be used. Large files Do not send large files as attachment. Be selective in the files you send to others via “Mail”. Within your own work group, it is better to share the file and send a message regarding the file name to the recipients. Attached files dramatically increase the network overhead as well as the size of the “Mail” file. Priority Do not flag all messages as high priority Do not send “Mail” as the highest priority unless it really merits that priority. High –priority “Mails” message should only be used for the most important message and when you need an immediately response. E-MAIL ETIQUETTE
  • 13. ACTIVITIES TO AVOID Password Do not give your password/s to others You are responsible for any mail message originating from your machine. Giving other employees access to your system could result in fraudulent use of “Mail”. Confidential Information Avoid sending confidential information by “Mail”. If you do, you must secure the information by including it in a Microsoft Word file protecting it with a password. Then provide the recipient with the password by means of other communication, for instance by telephone. E-MAIL ETIQUETTE
  • 14. HINTS AND TIPS Requirements Set the options to suit your requirements Check for messages every 15 - 60 minutes. Sound the chime when a new message arrives. Flash the envelope when a new message arrives. Receipt Use the return receipt option If you are not sure whether the addressees are receiving messages, use the return receipt option. This will send a message back to you, informing you that the recipient has got the message. E-MAIL ETIQUETTE
  • 15. HINTS AND TIPS Backing up Your “Mail” files should be backed-up periodically; otherwise users carry the responsibility if not provided by business. Tip Include a signature that contains other methods by which others can contact you. This usually includes your full name, job title, and company name and telephone numbers. Do not send messages all in capital as it will appear as if you are shouting. Use bold lettering or underlining for emphasis, e.g., use that is what I meant, rather than that IS what I meant. E-MAIL ETIQUETTE
  • 16. Questions simon.mofokeng@wits.ac.za Thank you once again for adhering to guidelines. E-MAIL ETIQUETTE