SlideShare a Scribd company logo
1 of 40
CREATING A MAIL MERGE
(in MS Word 2010)
Dave Shannon - 05/08/13
CONTENTS
 Why create a Mail Merge?
 Required Elements
 The Creation process
 Summary
DSHANNON05/08/13
WHY CREATE A MAIL MERGE?
 Send the same letter to many recipients while utilising personal
information
 Standard form letters - Legislation changes , Policy changes
 Personalised/Targeted Marketing materials - geography, sales figures
 Advantages of Mail Merging
 Send a clear and consistent message – reduce risk of misunderstanding
 Speed
 Easier proof reading; 1 letter instead of many.
 Thousands of letters can be produced or updated quickly
 Our example – a small test run of marketing letters being sent to a group of pre-selected
customers
DSHANNON05/08/13
CREATING A MAIL MERGE – REQUIRED ELEMENTS
 Data source - (MS Excel)
 Where your unique information
comes from
 Usually names and addresses
of customers
DSHANNON05/08/13
CREATING A MAIL MERGE – REQUIRED ELEMENTS
 Data source - (MS Excel)
 Where your unique information
comes from
 Usually names and addresses
of customers
DSHANNON05/08/13
 Standard text - (MSWord)
 The standardised part of your document
which remains the same
 The message you want to communicate
CREATING A MAIL MERGE – REQUIRED ELEMENTS
 Data source - (MS Excel)
 Where your unique information
comes from
 Usually names and addresses
of customers
DSHANNON05/08/13
Merged DocumentsMerged DocumentsMerged DocumentsMerged DocumentsMerged Documents
Stack of letters to be printed and sent
MAIL MERGE – THE PROCESS
DSHANNON05/08/13
MAIL MERGE – THE PROCESS
DSHANNON05/08/13
MAIL MERGE – THE PROCESS
DSHANNON05/08/13
MAIL MERGE – THE PROCESS
DSHANNON05/08/13
MAIL MERGE – THE PROCESS
DSHANNON05/08/13
MAIL MERGE – THE PROCESS
DSHANNON05/08/13
MAIL MERGE – THE PROCESS
DSHANNON05/08/13
MAIL MERGE – THE PROCESS
DSHANNON05/08/13
MAIL MERGE – THE PROCESS
DSHANNON05/08/13
MAIL MERGE – THE PROCESS
DSHANNON05/08/13
MAIL MERGE – THE PROCESS
DSHANNON05/08/13
MAIL MERGE – THE PROCESS
DSHANNON05/08/13
MAIL MERGE – THE PROCESS
DSHANNON05/08/13
MAIL MERGE – THE PROCESS
DSHANNON05/08/13
MAIL MERGE – THE PROCESS
DSHANNON05/08/13
MAIL MERGE – THE PROCESS
DSHANNON05/08/13
MAIL MERGE – THE PROCESS
DSHANNON05/08/13
MAIL MERGE – THE PROCESS
DSHANNON05/08/13
MAIL MERGE – THE PROCESS
DSHANNON05/08/13
MAIL MERGE – THE PROCESS
DSHANNON05/08/13
MAIL MERGE – THE PROCESS
DSHANNON05/08/13
MAIL MERGE – THE PROCESS
DSHANNON05/08/13
MAIL MERGE – THE PROCESS
DSHANNON05/08/13
MAIL MERGE – THE PROCESS
DSHANNON05/08/13
MAIL MERGE – THE PROCESS
DSHANNON05/08/13
MAIL MERGE – THE PROCESS
DSHANNON05/08/13
MAIL MERGE – THE PROCESS
DSHANNON05/08/13
MAIL MERGE – THE PROCESS
DSHANNON05/08/13
MAIL MERGE – THE PROCESS
DSHANNON05/08/13
MAIL MERGE – THE PROCESS
DSHANNON05/08/13
MAIL MERGE – THE PROCESS
DSHANNON05/08/13
MAIL MERGE – THE PROCESS
DSHANNON05/08/13
MAIL MERGE - SUMMARY
 Simple as A, B, C
A) Have your data source ready in Excel
B) Have your standard content ready in Word
C) Open your standard text document, Select:
Mailings > Start Mail Merge > Step by Step Mail Merge Wizard
And follow the onscreen instructions.
*Electronic versions of this presentation are available on request
DSHANNON05/08/13
THANK YOU FOR YOUR TIME
QUESTIONS?
DSHANNON05/08/13

More Related Content

Viewers also liked

Imaging and design for online environment group 1 tv5
Imaging and design for online environment group 1 tv5Imaging and design for online environment group 1 tv5
Imaging and design for online environment group 1 tv5Eleazhar Cabral
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologiesRufa Laguit
 
Creating mail merge
Creating mail mergeCreating mail merge
Creating mail mergeNico Bereber
 
Do's & Don'ts Inside a Computer Lab
Do's & Don'ts Inside a Computer LabDo's & Don'ts Inside a Computer Lab
Do's & Don'ts Inside a Computer LabMaria Eloisa Blanza
 
Dll empowerment technologies
Dll empowerment technologiesDll empowerment technologies
Dll empowerment technologieswacasr12
 
Contextualized online search and research skills
Contextualized online search and research skillsContextualized online search and research skills
Contextualized online search and research skillsJonathan Jr Marcelino
 
Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)Maria Eloisa Blanza
 
Copyright infringement
 Copyright infringement Copyright infringement
Copyright infringementRochelle Nato
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT TechnologiesMaria Eloisa Blanza
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologiesDeped
 

Viewers also liked (13)

Fabrics
FabricsFabrics
Fabrics
 
Imaging and design for online environment group 1 tv5
Imaging and design for online environment group 1 tv5Imaging and design for online environment group 1 tv5
Imaging and design for online environment group 1 tv5
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologies
 
Mail merge
Mail mergeMail merge
Mail merge
 
Animate pp1
Animate pp1Animate pp1
Animate pp1
 
Creating mail merge
Creating mail mergeCreating mail merge
Creating mail merge
 
Do's & Don'ts Inside a Computer Lab
Do's & Don'ts Inside a Computer LabDo's & Don'ts Inside a Computer Lab
Do's & Don'ts Inside a Computer Lab
 
Dll empowerment technologies
Dll empowerment technologiesDll empowerment technologies
Dll empowerment technologies
 
Contextualized online search and research skills
Contextualized online search and research skillsContextualized online search and research skills
Contextualized online search and research skills
 
Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)
 
Copyright infringement
 Copyright infringement Copyright infringement
Copyright infringement
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT Technologies
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologies
 

Recently uploaded

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Recently uploaded (20)

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

Creating a Mail Merge v1.0 050813

  • 1. CREATING A MAIL MERGE (in MS Word 2010) Dave Shannon - 05/08/13
  • 2. CONTENTS  Why create a Mail Merge?  Required Elements  The Creation process  Summary DSHANNON05/08/13
  • 3. WHY CREATE A MAIL MERGE?  Send the same letter to many recipients while utilising personal information  Standard form letters - Legislation changes , Policy changes  Personalised/Targeted Marketing materials - geography, sales figures  Advantages of Mail Merging  Send a clear and consistent message – reduce risk of misunderstanding  Speed  Easier proof reading; 1 letter instead of many.  Thousands of letters can be produced or updated quickly  Our example – a small test run of marketing letters being sent to a group of pre-selected customers DSHANNON05/08/13
  • 4. CREATING A MAIL MERGE – REQUIRED ELEMENTS  Data source - (MS Excel)  Where your unique information comes from  Usually names and addresses of customers DSHANNON05/08/13
  • 5. CREATING A MAIL MERGE – REQUIRED ELEMENTS  Data source - (MS Excel)  Where your unique information comes from  Usually names and addresses of customers DSHANNON05/08/13  Standard text - (MSWord)  The standardised part of your document which remains the same  The message you want to communicate
  • 6. CREATING A MAIL MERGE – REQUIRED ELEMENTS  Data source - (MS Excel)  Where your unique information comes from  Usually names and addresses of customers DSHANNON05/08/13 Merged DocumentsMerged DocumentsMerged DocumentsMerged DocumentsMerged Documents Stack of letters to be printed and sent
  • 7. MAIL MERGE – THE PROCESS DSHANNON05/08/13
  • 8. MAIL MERGE – THE PROCESS DSHANNON05/08/13
  • 9. MAIL MERGE – THE PROCESS DSHANNON05/08/13
  • 10. MAIL MERGE – THE PROCESS DSHANNON05/08/13
  • 11. MAIL MERGE – THE PROCESS DSHANNON05/08/13
  • 12. MAIL MERGE – THE PROCESS DSHANNON05/08/13
  • 13. MAIL MERGE – THE PROCESS DSHANNON05/08/13
  • 14. MAIL MERGE – THE PROCESS DSHANNON05/08/13
  • 15. MAIL MERGE – THE PROCESS DSHANNON05/08/13
  • 16. MAIL MERGE – THE PROCESS DSHANNON05/08/13
  • 17. MAIL MERGE – THE PROCESS DSHANNON05/08/13
  • 18. MAIL MERGE – THE PROCESS DSHANNON05/08/13
  • 19. MAIL MERGE – THE PROCESS DSHANNON05/08/13
  • 20. MAIL MERGE – THE PROCESS DSHANNON05/08/13
  • 21. MAIL MERGE – THE PROCESS DSHANNON05/08/13
  • 22. MAIL MERGE – THE PROCESS DSHANNON05/08/13
  • 23. MAIL MERGE – THE PROCESS DSHANNON05/08/13
  • 24. MAIL MERGE – THE PROCESS DSHANNON05/08/13
  • 25. MAIL MERGE – THE PROCESS DSHANNON05/08/13
  • 26. MAIL MERGE – THE PROCESS DSHANNON05/08/13
  • 27. MAIL MERGE – THE PROCESS DSHANNON05/08/13
  • 28. MAIL MERGE – THE PROCESS DSHANNON05/08/13
  • 29. MAIL MERGE – THE PROCESS DSHANNON05/08/13
  • 30. MAIL MERGE – THE PROCESS DSHANNON05/08/13
  • 31. MAIL MERGE – THE PROCESS DSHANNON05/08/13
  • 32. MAIL MERGE – THE PROCESS DSHANNON05/08/13
  • 33. MAIL MERGE – THE PROCESS DSHANNON05/08/13
  • 34. MAIL MERGE – THE PROCESS DSHANNON05/08/13
  • 35. MAIL MERGE – THE PROCESS DSHANNON05/08/13
  • 36. MAIL MERGE – THE PROCESS DSHANNON05/08/13
  • 37. MAIL MERGE – THE PROCESS DSHANNON05/08/13
  • 38. MAIL MERGE – THE PROCESS DSHANNON05/08/13
  • 39. MAIL MERGE - SUMMARY  Simple as A, B, C A) Have your data source ready in Excel B) Have your standard content ready in Word C) Open your standard text document, Select: Mailings > Start Mail Merge > Step by Step Mail Merge Wizard And follow the onscreen instructions. *Electronic versions of this presentation are available on request DSHANNON05/08/13
  • 40. THANK YOU FOR YOUR TIME QUESTIONS? DSHANNON05/08/13