SlideShare a Scribd company logo
Basic Email Etiquettes
Why is email etiquettes important?

• First impressions do happen over email.

• Increases professionalism.

• Having email etiquettes get to the point faster as
compared to poorly written emails.

• Proper use of words creates an overall good
  impression.
Recipients
To/Cc/Bcc :

 To : Specific person or department.
 Cc means carbon copy of your mail. Used in scenario when you have
to keep your superiors in loop.
 Bcc means Blind carbon copy. Recipients will not be able to see whom
all the email has been sent to.

Do not mark "Cc" or "Bcc" to those who are not connected with the
  business related to the subject matter.
Subject line and greetings
Try to use subject line that has meaning and purpose of mail.



• Clear and concise, it should to be related to the topic of the email.
• Failure to do so could mean being deleted.
Greetings :
• Americans: use Hi
• Europeans: use Hello
• Asians: use Dear
To be more formal we could use Dear Mr. /Ms. followed by Last name or Full
name. One should not use Dear Mr. /Ms. followed by First name alone.

We should not put '/' in greetings like Hi X/Y. Instead we should say Hi X and Y .
ADDRESSING YOUR EMAIL
The mail should have a Pyramid Structure i.e. it should contain:

•   Situation: What is the current situation?
•   Action items: What you expect from the reader of the mail to-do.
•   Information: The information you want to give to the reader .
•   Conclusion: Conclude with a Thank You.

The font of mail should be Verdana, Arial or times and font size should be 9.5
or 10. Avoid fancy font. Do not write in “CAPITALS”.
It looks as if you are shouting. This might trigger an unwanted response.

For writing use only Black or Blue color. For highlighting purpose make the word bold.
Avoid using Red color as Red signifies danger, so use it when urgent.

•   Do not use Italics font to write official mails.
•   Always conclude every email by writing your name, address, phone number and
    your email address. This way, recipients get the information on multiple means of
    contacting you in case they do not wish to communicate with you only through
    emails and wish to use other means. This information is also useful to the people to
    whom your email might be forwarded.
Content
• Pay attention to grammar, spelling, and punctuation.
Run spell and grammar check option in your outlook or Microsoft Word.
•   Be clear and concise .
•   Start with why you are emailing.
•   Do not use all caps, it appears to be similar to shouting.
•   Avoid using color and font schemes.
Importance of punctuation:
“A woman without her man is nothing"
"A woman, without her man, is nothing."
"A woman: without her, man is nothing."
Punctuation is powerful hence use wisely.
• Correct sentence formation and avoid emotions. []
• Do not use abbreviations (unless they are absolutely universally
  understood)
• Respond in timely manner.
Avoid
• For requesting something we should not use can, instead we should use
    may/could.
• Avoid writing 'Please find the attached file' because the reader does not have to
    find or search for the file in the mail it's already there. Instead write 'The file has
    been attached for your reference'.
• Avoid sentences like 'As per your mail' because 'per' is used only with units like per
    Kg etc. Instead write 'According to your mail'.
• We often write 'Please revert back'. Instead write 'Please revert'.
• When a bulk mail is sent do not reply to all. Instead reply to the
concerned person or to a specific department. As your reply may not be of any
importance to others and it would be a waste of time for them.
• If there is reply to a specific mail more than 3times. ALERT: It’s time
to pick your phone and speak rather than dragging the mail any further.
• Avoid sending large attachment; Instead use websites like www.sendspace.com
    and there are many others.
Summary


•   Respond in a timely matter.

•   Double check spelling and grammar, always rely on spell check.

•   Make sure you have actually attached your documents .

•   Email is a form of communication and becomes a written record ,hence
    tone and attitude should be polite.

•   Make sure to be sincere and thank those who take time to respond and
    give you information .

•   A well written email can quickly impress a potential employer .
Asrar Khan

More Related Content

What's hot

Email Etiquette_ OutworX
Email Etiquette_ OutworXEmail Etiquette_ OutworX
Email Etiquette_ OutworX
panjiarpraveen
 
Email etiquette [advanced level]
Email etiquette [advanced level]Email etiquette [advanced level]
Email etiquette [advanced level]
Harmeet Bhatia
 
Ssw Presents Email Etiquette
Ssw Presents Email EtiquetteSsw Presents Email Etiquette
Ssw Presents Email Etiquette
Soft Skills World
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
RIU6
 
Writing Effective Business EMails!
Writing Effective Business EMails!Writing Effective Business EMails!
Writing Effective Business EMails!
lorzinian
 
Email etiquette
Email etiquetteEmail etiquette
Email etiquette
Margaret Lakra Deb
 
Email Etiquette: Keep it Professional and Positive
Email Etiquette: Keep it Professional and PositiveEmail Etiquette: Keep it Professional and Positive
Email Etiquette: Keep it Professional and Positive
Libby Van Vleet
 
Email Writing Skills Slideshare
Email Writing Skills SlideshareEmail Writing Skills Slideshare
Email Writing Skills Slideshare
Kapil Sharma
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
MMMTS
 
Email etiquette and effective email use guidance for staff and associates
Email etiquette and effective email use guidance for staff and associatesEmail etiquette and effective email use guidance for staff and associates
Email etiquette and effective email use guidance for staff and associates
The Pathway Group
 
Email etiquettes
Email etiquettesEmail etiquettes
Email etiquettes
bodabb
 
Email Ettiquette (Javid Hamdard)
Email Ettiquette (Javid Hamdard)Email Ettiquette (Javid Hamdard)
Email Ettiquette (Javid Hamdard)
Javid Hamdard
 
Work Place Email Etiquette - PPT by buddinggeek.com.pptx
Work Place Email Etiquette - PPT by buddinggeek.com.pptxWork Place Email Etiquette - PPT by buddinggeek.com.pptx
Work Place Email Etiquette - PPT by buddinggeek.com.pptx
Abhishek Raj
 
Email Etiquettes
Email EtiquettesEmail Etiquettes
Email Etiquettes
RnR DataLex Pvt Ltd
 
Email Etiquette - duration of presentation is 3 minutes
Email Etiquette - duration of presentation is 3 minutesEmail Etiquette - duration of presentation is 3 minutes
Email Etiquette - duration of presentation is 3 minutes
Ajit R Chandran
 
6437971 email-writing-ettiquettes-
6437971 email-writing-ettiquettes-6437971 email-writing-ettiquettes-
6437971 email-writing-ettiquettes-caiusdf
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
guest130e97
 
Email Etiquette Workshop
Email Etiquette WorkshopEmail Etiquette Workshop
Email Etiquette Workshop
susan_denny
 
Presentation On Email Etiquettes
Presentation On Email EtiquettesPresentation On Email Etiquettes
Presentation On Email Etiquettes
Ketan Raval
 
Email Ethics
Email Ethics Email Ethics
Email Ethics
TheDoctor2Tardis
 

What's hot (20)

Email Etiquette_ OutworX
Email Etiquette_ OutworXEmail Etiquette_ OutworX
Email Etiquette_ OutworX
 
Email etiquette [advanced level]
Email etiquette [advanced level]Email etiquette [advanced level]
Email etiquette [advanced level]
 
Ssw Presents Email Etiquette
Ssw Presents Email EtiquetteSsw Presents Email Etiquette
Ssw Presents Email Etiquette
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
Writing Effective Business EMails!
Writing Effective Business EMails!Writing Effective Business EMails!
Writing Effective Business EMails!
 
Email etiquette
Email etiquetteEmail etiquette
Email etiquette
 
Email Etiquette: Keep it Professional and Positive
Email Etiquette: Keep it Professional and PositiveEmail Etiquette: Keep it Professional and Positive
Email Etiquette: Keep it Professional and Positive
 
Email Writing Skills Slideshare
Email Writing Skills SlideshareEmail Writing Skills Slideshare
Email Writing Skills Slideshare
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
Email etiquette and effective email use guidance for staff and associates
Email etiquette and effective email use guidance for staff and associatesEmail etiquette and effective email use guidance for staff and associates
Email etiquette and effective email use guidance for staff and associates
 
Email etiquettes
Email etiquettesEmail etiquettes
Email etiquettes
 
Email Ettiquette (Javid Hamdard)
Email Ettiquette (Javid Hamdard)Email Ettiquette (Javid Hamdard)
Email Ettiquette (Javid Hamdard)
 
Work Place Email Etiquette - PPT by buddinggeek.com.pptx
Work Place Email Etiquette - PPT by buddinggeek.com.pptxWork Place Email Etiquette - PPT by buddinggeek.com.pptx
Work Place Email Etiquette - PPT by buddinggeek.com.pptx
 
Email Etiquettes
Email EtiquettesEmail Etiquettes
Email Etiquettes
 
Email Etiquette - duration of presentation is 3 minutes
Email Etiquette - duration of presentation is 3 minutesEmail Etiquette - duration of presentation is 3 minutes
Email Etiquette - duration of presentation is 3 minutes
 
6437971 email-writing-ettiquettes-
6437971 email-writing-ettiquettes-6437971 email-writing-ettiquettes-
6437971 email-writing-ettiquettes-
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
Email Etiquette Workshop
Email Etiquette WorkshopEmail Etiquette Workshop
Email Etiquette Workshop
 
Presentation On Email Etiquettes
Presentation On Email EtiquettesPresentation On Email Etiquettes
Presentation On Email Etiquettes
 
Email Ethics
Email Ethics Email Ethics
Email Ethics
 

Similar to Basic email etiquettes

Basic email etiquettes
Basic email  etiquettesBasic email  etiquettes
Basic email etiquettes
Manish Kumar G
 
Business email etiquette.pptx
Business email etiquette.pptxBusiness email etiquette.pptx
Business email etiquette.pptx
ssuser21b53b
 
Email writing
Email writing Email writing
Email writing
Dr.Nidhi pandey
 
eMail Etiquettes.pptx
eMail Etiquettes.pptxeMail Etiquettes.pptx
eMail Etiquettes.pptx
RohitKadam532364
 
Writing formal and informal emails - M. van Eijk
Writing formal and informal emails - M. van EijkWriting formal and informal emails - M. van Eijk
Writing formal and informal emails - M. van Eijk
Zadkine
 
How to Write a Formal Letter
How to Write a Formal LetterHow to Write a Formal Letter
How to Write a Formal Letter
Scribendi
 
Business English - Business Emails - Ash Vyas
Business English - Business Emails - Ash VyasBusiness English - Business Emails - Ash Vyas
Business English - Business Emails - Ash Vyas
Ash (Ashvini) Vyas
 
Email Etiquette by Bhuvan Thapa.pptx
Email Etiquette by Bhuvan Thapa.pptxEmail Etiquette by Bhuvan Thapa.pptx
Email Etiquette by Bhuvan Thapa.pptx
Bhuvan Thapa
 
Email etiquettes
Email etiquettesEmail etiquettes
Email etiquettes
Anshumali Saxena
 
Writing Better Emails.pptx
Writing Better Emails.pptxWriting Better Emails.pptx
Writing Better Emails.pptx
Robbia Rana
 
Clase grabada formal writing 1
Clase grabada formal writing 1Clase grabada formal writing 1
Clase grabada formal writing 1
Alejandra Soledad Bueno
 
Day 2 email writing
Day 2 email writingDay 2 email writing
Day 2 email writing
SurajKumarGupta24
 
Email etiquettes presentation
Email etiquettes presentationEmail etiquettes presentation
Email etiquettes presentation
Jitan Aggarwal - Social Media Strategist
 
E-Mail etiquette Professional English.ppt
E-Mail etiquette Professional English.pptE-Mail etiquette Professional English.ppt
E-Mail etiquette Professional English.ppt
broadyranger
 
formalletter-111208031502-phpapp01.pptx
formalletter-111208031502-phpapp01.pptxformalletter-111208031502-phpapp01.pptx
formalletter-111208031502-phpapp01.pptx
RyanEstonio
 
Bcom 1 year letter writing
Bcom 1 year letter writingBcom 1 year letter writing
E-Mail Etiquette PPT - BSMC
E-Mail Etiquette PPT - BSMCE-Mail Etiquette PPT - BSMC
E-Mail Etiquette PPT - BSMC
Praneet Surti
 
Email Etiquette-RCC.pptx
Email Etiquette-RCC.pptxEmail Etiquette-RCC.pptx
Email Etiquette-RCC.pptx
OsamaIsmail36
 

Similar to Basic email etiquettes (20)

Basic email etiquettes
Basic email  etiquettesBasic email  etiquettes
Basic email etiquettes
 
Basic EmailEtiquettes
Basic EmailEtiquettesBasic EmailEtiquettes
Basic EmailEtiquettes
 
Business email etiquette.pptx
Business email etiquette.pptxBusiness email etiquette.pptx
Business email etiquette.pptx
 
Email writing
Email writing Email writing
Email writing
 
eMail Etiquettes.pptx
eMail Etiquettes.pptxeMail Etiquettes.pptx
eMail Etiquettes.pptx
 
Writing formal and informal emails - M. van Eijk
Writing formal and informal emails - M. van EijkWriting formal and informal emails - M. van Eijk
Writing formal and informal emails - M. van Eijk
 
How to Write a Formal Letter
How to Write a Formal LetterHow to Write a Formal Letter
How to Write a Formal Letter
 
Business English - Business Emails - Ash Vyas
Business English - Business Emails - Ash VyasBusiness English - Business Emails - Ash Vyas
Business English - Business Emails - Ash Vyas
 
Email Etiquette by Bhuvan Thapa.pptx
Email Etiquette by Bhuvan Thapa.pptxEmail Etiquette by Bhuvan Thapa.pptx
Email Etiquette by Bhuvan Thapa.pptx
 
Email etiquettes
Email etiquettesEmail etiquettes
Email etiquettes
 
Writing Better Emails.pptx
Writing Better Emails.pptxWriting Better Emails.pptx
Writing Better Emails.pptx
 
Netiquettes
NetiquettesNetiquettes
Netiquettes
 
Clase grabada formal writing 1
Clase grabada formal writing 1Clase grabada formal writing 1
Clase grabada formal writing 1
 
Day 2 email writing
Day 2 email writingDay 2 email writing
Day 2 email writing
 
Email etiquettes presentation
Email etiquettes presentationEmail etiquettes presentation
Email etiquettes presentation
 
E-Mail etiquette Professional English.ppt
E-Mail etiquette Professional English.pptE-Mail etiquette Professional English.ppt
E-Mail etiquette Professional English.ppt
 
formalletter-111208031502-phpapp01.pptx
formalletter-111208031502-phpapp01.pptxformalletter-111208031502-phpapp01.pptx
formalletter-111208031502-phpapp01.pptx
 
Bcom 1 year letter writing
Bcom 1 year letter writingBcom 1 year letter writing
Bcom 1 year letter writing
 
E-Mail Etiquette PPT - BSMC
E-Mail Etiquette PPT - BSMCE-Mail Etiquette PPT - BSMC
E-Mail Etiquette PPT - BSMC
 
Email Etiquette-RCC.pptx
Email Etiquette-RCC.pptxEmail Etiquette-RCC.pptx
Email Etiquette-RCC.pptx
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 

Basic email etiquettes

  • 2. Why is email etiquettes important? • First impressions do happen over email. • Increases professionalism. • Having email etiquettes get to the point faster as compared to poorly written emails. • Proper use of words creates an overall good impression.
  • 3. Recipients To/Cc/Bcc :  To : Specific person or department.  Cc means carbon copy of your mail. Used in scenario when you have to keep your superiors in loop.  Bcc means Blind carbon copy. Recipients will not be able to see whom all the email has been sent to. Do not mark "Cc" or "Bcc" to those who are not connected with the business related to the subject matter.
  • 4. Subject line and greetings Try to use subject line that has meaning and purpose of mail. • Clear and concise, it should to be related to the topic of the email. • Failure to do so could mean being deleted. Greetings : • Americans: use Hi • Europeans: use Hello • Asians: use Dear To be more formal we could use Dear Mr. /Ms. followed by Last name or Full name. One should not use Dear Mr. /Ms. followed by First name alone. We should not put '/' in greetings like Hi X/Y. Instead we should say Hi X and Y .
  • 5. ADDRESSING YOUR EMAIL The mail should have a Pyramid Structure i.e. it should contain: • Situation: What is the current situation? • Action items: What you expect from the reader of the mail to-do. • Information: The information you want to give to the reader . • Conclusion: Conclude with a Thank You. The font of mail should be Verdana, Arial or times and font size should be 9.5 or 10. Avoid fancy font. Do not write in “CAPITALS”. It looks as if you are shouting. This might trigger an unwanted response. For writing use only Black or Blue color. For highlighting purpose make the word bold. Avoid using Red color as Red signifies danger, so use it when urgent. • Do not use Italics font to write official mails. • Always conclude every email by writing your name, address, phone number and your email address. This way, recipients get the information on multiple means of contacting you in case they do not wish to communicate with you only through emails and wish to use other means. This information is also useful to the people to whom your email might be forwarded.
  • 6. Content • Pay attention to grammar, spelling, and punctuation. Run spell and grammar check option in your outlook or Microsoft Word. • Be clear and concise . • Start with why you are emailing. • Do not use all caps, it appears to be similar to shouting. • Avoid using color and font schemes. Importance of punctuation: “A woman without her man is nothing" "A woman, without her man, is nothing." "A woman: without her, man is nothing." Punctuation is powerful hence use wisely. • Correct sentence formation and avoid emotions. [] • Do not use abbreviations (unless they are absolutely universally understood) • Respond in timely manner.
  • 7. Avoid • For requesting something we should not use can, instead we should use may/could. • Avoid writing 'Please find the attached file' because the reader does not have to find or search for the file in the mail it's already there. Instead write 'The file has been attached for your reference'. • Avoid sentences like 'As per your mail' because 'per' is used only with units like per Kg etc. Instead write 'According to your mail'. • We often write 'Please revert back'. Instead write 'Please revert'. • When a bulk mail is sent do not reply to all. Instead reply to the concerned person or to a specific department. As your reply may not be of any importance to others and it would be a waste of time for them. • If there is reply to a specific mail more than 3times. ALERT: It’s time to pick your phone and speak rather than dragging the mail any further. • Avoid sending large attachment; Instead use websites like www.sendspace.com and there are many others.
  • 8. Summary • Respond in a timely matter. • Double check spelling and grammar, always rely on spell check. • Make sure you have actually attached your documents . • Email is a form of communication and becomes a written record ,hence tone and attitude should be polite. • Make sure to be sincere and thank those who take time to respond and give you information . • A well written email can quickly impress a potential employer .