SlideShare a Scribd company logo
E-Mail
  DRaFTiNG
aND ETiquETTE



             Jayanth Jagadeesh
            Asst. Director – Outreach
                        ISiM - Mysore
E-Mail Etiquette
 A system for sending and receiving
  messages electronically over a computer
  network, as between personal computers
 An email is the most important piece of
  communication you can have with
  someone. Visitors to your website come
  and go. They are faceless drones to you.
  An email to them is an opportunity to get to
  know and interact with them. The
  opportunity to win business can hinge on
  the success of an email.               Jayanth Jagadeesh
                                        Asst. Director – Outreach
                                                    ISiM - Mysore
The elements of email etiquette
•General format
•Writing long messages
•Attachments
•The curse of surprises
•Flaming
•Delivering information
•Delivering bad news
•Electronic Mailing Lists
                                   Jayanth Jagadeesh
                                  Asst. Director – Outreach
                                              ISiM - Mysore
Jayanth Jagadeesh
Asst. Director – Outreach
            ISiM - Mysore
Get to the point of your email as quickly as
possible, but don't leave out important details that
will help your recipient answer your query.


If you do not answer all the questions in the
original email, you will receive further e-mails
regarding the unanswered questions, which
will not only waste your time and your
customer’s time but also cause considerable
frustration.                                 Jayanth Jagadeesh
                                            Asst. Director – Outreach
                                                        ISiM - Mysore
It is important for conveying the message properly.




If they did not want a quick response they would
send a letter or a fax. Therefore, each e-mail should
be replied to within at least 24 hours, and
preferably within the same working day.
                                             Jayanth Jagadeesh
                                            Asst. Director – Outreach
                                                        ISiM - Mysore
Because of computer viruses, many people won't
open attachments unless they know the sender.
Even that can be a mistake because many viruses
come disguised in email messages from someone
you know. Before sending an attachment, ask the
recipient if you may do so.



                                        Jayanth Jagadeesh
                                       Asst. Director – Outreach
                                                   ISiM - Mysore
Also, do not capitalize (i.e, ALL UPPERCASE)
unless you really mean it.
Capitalizing all letters is considered “shouting” or
flaming.


Avoid doing a reply to all when mail involves
 group mail Id’s.
Do not REPLY to ALL for congratulatory
 mails especially when mailing to superiors.
                                            Jayanth Jagadeesh
                                           Asst. Director – Outreach
                                                       ISiM - Mysore
Jayanth Jagadeesh
Asst. Director – Outreach
            ISiM - Mysore
Users have come up with something called "smilies".
They are simple strings of characters that are
interspersed in the e-mail text to convey the writer's
emotions (cues).
:-)   Smiley face       ;-)     Wink (light sarcasm)

Abbreviation usage is quite rampant with e-mail. In the
quest to save keystrokes, users have traded clarity for
confusion (unless you understand the abbreviations).
BTW by the way OBO or best offer.

                                                  Jayanth Jagadeesh
                                                 Asst. Director – Outreach
                                                             ISiM - Mysore
Hoaxes are chain letters telling interesting
(sometimes funny, often scaring) stories of computer
viruses, something for free (even money), new laws
and much more. They all have one thing in common:
they are not true.




                                            Jayanth Jagadeesh
                                           Asst. Director – Outreach
                                                       ISiM - Mysore
 Do not use the following as subjects:
      [blank]
      Hi, Hey, Hello, How are you?
      FW: FW: Re: [Old subject line]

 Write short and catchy headlines in the Subject to
  entice people to read the e-mail.
 When no subject is included, some e-mail services
  deliver the message to junk mail
                                                 Jayanth Jagadeesh
                                                Asst. Director – Outreach
                                                            ISiM - Mysore
Try to keep your sentences to a maximum of 15-20
words. Email is meant to be a quick medium and
requires a different kind of writing than letters. Also
take care not to send emails that are too long.


By replying to spam or by unsubscribing, you are
confirming that your email address is 'live'. Confirming
this will only generate even more spam. Therefore, just
hit the delete button or use email software to remove
spam automatically.                             Jayanth Jagadeesh
                                               Asst. Director – Outreach
                                                           ISiM - Mysore
 CC  Carbon Copy / Courtesy Copy
  a feature for sending an original message to the
  Prime recipient and to other interested parties.
  When using CC, all recipients see who is receiving
  the message.




                                            Jayanth Jagadeesh
                                           Asst. Director – Outreach
                                                       ISiM - Mysore
Quotes
       We see both two level quoting (>>) and one level quoting (>).
The (>>) indicate that the sender is quoting your quote and the (>) is a
quote of part of your message you sent in reply.
Don't get hung up in quoting.


Email Signatures
   It is considered good netiquette to keep your signatures
     short, usually under 6 lines.
   Include a quotation only when relevant.



                                                              Jayanth Jagadeesh
                                                             Asst. Director – Outreach
                                                                         ISiM - Mysore
Jayanth Jagadeesh
Asst. Director – Outreach
            ISiM - Mysore
Why is email etiquette important?

 We all interact with the printed word as
  though it has a personality and that
  personality makes positive and negative
  impressions upon us.
 Without immediate feedback your
  document can easily be misinterpreted
  by your reader, so it is crucial that you
  follow the basic rules of etiquette to
  construct an appropriate tone.
                                         Jayanth Jagadeesh
                                        Asst. Director – Outreach
                                                    ISiM - Mysore
Jayanth Jagadeesh
Asst. Director – Outreach
            ISiM - Mysore

More Related Content

What's hot

Email Etiquette Workshop
Email Etiquette WorkshopEmail Etiquette Workshop
Email Etiquette Workshop
susan_denny
 
Email Etiquette: Tips For Better Communication
Email Etiquette: Tips For Better CommunicationEmail Etiquette: Tips For Better Communication
Email Etiquette: Tips For Better Communication
Monica Dhoundiyal
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
MMMTS
 
Ssw Presents Email Etiquette
Ssw Presents Email EtiquetteSsw Presents Email Etiquette
Ssw Presents Email Etiquette
Soft Skills World
 
Professional email writing Workshop
Professional email writing WorkshopProfessional email writing Workshop
Professional email writing Workshop
PadmaAkula2
 
Email Etiquette Presentation
Email Etiquette PresentationEmail Etiquette Presentation
Email Etiquette PresentationUNH Upward Bound
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
RIU6
 
Tips on Effective Email Writing
Tips on Effective Email WritingTips on Effective Email Writing
Tips on Effective Email Writing
POOJA SHARMA
 
Email Etiquette_ OutworX
Email Etiquette_ OutworXEmail Etiquette_ OutworX
Email Etiquette_ OutworX
panjiarpraveen
 
Email Etiquette
Email Etiquette Email Etiquette
Email Etiquette
Skillwise Group
 
Art of email writing
Art of email writingArt of email writing
Art of email writing
Kingsly Rajkumar Rajendran
 
Business Email Etiquette
Business Email EtiquetteBusiness Email Etiquette
Business Email Etiquette
Mostafa M. Shehata, HRM
 
Email writing skills
Email writing skillsEmail writing skills
Email writing skills
Amr Essam AbdelMoniem,PMP, MBA
 
Email Writing Skills Slideshare
Email Writing Skills SlideshareEmail Writing Skills Slideshare
Email Writing Skills Slideshare
Kapil Sharma
 
Email etiquette- The sweetest way to learn!
Email etiquette- The sweetest way to learn!Email etiquette- The sweetest way to learn!
Email etiquette- The sweetest way to learn!
hari3350
 
Email Communication
Email CommunicationEmail Communication
Email Communicationjjs1981
 
Effective Email communication for Business
Effective Email communication for BusinessEffective Email communication for Business
Effective Email communication for Business
GrowthMonk Media
 
Email Ethics
Email Ethics Email Ethics
Email Ethics
TheDoctor2Tardis
 
Email etiquette
Email etiquetteEmail etiquette
Email etiquette
Nidhi Gupta
 

What's hot (20)

Email Etiquette Workshop
Email Etiquette WorkshopEmail Etiquette Workshop
Email Etiquette Workshop
 
Email Etiquette: Tips For Better Communication
Email Etiquette: Tips For Better CommunicationEmail Etiquette: Tips For Better Communication
Email Etiquette: Tips For Better Communication
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
Ssw Presents Email Etiquette
Ssw Presents Email EtiquetteSsw Presents Email Etiquette
Ssw Presents Email Etiquette
 
Professional email writing Workshop
Professional email writing WorkshopProfessional email writing Workshop
Professional email writing Workshop
 
Email Etiquette Presentation
Email Etiquette PresentationEmail Etiquette Presentation
Email Etiquette Presentation
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
Tips on Effective Email Writing
Tips on Effective Email WritingTips on Effective Email Writing
Tips on Effective Email Writing
 
Email Etiquette_ OutworX
Email Etiquette_ OutworXEmail Etiquette_ OutworX
Email Etiquette_ OutworX
 
Email Etiquette
Email Etiquette Email Etiquette
Email Etiquette
 
Art of email writing
Art of email writingArt of email writing
Art of email writing
 
Business Email Etiquette
Business Email EtiquetteBusiness Email Etiquette
Business Email Etiquette
 
Email writing skills
Email writing skillsEmail writing skills
Email writing skills
 
Email Writing Skills Slideshare
Email Writing Skills SlideshareEmail Writing Skills Slideshare
Email Writing Skills Slideshare
 
Email etiquette- The sweetest way to learn!
Email etiquette- The sweetest way to learn!Email etiquette- The sweetest way to learn!
Email etiquette- The sweetest way to learn!
 
Email Communication
Email CommunicationEmail Communication
Email Communication
 
Effective Email communication for Business
Effective Email communication for BusinessEffective Email communication for Business
Effective Email communication for Business
 
Email Ethics
Email Ethics Email Ethics
Email Ethics
 
Email etiquette
Email etiquetteEmail etiquette
Email etiquette
 
Email etiquette
Email etiquette Email etiquette
Email etiquette
 

Viewers also liked

Business Etiquette Powerpoint Slides
Business Etiquette Powerpoint SlidesBusiness Etiquette Powerpoint Slides
Business Etiquette Powerpoint Slides
Tom Clark
 
Office Etiquette PowerPoint Presentation
Office Etiquette PowerPoint PresentationOffice Etiquette PowerPoint Presentation
Office Etiquette PowerPoint Presentation
Andrew Schwartz
 
Business etiquette
Business etiquette Business etiquette
Business etiquette
roopneetc
 
E Mail Ettiquette
E Mail EttiquetteE Mail Ettiquette
E Mail Ettiquette
abard
 
Email Ettiquette (Javid Hamdard)
Email Ettiquette (Javid Hamdard)Email Ettiquette (Javid Hamdard)
Email Ettiquette (Javid Hamdard)
Javid Hamdard
 
Office etiquette tips
Office etiquette tipsOffice etiquette tips
Office etiquette tips
Sachin Joshi
 
History of etiquette
History of etiquetteHistory of etiquette
History of etiquette
Ma E.C.C.
 
Guide to professionalism
Guide to  professionalismGuide to  professionalism
Guide to professionalism
Pradeep Yuvaraj
 
Workplace etiquette
Workplace etiquetteWorkplace etiquette
Workplace etiquette
Rachel Weber
 
Office Etiquette
Office EtiquetteOffice Etiquette
Office Etiquette
Nanette Bajador
 
Workplace Ethics PowerPoint Presentation
Workplace Ethics PowerPoint PresentationWorkplace Ethics PowerPoint Presentation
Workplace Ethics PowerPoint Presentation
Andrew Schwartz
 

Viewers also liked (13)

Business Etiquette Powerpoint Slides
Business Etiquette Powerpoint SlidesBusiness Etiquette Powerpoint Slides
Business Etiquette Powerpoint Slides
 
Office Etiquette PowerPoint Presentation
Office Etiquette PowerPoint PresentationOffice Etiquette PowerPoint Presentation
Office Etiquette PowerPoint Presentation
 
Business etiquette
Business etiquette Business etiquette
Business etiquette
 
E Mail Ettiquette
E Mail EttiquetteE Mail Ettiquette
E Mail Ettiquette
 
Email Ettiquette (Javid Hamdard)
Email Ettiquette (Javid Hamdard)Email Ettiquette (Javid Hamdard)
Email Ettiquette (Javid Hamdard)
 
Office etiquette tips
Office etiquette tipsOffice etiquette tips
Office etiquette tips
 
History of etiquette
History of etiquetteHistory of etiquette
History of etiquette
 
Office Etiquettes
Office EtiquettesOffice Etiquettes
Office Etiquettes
 
Guide to professionalism
Guide to  professionalismGuide to  professionalism
Guide to professionalism
 
Workplace etiquette
Workplace etiquetteWorkplace etiquette
Workplace etiquette
 
Office Etiquette
Office EtiquetteOffice Etiquette
Office Etiquette
 
Workplace etiquette & manners
Workplace etiquette & mannersWorkplace etiquette & manners
Workplace etiquette & manners
 
Workplace Ethics PowerPoint Presentation
Workplace Ethics PowerPoint PresentationWorkplace Ethics PowerPoint Presentation
Workplace Ethics PowerPoint Presentation
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

Email

  • 1. E-Mail DRaFTiNG aND ETiquETTE Jayanth Jagadeesh Asst. Director – Outreach ISiM - Mysore
  • 2. E-Mail Etiquette  A system for sending and receiving messages electronically over a computer network, as between personal computers  An email is the most important piece of communication you can have with someone. Visitors to your website come and go. They are faceless drones to you. An email to them is an opportunity to get to know and interact with them. The opportunity to win business can hinge on the success of an email. Jayanth Jagadeesh Asst. Director – Outreach ISiM - Mysore
  • 3. The elements of email etiquette •General format •Writing long messages •Attachments •The curse of surprises •Flaming •Delivering information •Delivering bad news •Electronic Mailing Lists Jayanth Jagadeesh Asst. Director – Outreach ISiM - Mysore
  • 4. Jayanth Jagadeesh Asst. Director – Outreach ISiM - Mysore
  • 5. Get to the point of your email as quickly as possible, but don't leave out important details that will help your recipient answer your query. If you do not answer all the questions in the original email, you will receive further e-mails regarding the unanswered questions, which will not only waste your time and your customer’s time but also cause considerable frustration. Jayanth Jagadeesh Asst. Director – Outreach ISiM - Mysore
  • 6. It is important for conveying the message properly. If they did not want a quick response they would send a letter or a fax. Therefore, each e-mail should be replied to within at least 24 hours, and preferably within the same working day. Jayanth Jagadeesh Asst. Director – Outreach ISiM - Mysore
  • 7. Because of computer viruses, many people won't open attachments unless they know the sender. Even that can be a mistake because many viruses come disguised in email messages from someone you know. Before sending an attachment, ask the recipient if you may do so. Jayanth Jagadeesh Asst. Director – Outreach ISiM - Mysore
  • 8. Also, do not capitalize (i.e, ALL UPPERCASE) unless you really mean it. Capitalizing all letters is considered “shouting” or flaming. Avoid doing a reply to all when mail involves group mail Id’s. Do not REPLY to ALL for congratulatory mails especially when mailing to superiors. Jayanth Jagadeesh Asst. Director – Outreach ISiM - Mysore
  • 9. Jayanth Jagadeesh Asst. Director – Outreach ISiM - Mysore
  • 10. Users have come up with something called "smilies". They are simple strings of characters that are interspersed in the e-mail text to convey the writer's emotions (cues). :-) Smiley face ;-) Wink (light sarcasm) Abbreviation usage is quite rampant with e-mail. In the quest to save keystrokes, users have traded clarity for confusion (unless you understand the abbreviations). BTW by the way OBO or best offer. Jayanth Jagadeesh Asst. Director – Outreach ISiM - Mysore
  • 11. Hoaxes are chain letters telling interesting (sometimes funny, often scaring) stories of computer viruses, something for free (even money), new laws and much more. They all have one thing in common: they are not true. Jayanth Jagadeesh Asst. Director – Outreach ISiM - Mysore
  • 12.  Do not use the following as subjects: [blank] Hi, Hey, Hello, How are you? FW: FW: Re: [Old subject line]  Write short and catchy headlines in the Subject to entice people to read the e-mail.  When no subject is included, some e-mail services deliver the message to junk mail Jayanth Jagadeesh Asst. Director – Outreach ISiM - Mysore
  • 13. Try to keep your sentences to a maximum of 15-20 words. Email is meant to be a quick medium and requires a different kind of writing than letters. Also take care not to send emails that are too long. By replying to spam or by unsubscribing, you are confirming that your email address is 'live'. Confirming this will only generate even more spam. Therefore, just hit the delete button or use email software to remove spam automatically. Jayanth Jagadeesh Asst. Director – Outreach ISiM - Mysore
  • 14.  CC  Carbon Copy / Courtesy Copy a feature for sending an original message to the Prime recipient and to other interested parties. When using CC, all recipients see who is receiving the message. Jayanth Jagadeesh Asst. Director – Outreach ISiM - Mysore
  • 15. Quotes We see both two level quoting (>>) and one level quoting (>). The (>>) indicate that the sender is quoting your quote and the (>) is a quote of part of your message you sent in reply. Don't get hung up in quoting. Email Signatures  It is considered good netiquette to keep your signatures short, usually under 6 lines.  Include a quotation only when relevant. Jayanth Jagadeesh Asst. Director – Outreach ISiM - Mysore
  • 16. Jayanth Jagadeesh Asst. Director – Outreach ISiM - Mysore
  • 17. Why is email etiquette important?  We all interact with the printed word as though it has a personality and that personality makes positive and negative impressions upon us.  Without immediate feedback your document can easily be misinterpreted by your reader, so it is crucial that you follow the basic rules of etiquette to construct an appropriate tone. Jayanth Jagadeesh Asst. Director – Outreach ISiM - Mysore
  • 18. Jayanth Jagadeesh Asst. Director – Outreach ISiM - Mysore