SlideShare a Scribd company logo
GAELIC SUMMER CAMP
E-MAIL ETIQUETTE
University of the Witwatersrand
Simon Mofokeng
OBJECTIVES
For the purpose of this document “Mail” will refer to “Email”
Electronic mail, or “Mail”, provides an easy-to use, efficient means of
communicating with other members of workgroups and the External
Internet Communities.
The purpose of this presentation is to ensure the proper use of email
system and make users aware of what is deemed as acceptable and
unacceptable use of the system.
E-MAIL ETIQUETTE
E-MAIL ETIQUETTE
RESPONSIBILITIES OF THE USER
Legal Risks: email is a business communication tool and users are
obliged to use this tool in a responsible, effective and lawful manner.
Although by its nature email seems to be less formal than other
written communication, the same laws apply.
The following guidelines for working with “Mail” are designed to ensure
that you and your colleagues get the maximum benefit from the
system.
The following information is included in the pages that follow:
* Responsibilities of the user
* Activities to avoid
* Hints and tips
E-MAIL ETIQUETTE
RESPONSIBILITIES OF THE USER
Limited
“Mail” must not be used as a forum of political, religious, or other
debates, or as a form of entertainment or broadcasting, or for sending
chain letters or advertisements or jokes or non- business related
issue. Each message occupies valuable time on the network, and
discretion must be used when using “Mail”.
Length
When using “Mail”, keep your message as brief and to the point as
possible.
Long messages tend to lose their point. Rather send a message
requesting a meeting to discuss lengthy issues.
E-MAIL ETIQUETTE
RESPONSIBILITIES OF THE USER
Title
Give every message a title
Make sure the subject line of your message provide a brief, clear
description of the contents of the message
Effectiveness
Read “Mail” message regularly and respond timeously where necessary.
The effectiveness of a “Mail” system in improving productivity and
communication is based on responsiveness. Read your message
regularly and reply as soon as possible.
E-MAIL ETIQUETTE
RESPONSIBILITIES OF THE USER
E-MAIL ETIQUETTE
RESPONSIBILITIES OF THE USER
Selective
Be selective when forwarding or replying to a “Mail” message.
Consider who really need to see the message. Forward it only to those who need
information.
Protect
Your user passwords are the gateway to your PC and systems resources
including mail, Protect it all the time.
You are responsible for actions taken under your user ID. Once your user ID is
logged on, it is impossible to tell whether it is really you or someone else
sending the message. Do not use passwords that would be obvious to others,
and change it immediately if you think it has been compromised.
Activate your Windows screen saver password to kick in automatically when idle
after a few minutes.
E-MAIL ETIQUETTE
RESPONSIBILITIES OF THE USER
Size
Keep your mailbox and “Mail” files as small as possible
Delete message from your mailbox after you have read or filed them. File
only those messages that really need to be recorded.
Housekeeping
Carry out regular housekeeping on your files
A facility exists “Mail” to archive messages to free up space on the
system. If at a later date you need to refer to them, it is possible to
access them. Another option will be to create a ‘personal folder’ and
move the important “Mail” items to the personal folder. Delete or
archive messages from the sent item folder regularly.
E-MAIL ETIQUETTE
RESPONSIBILITIES OF THE USER
Logging off
Exit and log off on your mail system if you will be away for an extended
period and when you leave at the end of the day.
Certain maintenance might be done overnight on the server, and this is
only possible if you have logged out of your computer.
Privacy
“Mail” message are considered private correspondence. As such,
messages are viewed as the private property of the receiver and will
not be made available to Management. Although privacy and security
are of the utmost importance, auditors, or investigators are authorized
to investigate misuse of the network, such as theft, pornography,
harassment, excessive private use, etc.
E-MAIL ETIQUETTE
ACTIVITIES TO AVOID
Misuse
Do not send any obscene, racist, defamatory or otherwise offensive material via
“Mail”
The use of vulgar language is expressly forbidden over the network, be it on
company business, or in a private capacity.
Personal use
Note- Sending and receiving excessive non-business related messages is
prohibited.
E-MAIL ETIQUETTE
ACTIVITIES TO AVOID
Confrontation
Do not use “Mail” to avoid confrontation.
In certain instances, such as disciplinary or explosive circumstances, the
sending of “Mail” messages is inappropriate. Do not send rude or
argumentative messages. These situations can only be dealt within in a
face to- face confrontation and “Mail” should not be used.
Large files
Do not send large files as attachment.
Be selective in the files you send to others via “Mail”. Within your own work group, it is better
to share the file and send a message regarding the file name to the recipients. Attached
files dramatically increase the network overhead as well as the size of the “Mail” file.
Priority
Do not flag all messages as high priority
Do not send “Mail” as the highest priority unless it really merits that priority. High –priority
“Mails” message should only be used for the most important message and when you
need an immediately response.
E-MAIL ETIQUETTE
ACTIVITIES TO AVOID
Password
Do not give your password/s to others
You are responsible for any mail message originating from your machine.
Giving other employees access to your system could result in
fraudulent use of “Mail”.
Confidential Information
Avoid sending confidential information by “Mail”. If you do, you must
secure the information by including it in a Microsoft Word file
protecting it with a password. Then provide the recipient with the
password by means of other communication, for instance by
telephone.
E-MAIL ETIQUETTE
HINTS AND TIPS
Requirements
Set the options to suit your requirements
Check for messages every 15 - 60 minutes. Sound the chime when a
new message arrives. Flash the envelope when a new message
arrives.
Receipt
Use the return receipt option
If you are not sure whether the addressees are receiving messages, use
the return receipt option. This will send a message back to you,
informing you that the recipient has got the message.
E-MAIL ETIQUETTE
HINTS AND TIPS
Backing up
Your “Mail” files should be backed-up periodically; otherwise users carry
the responsibility if not provided by business.
Tip
Include a signature that contains other methods by which others can
contact you. This usually includes your full name, job title, and
company name and telephone numbers.
Do not send messages all in capital as it will appear as if you are
shouting. Use bold lettering or underlining for emphasis, e.g., use that
is what I meant, rather than that IS what I meant.
E-MAIL ETIQUETTE
Questions
simon.mofokeng@wits.ac.za
Thank you once again for adhering to guidelines.
E-MAIL ETIQUETTE

More Related Content

What's hot

Introduction To Email
Introduction To EmailIntroduction To Email
Introduction To Email
Christian County Library
 
Email use in business ppt
Email use in business pptEmail use in business ppt
Email use in business ppt
Jason Roy
 
Welcome to email
Welcome to emailWelcome to email
Welcome to email
Richard Rogers
 
Email Essentials
Email EssentialsEmail Essentials
Email Essentials
Peter Ferguson
 
History of Email PowerPoint presentation
History of Email PowerPoint presentationHistory of Email PowerPoint presentation
History of Email PowerPoint presentation
Saad Zeeshan
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
Abid Fakhre Alam
 
E-Mail Basics
E-Mail BasicsE-Mail Basics
E-Mail Basics
Keith McVean
 
Basics of E-Mail
Basics of E-MailBasics of E-Mail
Basics of E-Mail
ruledbyrobotics2080
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)
Wissam Abdel Baki
 
E‑mail
E‑mailE‑mail
E‑mail
Mukul Kumar
 
Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User. Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User.
Empowerhosting
 
Parent quick-guides
Parent quick-guidesParent quick-guides
Parent quick-guidesthsieh
 
Email privacy issues and Netiquette
Email privacy issues and NetiquetteEmail privacy issues and Netiquette
Email privacy issues and NetiquetteSomeone Else
 
Internet and Email 101 v1
Internet and Email 101 v1Internet and Email 101 v1
Internet and Email 101 v1Adam Ripsam
 
Email Basics
Email BasicsEmail Basics
Email Basics
Sarthak Dongre
 

What's hot (18)

Introduction To Email
Introduction To EmailIntroduction To Email
Introduction To Email
 
E Mail Basic
E Mail BasicE Mail Basic
E Mail Basic
 
Email use in business ppt
Email use in business pptEmail use in business ppt
Email use in business ppt
 
Welcome to email
Welcome to emailWelcome to email
Welcome to email
 
Email Essentials
Email EssentialsEmail Essentials
Email Essentials
 
History of Email PowerPoint presentation
History of Email PowerPoint presentationHistory of Email PowerPoint presentation
History of Email PowerPoint presentation
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
E-Mail Basics
E-Mail BasicsE-Mail Basics
E-Mail Basics
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Basics of E-Mail
Basics of E-MailBasics of E-Mail
Basics of E-Mail
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)
 
E‑mail
E‑mailE‑mail
E‑mail
 
Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User. Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User.
 
Parent quick-guides
Parent quick-guidesParent quick-guides
Parent quick-guides
 
Email privacy issues and Netiquette
Email privacy issues and NetiquetteEmail privacy issues and Netiquette
Email privacy issues and Netiquette
 
E Mail
E MailE Mail
E Mail
 
Internet and Email 101 v1
Internet and Email 101 v1Internet and Email 101 v1
Internet and Email 101 v1
 
Email Basics
Email BasicsEmail Basics
Email Basics
 

Viewers also liked

Email etiquette
Email etiquetteEmail etiquette
Email etiquette
amu1
 
Email Etiquette ( Final) by Roma Kaur Rana
Email Etiquette ( Final) by Roma Kaur RanaEmail Etiquette ( Final) by Roma Kaur Rana
Email Etiquette ( Final) by Roma Kaur Rana
Roma Kaur Rana
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
hilonihadani
 
Propper Email Etiquette
Propper Email EtiquettePropper Email Etiquette
Propper Email Etiquette
St John
 
E mail etiquette
E mail etiquetteE mail etiquette
E mail etiquette
mindylcarter
 
Email etiquette and effective email use guidance for staff and associates
Email etiquette and effective email use guidance for staff and associatesEmail etiquette and effective email use guidance for staff and associates
Email etiquette and effective email use guidance for staff and associates
The Pathway Group
 
Email Etiquette
Email Etiquette Email Etiquette
Email Etiquette
Skillwise Group
 
Emailing Insight : An essential element for career
Emailing Insight : An essential element for careerEmailing Insight : An essential element for career
Emailing Insight : An essential element for career
Rahul Thakur
 
7 Email Etiquettes for Effective Email Communication
7 Email Etiquettes for Effective Email Communication 7 Email Etiquettes for Effective Email Communication
7 Email Etiquettes for Effective Email Communication
Wizdumb
 
Email Etiquette_ OutworX
Email Etiquette_ OutworXEmail Etiquette_ OutworX
Email Etiquette_ OutworX
panjiarpraveen
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
FAROOK Samath
 
Email Etiquette's for Professional & business profiles
Email Etiquette's for Professional & business profilesEmail Etiquette's for Professional & business profiles
Email Etiquette's for Professional & business profiles
HR ULTIMEZ TECHNOLOGY
 
Email etiquette
Email etiquetteEmail etiquette
Email etiquette
Pavanaja U B
 
5 essential tips for business email etiquette.ppt
5 essential tips for business email etiquette.ppt5 essential tips for business email etiquette.ppt
5 essential tips for business email etiquette.ppt
Sherin Thomas
 
Email Etiquette Presentation
Email Etiquette PresentationEmail Etiquette Presentation
Email Etiquette PresentationUNH Upward Bound
 
Presentation on Email Etiquette
Presentation on Email Etiquette Presentation on Email Etiquette
Presentation on Email Etiquette
OpenDev
 
Email Etiquette: Tips For Better Communication
Email Etiquette: Tips For Better CommunicationEmail Etiquette: Tips For Better Communication
Email Etiquette: Tips For Better Communication
Monica Dhoundiyal
 
Email etiquette
Email etiquetteEmail etiquette
Email etiquette
Ellie Simons
 

Viewers also liked (20)

Email etiquette
Email etiquetteEmail etiquette
Email etiquette
 
Email Etiquette ( Final) by Roma Kaur Rana
Email Etiquette ( Final) by Roma Kaur RanaEmail Etiquette ( Final) by Roma Kaur Rana
Email Etiquette ( Final) by Roma Kaur Rana
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
Propper Email Etiquette
Propper Email EtiquettePropper Email Etiquette
Propper Email Etiquette
 
E mail etiquette
E mail etiquetteE mail etiquette
E mail etiquette
 
Email etiquette and effective email use guidance for staff and associates
Email etiquette and effective email use guidance for staff and associatesEmail etiquette and effective email use guidance for staff and associates
Email etiquette and effective email use guidance for staff and associates
 
Email Etiquette
Email Etiquette Email Etiquette
Email Etiquette
 
Emailing Insight : An essential element for career
Emailing Insight : An essential element for careerEmailing Insight : An essential element for career
Emailing Insight : An essential element for career
 
7 Email Etiquettes for Effective Email Communication
7 Email Etiquettes for Effective Email Communication 7 Email Etiquettes for Effective Email Communication
7 Email Etiquettes for Effective Email Communication
 
Email Etiquette_ OutworX
Email Etiquette_ OutworXEmail Etiquette_ OutworX
Email Etiquette_ OutworX
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
Email Etiquette's for Professional & business profiles
Email Etiquette's for Professional & business profilesEmail Etiquette's for Professional & business profiles
Email Etiquette's for Professional & business profiles
 
Email etiquette
Email etiquette Email etiquette
Email etiquette
 
Email etiquette
Email etiquetteEmail etiquette
Email etiquette
 
5 essential tips for business email etiquette.ppt
5 essential tips for business email etiquette.ppt5 essential tips for business email etiquette.ppt
5 essential tips for business email etiquette.ppt
 
Email Etiquette Presentation
Email Etiquette PresentationEmail Etiquette Presentation
Email Etiquette Presentation
 
Presentation on Email Etiquette
Presentation on Email Etiquette Presentation on Email Etiquette
Presentation on Email Etiquette
 
Email Etiquette: Tips For Better Communication
Email Etiquette: Tips For Better CommunicationEmail Etiquette: Tips For Better Communication
Email Etiquette: Tips For Better Communication
 
Email etiquette
Email etiquetteEmail etiquette
Email etiquette
 

Similar to Mofokeng email etiquette

An email policy for your employeesA clear email policy hel.docx
An email policy for your employeesA clear email policy hel.docxAn email policy for your employeesA clear email policy hel.docx
An email policy for your employeesA clear email policy hel.docx
greg1eden90113
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentation
Wan Solo
 
Hhs en09 email_security
Hhs en09 email_securityHhs en09 email_security
Hhs en09 email_securityShoaib Sheikh
 
Email
EmailEmail
23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette
btanwar74
 
23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette
Namita Singh
 
23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette
Namita Singh
 
Tech Training - Session 8
Tech Training - Session 8Tech Training - Session 8
Tech Training - Session 8William Mann
 
Email Security Solutions | Seclore
Email Security Solutions | SecloreEmail Security Solutions | Seclore
Email Security Solutions | Seclore
Seclore
 
Email etiquette[1]
Email etiquette[1]Email etiquette[1]
Email etiquette[1]
101jennyj
 
Internet Tutorial 02
Internet  Tutorial 02Internet  Tutorial 02
Internet Tutorial 02
dpd
 
A Quick Email Etiquette Education
A Quick Email Etiquette EducationA Quick Email Etiquette Education
A Quick Email Etiquette Education
Chelse Benham
 
Electronic Mail Security (University of Jeddah, Saudi Arabia)
Electronic Mail Security (University of Jeddah, Saudi Arabia)Electronic Mail Security (University of Jeddah, Saudi Arabia)
Electronic Mail Security (University of Jeddah, Saudi Arabia)
IJCSIS Research Publications
 
PCC Training - Security
PCC Training - SecurityPCC Training - Security
PCC Training - Security
Robin Hastings
 

Similar to Mofokeng email etiquette (20)

An email policy for your employeesA clear email policy hel.docx
An email policy for your employeesA clear email policy hel.docxAn email policy for your employeesA clear email policy hel.docx
An email policy for your employeesA clear email policy hel.docx
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentation
 
Filing Client Email
Filing Client EmailFiling Client Email
Filing Client Email
 
Hhs en09 email_security
Hhs en09 email_securityHhs en09 email_security
Hhs en09 email_security
 
Email
EmailEmail
Email
 
Email
EmailEmail
Email
 
Junk Email
Junk EmailJunk Email
Junk Email
 
23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette
 
23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette
 
23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette
 
Electrnic mail
Electrnic mailElectrnic mail
Electrnic mail
 
Tech Training - Session 8
Tech Training - Session 8Tech Training - Session 8
Tech Training - Session 8
 
Email Security Solutions | Seclore
Email Security Solutions | SecloreEmail Security Solutions | Seclore
Email Security Solutions | Seclore
 
Email etiquette[1]
Email etiquette[1]Email etiquette[1]
Email etiquette[1]
 
Using E-mail In The Office
Using E-mail In The OfficeUsing E-mail In The Office
Using E-mail In The Office
 
Internet Tutorial 02
Internet  Tutorial 02Internet  Tutorial 02
Internet Tutorial 02
 
A Quick Email Etiquette Education
A Quick Email Etiquette EducationA Quick Email Etiquette Education
A Quick Email Etiquette Education
 
Electronic Mail Security (University of Jeddah, Saudi Arabia)
Electronic Mail Security (University of Jeddah, Saudi Arabia)Electronic Mail Security (University of Jeddah, Saudi Arabia)
Electronic Mail Security (University of Jeddah, Saudi Arabia)
 
PCC Training - Security
PCC Training - SecurityPCC Training - Security
PCC Training - Security
 
7 module web based email
7 module web based email7 module web based email
7 module web based email
 

More from FOTIM

Mofokeng email etiquette
Mofokeng email etiquetteMofokeng email etiquette
Mofokeng email etiquette
FOTIM
 
Madondo our journey down the self check road
Madondo our journey down the self check roadMadondo our journey down the self check road
Madondo our journey down the self check road
FOTIM
 
Sithole & mofokeng support staff in the library getting involved
Sithole & mofokeng support staff in the library   getting involvedSithole & mofokeng support staff in the library   getting involved
Sithole & mofokeng support staff in the library getting involved
FOTIM
 
Sithole & mofokeng support staff in the library getting involved
Sithole & mofokeng support staff in the library   getting involvedSithole & mofokeng support staff in the library   getting involved
Sithole & mofokeng support staff in the library getting involved
FOTIM
 
Madondo our journey down the self check road
Madondo our journey down the self check roadMadondo our journey down the self check road
Madondo our journey down the self check road
FOTIM
 
Erasmus man gaelic & innovative an overview
Erasmus man gaelic & innovative an overviewErasmus man gaelic & innovative an overview
Erasmus man gaelic & innovative an overview
FOTIM
 
Sithole it support in the library help desk
Sithole it support in the library   help desk Sithole it support in the library   help desk
Sithole it support in the library help desk
FOTIM
 
Van wyk trends and changes in technical services and the impact on cataloguing
Van wyk trends and changes in technical services and the impact on cataloguingVan wyk trends and changes in technical services and the impact on cataloguing
Van wyk trends and changes in technical services and the impact on cataloguing
FOTIM
 
Selematsela re orienting the role of the informaiton specialist in the knowle...
Selematsela re orienting the role of the informaiton specialist in the knowle...Selematsela re orienting the role of the informaiton specialist in the knowle...
Selematsela re orienting the role of the informaiton specialist in the knowle...
FOTIM
 
Le roux library assoc in unisa archives
Le roux library assoc in unisa archivesLe roux library assoc in unisa archives
Le roux library assoc in unisa archives
FOTIM
 
Johnson ru shing @ wits
Johnson ru shing @ witsJohnson ru shing @ wits
Johnson ru shing @ wits
FOTIM
 
Ehlers assessement of information literacy skills circle
Ehlers assessement of information literacy skills circleEhlers assessement of information literacy skills circle
Ehlers assessement of information literacy skills circle
FOTIM
 
Van vuuren communal reading as a way to foster a reading culture
Van vuuren communal reading as a way to foster a reading cultureVan vuuren communal reading as a way to foster a reading culture
Van vuuren communal reading as a way to foster a reading cultureFOTIM
 
Snyman unisa battle to build an ebook collection
Snyman unisa battle to build an ebook collectionSnyman unisa battle to build an ebook collection
Snyman unisa battle to build an ebook collectionFOTIM
 
Mbonambi library orientation strategy sharing experiences
Mbonambi library orientation strategy sharing experiencesMbonambi library orientation strategy sharing experiences
Mbonambi library orientation strategy sharing experiences
FOTIM
 
Malan world cat
Malan world catMalan world cat
Malan world catFOTIM
 
Bester marketing strategies
Bester marketing strategiesBester marketing strategies
Bester marketing strategies
FOTIM
 
Xanko libguides @ wits
Xanko libguides @ witsXanko libguides @ wits
Xanko libguides @ wits
FOTIM
 
Wiggell librarians academic collaboration
Wiggell librarians   academic collaborationWiggell librarians   academic collaboration
Wiggell librarians academic collaboration
FOTIM
 
Lessing & swanepoel roi university of pretoria
Lessing & swanepoel roi university of pretoriaLessing & swanepoel roi university of pretoria
Lessing & swanepoel roi university of pretoriaFOTIM
 

More from FOTIM (20)

Mofokeng email etiquette
Mofokeng email etiquetteMofokeng email etiquette
Mofokeng email etiquette
 
Madondo our journey down the self check road
Madondo our journey down the self check roadMadondo our journey down the self check road
Madondo our journey down the self check road
 
Sithole & mofokeng support staff in the library getting involved
Sithole & mofokeng support staff in the library   getting involvedSithole & mofokeng support staff in the library   getting involved
Sithole & mofokeng support staff in the library getting involved
 
Sithole & mofokeng support staff in the library getting involved
Sithole & mofokeng support staff in the library   getting involvedSithole & mofokeng support staff in the library   getting involved
Sithole & mofokeng support staff in the library getting involved
 
Madondo our journey down the self check road
Madondo our journey down the self check roadMadondo our journey down the self check road
Madondo our journey down the self check road
 
Erasmus man gaelic & innovative an overview
Erasmus man gaelic & innovative an overviewErasmus man gaelic & innovative an overview
Erasmus man gaelic & innovative an overview
 
Sithole it support in the library help desk
Sithole it support in the library   help desk Sithole it support in the library   help desk
Sithole it support in the library help desk
 
Van wyk trends and changes in technical services and the impact on cataloguing
Van wyk trends and changes in technical services and the impact on cataloguingVan wyk trends and changes in technical services and the impact on cataloguing
Van wyk trends and changes in technical services and the impact on cataloguing
 
Selematsela re orienting the role of the informaiton specialist in the knowle...
Selematsela re orienting the role of the informaiton specialist in the knowle...Selematsela re orienting the role of the informaiton specialist in the knowle...
Selematsela re orienting the role of the informaiton specialist in the knowle...
 
Le roux library assoc in unisa archives
Le roux library assoc in unisa archivesLe roux library assoc in unisa archives
Le roux library assoc in unisa archives
 
Johnson ru shing @ wits
Johnson ru shing @ witsJohnson ru shing @ wits
Johnson ru shing @ wits
 
Ehlers assessement of information literacy skills circle
Ehlers assessement of information literacy skills circleEhlers assessement of information literacy skills circle
Ehlers assessement of information literacy skills circle
 
Van vuuren communal reading as a way to foster a reading culture
Van vuuren communal reading as a way to foster a reading cultureVan vuuren communal reading as a way to foster a reading culture
Van vuuren communal reading as a way to foster a reading culture
 
Snyman unisa battle to build an ebook collection
Snyman unisa battle to build an ebook collectionSnyman unisa battle to build an ebook collection
Snyman unisa battle to build an ebook collection
 
Mbonambi library orientation strategy sharing experiences
Mbonambi library orientation strategy sharing experiencesMbonambi library orientation strategy sharing experiences
Mbonambi library orientation strategy sharing experiences
 
Malan world cat
Malan world catMalan world cat
Malan world cat
 
Bester marketing strategies
Bester marketing strategiesBester marketing strategies
Bester marketing strategies
 
Xanko libguides @ wits
Xanko libguides @ witsXanko libguides @ wits
Xanko libguides @ wits
 
Wiggell librarians academic collaboration
Wiggell librarians   academic collaborationWiggell librarians   academic collaboration
Wiggell librarians academic collaboration
 
Lessing & swanepoel roi university of pretoria
Lessing & swanepoel roi university of pretoriaLessing & swanepoel roi university of pretoria
Lessing & swanepoel roi university of pretoria
 

Recently uploaded

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 

Recently uploaded (20)

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 

Mofokeng email etiquette

  • 1. GAELIC SUMMER CAMP E-MAIL ETIQUETTE University of the Witwatersrand Simon Mofokeng
  • 2. OBJECTIVES For the purpose of this document “Mail” will refer to “Email” Electronic mail, or “Mail”, provides an easy-to use, efficient means of communicating with other members of workgroups and the External Internet Communities. The purpose of this presentation is to ensure the proper use of email system and make users aware of what is deemed as acceptable and unacceptable use of the system. E-MAIL ETIQUETTE
  • 4. RESPONSIBILITIES OF THE USER Legal Risks: email is a business communication tool and users are obliged to use this tool in a responsible, effective and lawful manner. Although by its nature email seems to be less formal than other written communication, the same laws apply. The following guidelines for working with “Mail” are designed to ensure that you and your colleagues get the maximum benefit from the system. The following information is included in the pages that follow: * Responsibilities of the user * Activities to avoid * Hints and tips E-MAIL ETIQUETTE
  • 5. RESPONSIBILITIES OF THE USER Limited “Mail” must not be used as a forum of political, religious, or other debates, or as a form of entertainment or broadcasting, or for sending chain letters or advertisements or jokes or non- business related issue. Each message occupies valuable time on the network, and discretion must be used when using “Mail”. Length When using “Mail”, keep your message as brief and to the point as possible. Long messages tend to lose their point. Rather send a message requesting a meeting to discuss lengthy issues. E-MAIL ETIQUETTE
  • 6. RESPONSIBILITIES OF THE USER Title Give every message a title Make sure the subject line of your message provide a brief, clear description of the contents of the message Effectiveness Read “Mail” message regularly and respond timeously where necessary. The effectiveness of a “Mail” system in improving productivity and communication is based on responsiveness. Read your message regularly and reply as soon as possible. E-MAIL ETIQUETTE
  • 7. RESPONSIBILITIES OF THE USER E-MAIL ETIQUETTE
  • 8. RESPONSIBILITIES OF THE USER Selective Be selective when forwarding or replying to a “Mail” message. Consider who really need to see the message. Forward it only to those who need information. Protect Your user passwords are the gateway to your PC and systems resources including mail, Protect it all the time. You are responsible for actions taken under your user ID. Once your user ID is logged on, it is impossible to tell whether it is really you or someone else sending the message. Do not use passwords that would be obvious to others, and change it immediately if you think it has been compromised. Activate your Windows screen saver password to kick in automatically when idle after a few minutes. E-MAIL ETIQUETTE
  • 9. RESPONSIBILITIES OF THE USER Size Keep your mailbox and “Mail” files as small as possible Delete message from your mailbox after you have read or filed them. File only those messages that really need to be recorded. Housekeeping Carry out regular housekeeping on your files A facility exists “Mail” to archive messages to free up space on the system. If at a later date you need to refer to them, it is possible to access them. Another option will be to create a ‘personal folder’ and move the important “Mail” items to the personal folder. Delete or archive messages from the sent item folder regularly. E-MAIL ETIQUETTE
  • 10. RESPONSIBILITIES OF THE USER Logging off Exit and log off on your mail system if you will be away for an extended period and when you leave at the end of the day. Certain maintenance might be done overnight on the server, and this is only possible if you have logged out of your computer. Privacy “Mail” message are considered private correspondence. As such, messages are viewed as the private property of the receiver and will not be made available to Management. Although privacy and security are of the utmost importance, auditors, or investigators are authorized to investigate misuse of the network, such as theft, pornography, harassment, excessive private use, etc. E-MAIL ETIQUETTE
  • 11. ACTIVITIES TO AVOID Misuse Do not send any obscene, racist, defamatory or otherwise offensive material via “Mail” The use of vulgar language is expressly forbidden over the network, be it on company business, or in a private capacity. Personal use Note- Sending and receiving excessive non-business related messages is prohibited. E-MAIL ETIQUETTE
  • 12. ACTIVITIES TO AVOID Confrontation Do not use “Mail” to avoid confrontation. In certain instances, such as disciplinary or explosive circumstances, the sending of “Mail” messages is inappropriate. Do not send rude or argumentative messages. These situations can only be dealt within in a face to- face confrontation and “Mail” should not be used. Large files Do not send large files as attachment. Be selective in the files you send to others via “Mail”. Within your own work group, it is better to share the file and send a message regarding the file name to the recipients. Attached files dramatically increase the network overhead as well as the size of the “Mail” file. Priority Do not flag all messages as high priority Do not send “Mail” as the highest priority unless it really merits that priority. High –priority “Mails” message should only be used for the most important message and when you need an immediately response. E-MAIL ETIQUETTE
  • 13. ACTIVITIES TO AVOID Password Do not give your password/s to others You are responsible for any mail message originating from your machine. Giving other employees access to your system could result in fraudulent use of “Mail”. Confidential Information Avoid sending confidential information by “Mail”. If you do, you must secure the information by including it in a Microsoft Word file protecting it with a password. Then provide the recipient with the password by means of other communication, for instance by telephone. E-MAIL ETIQUETTE
  • 14. HINTS AND TIPS Requirements Set the options to suit your requirements Check for messages every 15 - 60 minutes. Sound the chime when a new message arrives. Flash the envelope when a new message arrives. Receipt Use the return receipt option If you are not sure whether the addressees are receiving messages, use the return receipt option. This will send a message back to you, informing you that the recipient has got the message. E-MAIL ETIQUETTE
  • 15. HINTS AND TIPS Backing up Your “Mail” files should be backed-up periodically; otherwise users carry the responsibility if not provided by business. Tip Include a signature that contains other methods by which others can contact you. This usually includes your full name, job title, and company name and telephone numbers. Do not send messages all in capital as it will appear as if you are shouting. Use bold lettering or underlining for emphasis, e.g., use that is what I meant, rather than that IS what I meant. E-MAIL ETIQUETTE
  • 16. Questions simon.mofokeng@wits.ac.za Thank you once again for adhering to guidelines. E-MAIL ETIQUETTE