SlideShare a Scribd company logo
1 of 8
E-Mail EtiquetteE-Mail Etiquette
Article by Keith C. IveyArticle by Keith C. Ivey
Presented by Chris NeidertPresented by Chris Neidert
E-mail TodayE-mail Today
 Ray Tomlinson sent the first e-mail inRay Tomlinson sent the first e-mail in
1972 on what eventually became known1972 on what eventually became known
as the internetas the internet
 Presently, billions of messages have beenPresently, billions of messages have been
sentsent
 E-mail is an increasingly popular internetE-mail is an increasingly popular internet
application, but could be more effectivelyapplication, but could be more effectively
and efficiently usedand efficiently used
Know Your ApplicationKnow Your Application
 Become familiar with e-mail applicationBecome familiar with e-mail application
and its featuresand its features
 Read the manual or help guideRead the manual or help guide
 Many features not well known, but couldMany features not well known, but could
improve the efficiency of composing andimprove the efficiency of composing and
sending e-mailssending e-mails
Minimize Line LengthMinimize Line Length
 When composing messages, lines of textWhen composing messages, lines of text
should not be too longshould not be too long
 Shorter lines easier to readShorter lines easier to read
 Some programs don’t do an effective jobSome programs don’t do an effective job
of wrapping textof wrapping text
Addressing MessagesAddressing Messages
 When sending or replying to a message,When sending or replying to a message,
ensure it is being sent to correct addressensure it is being sent to correct address
 Don’t make mistake of replying to list ifDon’t make mistake of replying to list if
intended for one person…important tointended for one person…important to
check “To:” and “Cc:” linescheck “To:” and “Cc:” lines
 Use blind carbon copy (bcc) when sendingUse blind carbon copy (bcc) when sending
a message to multiple addresses soa message to multiple addresses so
everyone’s address is not exposed to alleveryone’s address is not exposed to all
recipientsrecipients
PersonalizationPersonalization
 Create a signature to be added at the endCreate a signature to be added at the end
of all messagesof all messages
 Signature should contain name of senderSignature should contain name of sender
and contact informationand contact information
 Should avoid extra content and be limitedShould avoid extra content and be limited
to a maximum of four linesto a maximum of four lines
Clarity and FormattingClarity and Formatting
 Message should be written with ASCII code toMessage should be written with ASCII code to
make sure it is understood by all applicationsmake sure it is understood by all applications
 Text and font should not be heavily formattedText and font should not be heavily formatted
 Formatting, images, and charts could beFormatting, images, and charts could be
incompatible with other mail programsincompatible with other mail programs
 When adding a link to a web page, make sure itWhen adding a link to a web page, make sure it
begins withbegins with http://http://
- Makes clickable in some programs- Makes clickable in some programs
Other GuidelinesOther Guidelines
 When replying, important to include onlyWhen replying, important to include only
relevant quotes from message beingrelevant quotes from message being
replied toreplied to
 Don’t send annoying junk mail such asDon’t send annoying junk mail such as
chain letters, virus alerts, and spamchain letters, virus alerts, and spam
(“unsolicited bulk e-mail”)(“unsolicited bulk e-mail”)
 A descriptive subject line should be usedA descriptive subject line should be used
to help users differentiate betweento help users differentiate between
important e-mail and junk/malicious e-mailimportant e-mail and junk/malicious e-mail

More Related Content

Similar to Orals

Workshop on email etiquette
Workshop on email etiquetteWorkshop on email etiquette
Workshop on email etiquetteKamalMunit
 
English Persentation Email
English Persentation EmailEnglish Persentation Email
English Persentation EmailNasrul_art
 
E mail etiquette
E mail etiquette E mail etiquette
E mail etiquette Nanda Palit
 
Presentation On Email Etiquettes
Presentation On Email EtiquettesPresentation On Email Etiquettes
Presentation On Email EtiquettesKetan Raval
 
Internet Tutorial 02
Internet  Tutorial 02Internet  Tutorial 02
Internet Tutorial 02dpd
 
BC (Email Correspondence) communication.pptx
BC (Email Correspondence) communication.pptxBC (Email Correspondence) communication.pptx
BC (Email Correspondence) communication.pptxHamHere
 
Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User. Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User. Empowerhosting
 
Business Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptxBusiness Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptxDr Ganesh Saini
 
HTML email design and usability
HTML email design and usabilityHTML email design and usability
HTML email design and usabilityKeith Kmett
 
Electronic Communication Etiquette
Electronic Communication EtiquetteElectronic Communication Etiquette
Electronic Communication Etiquetteladytj1754
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentationWan Solo
 
EMarketing Techniques Conference_Emailmarketingessentials May2008
EMarketing Techniques Conference_Emailmarketingessentials May2008EMarketing Techniques Conference_Emailmarketingessentials May2008
EMarketing Techniques Conference_Emailmarketingessentials May2008Corporate College
 

Similar to Orals (20)

Email Lesson
Email LessonEmail Lesson
Email Lesson
 
Workshop on email etiquette
Workshop on email etiquetteWorkshop on email etiquette
Workshop on email etiquette
 
English Persentation Email
English Persentation EmailEnglish Persentation Email
English Persentation Email
 
E mail etiquette
E mail etiquette E mail etiquette
E mail etiquette
 
Presentation On Email Etiquettes
Presentation On Email EtiquettesPresentation On Email Etiquettes
Presentation On Email Etiquettes
 
Using E-mail In The Office
Using E-mail In The OfficeUsing E-mail In The Office
Using E-mail In The Office
 
Email
EmailEmail
Email
 
Internet Tutorial 02
Internet  Tutorial 02Internet  Tutorial 02
Internet Tutorial 02
 
BC (Email Correspondence) communication.pptx
BC (Email Correspondence) communication.pptxBC (Email Correspondence) communication.pptx
BC (Email Correspondence) communication.pptx
 
Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User. Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User.
 
Trigger Emails BigD17
Trigger Emails BigD17Trigger Emails BigD17
Trigger Emails BigD17
 
Business Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptxBusiness Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptx
 
HTML email design and usability
HTML email design and usabilityHTML email design and usability
HTML email design and usability
 
Electronic Communication Etiquette
Electronic Communication EtiquetteElectronic Communication Etiquette
Electronic Communication Etiquette
 
Deliverability Drives Revenue
Deliverability Drives RevenueDeliverability Drives Revenue
Deliverability Drives Revenue
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentation
 
EMarketing Techniques Conference_Emailmarketingessentials May2008
EMarketing Techniques Conference_Emailmarketingessentials May2008EMarketing Techniques Conference_Emailmarketingessentials May2008
EMarketing Techniques Conference_Emailmarketingessentials May2008
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
All about email
All about emailAll about email
All about email
 
Email Etiquettes
Email EtiquettesEmail Etiquettes
Email Etiquettes
 

More from Sadhana Mahato

99165cc3 6f35-4de4bb6e63bb
99165cc3 6f35-4de4bb6e63bb99165cc3 6f35-4de4bb6e63bb
99165cc3 6f35-4de4bb6e63bbSadhana Mahato
 
99165cc3 6f35-4de4bb6e63bb
99165cc3 6f35-4de4bb6e63bb99165cc3 6f35-4de4bb6e63bb
99165cc3 6f35-4de4bb6e63bbSadhana Mahato
 
Digitalmarketing 130803040248-phpapp01
Digitalmarketing 130803040248-phpapp01Digitalmarketing 130803040248-phpapp01
Digitalmarketing 130803040248-phpapp01Sadhana Mahato
 
Digitalmarketing 130803040248-phpapp01
Digitalmarketing 130803040248-phpapp01Digitalmarketing 130803040248-phpapp01
Digitalmarketing 130803040248-phpapp01Sadhana Mahato
 
Digitalmarketing 130803040248-phpapp01
Digitalmarketing 130803040248-phpapp01Digitalmarketing 130803040248-phpapp01
Digitalmarketing 130803040248-phpapp01Sadhana Mahato
 

More from Sadhana Mahato (8)

Love across 7 seas
Love across 7 seasLove across 7 seas
Love across 7 seas
 
Food
FoodFood
Food
 
Food
FoodFood
Food
 
99165cc3 6f35-4de4bb6e63bb
99165cc3 6f35-4de4bb6e63bb99165cc3 6f35-4de4bb6e63bb
99165cc3 6f35-4de4bb6e63bb
 
99165cc3 6f35-4de4bb6e63bb
99165cc3 6f35-4de4bb6e63bb99165cc3 6f35-4de4bb6e63bb
99165cc3 6f35-4de4bb6e63bb
 
Digitalmarketing 130803040248-phpapp01
Digitalmarketing 130803040248-phpapp01Digitalmarketing 130803040248-phpapp01
Digitalmarketing 130803040248-phpapp01
 
Digitalmarketing 130803040248-phpapp01
Digitalmarketing 130803040248-phpapp01Digitalmarketing 130803040248-phpapp01
Digitalmarketing 130803040248-phpapp01
 
Digitalmarketing 130803040248-phpapp01
Digitalmarketing 130803040248-phpapp01Digitalmarketing 130803040248-phpapp01
Digitalmarketing 130803040248-phpapp01
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

Orals

  • 1. E-Mail EtiquetteE-Mail Etiquette Article by Keith C. IveyArticle by Keith C. Ivey Presented by Chris NeidertPresented by Chris Neidert
  • 2. E-mail TodayE-mail Today  Ray Tomlinson sent the first e-mail inRay Tomlinson sent the first e-mail in 1972 on what eventually became known1972 on what eventually became known as the internetas the internet  Presently, billions of messages have beenPresently, billions of messages have been sentsent  E-mail is an increasingly popular internetE-mail is an increasingly popular internet application, but could be more effectivelyapplication, but could be more effectively and efficiently usedand efficiently used
  • 3. Know Your ApplicationKnow Your Application  Become familiar with e-mail applicationBecome familiar with e-mail application and its featuresand its features  Read the manual or help guideRead the manual or help guide  Many features not well known, but couldMany features not well known, but could improve the efficiency of composing andimprove the efficiency of composing and sending e-mailssending e-mails
  • 4. Minimize Line LengthMinimize Line Length  When composing messages, lines of textWhen composing messages, lines of text should not be too longshould not be too long  Shorter lines easier to readShorter lines easier to read  Some programs don’t do an effective jobSome programs don’t do an effective job of wrapping textof wrapping text
  • 5. Addressing MessagesAddressing Messages  When sending or replying to a message,When sending or replying to a message, ensure it is being sent to correct addressensure it is being sent to correct address  Don’t make mistake of replying to list ifDon’t make mistake of replying to list if intended for one person…important tointended for one person…important to check “To:” and “Cc:” linescheck “To:” and “Cc:” lines  Use blind carbon copy (bcc) when sendingUse blind carbon copy (bcc) when sending a message to multiple addresses soa message to multiple addresses so everyone’s address is not exposed to alleveryone’s address is not exposed to all recipientsrecipients
  • 6. PersonalizationPersonalization  Create a signature to be added at the endCreate a signature to be added at the end of all messagesof all messages  Signature should contain name of senderSignature should contain name of sender and contact informationand contact information  Should avoid extra content and be limitedShould avoid extra content and be limited to a maximum of four linesto a maximum of four lines
  • 7. Clarity and FormattingClarity and Formatting  Message should be written with ASCII code toMessage should be written with ASCII code to make sure it is understood by all applicationsmake sure it is understood by all applications  Text and font should not be heavily formattedText and font should not be heavily formatted  Formatting, images, and charts could beFormatting, images, and charts could be incompatible with other mail programsincompatible with other mail programs  When adding a link to a web page, make sure itWhen adding a link to a web page, make sure it begins withbegins with http://http:// - Makes clickable in some programs- Makes clickable in some programs
  • 8. Other GuidelinesOther Guidelines  When replying, important to include onlyWhen replying, important to include only relevant quotes from message beingrelevant quotes from message being replied toreplied to  Don’t send annoying junk mail such asDon’t send annoying junk mail such as chain letters, virus alerts, and spamchain letters, virus alerts, and spam (“unsolicited bulk e-mail”)(“unsolicited bulk e-mail”)  A descriptive subject line should be usedA descriptive subject line should be used to help users differentiate betweento help users differentiate between important e-mail and junk/malicious e-mailimportant e-mail and junk/malicious e-mail