SlideShare a Scribd company logo
1 of 16
GAELIC SUMMER CAMP
E-MAIL ETIQUETTE
University of the Witwatersrand
Simon Mofokeng
OBJECTIVES
For the purpose of this document “Mail” will refer to “Email”
Electronic mail, or “Mail”, provides an easy-to use, efficient means of
communicating with other members of workgroups and the External
Internet Communities.
The purpose of this presentation is to ensure the proper use of email
system and make users aware of what is deemed as acceptable and
unacceptable use of the system.
E-MAIL ETIQUETTE
E-MAIL ETIQUETTE
RESPONSIBILITIES OF THE USER
Legal Risks: email is a business communication tool and users are
obliged to use this tool in a responsible, effective and lawful manner.
Although by its nature email seems to be less formal than other
written communication, the same laws apply.
The following guidelines for working with “Mail” are designed to ensure
that you and your colleagues get the maximum benefit from the
system.
The following information is included in the pages that follow:
* Responsibilities of the user
* Activities to avoid
* Hints and tips
E-MAIL ETIQUETTE
RESPONSIBILITIES OF THE USER
Limited
“Mail” must not be used as a forum of political, religious, or other
debates, or as a form of entertainment or broadcasting, or for sending
chain letters or advertisements or jokes or non- business related
issue. Each message occupies valuable time on the network, and
discretion must be used when using “Mail”.
Length
When using “Mail”, keep your message as brief and to the point as
possible.
Long messages tend to lose their point. Rather send a message
requesting a meeting to discuss lengthy issues.
E-MAIL ETIQUETTE
RESPONSIBILITIES OF THE USER
Title
Give every message a title
Make sure the subject line of your message provide a brief, clear
description of the contents of the message
Effectiveness
Read “Mail” message regularly and respond timeously where necessary.
The effectiveness of a “Mail” system in improving productivity and
communication is based on responsiveness. Read your message
regularly and reply as soon as possible.
E-MAIL ETIQUETTE
RESPONSIBILITIES OF THE USER
E-MAIL ETIQUETTE
RESPONSIBILITIES OF THE USER
Selective
Be selective when forwarding or replying to a “Mail” message.
Consider who really need to see the message. Forward it only to those who need
information.
Protect
Your user passwords are the gateway to your PC and systems resources
including mail, Protect it all the time.
You are responsible for actions taken under your user ID. Once your user ID is
logged on, it is impossible to tell whether it is really you or someone else
sending the message. Do not use passwords that would be obvious to others,
and change it immediately if you think it has been compromised.
Activate your Windows screen saver password to kick in automatically when idle
after a few minutes.
E-MAIL ETIQUETTE
RESPONSIBILITIES OF THE USER
Size
Keep your mailbox and “Mail” files as small as possible
Delete message from your mailbox after you have read or filed them. File
only those messages that really need to be recorded.
Housekeeping
Carry out regular housekeeping on your files
A facility exists “Mail” to archive messages to free up space on the
system. If at a later date you need to refer to them, it is possible to
access them. Another option will be to create a ‘personal folder’ and
move the important “Mail” items to the personal folder. Delete or
archive messages from the sent item folder regularly.
E-MAIL ETIQUETTE
RESPONSIBILITIES OF THE USER
Logging off
Exit and log off on your mail system if you will be away for an extended
period and when you leave at the end of the day.
Certain maintenance might be done overnight on the server, and this is
only possible if you have logged out of your computer.
Privacy
“Mail” message are considered private correspondence. As such,
messages are viewed as the private property of the receiver and will
not be made available to Management. Although privacy and security
are of the utmost importance, auditors, or investigators are authorized
to investigate misuse of the network, such as theft, pornography,
harassment, excessive private use, etc.
E-MAIL ETIQUETTE
ACTIVITIES TO AVOID
Misuse
Do not send any obscene, racist, defamatory or otherwise offensive material via
“Mail”
The use of vulgar language is expressly forbidden over the network, be it on
company business, or in a private capacity.
Personal use
Note- Sending and receiving excessive non-business related messages is
prohibited.
E-MAIL ETIQUETTE
ACTIVITIES TO AVOID
Confrontation
Do not use “Mail” to avoid confrontation.
In certain instances, such as disciplinary or explosive circumstances, the
sending of “Mail” messages is inappropriate. Do not send rude or
argumentative messages. These situations can only be dealt within in a
face to- face confrontation and “Mail” should not be used.
Large files
Do not send large files as attachment.
Be selective in the files you send to others via “Mail”. Within your own work group, it is better
to share the file and send a message regarding the file name to the recipients. Attached
files dramatically increase the network overhead as well as the size of the “Mail” file.
Priority
Do not flag all messages as high priority
Do not send “Mail” as the highest priority unless it really merits that priority. High –priority
“Mails” message should only be used for the most important message and when you
need an immediately response.
E-MAIL ETIQUETTE
ACTIVITIES TO AVOID
Password
Do not give your password/s to others
You are responsible for any mail message originating from your machine.
Giving other employees access to your system could result in
fraudulent use of “Mail”.
Confidential Information
Avoid sending confidential information by “Mail”. If you do, you must
secure the information by including it in a Microsoft Word file
protecting it with a password. Then provide the recipient with the
password by means of other communication, for instance by
telephone.
E-MAIL ETIQUETTE
HINTS AND TIPS
Requirements
Set the options to suit your requirements
Check for messages every 15 - 60 minutes. Sound the chime when a
new message arrives. Flash the envelope when a new message
arrives.
Receipt
Use the return receipt option
If you are not sure whether the addressees are receiving messages, use
the return receipt option. This will send a message back to you,
informing you that the recipient has got the message.
E-MAIL ETIQUETTE
HINTS AND TIPS
Backing up
Your “Mail” files should be backed-up periodically; otherwise users carry
the responsibility if not provided by business.
Tip
Include a signature that contains other methods by which others can
contact you. This usually includes your full name, job title, and
company name and telephone numbers.
Do not send messages all in capital as it will appear as if you are
shouting. Use bold lettering or underlining for emphasis, e.g., use that
is what I meant, rather than that IS what I meant.
E-MAIL ETIQUETTE
Questions
simon.mofokeng@wits.ac.za
Thank you once again for adhering to guidelines.
E-MAIL ETIQUETTE

More Related Content

What's hot

Email use in business ppt
Email use in business pptEmail use in business ppt
Email use in business pptJason Roy
 
History of Email PowerPoint presentation
History of Email PowerPoint presentationHistory of Email PowerPoint presentation
History of Email PowerPoint presentationSaad Zeeshan
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)Wissam Abdel Baki
 
Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User. Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User. Empowerhosting
 
Parent quick-guides
Parent quick-guidesParent quick-guides
Parent quick-guidesthsieh
 
Email privacy issues and Netiquette
Email privacy issues and NetiquetteEmail privacy issues and Netiquette
Email privacy issues and NetiquetteSomeone Else
 
Internet and Email 101 v1
Internet and Email 101 v1Internet and Email 101 v1
Internet and Email 101 v1Adam Ripsam
 

What's hot (18)

Introduction To Email
Introduction To EmailIntroduction To Email
Introduction To Email
 
E Mail Basic
E Mail BasicE Mail Basic
E Mail Basic
 
Email use in business ppt
Email use in business pptEmail use in business ppt
Email use in business ppt
 
Welcome to email
Welcome to emailWelcome to email
Welcome to email
 
Email Essentials
Email EssentialsEmail Essentials
Email Essentials
 
History of Email PowerPoint presentation
History of Email PowerPoint presentationHistory of Email PowerPoint presentation
History of Email PowerPoint presentation
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
E-Mail Basics
E-Mail BasicsE-Mail Basics
E-Mail Basics
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Basics of E-Mail
Basics of E-MailBasics of E-Mail
Basics of E-Mail
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)
 
E‑mail
E‑mailE‑mail
E‑mail
 
Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User. Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User.
 
Parent quick-guides
Parent quick-guidesParent quick-guides
Parent quick-guides
 
Email privacy issues and Netiquette
Email privacy issues and NetiquetteEmail privacy issues and Netiquette
Email privacy issues and Netiquette
 
E Mail
E MailE Mail
E Mail
 
Internet and Email 101 v1
Internet and Email 101 v1Internet and Email 101 v1
Internet and Email 101 v1
 
Email Basics
Email BasicsEmail Basics
Email Basics
 

Viewers also liked

Madondo our journey down the self check road
Madondo our journey down the self check roadMadondo our journey down the self check road
Madondo our journey down the self check roadFOTIM
 
Mofokeng email etiquette
Mofokeng email etiquetteMofokeng email etiquette
Mofokeng email etiquetteFOTIM
 
Erasmus man gaelic & innovative an overview
Erasmus man gaelic & innovative an overviewErasmus man gaelic & innovative an overview
Erasmus man gaelic & innovative an overviewFOTIM
 
Xanko libguides @ wits
Xanko libguides @ witsXanko libguides @ wits
Xanko libguides @ witsFOTIM
 
Sithole & mofokeng support staff in the library getting involved
Sithole & mofokeng support staff in the library   getting involvedSithole & mofokeng support staff in the library   getting involved
Sithole & mofokeng support staff in the library getting involvedFOTIM
 
Sithole & mofokeng support staff in the library getting involved
Sithole & mofokeng support staff in the library   getting involvedSithole & mofokeng support staff in the library   getting involved
Sithole & mofokeng support staff in the library getting involvedFOTIM
 
Madondo our journey down the self check road
Madondo our journey down the self check roadMadondo our journey down the self check road
Madondo our journey down the self check roadFOTIM
 
Customer Development Syllabus
Customer Development SyllabusCustomer Development Syllabus
Customer Development SyllabusVenture Hacks
 
Saunders datal
Saunders datalSaunders datal
Saunders datalFOTIM
 
Snyman unisa battle to build an ebook collection
Snyman unisa battle to build an ebook collectionSnyman unisa battle to build an ebook collection
Snyman unisa battle to build an ebook collectionFOTIM
 
Coertzen e checkin
Coertzen e checkin Coertzen e checkin
Coertzen e checkin FOTIM
 
Malan world cat
Malan world catMalan world cat
Malan world catFOTIM
 
Selematsela re orienting the role of the informaiton specialist in the knowle...
Selematsela re orienting the role of the informaiton specialist in the knowle...Selematsela re orienting the role of the informaiton specialist in the knowle...
Selematsela re orienting the role of the informaiton specialist in the knowle...FOTIM
 
Wiggell librarians academic collaboration
Wiggell librarians   academic collaborationWiggell librarians   academic collaboration
Wiggell librarians academic collaborationFOTIM
 
Kunene millennium ill training
Kunene millennium ill trainingKunene millennium ill training
Kunene millennium ill trainingFOTIM
 
Ehlers assessement of information literacy skills circle
Ehlers assessement of information literacy skills circleEhlers assessement of information literacy skills circle
Ehlers assessement of information literacy skills circleFOTIM
 

Viewers also liked (16)

Madondo our journey down the self check road
Madondo our journey down the self check roadMadondo our journey down the self check road
Madondo our journey down the self check road
 
Mofokeng email etiquette
Mofokeng email etiquetteMofokeng email etiquette
Mofokeng email etiquette
 
Erasmus man gaelic & innovative an overview
Erasmus man gaelic & innovative an overviewErasmus man gaelic & innovative an overview
Erasmus man gaelic & innovative an overview
 
Xanko libguides @ wits
Xanko libguides @ witsXanko libguides @ wits
Xanko libguides @ wits
 
Sithole & mofokeng support staff in the library getting involved
Sithole & mofokeng support staff in the library   getting involvedSithole & mofokeng support staff in the library   getting involved
Sithole & mofokeng support staff in the library getting involved
 
Sithole & mofokeng support staff in the library getting involved
Sithole & mofokeng support staff in the library   getting involvedSithole & mofokeng support staff in the library   getting involved
Sithole & mofokeng support staff in the library getting involved
 
Madondo our journey down the self check road
Madondo our journey down the self check roadMadondo our journey down the self check road
Madondo our journey down the self check road
 
Customer Development Syllabus
Customer Development SyllabusCustomer Development Syllabus
Customer Development Syllabus
 
Saunders datal
Saunders datalSaunders datal
Saunders datal
 
Snyman unisa battle to build an ebook collection
Snyman unisa battle to build an ebook collectionSnyman unisa battle to build an ebook collection
Snyman unisa battle to build an ebook collection
 
Coertzen e checkin
Coertzen e checkin Coertzen e checkin
Coertzen e checkin
 
Malan world cat
Malan world catMalan world cat
Malan world cat
 
Selematsela re orienting the role of the informaiton specialist in the knowle...
Selematsela re orienting the role of the informaiton specialist in the knowle...Selematsela re orienting the role of the informaiton specialist in the knowle...
Selematsela re orienting the role of the informaiton specialist in the knowle...
 
Wiggell librarians academic collaboration
Wiggell librarians   academic collaborationWiggell librarians   academic collaboration
Wiggell librarians academic collaboration
 
Kunene millennium ill training
Kunene millennium ill trainingKunene millennium ill training
Kunene millennium ill training
 
Ehlers assessement of information literacy skills circle
Ehlers assessement of information literacy skills circleEhlers assessement of information literacy skills circle
Ehlers assessement of information literacy skills circle
 

Similar to Mofokeng email etiquette

An email policy for your employeesA clear email policy hel.docx
An email policy for your employeesA clear email policy hel.docxAn email policy for your employeesA clear email policy hel.docx
An email policy for your employeesA clear email policy hel.docxgreg1eden90113
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentationWan Solo
 
Hhs en09 email_security
Hhs en09 email_securityHhs en09 email_security
Hhs en09 email_securityShoaib Sheikh
 
23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquettebtanwar74
 
23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquetteNamita Singh
 
23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquetteNamita Singh
 
Tech Training - Session 8
Tech Training - Session 8Tech Training - Session 8
Tech Training - Session 8William Mann
 
Email Security Solutions | Seclore
Email Security Solutions | SecloreEmail Security Solutions | Seclore
Email Security Solutions | SecloreSeclore
 
Email etiquette[1]
Email etiquette[1]Email etiquette[1]
Email etiquette[1]101jennyj
 
Internet Tutorial 02
Internet  Tutorial 02Internet  Tutorial 02
Internet Tutorial 02dpd
 
A Quick Email Etiquette Education
A Quick Email Etiquette EducationA Quick Email Etiquette Education
A Quick Email Etiquette EducationChelse Benham
 
Electronic Mail Security (University of Jeddah, Saudi Arabia)
Electronic Mail Security (University of Jeddah, Saudi Arabia)Electronic Mail Security (University of Jeddah, Saudi Arabia)
Electronic Mail Security (University of Jeddah, Saudi Arabia)IJCSIS Research Publications
 
PCC Training - Security
PCC Training - SecurityPCC Training - Security
PCC Training - SecurityRobin Hastings
 

Similar to Mofokeng email etiquette (20)

An email policy for your employeesA clear email policy hel.docx
An email policy for your employeesA clear email policy hel.docxAn email policy for your employeesA clear email policy hel.docx
An email policy for your employeesA clear email policy hel.docx
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentation
 
Filing Client Email
Filing Client EmailFiling Client Email
Filing Client Email
 
Hhs en09 email_security
Hhs en09 email_securityHhs en09 email_security
Hhs en09 email_security
 
Email
EmailEmail
Email
 
Email
EmailEmail
Email
 
Junk Email
Junk EmailJunk Email
Junk Email
 
23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette
 
23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette
 
23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette
 
Electrnic mail
Electrnic mailElectrnic mail
Electrnic mail
 
Tech Training - Session 8
Tech Training - Session 8Tech Training - Session 8
Tech Training - Session 8
 
Email Security Solutions | Seclore
Email Security Solutions | SecloreEmail Security Solutions | Seclore
Email Security Solutions | Seclore
 
Email etiquette[1]
Email etiquette[1]Email etiquette[1]
Email etiquette[1]
 
Using E-mail In The Office
Using E-mail In The OfficeUsing E-mail In The Office
Using E-mail In The Office
 
Internet Tutorial 02
Internet  Tutorial 02Internet  Tutorial 02
Internet Tutorial 02
 
A Quick Email Etiquette Education
A Quick Email Etiquette EducationA Quick Email Etiquette Education
A Quick Email Etiquette Education
 
Electronic Mail Security (University of Jeddah, Saudi Arabia)
Electronic Mail Security (University of Jeddah, Saudi Arabia)Electronic Mail Security (University of Jeddah, Saudi Arabia)
Electronic Mail Security (University of Jeddah, Saudi Arabia)
 
PCC Training - Security
PCC Training - SecurityPCC Training - Security
PCC Training - Security
 
7 module web based email
7 module web based email7 module web based email
7 module web based email
 

More from FOTIM

Sithole it support in the library help desk
Sithole it support in the library   help desk Sithole it support in the library   help desk
Sithole it support in the library help desk FOTIM
 
Van wyk trends and changes in technical services and the impact on cataloguing
Van wyk trends and changes in technical services and the impact on cataloguingVan wyk trends and changes in technical services and the impact on cataloguing
Van wyk trends and changes in technical services and the impact on cataloguingFOTIM
 
Le roux library assoc in unisa archives
Le roux library assoc in unisa archivesLe roux library assoc in unisa archives
Le roux library assoc in unisa archivesFOTIM
 
Johnson ru shing @ wits
Johnson ru shing @ witsJohnson ru shing @ wits
Johnson ru shing @ witsFOTIM
 
Van vuuren communal reading as a way to foster a reading culture
Van vuuren communal reading as a way to foster a reading cultureVan vuuren communal reading as a way to foster a reading culture
Van vuuren communal reading as a way to foster a reading cultureFOTIM
 
Mbonambi library orientation strategy sharing experiences
Mbonambi library orientation strategy sharing experiencesMbonambi library orientation strategy sharing experiences
Mbonambi library orientation strategy sharing experiencesFOTIM
 
Bester marketing strategies
Bester marketing strategiesBester marketing strategies
Bester marketing strategiesFOTIM
 
Lessing & swanepoel roi university of pretoria
Lessing & swanepoel roi university of pretoriaLessing & swanepoel roi university of pretoria
Lessing & swanepoel roi university of pretoriaFOTIM
 
Shibanda millennium statistics2
Shibanda millennium statistics2Shibanda millennium statistics2
Shibanda millennium statistics2FOTIM
 
Rantlha research pro
Rantlha research proRantlha research pro
Rantlha research proFOTIM
 
Spoelstra booking rooms in circulation wo 8_sept
Spoelstra booking rooms in circulation wo 8_septSpoelstra booking rooms in circulation wo 8_sept
Spoelstra booking rooms in circulation wo 8_septFOTIM
 
Keyser rfi da
Keyser rfi daKeyser rfi da
Keyser rfi daFOTIM
 
Ferguson oclc
Ferguson oclc Ferguson oclc
Ferguson oclc FOTIM
 
Ntotlang stats
Ntotlang statsNtotlang stats
Ntotlang statsFOTIM
 

More from FOTIM (14)

Sithole it support in the library help desk
Sithole it support in the library   help desk Sithole it support in the library   help desk
Sithole it support in the library help desk
 
Van wyk trends and changes in technical services and the impact on cataloguing
Van wyk trends and changes in technical services and the impact on cataloguingVan wyk trends and changes in technical services and the impact on cataloguing
Van wyk trends and changes in technical services and the impact on cataloguing
 
Le roux library assoc in unisa archives
Le roux library assoc in unisa archivesLe roux library assoc in unisa archives
Le roux library assoc in unisa archives
 
Johnson ru shing @ wits
Johnson ru shing @ witsJohnson ru shing @ wits
Johnson ru shing @ wits
 
Van vuuren communal reading as a way to foster a reading culture
Van vuuren communal reading as a way to foster a reading cultureVan vuuren communal reading as a way to foster a reading culture
Van vuuren communal reading as a way to foster a reading culture
 
Mbonambi library orientation strategy sharing experiences
Mbonambi library orientation strategy sharing experiencesMbonambi library orientation strategy sharing experiences
Mbonambi library orientation strategy sharing experiences
 
Bester marketing strategies
Bester marketing strategiesBester marketing strategies
Bester marketing strategies
 
Lessing & swanepoel roi university of pretoria
Lessing & swanepoel roi university of pretoriaLessing & swanepoel roi university of pretoria
Lessing & swanepoel roi university of pretoria
 
Shibanda millennium statistics2
Shibanda millennium statistics2Shibanda millennium statistics2
Shibanda millennium statistics2
 
Rantlha research pro
Rantlha research proRantlha research pro
Rantlha research pro
 
Spoelstra booking rooms in circulation wo 8_sept
Spoelstra booking rooms in circulation wo 8_septSpoelstra booking rooms in circulation wo 8_sept
Spoelstra booking rooms in circulation wo 8_sept
 
Keyser rfi da
Keyser rfi daKeyser rfi da
Keyser rfi da
 
Ferguson oclc
Ferguson oclc Ferguson oclc
Ferguson oclc
 
Ntotlang stats
Ntotlang statsNtotlang stats
Ntotlang stats
 

Mofokeng email etiquette

  • 1. GAELIC SUMMER CAMP E-MAIL ETIQUETTE University of the Witwatersrand Simon Mofokeng
  • 2. OBJECTIVES For the purpose of this document “Mail” will refer to “Email” Electronic mail, or “Mail”, provides an easy-to use, efficient means of communicating with other members of workgroups and the External Internet Communities. The purpose of this presentation is to ensure the proper use of email system and make users aware of what is deemed as acceptable and unacceptable use of the system. E-MAIL ETIQUETTE
  • 4. RESPONSIBILITIES OF THE USER Legal Risks: email is a business communication tool and users are obliged to use this tool in a responsible, effective and lawful manner. Although by its nature email seems to be less formal than other written communication, the same laws apply. The following guidelines for working with “Mail” are designed to ensure that you and your colleagues get the maximum benefit from the system. The following information is included in the pages that follow: * Responsibilities of the user * Activities to avoid * Hints and tips E-MAIL ETIQUETTE
  • 5. RESPONSIBILITIES OF THE USER Limited “Mail” must not be used as a forum of political, religious, or other debates, or as a form of entertainment or broadcasting, or for sending chain letters or advertisements or jokes or non- business related issue. Each message occupies valuable time on the network, and discretion must be used when using “Mail”. Length When using “Mail”, keep your message as brief and to the point as possible. Long messages tend to lose their point. Rather send a message requesting a meeting to discuss lengthy issues. E-MAIL ETIQUETTE
  • 6. RESPONSIBILITIES OF THE USER Title Give every message a title Make sure the subject line of your message provide a brief, clear description of the contents of the message Effectiveness Read “Mail” message regularly and respond timeously where necessary. The effectiveness of a “Mail” system in improving productivity and communication is based on responsiveness. Read your message regularly and reply as soon as possible. E-MAIL ETIQUETTE
  • 7. RESPONSIBILITIES OF THE USER E-MAIL ETIQUETTE
  • 8. RESPONSIBILITIES OF THE USER Selective Be selective when forwarding or replying to a “Mail” message. Consider who really need to see the message. Forward it only to those who need information. Protect Your user passwords are the gateway to your PC and systems resources including mail, Protect it all the time. You are responsible for actions taken under your user ID. Once your user ID is logged on, it is impossible to tell whether it is really you or someone else sending the message. Do not use passwords that would be obvious to others, and change it immediately if you think it has been compromised. Activate your Windows screen saver password to kick in automatically when idle after a few minutes. E-MAIL ETIQUETTE
  • 9. RESPONSIBILITIES OF THE USER Size Keep your mailbox and “Mail” files as small as possible Delete message from your mailbox after you have read or filed them. File only those messages that really need to be recorded. Housekeeping Carry out regular housekeeping on your files A facility exists “Mail” to archive messages to free up space on the system. If at a later date you need to refer to them, it is possible to access them. Another option will be to create a ‘personal folder’ and move the important “Mail” items to the personal folder. Delete or archive messages from the sent item folder regularly. E-MAIL ETIQUETTE
  • 10. RESPONSIBILITIES OF THE USER Logging off Exit and log off on your mail system if you will be away for an extended period and when you leave at the end of the day. Certain maintenance might be done overnight on the server, and this is only possible if you have logged out of your computer. Privacy “Mail” message are considered private correspondence. As such, messages are viewed as the private property of the receiver and will not be made available to Management. Although privacy and security are of the utmost importance, auditors, or investigators are authorized to investigate misuse of the network, such as theft, pornography, harassment, excessive private use, etc. E-MAIL ETIQUETTE
  • 11. ACTIVITIES TO AVOID Misuse Do not send any obscene, racist, defamatory or otherwise offensive material via “Mail” The use of vulgar language is expressly forbidden over the network, be it on company business, or in a private capacity. Personal use Note- Sending and receiving excessive non-business related messages is prohibited. E-MAIL ETIQUETTE
  • 12. ACTIVITIES TO AVOID Confrontation Do not use “Mail” to avoid confrontation. In certain instances, such as disciplinary or explosive circumstances, the sending of “Mail” messages is inappropriate. Do not send rude or argumentative messages. These situations can only be dealt within in a face to- face confrontation and “Mail” should not be used. Large files Do not send large files as attachment. Be selective in the files you send to others via “Mail”. Within your own work group, it is better to share the file and send a message regarding the file name to the recipients. Attached files dramatically increase the network overhead as well as the size of the “Mail” file. Priority Do not flag all messages as high priority Do not send “Mail” as the highest priority unless it really merits that priority. High –priority “Mails” message should only be used for the most important message and when you need an immediately response. E-MAIL ETIQUETTE
  • 13. ACTIVITIES TO AVOID Password Do not give your password/s to others You are responsible for any mail message originating from your machine. Giving other employees access to your system could result in fraudulent use of “Mail”. Confidential Information Avoid sending confidential information by “Mail”. If you do, you must secure the information by including it in a Microsoft Word file protecting it with a password. Then provide the recipient with the password by means of other communication, for instance by telephone. E-MAIL ETIQUETTE
  • 14. HINTS AND TIPS Requirements Set the options to suit your requirements Check for messages every 15 - 60 minutes. Sound the chime when a new message arrives. Flash the envelope when a new message arrives. Receipt Use the return receipt option If you are not sure whether the addressees are receiving messages, use the return receipt option. This will send a message back to you, informing you that the recipient has got the message. E-MAIL ETIQUETTE
  • 15. HINTS AND TIPS Backing up Your “Mail” files should be backed-up periodically; otherwise users carry the responsibility if not provided by business. Tip Include a signature that contains other methods by which others can contact you. This usually includes your full name, job title, and company name and telephone numbers. Do not send messages all in capital as it will appear as if you are shouting. Use bold lettering or underlining for emphasis, e.g., use that is what I meant, rather than that IS what I meant. E-MAIL ETIQUETTE
  • 16. Questions simon.mofokeng@wits.ac.za Thank you once again for adhering to guidelines. E-MAIL ETIQUETTE