SlideShare une entreprise Scribd logo
1  sur  13
Télécharger pour lire hors ligne
Email Basics
             Presented by:
       Software Training Services




                The University of Akron




Topics
 Guidelines/Etiquette
 Privacy of Email
 Spam
 Chain Letters/Hoaxes
 Discussion Groups/Listservs




                The University of Akron




    Guidelines/Etiquette




                The University of Akron




                                          1
Basic Guidelines
  Length
      Concise, to the point
      Subject Line
  Tone
      Avoid all capital letters
      Professional
      Read carefully before sending
      Humor, sarcasm – difficult to convey
      Emoticons – use sparingly

                      The University of Akron




Emoticons
:-)    =     Happy

:-(    =     Sad

;-)    =     Wink (Sarcasm)

:-O =        Yell


                      The University of Akron




Identify Yourself
  Signature
      Full Name
      Title
      Company
      Address
      Phone Number
      Fax Number




                      The University of Akron




                                                2
Replies and Forwarding
 Use the “Reply to” or “Reply to All” option
   Maintains a link to the original message
   Maintains “thread” of correspondence
 Forwarding a message
   Not the same as replying
   Mail original message to someone other than the sender
   Use caution when forwarding private or sensitive email
   messages without the permission of the sender
   May be inappropriate to forward a portion of a message




                      The University of Akron




Using the “CC:” field
 Carbon copy
 Everyone in the “To” and “CC” fields are
 visible
 ‘This email is not addressed to you, you're
 just receiving a copy' (FYI)
 Can be overused
 “Reply to All” will be sent to everyone in
 “CC” and “To” fields


                      The University of Akron




Using the “Bcc” field
 Blind carbon copy
 Conceals address from other recipients
 Use for mass mailings
   No need for others to see list of recipients
 Will not receive a “Reply To” or “Reply to
 All” message




                      The University of Akron




                                                            3
Email Attachments
 Never open an unexpected attachment
   Even from someone you know
 Used to spread viruses
 Scan questionable attachments
   On Demand Scan
 When sending attachments, alert the
 recipient to the attachment



                  The University of Akron




Etiquette - Flaming
 Verbal attack
 Not an appropriate use
 Ignore
 Steps to Avoid:
   Carefully read messages before sending
   Don’t send messages in all upper case
   Don’t send insulting email
   Don’t send mass-mailing advertisements


                  The University of Akron




        Privacy of Email




                  The University of Akron




                                            4
Privacy of Email
 Not a secure form of communication
 Don’t send secret or confidential
 information
   Credit Card information
   Social Security number
   Passwords
 More like a postcard than a sealed letter
 Think before you forward
   Do you have the sender’s permission?

                   The University of Akron




Privacy of Email
 Subject to review with sufficient
 justification
   Court order
   Evidence as part of investigations
 Message may be mistakenly addressed
   Return message to sender and delete




                   The University of Akron




When NOT to communicate via Email
 Don’t send email of a sensitive or
 confidential nature
 Don’t use email to communicate
 complaints or dissatisfaction with someone
   Have a phone or face-to-face conversation
   with the person
   Promotes 2-way communication
 If you find yourself responding more than
 3 times on the same topic –
   Have a phone or face-to-face conversation

                   The University of Akron




                                               5
Privacy of Email
 If you wouldn’t want it broadcast on the
 6:00 news – don’t put it in an email!!




                   The University of Akron




                  Spam




                   The University of Akron




Spam
 Junk mail
 Unsolicited bulk mailings
 Overloads mailboxes
   20 – 90% of incoming traffic
   Adult content, health promotions, software
   offers, investment ads, get-rich quick schemes
   Chain letters, hoaxes, jokes
 NEVER respond to spam!


                   The University of Akron




                                                    6
Spam
 How they obtain email addresses:
   Posted on the web (chat, newsgroups, etc.)
   Web-based discussion boards
   Inappropriate sharing or sale of email
   addresses
   Companies not respecting user opt-out
   preferences
   Signing up for “offers”
   Guessing (random generation)
   Stealing via malware

                    The University of Akron




University of Akron Response to Spam
 Defining spam
   Difficult – Did you sign up for stock tips? Are
   you really interested in wonder vitamins?
 Can’t block all sites
   Also include legitimate mail




                    The University of Akron




University of Akron Response to Spam
 Spammers hide true source of mail
   Misconfigured mail servers allow this
   Sign up for free accounts
 Spam Scanning System
   Determines if each message is spam
   {SPAM?} = May be spam
   {SPAM!} = High probability
   Point system



                    The University of Akron




                                                     7
Reporting Spam
 Messages not marked as spam, send to:
 spam@uakron.edu

 Messages marked as spam which are
 legitimate, send to:
 notspam@uakron.edu




                   The University of Akron




Spam Filters
 Set up filters on email to sort spam
 messages
    Place in Junk Mail folder and then review
    Software Training website
  http://www.uakron.edu/its/learning/training/facs
    taffmail.php




                   The University of Akron




Other Methods to Reduce Spam
 Contact your congressperson
 Be cautious when giving out your email
 address
 Complain to the Internet Service Provider
 where the message originated
   Forward message
   abuse@domain_name – abuse@uakron.edu,
   abuse@yahoo.com, abuse@aol.com



                   The University of Akron




                                                     8
Hoaxes and Chain Letters




                     The University of Akron




Purpose and Cost
  Send to everyone
  Messages are untrue
  Appeal to sense of good will
  Cost:
     Time to read
     Stress placed on servers
  Spammers harvest email addresses from
  hoaxes and chain letters

                     The University of Akron




Cost of Hoaxes and Chain Letters
Generation   1   2     3               4       5       6

No of        10 100 1,000 10,000 100,000           1,000,000
Messages:




                     The University of Akron




                                                               9
Examples




                   The University of Akron




                   The University of Akron




Identification
 “Send this to everyone you know”
 Technical language
 Credibility by association
 3 Components
   Hook – grab your interest
   Threat – something terrible will happen
   Request – Forward this to everyone
 No contact information or invalid contact
 information
                   The University of Akron




                                             10
Hoax/Chain Letter Prevention
 Do NOT forward the message
 Various sites used to check validity:
   McAfee: http://vil.nai.com/vil/hoaxes.aspx
   F-Secure: http://www.f-secure.com/virus-
   info/hoax/
   Snopes: http://www.snopes.com
   Hoaxbuster’s: http://hoaxbusters.ciac.org




                   The University of Akron




University Rule 3359-11-10
 Access and acceptable use of university
 computer and informational resources
 “Misuse of e-mail, such as, but not limited
 to:
   Sending unsolicited e-mails to a large number
   of recipients, i.e. sending spam-mail or
   unwanted chain letters.”
 http://www.uakron.edu/ogc/rules/Rulesby
 Number.php#policies

                   The University of Akron




Phishing
 Process by which someone obtains private
 information through deceptive or illicit
 means
   Used to falsely assume another person’s
   identity
 Online course available
   Faculty and staff can enroll at:
   https://www.uakron.edu/seminars/index.php
   Students can log in to ZipLine and find the
   course listed on the “My Page” tab – under
   CyberSecurity Information

                   The University of Akron




                                                   11
Listservs and Discussion
           Groups




                   The University of Akron




Guidelines
 Double-check the To: when replying
   Don’t send your response to the entire listserv
   Start a new email and type the recipient’s
   name
 Don’t air your grievances on a list
   Avoid personal attacks
   Be professional
 “Lurk” if you are new to a list
   Read posts without responding
   Learn what the group discusses, how it talks,
   expected behavior
                   The University of Akron




Summary
 Email is a valuable communication tool
 Sometimes – it is NOT the best or most
 appropriate method of communication
 Follow the basic guidelines presented to
 improve the quality of your
 communications




                   The University of Akron




                                                     12
Questions?
 Email: PSTrain@uakron.edu
 Phone: 330.972.6391
 Web site:
    http://www.uakron.edu/its/learning/training/ind
    ex.php




                    The University of Akron




Record Course Completion
 Click the following link to have this course
 added to your training record:

http://survey.uakron.edu:2929/2wV3GFE/Li
  nk.html

  NOTE: Failure to click the link and complete
  the necessary information will result in your
  course completion being unrecorded!

                    The University of Akron




                                                      13

Contenu connexe

En vedette

Creating Presentations using Microsoft Powerpoint - 2007
Creating Presentations  using Microsoft Powerpoint - 2007Creating Presentations  using Microsoft Powerpoint - 2007
Creating Presentations using Microsoft Powerpoint - 2007 indika rathninda
 
Microsoft® Office Training
Microsoft® Office TrainingMicrosoft® Office Training
Microsoft® Office Trainingsun12341
 
Basics of microsoft powerpoint
Basics of microsoft powerpointBasics of microsoft powerpoint
Basics of microsoft powerpoint3eichled
 
Microsoft PowerPoint 2010
Microsoft PowerPoint 2010Microsoft PowerPoint 2010
Microsoft PowerPoint 2010nhumar
 
All About Microsoft PowerPoint
All About Microsoft PowerPointAll About Microsoft PowerPoint
All About Microsoft PowerPointPrincess Mae Mejia
 
Industrial Design Portfolio Basics
Industrial Design Portfolio BasicsIndustrial Design Portfolio Basics
Industrial Design Portfolio Basicscarlyhagins
 
Sketching for Design
Sketching for DesignSketching for Design
Sketching for DesignJackson Fox
 
Photoshop Workshop 1 - Fall 2012
Photoshop Workshop 1 - Fall 2012Photoshop Workshop 1 - Fall 2012
Photoshop Workshop 1 - Fall 2012Jeff Zhan
 
Typography for [Digital] Humanists
Typography for [Digital] HumanistsTypography for [Digital] Humanists
Typography for [Digital] HumanistsAmy Papaelias
 
How to Make Money With Your Photoshop Editing Skills
How to Make Money With Your Photoshop Editing SkillsHow to Make Money With Your Photoshop Editing Skills
How to Make Money With Your Photoshop Editing SkillsFiverr
 
UX Strategy - the secret sauce that defines the pixie dust
UX Strategy - the secret sauce that defines the pixie dustUX Strategy - the secret sauce that defines the pixie dust
UX Strategy - the secret sauce that defines the pixie dustEric Reiss
 
10 Color Banner Design Inspiration
10 Color Banner Design Inspiration10 Color Banner Design Inspiration
10 Color Banner Design InspirationBannersnack
 
How to create a basic power point presentation
How to create a basic power point presentationHow to create a basic power point presentation
How to create a basic power point presentationjoluisae
 
The Sketchnote Mini-Workshop
The Sketchnote Mini-WorkshopThe Sketchnote Mini-Workshop
The Sketchnote Mini-WorkshopMike Rohde
 

En vedette (19)

Creating Presentations using Microsoft Powerpoint - 2007
Creating Presentations  using Microsoft Powerpoint - 2007Creating Presentations  using Microsoft Powerpoint - 2007
Creating Presentations using Microsoft Powerpoint - 2007
 
Computer basicsclassnpl
Computer basicsclassnplComputer basicsclassnpl
Computer basicsclassnpl
 
Microsoft® Office Training
Microsoft® Office TrainingMicrosoft® Office Training
Microsoft® Office Training
 
Basics of microsoft powerpoint
Basics of microsoft powerpointBasics of microsoft powerpoint
Basics of microsoft powerpoint
 
Computer Basics
Computer BasicsComputer Basics
Computer Basics
 
Microsoft Powerpoint Basics
Microsoft Powerpoint BasicsMicrosoft Powerpoint Basics
Microsoft Powerpoint Basics
 
Microsoft PowerPoint 2010
Microsoft PowerPoint 2010Microsoft PowerPoint 2010
Microsoft PowerPoint 2010
 
All About Microsoft PowerPoint
All About Microsoft PowerPointAll About Microsoft PowerPoint
All About Microsoft PowerPoint
 
Industrial Design Portfolio Basics
Industrial Design Portfolio BasicsIndustrial Design Portfolio Basics
Industrial Design Portfolio Basics
 
Sketching for Design
Sketching for DesignSketching for Design
Sketching for Design
 
Photoshop Workshop 1 - Fall 2012
Photoshop Workshop 1 - Fall 2012Photoshop Workshop 1 - Fall 2012
Photoshop Workshop 1 - Fall 2012
 
Typography for [Digital] Humanists
Typography for [Digital] HumanistsTypography for [Digital] Humanists
Typography for [Digital] Humanists
 
Basic sketching
Basic sketchingBasic sketching
Basic sketching
 
How to Make Money With Your Photoshop Editing Skills
How to Make Money With Your Photoshop Editing SkillsHow to Make Money With Your Photoshop Editing Skills
How to Make Money With Your Photoshop Editing Skills
 
UX Strategy - the secret sauce that defines the pixie dust
UX Strategy - the secret sauce that defines the pixie dustUX Strategy - the secret sauce that defines the pixie dust
UX Strategy - the secret sauce that defines the pixie dust
 
10 Color Banner Design Inspiration
10 Color Banner Design Inspiration10 Color Banner Design Inspiration
10 Color Banner Design Inspiration
 
How to Create a Twitter Cover Photo in PowerPoint [Tutorial]
How to Create a Twitter Cover Photo in PowerPoint [Tutorial]How to Create a Twitter Cover Photo in PowerPoint [Tutorial]
How to Create a Twitter Cover Photo in PowerPoint [Tutorial]
 
How to create a basic power point presentation
How to create a basic power point presentationHow to create a basic power point presentation
How to create a basic power point presentation
 
The Sketchnote Mini-Workshop
The Sketchnote Mini-WorkshopThe Sketchnote Mini-Workshop
The Sketchnote Mini-Workshop
 

Similaire à Email Basics Handout

Email strategies
Email strategiesEmail strategies
Email strategiesAlan Haller
 
Plagarism + Turnitin Bus Induction Feb 2010
Plagarism + Turnitin   Bus Induction Feb 2010Plagarism + Turnitin   Bus Induction Feb 2010
Plagarism + Turnitin Bus Induction Feb 2010esyin
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitssuser64f8f8
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentationWan Solo
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles schoolesksaints
 
7 module web based email
7 module web based email7 module web based email
7 module web based emailRozell Sneede
 
Something in the library smells phishy
Something in the library smells phishySomething in the library smells phishy
Something in the library smells phishyNicholas Davis
 
Security Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got MailSecurity Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got MailCatherine MacAllister
 

Similaire à Email Basics Handout (18)

Email basics
Email basicsEmail basics
Email basics
 
Email strategies
Email strategiesEmail strategies
Email strategies
 
Plagarism + Turnitin Bus Induction Feb 2010
Plagarism + Turnitin   Bus Induction Feb 2010Plagarism + Turnitin   Bus Induction Feb 2010
Plagarism + Turnitin Bus Induction Feb 2010
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
How to recognize an email scam
How to recognize an email scamHow to recognize an email scam
How to recognize an email scam
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentation
 
Spam
SpamSpam
Spam
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
 
Web spam
Web spamWeb spam
Web spam
 
7 module web based email
7 module web based email7 module web based email
7 module web based email
 
7 module web based email
7 module web based email7 module web based email
7 module web based email
 
7 module web based email
7 module web based email7 module web based email
7 module web based email
 
Something in the library smells phishy
Something in the library smells phishySomething in the library smells phishy
Something in the library smells phishy
 
Hot topic
Hot topicHot topic
Hot topic
 
Email Essentials
Email EssentialsEmail Essentials
Email Essentials
 
Email
EmailEmail
Email
 
Cel1
Cel1Cel1
Cel1
 
Security Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got MailSecurity Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got Mail
 

Dernier

办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书saphesg8
 
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一z xss
 
加拿大MUN学位证,纽芬兰纪念大学毕业证书1:1制作
加拿大MUN学位证,纽芬兰纪念大学毕业证书1:1制作加拿大MUN学位证,纽芬兰纪念大学毕业证书1:1制作
加拿大MUN学位证,纽芬兰纪念大学毕业证书1:1制作rpb5qxou
 
美国SU学位证,雪城大学毕业证书1:1制作
美国SU学位证,雪城大学毕业证书1:1制作美国SU学位证,雪城大学毕业证书1:1制作
美国SU学位证,雪城大学毕业证书1:1制作ss846v0c
 
Protection of Children in context of IHL and Counter Terrorism
Protection of Children in context of IHL and  Counter TerrorismProtection of Children in context of IHL and  Counter Terrorism
Protection of Children in context of IHL and Counter TerrorismNilendra Kumar
 
Spanish Classes Online In India With Tutor At Affordable Price
Spanish Classes Online In India With Tutor At Affordable PriceSpanish Classes Online In India With Tutor At Affordable Price
Spanish Classes Online In India With Tutor At Affordable PriceFluent Fast Academy
 
LinkedIn for Your Job Search in April 2024
LinkedIn for Your Job Search in April 2024LinkedIn for Your Job Search in April 2024
LinkedIn for Your Job Search in April 2024Bruce Bennett
 
401799841-Increasing-Crimes-and-Suicides-Among-Youth.pptx
401799841-Increasing-Crimes-and-Suicides-Among-Youth.pptx401799841-Increasing-Crimes-and-Suicides-Among-Youth.pptx
401799841-Increasing-Crimes-and-Suicides-Among-Youth.pptxwaghmare9860lavin
 
Human Rights are notes and helping material
Human Rights are notes and helping materialHuman Rights are notes and helping material
Human Rights are notes and helping materialnadeemcollege26
 
Banged Dubai Call Girls O525547819 Call Girls Dubai
Banged Dubai Call Girls O525547819 Call Girls DubaiBanged Dubai Call Girls O525547819 Call Girls Dubai
Banged Dubai Call Girls O525547819 Call Girls Dubaikojalkojal131
 
AICTE PPT slide of Engineering college kr pete
AICTE PPT slide of Engineering college kr peteAICTE PPT slide of Engineering college kr pete
AICTE PPT slide of Engineering college kr peteshivubhavv
 
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改yuu sss
 
Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713Riya Pathan
 
Abanoub Ghobrial, Planning Team Leader.pdf
Abanoub Ghobrial, Planning Team Leader.pdfAbanoub Ghobrial, Planning Team Leader.pdf
Abanoub Ghobrial, Planning Team Leader.pdfAbanoubGhobrial1
 
Jumark Morit Diezmo- Career portfolio- BPED 3A
Jumark Morit Diezmo- Career portfolio- BPED 3AJumark Morit Diezmo- Career portfolio- BPED 3A
Jumark Morit Diezmo- Career portfolio- BPED 3Ajumarkdiezmo1
 
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书saphesg8
 
Application deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdfApplication deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdfCyril CAUDROY
 
LinkedIn Strategic Guidelines April 2024
LinkedIn Strategic Guidelines April 2024LinkedIn Strategic Guidelines April 2024
LinkedIn Strategic Guidelines April 2024Bruce Bennett
 
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
Career-Orientation-for-Grade-9-and-10.pptx
Career-Orientation-for-Grade-9-and-10.pptxCareer-Orientation-for-Grade-9-and-10.pptx
Career-Orientation-for-Grade-9-and-10.pptxGachaFluffy
 

Dernier (20)

办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书
 
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
 
加拿大MUN学位证,纽芬兰纪念大学毕业证书1:1制作
加拿大MUN学位证,纽芬兰纪念大学毕业证书1:1制作加拿大MUN学位证,纽芬兰纪念大学毕业证书1:1制作
加拿大MUN学位证,纽芬兰纪念大学毕业证书1:1制作
 
美国SU学位证,雪城大学毕业证书1:1制作
美国SU学位证,雪城大学毕业证书1:1制作美国SU学位证,雪城大学毕业证书1:1制作
美国SU学位证,雪城大学毕业证书1:1制作
 
Protection of Children in context of IHL and Counter Terrorism
Protection of Children in context of IHL and  Counter TerrorismProtection of Children in context of IHL and  Counter Terrorism
Protection of Children in context of IHL and Counter Terrorism
 
Spanish Classes Online In India With Tutor At Affordable Price
Spanish Classes Online In India With Tutor At Affordable PriceSpanish Classes Online In India With Tutor At Affordable Price
Spanish Classes Online In India With Tutor At Affordable Price
 
LinkedIn for Your Job Search in April 2024
LinkedIn for Your Job Search in April 2024LinkedIn for Your Job Search in April 2024
LinkedIn for Your Job Search in April 2024
 
401799841-Increasing-Crimes-and-Suicides-Among-Youth.pptx
401799841-Increasing-Crimes-and-Suicides-Among-Youth.pptx401799841-Increasing-Crimes-and-Suicides-Among-Youth.pptx
401799841-Increasing-Crimes-and-Suicides-Among-Youth.pptx
 
Human Rights are notes and helping material
Human Rights are notes and helping materialHuman Rights are notes and helping material
Human Rights are notes and helping material
 
Banged Dubai Call Girls O525547819 Call Girls Dubai
Banged Dubai Call Girls O525547819 Call Girls DubaiBanged Dubai Call Girls O525547819 Call Girls Dubai
Banged Dubai Call Girls O525547819 Call Girls Dubai
 
AICTE PPT slide of Engineering college kr pete
AICTE PPT slide of Engineering college kr peteAICTE PPT slide of Engineering college kr pete
AICTE PPT slide of Engineering college kr pete
 
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
 
Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713
 
Abanoub Ghobrial, Planning Team Leader.pdf
Abanoub Ghobrial, Planning Team Leader.pdfAbanoub Ghobrial, Planning Team Leader.pdf
Abanoub Ghobrial, Planning Team Leader.pdf
 
Jumark Morit Diezmo- Career portfolio- BPED 3A
Jumark Morit Diezmo- Career portfolio- BPED 3AJumark Morit Diezmo- Career portfolio- BPED 3A
Jumark Morit Diezmo- Career portfolio- BPED 3A
 
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
 
Application deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdfApplication deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdf
 
LinkedIn Strategic Guidelines April 2024
LinkedIn Strategic Guidelines April 2024LinkedIn Strategic Guidelines April 2024
LinkedIn Strategic Guidelines April 2024
 
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
 
Career-Orientation-for-Grade-9-and-10.pptx
Career-Orientation-for-Grade-9-and-10.pptxCareer-Orientation-for-Grade-9-and-10.pptx
Career-Orientation-for-Grade-9-and-10.pptx
 

Email Basics Handout

  • 1. Email Basics Presented by: Software Training Services The University of Akron Topics Guidelines/Etiquette Privacy of Email Spam Chain Letters/Hoaxes Discussion Groups/Listservs The University of Akron Guidelines/Etiquette The University of Akron 1
  • 2. Basic Guidelines Length Concise, to the point Subject Line Tone Avoid all capital letters Professional Read carefully before sending Humor, sarcasm – difficult to convey Emoticons – use sparingly The University of Akron Emoticons :-) = Happy :-( = Sad ;-) = Wink (Sarcasm) :-O = Yell The University of Akron Identify Yourself Signature Full Name Title Company Address Phone Number Fax Number The University of Akron 2
  • 3. Replies and Forwarding Use the “Reply to” or “Reply to All” option Maintains a link to the original message Maintains “thread” of correspondence Forwarding a message Not the same as replying Mail original message to someone other than the sender Use caution when forwarding private or sensitive email messages without the permission of the sender May be inappropriate to forward a portion of a message The University of Akron Using the “CC:” field Carbon copy Everyone in the “To” and “CC” fields are visible ‘This email is not addressed to you, you're just receiving a copy' (FYI) Can be overused “Reply to All” will be sent to everyone in “CC” and “To” fields The University of Akron Using the “Bcc” field Blind carbon copy Conceals address from other recipients Use for mass mailings No need for others to see list of recipients Will not receive a “Reply To” or “Reply to All” message The University of Akron 3
  • 4. Email Attachments Never open an unexpected attachment Even from someone you know Used to spread viruses Scan questionable attachments On Demand Scan When sending attachments, alert the recipient to the attachment The University of Akron Etiquette - Flaming Verbal attack Not an appropriate use Ignore Steps to Avoid: Carefully read messages before sending Don’t send messages in all upper case Don’t send insulting email Don’t send mass-mailing advertisements The University of Akron Privacy of Email The University of Akron 4
  • 5. Privacy of Email Not a secure form of communication Don’t send secret or confidential information Credit Card information Social Security number Passwords More like a postcard than a sealed letter Think before you forward Do you have the sender’s permission? The University of Akron Privacy of Email Subject to review with sufficient justification Court order Evidence as part of investigations Message may be mistakenly addressed Return message to sender and delete The University of Akron When NOT to communicate via Email Don’t send email of a sensitive or confidential nature Don’t use email to communicate complaints or dissatisfaction with someone Have a phone or face-to-face conversation with the person Promotes 2-way communication If you find yourself responding more than 3 times on the same topic – Have a phone or face-to-face conversation The University of Akron 5
  • 6. Privacy of Email If you wouldn’t want it broadcast on the 6:00 news – don’t put it in an email!! The University of Akron Spam The University of Akron Spam Junk mail Unsolicited bulk mailings Overloads mailboxes 20 – 90% of incoming traffic Adult content, health promotions, software offers, investment ads, get-rich quick schemes Chain letters, hoaxes, jokes NEVER respond to spam! The University of Akron 6
  • 7. Spam How they obtain email addresses: Posted on the web (chat, newsgroups, etc.) Web-based discussion boards Inappropriate sharing or sale of email addresses Companies not respecting user opt-out preferences Signing up for “offers” Guessing (random generation) Stealing via malware The University of Akron University of Akron Response to Spam Defining spam Difficult – Did you sign up for stock tips? Are you really interested in wonder vitamins? Can’t block all sites Also include legitimate mail The University of Akron University of Akron Response to Spam Spammers hide true source of mail Misconfigured mail servers allow this Sign up for free accounts Spam Scanning System Determines if each message is spam {SPAM?} = May be spam {SPAM!} = High probability Point system The University of Akron 7
  • 8. Reporting Spam Messages not marked as spam, send to: spam@uakron.edu Messages marked as spam which are legitimate, send to: notspam@uakron.edu The University of Akron Spam Filters Set up filters on email to sort spam messages Place in Junk Mail folder and then review Software Training website http://www.uakron.edu/its/learning/training/facs taffmail.php The University of Akron Other Methods to Reduce Spam Contact your congressperson Be cautious when giving out your email address Complain to the Internet Service Provider where the message originated Forward message abuse@domain_name – abuse@uakron.edu, abuse@yahoo.com, abuse@aol.com The University of Akron 8
  • 9. Hoaxes and Chain Letters The University of Akron Purpose and Cost Send to everyone Messages are untrue Appeal to sense of good will Cost: Time to read Stress placed on servers Spammers harvest email addresses from hoaxes and chain letters The University of Akron Cost of Hoaxes and Chain Letters Generation 1 2 3 4 5 6 No of 10 100 1,000 10,000 100,000 1,000,000 Messages: The University of Akron 9
  • 10. Examples The University of Akron The University of Akron Identification “Send this to everyone you know” Technical language Credibility by association 3 Components Hook – grab your interest Threat – something terrible will happen Request – Forward this to everyone No contact information or invalid contact information The University of Akron 10
  • 11. Hoax/Chain Letter Prevention Do NOT forward the message Various sites used to check validity: McAfee: http://vil.nai.com/vil/hoaxes.aspx F-Secure: http://www.f-secure.com/virus- info/hoax/ Snopes: http://www.snopes.com Hoaxbuster’s: http://hoaxbusters.ciac.org The University of Akron University Rule 3359-11-10 Access and acceptable use of university computer and informational resources “Misuse of e-mail, such as, but not limited to: Sending unsolicited e-mails to a large number of recipients, i.e. sending spam-mail or unwanted chain letters.” http://www.uakron.edu/ogc/rules/Rulesby Number.php#policies The University of Akron Phishing Process by which someone obtains private information through deceptive or illicit means Used to falsely assume another person’s identity Online course available Faculty and staff can enroll at: https://www.uakron.edu/seminars/index.php Students can log in to ZipLine and find the course listed on the “My Page” tab – under CyberSecurity Information The University of Akron 11
  • 12. Listservs and Discussion Groups The University of Akron Guidelines Double-check the To: when replying Don’t send your response to the entire listserv Start a new email and type the recipient’s name Don’t air your grievances on a list Avoid personal attacks Be professional “Lurk” if you are new to a list Read posts without responding Learn what the group discusses, how it talks, expected behavior The University of Akron Summary Email is a valuable communication tool Sometimes – it is NOT the best or most appropriate method of communication Follow the basic guidelines presented to improve the quality of your communications The University of Akron 12
  • 13. Questions? Email: PSTrain@uakron.edu Phone: 330.972.6391 Web site: http://www.uakron.edu/its/learning/training/ind ex.php The University of Akron Record Course Completion Click the following link to have this course added to your training record: http://survey.uakron.edu:2929/2wV3GFE/Li nk.html NOTE: Failure to click the link and complete the necessary information will result in your course completion being unrecorded! The University of Akron 13