Friday, October 26, 2007

E-mail Etiquette-II

There are four ways, and only four ways, in which we have contact with the world. We are evaluated and classified by these four contacts:what we do, how we look, what we say, and how we say it." - Dale Carnegie (1888-1955) American Educator

Below are the online basics you need to minimally become familiar with in order to be taken seriously in your online communications.

1.Do not type in all caps. Typing in all caps is considered yelling or screaming online. Those who type in all caps are perceived as lazy and not being considerate of those who will have to read their email. Various studies on the topic reflect that it is more difficult and takes longer to read text that is typed in all caps. And for those who question "What studies?" here is one example for your reading pleasure:

http://www.psych.utoronto.ca/~muter/pmuter1.htm

Searching for words is faster with uppercase characters, but reading of continuous text is slower (Vartabedian, 1971), perhaps because interline masking is greater with uppercase (Nes, 1986). In addition, lowercase enhances reading efficiency because word shape is helpful in word recognition (Rudnicky & Kolers, 1984).

One is free, at their convenience, to review the entire document above which goes into detail about how eyes react to what they have to read based on how the content is presented.

Stating certain professions are required to type in all caps (that's the first time I've heard that one) does not jive either. Would you send any off-line communications in all caps - the answer is probably no.

NOTE: It should go without saying, however, since I was chastised for not saying so, this rule certainly doesn't apply to the vision impaired or to those who are disabled or handicapped and cannot use the shift key. However, since typing in all caps is considered yelling online, it would behoove those who do so because of these reasons to take the time to include a brief note why they are typing in caps so that their emails and intent are not misinterpreted.

2. Do not leave the Subject: field blank. Always fill in the Subject: field with a brief and concise description of the content of your email. This is very important in helping those you communicate with organize and manage their email. Important: avoid using all caps or all small case, terms such as Hi, Help or Please Respond, or the recipient's name in the Subject: field as you may be misidentified as a spammer and your email deleted.

3.Refrain from formatting your email with colored text and background colors or images in your day to day communications. If I had $1.00 for every Netizen who emailed me complaining about how they cannot read emails that are formatted (different color text, bolding entire emails, using giganto background images or script fonts), apparently by those who have no color sense or command of HTML, I could retire. Your color and formatting choices can make your emails impossible to read. In addition, formatting could make your emails difficult to reply to without having to go through a procedure to convert your email to plain text first. Many times when folks hit Reply they have to deal with your formatting carrying over to their reply - which makes communicating with you unnecessarily difficult. Why would you expect folks to have to go through having to convert your email just to read and respond to you? The answer: They probably will not! Using large background graphics that take forever to download, especially if you have a phone connection (which is more common than most think once you get outside of metro areas) is plain old naive. If you do feel the uncontrollable need to use any type of formatting in your daily communications, do so sparingly. Please, on behalf of all those who email me, just send your email in plain text!

4.On those rare occasions where it is necessary to send a group of people the very same email, as a courtesy to those you are sending to, please list all of the recipients email addresses in the BCC field. (B lind Carbon Copy - from the old days when typewriters used carbon paper to create identical copies of a document when it was being typed.) When an email address is designated in the Blind Carbon Copy field, the recipient will get a copy of the email while their email address remains invisible and protected from the view of the other recipients of the email - some of whom they may or may not know. Never expose your contact's addresses to strangers! If you are not sure how to BCC in your email program, here are site resources that may help you learn the features of your software programs:

Long lists of email addresses at the beginning of any email is an immediate sign that the sender is either a novice/Newbie - or doesn't care to respect other's privacy. None of which, as I am sure you'll agree, are complimentary perceptions! Email addresses are like phone numbers. Only the owner of the email address or phone number is the one to authorize who they want to have it and make it public to. Many folks prefer to decide for themselves who has their email address. By sending mass mails to a list of folks, you have made that decision for them - and that is a breach of assumed privacy when communicating with you. Let those you correspond with determine for themselves who they will make their email address known to - do not make that decision for them! By listing handfuls of email addresses in the email headers for all to see is inconsiderate of each recipient's right to privacy.

5.If you are new online, raise your right hand and repeat after me:

"I will not forward any dumb joke, "chain letter" or unimportant emails to my friends without their permission."
"I will not forward any dumb joke, "chain letter" or unimportant emails to my friends without their permission."

"I understand that by doing so I may fill up their in box, use other's resources unnecessarily and may cause other important email to bounce."
"I understand that by doing so I may fill up their in box, use other's resources unnecessarily and may cause other important email to bounce."

"I understand that most folks have seen these emails a million times and find them annoying."
"I understand that most folks have seen these emails a million times and find them annoying."

"I know that by forwarding these so-called humorous emails I may offend or tick off people who do not share my sense of humor or who are sick of having stupid emails forwarded to them each time a Newbie hops online."
"I know that by forwarding these so-called humorous emails I may offend or tick off people who do not share my sense of humor or who are sick of having stupid emails forwarded to them each time a Newbie hops online."

There! Now, that wasn't too bad was it? ;-) You will no longer be tempted to forward those jokes, untruthful or frivolous email that instruct you to forward to your friends! And, you will avoid looking silly and uninformed in the process. Read them if you must then hit delete. You really don't believe email that state certain things will happen simply by you forwarding the email to 10 friends do you? Talk about a waste of resources!!

In addition, many of these emails are actually hoaxes or downright bogus. Before you forward an email that appears good intentioned with an incredible story that instructs you to "read and share" with everyone you know, first check Snopes.com to see if the story is even legit in the first place and not a hoax. Not doing so can have you eating crow when everyone you email is informed you just forwarded a hoax and didn't know any better. And, don't get mad at someone if they point out to you that you were uninformed by perpetuating a hoax! If you don't know for a fact that the email you are forwarding is accurate and specifically apropos to the person you are forwarding to and you know they will want to receive it - all you have to do is ask first.

One of the common requests I receive through this site is from folks wanting to know a "nice way" of telling someone they care about to stop sending joke, hoax and chain emails without hurting their feelings. Speaking for those who know you, we have seen those emails before, many times - cut us a break - verify them before you send them to us or just hit delete!

6.Never give out phone numbers or personal information without confirming you are communicating with a reputable party. Never give out personal contact information of others without their specific permission to do so.

7.Make a reasonable effort to search a Web site for the information you are looking for - "Frequently Asked Questions" or "About Us" sections may give you the answers you seek before you waste the site owner's time by emailing for information that is readily available on their site. I get emailed daily for answers that are easily found in my 10 Courtesies or in the Internet 101 section if someone were to make minimal effort. These onliners simply didn't want to take the time to read them so they expected me to take the time to repeat what is on my site. Talk about giving the perception of lazy and not respecting other's time! If a Web site owner takes the time to provide information, read it. No one person's time is more important and common courtesy includes respecting this fact. If you do not find what you are looking for, search for the appropriate contact area for your question. Do not just click on the first email link you come across and blurt out your question(s). If you do, don't be surprised if your email goes unanswered when the information is easily found on the site. It is important to understand the focus of each Web site as well. Each site cannot be everything to everyone or be what you perceive it should be. Be sure to review the information provided to double check that what you seek would even be covered by the site you are visiting.

8.Do not use Return Receipt Request (RR) for each and every email you send because you like "knowing" when someone opens your email. Not only is this annoying to the recipient, this feature is intrusive! How would you like it if every time you heard a voice mail, answering machine message, opened a postal letter from a friend it was immediately reported back to them that you had heard/opened their communications? The recipient should have the privacy to determine when/if they want to open, read and reply - period. RRs should be reserved for those instances where it is critical to each side knowing the email was opened. Such instances would include legal and important business issues. Keep in mind opened doesn't mean read and that the recipient can decline an RR request so you will not be notified of their actions.

9.Understand that you will be on a continual learning curve. All of us are. This gig is changing constantly. The only consistency is change! If you do not have the desire to learn and do not make the effort to understand the "culture" of the technology in which you are participating, you will not be taken seriously by your fellow Netizens. You also may get some terse emails from other onliners pointing such issues out to you - some may not be as nice as others. When this happens, do not fire back at them! Use situations like this as an opportunity to learn what you are doing wrong so you do not anger others and can have a more enjoyable time.

10.If you receive a nasty email - do not respond immediately - if at all. People are very bold and overly critical on the other side of this screen. In my experience they tend to not hesitate to point out the things they think you need improvement on while not even noticing the good or positive points on the very same issue. Many times these folks are simply trying to get a rise out of you (this is called trolling) or are trying to make themselves feel self-important. Sometimes they are just plain jerks. If you do not have something nice or constructive to say, or at the very least sternly professional - just hit delete.

11.Keep in mind that all private email is considered to be copyrighted by the original author. If you post private email to a public list or board, or forward it to an outside party in whole or in part, you must include the author's permission to post the material publicly. Not doing so can get you into some deep doo-doo legally or with your friends and associates. Think of it this way... how would you feel if a personal private email that you had written for a specific purpose/person is then plastered across the Internet or forwarded to folks you do not know? Always ask for permission before forwarding or posting any private emails!

12.Always minimize, compress or "zip" large files before sending. Many folks new to the online world do not realize how large documents, graphics or photo files are. Guess what? They are large enough to fill someone's email box and cause their other mail to bounce! Get in the habit of compressing anything over 200,000 bytes (200K). (You can view file sizes in Windows Explorer. Simply right click on the file name and choose properties.) There are several types of file compression software available for these purposes. Do not send unannounced large attachments to others because you think that photo or file is cute or cool or neat. Always ask first! More importantly when sending business files, do so only during business hours, always compress and send at a prearranged time!

Many onliners still have to wait up to 30 minutes or more to open overly large files due to their connection speed. Those online not too far outside of metropolitan areas do not have cable or DSL connections, they are on dial-ups - many only @ 28.8K! If you do not know how to compress files, then you need to learn how to make them physically smaller with graphic software. Those are your two choices; compressing or minimizing. You really need to be aware of and practice one or the other. Minimizing a photo or graphic's physical size to no larger than 600 pixels in width will make them emailable. Most photos right off your camera are 1,000 pixels plus in width which makes for a very, very large file size. Nothing need be larger than 600 pixels to view anyway. Or you could be really courteous and learn how to use the free Web space offered by your ISP to upload photos and simply send the link to friends and family to view. If you do not know how to do any of these things all you have to do is learn! [Great Resource: HTML Programming Cheat Sheets]

To send large files that take a long time to download that may not respect the other person's time, reflect their sense of humor or point of view and may even max out their email box is pretty inconsiderate and downright lazy.

13.Do not forward virus warnings! Virus warnings received from others are generally always hoaxes. [Great Resource: Symantec's Virus Hoax Page ] Especially if an email tells you to forward to everyone you know--don't!! Delete those emails and do not forward them! Definitely ignore those forwarded emails instructing you to delete files on your computer - they could be critical files that your computer needs to operate. Only warn friends if you know that your computer has a virus that you inadvertently may have passed on to them. Rely only on your virus software and your software provider's Web site for the real scoop. If you get one of these wacky emails from a friend or associate, go to your virus software provider's site and search for the virus name in question to confirm if it is accurate information or if it is a hoax. When you find it to be a hoax, let the person who forwarded it to you know that they are perpetrating misinformation and unintentionally alarming others. Read what your Virus Software provider has to say before you unnecessarily alarm folks and in the process end up looking rather silly to say the least. There are many urban legends purely in existence to watch all the Newbies screw up their computer's configuration files or forward the fake email to "everyone they know" while looking rather foolish in the process. You know what they say... There's a Newbie born every minute! ;-)

With the advancement of technology, it is possible to get a virus without even opening an email. That ended with W32.Nimda.A@mm in September/2001 that merely required you click on the subject of the email in your email program or for those that use Outlook Express have your program set to preview. HINT: Turn Previewing Off! Nimda also propagated itself by taking advantage of bugs in Microsoft servers to plant itself on the server and then transfer itself to those who visited the Web sites on that server using Internet Explorer (yes, IE is buggy too) as their browser. (That's why I use Eudora for email and FireFox as my browser!)

Several of the latest viruses actually use email addressed farmed out of your address book or inbox to send the virus and propagate itself to all those listed with your name in the From: field. The latest viruses can send out the virus with your friend's names in the From: field or any combination of email addresses found on your system! Yikes! It is clear... The need for a 24/7 real-time virus protection software is no longer a choice - it is your responsibility to remain virus free. You will also need to update your virus files regularly. Check for updates every time you log on so that your computer is protected from the latest releases or use the automatic update feature of your virus software.

Basics for virus protection:
  • Get an active program that is always "ON". This will catch any viruses as they are being downloaded so they can immediately be quarantined and cannot infect your system.
  • Update your virus patterns daily or every time you log on. These updates can be downloaded from the Web site of your virus software manufacturer. Most software has a scheduler to tell your computer to do this automatically - how convenient! You need to ensure your system is protected from the latest viruses which may have just been discovered since last you were online. New viruses are identified daily!
  • Never click on any attachment or an .exe (example: Happy99.exe, free stuff, click here or ILOVEYOU) file attached within an email without making sure the attachment has been checked for viruses. Even if the email appears to come from someone you know very well! The attachment may be virus generated and plucked your friend's email address off another infected computer belonging to someone they communicated with. Or your friend may unknowingly be infected and not aware of the virus on their system which has just spawned an email that has their name on it and is addressed to you. The email may look like it is from your friend just to get you to open it when in fact it is an email generated by a virus.

1 comment:

Anonymous said...

I recomend to you to advertise your Effective Communication blog to opt-in email leads. Its free and 100% legal as is opt-in!

Free Daily Opt-In Email Leads - "Click here to Download 2,000 Email List Every Hour"

What is Opt In Email Marketing
Opt-in email advertising or permission based marketing is the process of broadcasting advertising messages via electronic mail wherein the recipients of these ads have expressed consent to receive them.

The opt-in processes requires that a potential prospect select the products or services they are interested in and wish to subscribe to. The benefit to this approach is that an individual who has expressed an active interest in an offer is a more qualified potential prospect.

PREMIUM AUTORESPONDER LEADS
If you're looking for high quality auto-responder leads, these are the ones you should be using! Not the penny leads that companies say are so great! If you want your email campaigns to light up with activity, get these today!

PRE ENROLLEES/TOUR TAKERS
Our Real-Time Tour Leads have filled out a form on the internet asking them whether they would like to take a tour of one of the hottest Home Based Businesses on the Internet. Once they submit their information they are immediately redirected right to your website and Tour/Presentation! Imagine calling a lead that is still browsing your website when they pick up the phone!

FRESH SURVEYED LEADS
These are Super Fresh responsive Home Business Opportunity Leads that are 0 to 72 hours old. Our customers find Super Fresh Leads like these to be an extremely effective, affordable, and duplicable way to build a large successful organization.

REAL TIME INTERVIEWED LEADS
We call an average of 94 double qualified opportunity seekers to develop one of these Ultra - qualified prospects! Then we get the lead in your hands within seconds of the interview being completed.

Why You Need Opt-In Targeted Email Leads
Some of the most powerful marketing on the Internet is done using opt-in targeted email leads. This type of promotion is sometimes called ?permission based? contact. Because the recipient has requested information, it is not considered spam. Opt-in email is the Internet version of direct mail and is much more cost effective.

To profit from your opt-in targeted email leads you will need to build lists that are focused on specific interests. List building is a continuous project for Internet marketers. You will be emailing product promotions, newsletters, and other information matched to your subscribers' interests. The more targeted your list, the easier it will be to identify potential products.

If you have a list of opt-in targeted email leads interested in golf, you shouldn't mail them a promotion for the newest dog training manual. Obviously, if you send a review of a recently released set of videos about improving your golf swing, the results will be much better. Before you begin to build your list, you much decide on your target market.

The easiest way to build a targeted opt-in list is to give away an information product in exchange for a name, email address, and permission to email again. It's possible to collect opt-in targeted email leads for almost any topic using this method. This is an excellent way to lots of opt in email leads at no cost. Of course, your free product will be relevant to your target market. Here is a hint. If you are targeting the golf market, try to find a beginner level product to offer as an incentive. New golfers probably need a wider range of products than more experienced players.

Opt-in email is a simple, inexpensive way to generate interest and sales for a service or product. There are a multitude of strategies and tactics to build your list. Once a prospective customer is in your autoresponder database, you will be emailing them on a regular basis. This will allow you to create a steady income from you list of opt-in targeted email leads.