GAELIC SUMMER CAMP E-MAIL ETIQUETTE University of the Witwatersrand Simon Mofokeng.

Slides:



Advertisements
Similar presentations
How to Use Stowe School District
Advertisements

Hart District Acceptable Use Policy Acceptable Use Policy.
Etiquette Are you -happy; that is, do you send too much? Did you send an that was misunderstood? Did the message you thought you sent.
Basic Communication on the Internet:
6 C H A P T E R © 2001 The McGraw-Hill Companies, Inc. All Rights Reserved1 Electronic Mail Electronic mail has revolutionized the way people communicate.
ETIQUETTE Fact: has overtaken the ____________ as a communication tool in the workplace. (ranking: , ______________, mobile phones, instant.
C O A L I T I O N Corner Coalition Corner: Business training tools for HR staff, real estate licensees and other service professionals in the relocation.
Policy 6460 Staff Use of Computerized Information Resources Regulation 6460 R-Staff Use of Computerized Information Resources Regulation 6460 R.2 Staff.
APS Guidelines Policy Practice Netiquette. APS Guidelines Arlington Public Schools recognizes that electronic mail ( ) is a valuable communication.
Microsoft Outlook is a tool that includes , calendaring, and tasks.
Uintah School District Acceptable Use for Computer and Network Access.
Dobrin / Keller / Weisser : Technical Communication in the Twenty-First Century. © 2008 Pearson Education. Upper Saddle River, NJ, All Rights Reserved.
August 15 click! 1 Basics Kitsap Regional Library.
By Laura Trawin.
INTERNET and CODE OF CONDUCT
evidence. Safety To stay safe on the internet there are many points you need to follow. The first point is to change your password regularly, you.
This is the first page of the log in, this is were you enter your unique details.
This PowerPoint presentation will show you how to use your productively and successfully.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
This is group I have made.  Deleted all the s we didn’t need to clear out our .  Then created folders for the s we would receive.
ICT Essential Skills. (electronic mail) Snail Mail.
user guide Having a strong password allows other users to struggle to guess. To make a strong password you should use up to 12 letters and 1 or 2.
Company LOGO Exploring Using TWIG (Webmail) at ACC.
Hello Employee, Welcome to MStreamIT!
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
. Open a Click on your inbox and click on a you want to open then it will open.
Tips & Tricks Presented by: Tim Trice Madisonville Community College.
Information guide.
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
. Open a Click on your inbox and click on a you want to open then it will open.
Electronic Use Policies.   Social Media  Internet.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Santa’s s By Becky.
Name: Ryan Lugg Form: 10B . How can businesses make use of . (P) can be a very useful tool, it can be very cost effective and efficient.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
By Ciaran carney. ADD COM  Etiquette – Acceptable Use Policy  Use a suitable subject in the - this helps the reader to understand what the message.
NETIQUETTE GUIDELINES FOR DISTANCE EDUCATION COURSES.
Santa’s s By Chloe Warman.
Dylan Bayliff. Contents: 1- Sending s & Using etiquette 2- Staying safe and Accessing 3- Open s 4- Replying to s 5- Setting up contacts.
How to use ? By Martyna Haliniak. How to log on? In order to log on, you have to type in your username & password in the text boxes, and then click.
A guide for new employees-.  When you see an that is highlighted and that looks like it is un-opened, double click on the bar to open the .
 Subject: The topic you are talking about. So they understand what it is a about and explain to the point.  clients usually display it in a.
Microsoft Outlook Objective The learner will be able to perform basic tasks in Microsoft Outlook 2003.
Microsoft Office Illustrated Introductory, Second Edition Started with Outlook 2003 Getting.
Microsoft Office XP Illustrated Introductory, Enhanced Started with Outlook 2002 Getting.
By Sasha Radjuk. - Etiquette and User Guide Give some basic notes on how to log in. To login go on Google and type in outlook web app and the type.
2 Importance of s Time – is quicker than snail mail Convenience –Can be sent from notebooks to handhelds improving client accessibility Internal/External.
Preparing s Using Etiquette Lesson A4-3.
Company Guidelines and Basic Rules for …. No text words or slang, all s sent have to be polite and formal Use suitable, relevant subject lines.
s This presentation is all about s, etiquette and software. I will go through these things step by step to give you a clear understanding.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
Preparing s Using Etiquette. Learning Objectives Define . List the parts of an and an header. List rules for etiquette.
STAYING SAFE: Here are some safety tips when using Change your password regularly and keep it in a safe place. Don’t share your password with anyone.
The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
user guide Having a strong password allows other users to struggle to guess. To make a strong password you should use up to 12 letters and 1 or 2.
Create a new then select the options tab. Setting high/low importance.
tool kit. USER GUIDE Etiquette (Acceptable use policy) – a list of rules that we observe Use a suitable subject in the - this helps.
‘ NETIQUETTE MANNERS IN CYBERSPACE. Your Student Account: Is designed for to ensure your online safety Is created for instruction and learning Is.
Do Now: Describe the steps used to access the comments tool in MS Word. ( review your notes for the answer) Ex: Step 1. Select the text or item you want.
ETIQUETTES “ - when it absolutely positively has to get lost at the speed of light.”
EFFECTIVE COMMUNICATION PRESENTED BY THE SOLUTIONS GROUP.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
1. Setting up an account- technical
Proper Internet and Social Media Usage Internet Usage While on Premise Board Policy GBEAA (The Internet Acceptable Use Policy): “Employees will.
Sending effective and professional s . Session aims and objectives Lesson Aims and Objectives send s that are fit for purpose and audience.
Using Using Computers Safely, Effectively and Responsibly.
What is Netiquette? We expect other drivers to observe the rules of the road. The same is true as we travel through cyberspace. Netiquette - network.
Epic In Basket.
CBP Program – Business Etiquette
Presentation transcript:

GAELIC SUMMER CAMP ETIQUETTE University of the Witwatersrand Simon Mofokeng

OBJECTIVES For the purpose of this document Mail will refer to Electronic mail, or Mail, provides an easy-to use, efficient means of communicating with other members of workgroups and the External Internet Communities. The purpose of this presentation is to ensure the proper use of system and make users aware of what is deemed as acceptable and unacceptable use of the system. ETIQUETTE

RESPONSIBILITIES OF THE USER Legal Risks: is a business communication tool and users are obliged to use this tool in a responsible, effective and lawful manner. Although by its nature seems to be less formal than other written communication, the same laws apply. The following guidelines for working with Mail are designed to ensure that you and your colleagues get the maximum benefit from the system. The following information is included in the pages that follow: * Responsibilities of the user * Activities to avoid * Hints and tips ETIQUETTE

RESPONSIBILITIES OF THE USER Limited Mail must not be used as a forum of political, religious, or other debates, or as a form of entertainment or broadcasting, or for sending chain letters or advertisements or jokes or non- business related issue. Each message occupies valuable time on the network, and discretion must be used when using Mail. Length When using Mail, keep your message as brief and to the point as possible. Long messages tend to lose their point. Rather send a message requesting a meeting to discuss lengthy issues. ETIQUETTE

RESPONSIBILITIES OF THE USER Title Give every message a title Make sure the subject line of your message provide a brief, clear description of the contents of the message Effectiveness Read Mail message regularly and respond timeously where necessary. The effectiveness of a Mail system in improving productivity and communication is based on responsiveness. Read your message regularly and reply as soon as possible. ETIQUETTE

RESPONSIBILITIES OF THE USER ETIQUETTE

RESPONSIBILITIES OF THE USER Selective Be selective when forwarding or replying to a Mail message. Consider who really need to see the message. Forward it only to those who need information. Protect Your user passwords are the gateway to your PC and systems resources including mail, Protect it all the time. You are responsible for actions taken under your user ID. Once your user ID is logged on, it is impossible to tell whether it is really you or someone else sending the message. Do not use passwords that would be obvious to others, and change it immediately if you think it has been compromised. Activate your Windows screen saver password to kick in automatically when idle after a few minutes. ETIQUETTE

RESPONSIBILITIES OF THE USER Size Keep your mailbox and Mail files as small as possible Delete message from your mailbox after you have read or filed them. File only those messages that really need to be recorded. Housekeeping Carry out regular housekeeping on your files A facility exists Mail to archive messages to free up space on the system. If at a later date you need to refer to them, it is possible to access them. Another option will be to create a personal folder and move the important Mail items to the personal folder. Delete or archive messages from the sent item folder regularly. ETIQUETTE

RESPONSIBILITIES OF THE USER Logging off Exit and log off on your mail system if you will be away for an extended period and when you leave at the end of the day. Certain maintenance might be done overnight on the server, and this is only possible if you have logged out of your computer. Privacy Mail message are considered private correspondence. As such, messages are viewed as the private property of the receiver and will not be made available to Management. Although privacy and security are of the utmost importance, auditors, or investigators are authorized to investigate misuse of the network, such as theft, pornography, harassment, excessive private use, etc. ETIQUETTE

ACTIVITIES TO AVOID Misuse Do not send any obscene, racist, defamatory or otherwise offensive material via Mail The use of vulgar language is expressly forbidden over the network, be it on company business, or in a private capacity. Personal use Note- Sending and receiving excessive non-business related messages is prohibited. ETIQUETTE

ACTIVITIES TO AVOID Confrontation Do not use Mail to avoid confrontation. In certain instances, such as disciplinary or explosive circumstances, the sending of Mail messages is inappropriate. Do not send rude or argumentative messages. These situations can only be dealt within in a face to- face confrontation and Mail should not be used. Large files Do not send large files as attachment. Be selective in the files you send to others via Mail. Within your own work group, it is better to share the file and send a message regarding the file name to the recipients. Attached files dramatically increase the network overhead as well as the size of the Mail file. Priority Do not flag all messages as high priority Do not send Mail as the highest priority unless it really merits that priority. High –priority Mails message should only be used for the most important message and when you need an immediately response. ETIQUETTE

ACTIVITIES TO AVOID Password Do not give your password/s to others You are responsible for any mail message originating from your machine. Giving other employees access to your system could result in fraudulent use of Mail. Confidential Information Avoid sending confidential information by Mail. If you do, you must secure the information by including it in a Microsoft Word file protecting it with a password. Then provide the recipient with the password by means of other communication, for instance by telephone. ETIQUETTE

HINTS AND TIPS Requirements Set the options to suit your requirements Check for messages every minutes. Sound the chime when a new message arrives. Flash the envelope when a new message arrives. Receipt Use the return receipt option If you are not sure whether the addressees are receiving messages, use the return receipt option. This will send a message back to you, informing you that the recipient has got the message. ETIQUETTE

HINTS AND TIPS Backing up Your Mail files should be backed-up periodically; otherwise users carry the responsibility if not provided by business. Tip Include a signature that contains other methods by which others can contact you. This usually includes your full name, job title, and company name and telephone numbers. Do not send messages all in capital as it will appear as if you are shouting. Use bold lettering or underlining for emphasis, e.g., use that is what I meant, rather than that IS what I meant. ETIQUETTE

Questions Thank you once again for adhering to guidelines. ETIQUETTE