Chpter8: Using e-mail responsibly. Step 1: Keep personal e-mail to a minimum  Keep personal messages sent from your work account short and few in number,

Slides:



Advertisements
Similar presentations
Geneva Public Library February 15th, What is ? How many of you have had accounts before?
Advertisements

ORGANIZING Using Windows Live Mail Barbara Alwin.
Computer Technology Sue Hubbard Sending an with attachments.
Managing Incoming Chapter 3 Bit Literacy. Terminology client – program which retrieves s from a mail server, lets you read the mails,
Introduction to Your Name Goes Here
Basic Communication on the Internet: Integrated Browser Programs and Web-Based Services Tutorial 3.
Etiquette This is my slideshow about tools and etiquette that help you to communicate with others in a business context. By Jake Alaia.
Evidence. Sending with attachment As you can see I have attached a file which I would then continue to send to the recipient.
A quick course on the new. GCA Webmail can be accessed by clicking on the Webmail link in the GCA page, or by going to either or .gcasda.org.
August 15 click! 1 Basics Kitsap Regional Library.
- Part 2 Your teachers are :. Review 1.Did you do your homework? Was it difficult, easy, or just right? 2.Turn to your partner and tell them your.
Goodbye Snail Mail, Hello
By Laura Trawin.
OCR Functional Skills Keywords Use the right keywords To do this you need to know what it is you are searching for! – For example, you might want to search.
BELLRINGER What is the purpose of ? Who uses it?
evidence. Safety To stay safe on the internet there are many points you need to follow. The first point is to change your password regularly, you.
This is the first page of the log in, this is were you enter your unique details.
This PowerPoint presentation will show you how to use your productively and successfully.
This is group I have made.  Deleted all the s we didn’t need to clear out our .  Then created folders for the s we would receive.
AND SPAM BY OLUWATOBI BAKARE
ICT Essential Skills. (electronic mail) Snail Mail.
user guide Having a strong password allows other users to struggle to guess. To make a strong password you should use up to 12 letters and 1 or 2.
Hello Employee, Welcome to MStreamIT!
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
ETIQUETTE AND EVIDENCE
How to use safely and efficiently
Information guide.
There are hundreds of Internet sites that offer free accounts. Some of the most popular are: Yahoo! Hotmail Excite Juno We’ll use Yahoo! for.
Staying Safe Online Keep your Information Secure.
 Facebook  Twitter  MySpace  Windows LiveSpace.
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
Santa’s s By Chloe Warman.
Dylan Bayliff. Contents: 1- Sending s & Using etiquette 2- Staying safe and Accessing 3- Open s 4- Replying to s 5- Setting up contacts.
How to use ? By Martyna Haliniak. How to log on? In order to log on, you have to type in your username & password in the text boxes, and then click.
This PowerPoint presentation will show you how to use your productively and successfully.
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
Managing Incoming Chapter 3 Bit Literacy. Terminology client – program which retrieves s from a mail server, lets you read the mails,
Basic Features and Options Accessing  Means of communicating electronically via the Internet.  Used by individuals, businesses,
Preparing s Using Etiquette Lesson A4-3.
Company Guidelines and Basic Rules for …. No text words or slang, all s sent have to be polite and formal Use suitable, relevant subject lines.
Preparing s Using Etiquette. Learning Objectives Define . List the parts of an and an header. List rules for etiquette.
 When you receive a new you will be shown a highlighted in yellow box where your can be found  To open your new just double click.
STAYING SAFE: Here are some safety tips when using Change your password regularly and keep it in a safe place. Don’t share your password with anyone.
Setting up Web-based or Local Computer Program.
Santa’s s By Jack Carr. Sending an attachment to Santa Explain how you attached the . New message, insert, attachment Explain why you.
SAFE SOCIAL NETWORKING. SOCIAL NETWORKING SITES ARE A GOOD WAY OF KEEPING IN CONTACT SHARING PHOTOS AND THOUGHTS WITH THE WORLD AT LARGE.
tool kit. USER GUIDE Etiquette (Acceptable use policy) – a list of rules that we observe Use a suitable subject in the - this helps.
‘ NETIQUETTE MANNERS IN CYBERSPACE. Your Student Account: Is designed for to ensure your online safety Is created for instruction and learning Is.
Do Now: Describe the steps used to access the comments tool in MS Word. ( review your notes for the answer) Ex: Step 1. Select the text or item you want.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Objective 4.01: Compose effective correspondence.
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
Definitions. Inbox – Incoming s are stored in the Inbox Sent Box – Set your system to save your sent messages.
is short for electronic mail!. What is ? An electronic message sent from one computer to another. saves money and time compared to regular.
BASICS. Objectives Choose an provider Fill out an online form Learn about usernames and addresses Learn about Capcha Explore the organization.
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Using Using Computers Safely, Effectively and Responsibly.
is short for electronic mail!
Introduction to Your Name Goes Here
Fix Yahoo Mail Box Error 550 Call for Help
Technology ICT Option: .
Year 10.
Sending an with attachments
How to create an address…
Fun gym Cambridge Nationals R001.
Introduction to Your Name Goes Here
Objective 4.01: Compose effective correspondence
Health Insurance Portability and Accountability Act
Technology ICT Option: .
Objective: Compose effective e- mail correspondence
Presentation transcript:

Chpter8: Using responsibly

Step 1: Keep personal to a minimum  Keep personal messages sent from your work account short and few in number, and don ’ t send unacceptable content ─ you could face disciplinary action. The best thing to do is to get your friends and family to contact you via an Internet-based provider such as Hotmail, Yahoo, or AOL. That way your business and personal e- mail are kept completely separate

Step 2: Recognize what is acceptable in business  Don ’ t use to say something that you wouldn ’ t include in a letter. Also, if you think someone has sent you a message that contains inappropriate content of any kind, imagine what you ’ d do if your boss turned up just as you opened it. What would the consequences be? It ’ s best to delete s of this kind without even opening them, and then empty your ‘ deleted items ’ folder or ‘ wastebin ’.

Step 3: Understand the issue of e- mail privacy  Closely linked to the question of acceptable use is the issue of privacy. If companies issue guidelines on use, they may also operate monitoring systems to check that is being used correctly. The legal position is not entirely clear-cut here.

Step 4: watch out for viruses  Don ’ t open attachments from an unknown source. Viruses are carried in attachments, not messages, so opening the message itself should not cause any provlems.

Step 5: Comply with company confidentiality agreements  Sending confidential information to an incorrect address  Expressing opinions in the that might lead the recipient to take legal action against your company  Inadvertently including a virus that infects the recipient ’ s system

Step 6: Store business s for the required period  Set up a filling system to make sure that you can find business s quickly and easily. Check with your company ’ s IT helpdesk, who should be able to let you know how long you need to keep copies. To save space on your server, the helpdesk will be able to help you set up archives that can be accessed as necessary.

Common mistakes  You take advantage of the facilities at work  You don ’ t understand what ‘ acceptable ’ content is  You think that no one will notice what you write  You don ’ t know what to do about e- mail viruses

Steps to success  Use your company system for business. Keep personal use to a minimum.  Make sure you understand what constitutes acceptable content.  Recognize that your company may monitor s and keep private and confidential material to a minimum.

Steps to success  Be careful about incoming ; it could introduce potentially damaging viruses.  Check your outgoing s to make sure that you do not inadvertently release confidential material to the wrong recipient.  Find out how long you have to retain business s and store them safely.