EMAIL ETIQUETTE & USER ACCOUNT SECURITY TIPS Robert Torres Chief Technology Officer.

Slides:



Advertisements
Similar presentations
Setting up a Gmail Account & Safety
Advertisements

Mandy Peterson March 7, 2007 Customer Service Training MASFAP Spring Conference.
The basics that we should all remember while communicating digitally.
Business Etiquette Are you being Rude? by Paula N. Strozier.
Internet etiquette, or netiquette guides us in proper behavior on the Internet. There are widely accepted rules of behavior to follow when you're online.
C O A L I T I O N Corner Coalition Corner: Business training tools for HR staff, real estate licensees and other service professionals in the relocation.
Information and Communication Technology
Etiquette Guidelines to Electronic Communication 4/ Etiquette.ppt Presented by Duane Shaw.
Etiquette This is my slideshow about tools and etiquette that help you to communicate with others in a business context. By Jake Alaia.
By Angela Bitter Comm 165 A.K.A. “Internet Etiquette”
 When you receive a new you will be shown a highlighted in yellow box where your can be found  To open your new just double click.
{ Etiquette Handbook. Feature Creating an Font, colour and sizes etc Sending an Sending using Cc Sending using Bcc Creating a signature.
(Netiquette).  We expect other drivers to observe the rules of the road.  The same is true as we travel through cyberspace.  Netiquette - network etiquette.
Business Etiquette. “There are four ways, and only four ways, in which we have contact with the world. We are evaluated and classified by these.
This is the first page of the log in, this is were you enter your unique details.
This PowerPoint presentation will show you how to use your productively and successfully.
“Untangling the Web - Etiquette” “Untangling the Web - Etiquette” Written by: Keith C. Ivey Presented by: Michael Persons.
This is group I have made.  Deleted all the s we didn’t need to clear out our .  Then created folders for the s we would receive.
user guide Having a strong password allows other users to struggle to guess. To make a strong password you should use up to 12 letters and 1 or 2.
Etiquette (Netiquette). What is Netiquette?  We expect other drivers to observe the rules of the road.  The same is true as we travel through.
Evidence. Sending with attachment with zip folder.
ETIQUETTE AND EVIDENCE
Safety: Avoiding Emotional Injury in the Workplace “Doctor” Nikki Massaro Kauffman, I-Tech Clinic Andrew Calvin, HelpDesk First Responder, I-Tech.
Top Ten Tips, Tricks, and Peeves in Communication
Information guide.
Electronic Etiquette Communication Skills for and Blogs.
PROFESSIONAL USE s Have Responsibilities Do Not Just Shoot Me an .
NETIQUETTE GUIDELINES FOR DISTANCE EDUCATION COURSES.
Professional Etiquette. Why Learn Etiquette? From: Sent: Wednesday, December 11, :29 AM To: Subject: _______________________________________________________________.
Dylan Bayliff. Contents: 1- Sending s & Using etiquette 2- Staying safe and Accessing 3- Open s 4- Replying to s 5- Setting up contacts.
Business English Upper Intermediate U1S09 John Silberstein
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
How to use ? By Martyna Haliniak. How to log on? In order to log on, you have to type in your username & password in the text boxes, and then click.
This PowerPoint presentation will show you how to use your productively and successfully.
A guide for new employees-.  When you see an that is highlighted and that looks like it is un-opened, double click on the bar to open the .
What Does Your Netiquette Say About You? WLN-August 26, 2008.
By Sasha Radjuk. - Etiquette and User Guide Give some basic notes on how to log in. To login go on Google and type in outlook web app and the type.
Preparing s Using Etiquette Lesson A4-3.
s This presentation is all about s, etiquette and software. I will go through these things step by step to give you a clear understanding.
Etiquette. Sending s 1. Make sure your includes a courteous greeting and closing. Helps to make your not seem demanding or terse.
Crash Course: Etiquette Made Easy. Preventing Virus Outbreaks Use antivirus software to detect viruses. Use Internet-based .
Preparing s Using Etiquette. Learning Objectives Define . List the parts of an and an header. List rules for etiquette.
 When you receive a new you will be shown a highlighted in yellow box where your can be found  To open your new just double click.
STAYING SAFE: Here are some safety tips when using Change your password regularly and keep it in a safe place. Don’t share your password with anyone.
Chapter 18 Digital Communication: , Instant Messages, Blogs, and Wikis Strategies for Technical Communication in the Workplace Laura J. Gurak John.
is a shortened form of electronic mail allowing you to send messages over the internet, store and retrieve messages which you have received. So.
BASIC ETIQUETTE Use the BCC and CC appropriately. 3.
user guide Having a strong password allows other users to struggle to guess. To make a strong password you should use up to 12 letters and 1 or 2.
Basic Etiquettes. First impressions do happen over . Increases professionalism. Having etiquettes get to the point faster as compared.
Basics. Stands for “electronic mail” Digital message sent over the internet Primarily text but can include pictures, sound and attachments.
tool kit. USER GUIDE Etiquette (Acceptable use policy) – a list of rules that we observe Use a suitable subject in the - this helps.
Professional Communications Mrs. Lopez-Wyatt. Why is etiquette important? We interact more with written word and the number of users and usage rates.
Introduction to Your OUSD and other district technology applications Leah Jensen, Instructional Technologist (510) (office), (510)
ETIQUETTES “ - when it absolutely positively has to get lost at the speed of light.”
© 2003 SOUTH-WESTERN PUBLISHINGCHAPTER 15Slide 1 CHAPTER 15 COMMUNICATION SKILLS 15.1Listening and Speaking 15.2Reading and Writing LESSONS.
Use the subject field to indicate the purpose of the .
Etiquette Rules Every Professional Should Know.
EFFECTIVE COMMUNICATION PRESENTED BY THE SOLUTIONS GROUP.
M STREAM IT running dos C :/ dommand delete D :/ freesize D :/ load D ;/ dagger C :/ toloadtype dag D :/ dag Loading operating win 96 Loading disk.
Learning to effectively communicate electronically.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Communication Presenters : Terri Yau Global Customer Service Date : February 2011.
Writing Effective s. Addressing Limit to who really needs to know. Make it clear in text who has action and who is info addressee. Use ‘To’, ‘CC’
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Writing Professional WRITING RIGHT.
What is Netiquette? We expect other drivers to observe the rules of the road. The same is true as we travel through cyberspace. Netiquette - network.
CBP Program – Business Etiquette
Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.
Etiquette This is a discussion on etiquette, with a focus on forwarding etiquette.
NETIQUETTE Pn. Jamilah Binti Yusof.
Presentation transcript:

ETIQUETTE & USER ACCOUNT SECURITY TIPS Robert Torres Chief Technology Officer

ETIQUETTE 1. Be informal, not sloppy. Your colleagues may use commonly accepted abbreviations in , but when communicating with external customers, everyone should follow standard writing protocol. Your message reflects you and our district, so traditional spelling, grammar, and punctuation rules apply. 2. Keep messages brief and to the point. Just because your writing is grammatically correct does not mean that it has to be long. Nothing is more frustrating than wading through an message that is twice as long as necessary. Concentrate on one subject per message whenever possible. 3. Use sentence case. USING ALL CAPITAL LETTERS LOOKS AS IF YOU'RE SHOUTING. Using all lowercase letters looks lazy. For emphasis, use asterisks or bold formatting to emphasize important words. Do not, however, use a lot of colors or graphics embedded in your message, because not everyone uses an program that can display them. 4. Use the blind copy and courtesy copy appropriately. Don't use BCC to keep others from seeing who you copied; it shows confidence when you directly CC anyone receiving a copy. Do use BCC, however, when sending to a large distribution list, so recipients won't have to see a huge list of names. Be cautious with your use of CC; overuse simply clutters inboxes. Copy only people who are directly involved. 5. Don't use as an excuse to avoid personal contact. Don't forget the value of face-to-face or even voice-to-voice communication. communication isn't appropriate when sending confusing or emotional messages. Think of the times you've heard someone in the office indignantly say, "Well, I sent you ." If you have a problem with someone, speak with that person directly. Don't use to avoid an uncomfortable situation or to cover up a mistake. 6. Remember that isn't private. is considered district property and can be retrieved, examined, and used in a court of law. Unless you are using an encryption device (hardware or software), you should assume that over the Internet is not secure. Never put in an message anything that you wouldn't put on a postcard. Remember that e- mail can be forwarded, so unintended audiences may see what you've written. You might also inadvertently send something to the wrong party, so always keep the content professional to avoid embarrassment.

ETIQUETTE – CONT’D 7. Be sparing with group . Send group only when it's useful to every recipient. Use the "reply all" button only when compiling results requiring collective input and only if you have something to add. Recipients get quite annoyed to open an that says only "Me too!" 8. Use the subject field to indicate content and purpose. Don't just say, "Hi!" or "From Laura. This will aid in searching for a past . It's also a good practice to include the word "Long" in the subject field, if necessary, so that the recipient knows that the message will take time to read. 9. Don't send chain letters, virus warnings, or junk mail. Always check with your IT department before sending out an alarm to report chain letters. If a constant stream of jokes from a co-workers or a friend annoys you, be honest and ask to be removed from the list. Direct personal to your home account. 10. Remember that your tone can't be heard in . Have you ever attempted sarcasm in an , and the recipient took it the wrong way? communication can't convey the nuances of verbal communication. In an attempt to infer tone of voice, some people use emoticons, but use them sparingly so that you don't appear unprofessional. Also, don't assume that using a smiley will diffuse a difficult message. 11. Use a signature that includes contact information. To ensure that people know who you are, include a signature that has your contact information, including your mailing address, Web site, and phone numbers. 12. Summarize long discussions. Scrolling through pages of replies to understand a discussion is annoying. Instead of continuing to forward a message string, take a minute to summarize it for your reader. You could even highlight or quote the relevant passage, then include your response. Some words of caution: If you are forwarding or reposting a message you've received, do not change the wording. If you want to repost to a group a message that you received individually, ask the author for permission first. Give proper attribution.

USER ACCOUNT SECURITY TIPS 1. Always protect your user account and password – Depending on the level of access your user account contains it may provide escalated views and access to sensitive data in core systems like the district’s financial system, student system, assessment, s, Internet filter, personal and shared network data files. 2. Never share your user account with anyone – Anytime your user account logins into any core system most of them capture your account information for auditing and reporting. You don’t want to be put in a situation explaining a budget expenditure, a student’s grade change, or attempting to access inappropriate Internet sites. 3. Change your password immediately if you suspect a compromise - The district’s network user account password policy will force you to change your password periodically; at any time you may change your password on your own. Do not wait to change your password if you sense any suspicious activities and report it immediately to the Information Services Help Desk at ext Use complex passwords that you can remember – When choosing a password keep the following tips in mind: Don't use passwords that are based on personal information that can be easily accessed or guessed. Don't use words that can be found in any dictionary of any language. Use both lowercase and capital letters. Use a combination of letters, numbers, and special characters. Use passphrases when you can. Use different passwords on different systems. 5. Do not leave your user account and password written down in the open –A common place to find a written down user account and password is in your general work area and most likely underneath taped to a monitor or a keyboard or in the top drawer of your desk. If you have to write down your user account and password place the copy in your wallet.