Thursday, January 16, 2014

Three Types of Email


Writing effective and proper emails, utilizing good Netiquette, necessitate an understanding of what type of email one is writing. The following represent several of these. The remainder will be sent in the next blog.
          
 Every email can be categorized into arguably, at least ten unique types.  All of these share common Netiquette principles.  Additionally, there are unique attributes and particulars which are specific to each category.  As such, insuring proper adherence and optimizing best practices within each mail type insures the best possible results.  There are obvious differences, attributes and nuances for each and these will be discussed in this section.

1)            Personal – Clearly this type of email allows for the greatest flexibility, particularly with immediate family.  Moreover, this type of email tolerates the greatest range of Netiquette interpretation.  Despite allowing for exceptions these should not go so far as to affect and carry over into authoring other more formal and structured compositions.  Remember the rule of “composing emails consistently.”  The composer of personal emails should, at a minimum, keep within the basic rules of Netiquette. In a personal email, the salutation, body, closing and signature can accommodate the most flexibility.

2)           Introductory – This category of email can be a personal, business or solicitation form.  By its very name, the usual common thread is that it is a first time message and might very well be one that is not expected by the recipient.  Therefore, special attention must be given to the subject line and first paragraph in order to a) be opened; b) be read; and c) be effective.

In terms of the subject line, an attention producing or recognizable description is very important, particularly if the sendee has no reason to open the communication from seeing the user’s name, organization or cc receipts.  For example, if the message is referral precipitated, the person should be mentioned in the subject line such as:

        “John Brown suggested I contact you”

        “Our mutual friend John Brown”

If there is not a common thread, a short and pertinent subject title is very important.

        The first paragraph of an introductory message should get straight to the issue.  If there is a referral, the party should be mentioned right away:

        “My name is Sam Smith. We have not previously met and the reason for this email is Jane Brown suggested I contact you."  Any amenities can be done later.  Keep the overall email short and purposeful.  State a next step or action and specifically give the recipient a convenient way to reply.

        3)     Emotive - These types of email express some sort of emotion ranging from congratulatory to ones of sympathy.  These can be personal, business or informative.  They might be addressed to a single individual or to an entire company.  Similar to the introductory email, these should be brief and provide for an explanation or purpose of the email in the first sentence or paragraph.  Any niceties or supplemental information can be added after this.  Keeping the message on key is usually the most appropriate and most adherent to Netiquette.  Requests for replies are usually not appropriate.

 ++++++++++++++++++++++++++++++++++++++++++++++++

You can view my new book page at www.amazon.com/author/paulbabicki

Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com

 
Please visit our websites 

www.netiquetteiq.com
www.tabularosa.net



 My original response was to sue her for defamation of character but then I realized I had no character."

Charles Barkley

 Defamation

        Defamation is easier to do with email than through other mediums. If you quote someone from an email but only with select certain portions that change the meaning of what is said or distort the content, it can be a strong case for defamation. If you do not put the quote into context, and it besmirches their reputation, that can also be considered defamation. If someone does it to you, there are many potential avenues of attack and several ways it is actionable in court. Still, if you are worried about email privacy, put a disclaimer in your footer indicating that the email is considered private and is not for publication. It really is not necessary for the most part but is never a bad idea.

If an email is forwarded and part of it is changed or left out with a negative result or changed meaning, it is defamation.

Example:
The governor and his party proposed a very popular bill for cutting taxes, one of his campaign promises. When the document was sent to the legislature, the opposing party added a significant amount of partisan riders that would cut popular programs. Upon reading the measure, the governor commented. “The legislature has passed the bill. In its current form, I have decided to veto it and send it back, even though it was a campaign promise. When the bill is restored to its original form, I will gladly sign it.” 

If the last sentence is removed, it will change the entire context of the quote.

The governor and his party proposed a very popular bill for cutting taxes, one of his campaign promises. When the document was sent to the legislature, the opposing party added a significant amount of partisan riders that would cut popular programs. Upon reading the measure, the governor commented. “The legislature has passed the bill. In its current form, I have decided to veto it and send it back, even though it was a campaign promise". 

 ++++++++++++++++++++++++++++++++++++++++++++++++

You can view my new book page at www.amazon.com/author/paulbabicki

Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com

 
Please visit our websites 

www.netiquetteiq.com
www.tabularosa.net

US-Cert Announcement of Cisco ACS Vulernabilities via Netiquette IQ




National Cyber Awareness System:
01/15/2014 03:52 PM EST

Original release date: January 15, 2014
Cisco has released a security advisory to address multiple vulnerabilities in Cisco Secure Access Control System (ACS). These vulnerabilities affect the following:
  • Cisco Secure ACS RMI Privilege Escalation Vulnerability
  • Cisco Secure ACS RMI Unauthenticated User Access Vulnerability
  • Cisco Secure ACS RMI Operating System Command Injection Vulnerability
Successful exploitation could allow a remote, unauthenticated attacker to perform administrative actions on the system.
US-CERT encourages users and administrators to review the following Cisco Security Advisory and apply any necessary updates to help mitigate the risk.






This product is provided subject to this Notification and this Privacy & Use policy.

+++++++++++++++++++++++++++++++

About Netiquette IQ:
My book, "Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email" and the Kindle version are now available on Amazon. Please visit my profile at:



My other sites of Netiquette resources include:


www.netiquetteiq.com - website

www.blogtalkradio.com/netiquetteiq - radio show

www.tabularosa.net Internet products and services website.


 Paul Babicki and Frank Kovacs are co-authoring a new book on Netiquette IQ for job seekers, recruiters and employers (no official title as yet!). This book is a follow up to Paul’s current release. This book will be a part of the forthcoming Netiquette IQ compendium featuring a series of books on specific areas of Netiquette; education, sales, social media, etc. We would desire and encourage feedback from anyone who would like to contribute their thought ideas, even a segment to include in the book.

We wish to have the book to cover as many pertinent topics as possible for the job seeker, recruiter and employer. There will be an acknowledgement page in the book listing those whose ideas or suggestions are used. The persons with the five top ideas will be sent a complimentary signed copy of my current book and a copy of the new one. Comments will be closed on 1/31/2014. Kindly submit your suggestion(s) to my blog post of 12/26/2013 in the comment field.

 Happy emailing and good Netiquette!
 #Netiquette



Quantum Physics Could Make Secure, Single-Use Computer Memories Possible

Quantum Physics Could Make Secure, Single-Use Computer Memories Possible