BE A “PRO” COMMUNICATOR
E-mail usage is growing exponentially worldwide. Unless all users start exercising much greater discipline in determining when to send an e-mail, its popularity is going to be self-defeating as the rising number of e-mails is becoming a massive drag on productivity. While spam or junk e-mail is part of the problem, the ease of sending e-mail is generating a high proportion of inappropriate messaging.
Avoid getting swamped by e-mail and letting it totally disrupt your productivity. Develop a daily routine for dealing with incoming e-mails. Get into the habit of only checking and responding to your e-mail at three set times every day — for example, at mid-morning, then again just after your lunch break, and finally just before the end of your workday. Save the start of your day, when you are freshest, for planning your schedule and working on high priority tasks. Unless you want to become an e-mail slave, switch off the alert or ping that announces you have a new e-mail.
Just as is the case with handling incoming mail and other hard copy materials, try to deal with each e-mail decisively at the time you first read it. Answer it, transfer your reply together with the original message to a designated subject file if you are reasonably certain you will need to refer to them again, or delete it. If for some reason you are unable to respond immediately, transfer the e-mail message to a “save file”. At the end of the day, clear your deleted files. In some cases, you may need to retain or print out a hard copy of certain e-mail communications (or just their attachments) for either a working file or your permanent file.
Create folders and sub-folders on your computer, organized and listed by priority, sender or subject, for storing e-mails that you want to retain or return to later. Purge these files at least once a month so they do not become unwieldy. You can also program your e-mail software so incoming e-mails automatically go into these folders.
Keep in mind that e-mail software employs an internal file system that is notoriously unreliable, especially when messages and attachments accumulate. Save e-mail attachments “outside” of your e-mail software in external folders (that are part of your computer’s native file system) with copies safely stored in separate project files. Then, remove the original attachments from the messages. This will preserve your record of important attachments.
Storing attachments and other typical working documents in conventional folders (“outside” of the mail application's database) makes them easier to back up. It is also critical to back up your e-mail database on a regular basis to preserve important messages.
Business e-mail is ideally suited for sending short messages, critical information and follow-up reminders, for confirming something has been done, for asking brief questions, and for organizing meetings. E-mail speeds up the communication and decision-making process, eliminates the wasted time of “phone tag”, and makes distance and time differences irrelevant. E-mail also significantly reduces long-distance telephone and fax charges.
Exercise extreme caution about what you say in your e-mails. Never include anything of a confidential, controversial or sensitive nature in an e-mail as there is always a risk of your e-mail ending up in the wrong hands through error or some computer malfunction. You cannot control who sees your e-mails after you have sent them. If you would be embarrassed to read your e-mail on the front page of a newspaper or posted on your organization’s bulletin board, do not send it. Also do not assume that e-mail messages are private. Practice “safe e-mail”.
In many jurisdictions, both business and personal e-mail messages can be retrieved from your computer and introduced as evidence in court hearings. The technology now exists to recover all electronic conversations, including deleted e-mails and encrypted messages. As John Battelle, a New York Times technology journalist, stated, “Our tracks through the digital sand are eternal.”
Many larger organizations have implemented e-mail archiving and retention policies involving the indexing and storing of messages for a given period before their deletion. Legislation is being adopted in the U.S. and elsewhere requiring companies to treat e-mail in the same manner as paper documents. If your organization does not have its own e-mail archiving policy, establish your own system for the storage of all e-mails relating to contractual, financial, legal and technical matters.
Increasingly, employers are using various types of software to monitor employee computer use of e-mail (both incoming and outgoing), website visits, and the downloading and deletion of files and data. The software is programmed to check e-mail messages and electronic files against a list of keywords, including inappropriate language, profanity, sexual terms, and industry-specific terms that might indicate an ethical or security problem.
The CEO of Boeing was fired for having the bad judgment of using the company’s e-mail system to send explicit messages to a female employee with whom he was having an affair. Whenever you utilize your computer at work or any other company equipment for personal uses, you are exposing yourself to criticism or worse. To be safe, refrain from using your office computer or company e-mail account to send any personal e-mails.
E-mail is a hot and fast medium. It encourages people to “say” things that they would not say in person, including being more aggressive or intimate than they otherwise would be. Never respond to an e-mail when you are angry or in a highly emotional state. If it makes you feel better, type up your reply but do not hit the send button. Always wait until the next day to review and send any message under these circumstances.
Also, do not use e-mail or social media to communicate bad news, such as layoffs and terminations. Most of the time, bad news should be delivered in person. The same applies to serious apologies and major criticism.
Always follow the rule — when in doubt, do not send the e-mail out. Otherwise, you are being inconsiderate of other people’s time. Ask yourself, does the prospective recipient really need to receive this message or a copy of it? Is it truly relevant and necessary? Would you yourself like to receive such an e-mail? Be especially careful about automatically sending messages and copies to everyone on a set distribution list with the Reply to All button. Just send your reply to the person who directly needs to receive it. If you use distribution lists at all, keep them up-to-date.
Try to respond within a maximum of three days to those e-mails requiring an answer, unless you are away from the office. If you are going to be away for any length of time, leave an automatic reply message, stating that fact and when you will be back. A late or even a brief, disappointing response is better than no response.
Resist sending back unnecessary responses to e-mails, such as “thank you” or “I will do it” as opposed to waiting until you can say, “I have done it.” Most one- to three-word e-mails waste people’s time. Categorically, do not add to e-mail clutter by sending out unsolicited jokes, chain letters or “thoughts for the day”. Similarly, do not send any e-mails containing sarcasm, rude statements, offensive material or any type of coarse or sexist language or images.
Do not be lazy. Refrain from using e-mail to deliver messages that are better delivered in person, especially with individuals who are located nearby. Any contentious issue is always best handled in person. E-mails are also not appropriate for personal expressions of condolences. Conversely, do not say anything in an e-mail that you would hesitate to say in person.
Here are some other recommendations to follow:
Keep in mind these points regarding the content of your e-mails:
Some cautions to take to avoid experiencing problems with your e-mails include:
Do not use e-mail to convey any “message” of an emotional, confrontational or controversial nature. Regardless of how unpleasant it may be, such matters should be communicated in person or, at a minimum, on the phone to avoid any misinterpretation. Doing so also provides an opportunity for clarification or modification on the spot, depending on the other person’s reaction.
Also, it is never a good idea to send out any business or personal e-mails when you are highly upset about something, are extremely tired, are heavily medicated or are under the influence of alcohol or other stimulants. The risks of you making a mistake, writing something you later regret or conveying the wrong impression are much too great. If you feel compelled to write an e-mail when you are in one of those states, save it as a draft to review the next day before sending it out. You will usually avoid much embarrassment by following this practice.
One of the most frequent irritants occurs when someone e-mails a message to a large group with a question, such as “Can you all attend a meeting at this time and date?” and the members of the group send their individual responses by hitting the Reply to All button. When you are replying to such an e-mail message, ensure that your reply is only sent to the individual sender and not to everyone else to whom the original message was sent. Sometimes, it may be better to “forward” your message back to this person to be considerate of the other recipients who do not need to be bothered by receiving your response. This is definitely necessary when the Reply to All button automatically pops up after you hit the Reply button.
When you sign off, consider the following:
Viruses are increasingly attacking computers via e-mails. To avoid damage to your computer and computer files, never open attachments or click on URLs contained in e-mails sent by anyone you do not know. Even with a file attached to an e-mail supposedly sent by a relative or friend, confirm that they actually sent it if you were not expecting the e-mail or attachment. Delete chain letters and junk e-mail without forwarding them to anyone else or replying to them. Regularly update your anti-virus software.
The increasing availability of mobile wireless access (Wi-Fi) to the Internet, e-mail and corporate networks in airports, hotels and other locations raises serious security concerns. Unless you follow proper encryption and password procedures, there is a risk that other users in the same area can log on to your laptop or PDA and access your e-mails and other computer information.
Use passwords for your e-mail and other computer accounts that are difficult for hackers to crack. The most secure passwords are those that are a random combination of at least eight numbers, punctuation marks and upper- and lower-case letters. Do not use birth dates or the names of your children and pets. Some recommend that your business-related passwords should probably be changed every 30 days and your ones for personal use every three months but this may not be necessary. Be especially careful, however, in the passwords you use for those Internet sites where you are providing your credit card details or other financial information. Do not write your passwords down and leave them anywhere near the area where you regularly use your computer or PDA.
Finally, some organizations insist that all e-mails sent by their members have a standard statement at the bottom in the event the e-mail ends up in the wrong hands. The wording of these statements is generally:
This message and any attachments are solely for the intended recipient and may contain confidential or privileged information. If you are not the intended recipient, any disclosure, copying, use, or distribution of the information included in this message and any attachments is prohibited. If you have received this communication in error, please notify us by reply e-mail and immediately and permanently delete this message and any attachments. Thank you.
The use of instant messaging (IM) and mobile text messaging via cellphones and computers is becoming increasingly popular as a faster, briefer, real-time alternative to e-mail. While IM speeds up business communications and is much cheaper than long-distance phoning, it is frequently misused.
Keep in mind these points when you utilize instant messaging (or text messaging) at work:
Given the relative newness of instant and text messaging, the proper protocols for using them are still evolving and vary considerably from organization to organization. Many of the above points and cautions regarding the use of e-mail also apply to what you do on Twitter and other forms of social media.