is Consuming A Great Deal Of Our Lives
Etiquette Article 1:
Often we get e-mails from folks who have added our e-mail addresses to their address book. That's generally fine, but when they write and their mailing list is placed in the "TO:" or "CC:" lines, who they write to, and about what, is exposed to the entire mailing. We would request that would not be done.
should be protected.
Another thought on this is... supposed someone has something against you or whatever or whoever on the list. You've just supplied them a means to communicate with all of us very quickly. That is scary. It's best to protect your address list like your friend's cell phone numbers - you wouldn't give them out to telemarketers. The same thoughts apply to organization phone lists or any electronic information that get circulated around via e-mail. It is really best not to do that. Identity thieves only need a couple bits of information to clean out your bank account.
It only takes a second to write to everyone on your list and say (either true or false) "you know so-and-so... they owe me money", or "...their group is questionable", or "...look at these pictures I found of them on the web". You've given that person quick access to all on your e-mail list. It takes a lifetime and tons of energy to try and correct all that.
Your e-mail program will allow you to create address mailing groups, this can help you manage bulk mailings. Consult your manual for help. For those sending from their company e-mail, check first with your user policies, and with your IT professional for the best way to handle bulk mailings.
If you do forward a appropriate e-mail, be sure to delete any e-mail addresses and other useless e-junk that accumulates and is included in any forwarded messages.
For organizational information (members, phone lists, youth info, etc.), such valuable info should be posted on a secure website with password access - ONLY. Be sure you have permission from each person on that list that they approve of their info being available to others. Sometimes well meaning event organizers post everyone's cell phone numbers on files and do a mass mailing. If you do not have complete approval, DO NOT CIRCULATE that info.
We (and we're sure all you e-mail) appreciate your attention to this.
and Ann Myers, Partners
2. Take a Breath and Check it Out Before Hitting the FW Button
Or - Bill Gates is Not Giving Away His Fortune to Those That FW That E-mail
How many of those panic FW e-mails have we gotten, only to find out later that the girl in the story was not abducted, that the plane in the photo was not hitting the World Trade Center, that by sending this e-mail to everyone on your mailing list you'll be getting Bill Gate's money. All false, hoaxes, urban legends, etc.
Before you hit the FW button and blitz your entire address book or business contacts (see previous article), take a breath. Go to google and type in some key words relating to the story with the word "hoax". Chances are (my guess - 98% of the time), it is a proven urban legend. There are plenty of websites that will be in the search results that handle these internet lies, so take the time to read key things listed in these stories.
Just add up all the wasted employee hours, company resources, panic prayers and energy chasing these false stories, an it's really worth a few moments to "prove all things" before sending?
We (and we're sure all you e-mail) appreciate your attention to this.
and Ann Myers, Partners
3. Office E-mail - Your Personal E-mail? Or Building Your Business on Your Boss' Dollars
Or - Am I Paying You To Do That?
Literally - at our fingertips sits a very powerful communication tool - the office e-mail and internet access. Your employer has paid a great deal in IT resources and monthly fees to provide high-speed connection in order for you to do your work. That is the purpose of the tool, the same as the office copier, the expense account, office supplies, phone, etc. They are paid for by the company to do their business.
Unfortunately, many feel that the internet is free and put there for their personal and private business benefit. I can't list the number of e-mails I get from entrepreneurs or well-meaning folks with those communications thru their company's e-mail. They use it for their silly stuff (see Article 2), but also their important personal business communication. The amount of time and resources "stolen" from companies, government offices or non-profits is huge with personal e-mail and internet use.
the Employee Handbook
It needs to be noted that all e-mails and internet visits are known by IT Departments and there is cause for dismissal or even legal action if the company determines abuse is taken place.
Also, you run the risk of having any vital information you were transmitting being lost. Don't assume your office computer will always be there with your files on them. Many times unannounced computer services result in the box on your desk going away. We all know of stories of broken water pipes or natural disasters that can harm equipment. Having your personal health correspondence, or start-up business proposal on a company hard drive that just died and went away over the weekend with the with the IT geek is very dangerous.
way to handle things properly is to:
suggestions for personal e-mail:
and Ann Myers, Partners
4. Setting Yourself Apart in a World of Spam - Using Subject Lines and Setting Up Personalities
How much spam do you get each day? What do you look for to determine spam from valid e-mails? It might be the senders' name or e-mail address, or the subject line. With that in mind, if you want to have your e-mail survive the delete key and actually be read, try using a clear subject line.
So many vital e-mails I get from business have either no subject line, or a very vague/common word - such as: "Hi", "Website", "It's Me", "Important", "Change", etc. Or for those precious AOL users that do not put in a subject line we get: "(No Subject)". Those one-word subjects often look like the hundreds of spam mail by the same subject.
are many reasons to take a second and type in a clear subject. For me, it has
to do with sorting, filing, and following a thread or discussion about a project.
I prefer that my clients put their company ID first, then a pretty clear description
of what the e-mail is about. For example:
take a look at how your "From" is viewed. If you have a unique e-mail address,
it might get deleted by the user. If you send your e-mails as email@example.com
or firstname.lastname@example.org - it stands a good chance of getting deleted.
Look around your e-mail program and there should be a place to put in an actual
name or personality. Then the e-mail might look like this:
The reader might recognize his friend Tim Smith's name and actually open and read the message. Don't make the mistake of just using another nickname in that setup. Leslie "email@example.com" will look like the zillion pieces of junk mail that come in each week.
is not a bad idea to include your company name in that setup as well:
Of course the gold standard for business or personal e-mail is to register your own domain name and have YourName@YourCompany.com identify the e-mail. This promotes your website and business, rather than yahoo, aol, google or whoever. A vital minor expense for businesses, but maybe not worth the cost for personal e-mail. Contact FiveStones.com to help you with domain setup and website development.
5. OH NO - Not Another Word.doc Attachment!
Another of my personal e-mail nightmares - MSWord.doc attachments. I know I'm in the minority of computer users that live all day in MSWord (many of us don't), but there are some good reasons NOT to send those blasted .doc files all over the internet. Here are a couple:
Then they often send revisions, or other files with the same filename.doc. The amount of valuable time wasted managing and comparing those files adds up.
Again, I know I'm in the minority, but not all of us have MSWord open all day. Many of us graphic-type folks have several large programs continually running and Word just gets in the way. With e-mail being checked on phones and other gadgts, MSWord may not be available.
about a PDF?
MSWord.docs are intended to be edited, so as your flyer or whatever gets passed around, the information can be easily changed. Are you comfortable with that? PDFs can be edited, but most users do not have the programs to do it, so your info is safer.
didn't mean for you to read that!
it on a website
If personal information is in the document, a web page or PDF file can be password protected. Be sure to have documented permission from each person to post and distribute that information.
According to microsoft.com, there are also potential security problems with sending .doc attachment files. With viruses, worms and all sorts of potential computer harm out there, it is best to limit attachments whenever possible. For safely, many of your readers may not be opening your attached file.
Please consider everyone's time and security when distributing electronic information.
If you wish to send us your digital pictures or other files for your job please follow these instructions. Failure to do so may mean that your pictures do not make it to our office and therefor delay production.
1. Contact FiveStones to discuss what files you wish to send. Please e-mail us and let us know what type of files and how many to expect. Do not send the files at that time. After we discuss your job THEN, PLEASE FOLLOW THE NEXT STEPS.
2. Do Not Create File Management Work for the Recipient. Just think how many "resume.doc" or "resume.pdf" files are being sent. YOU ARE NOT THE ONLY ONE. Name your file:
If you are sending other file types like CADD, XL, PPT, etc., please be sure to read the above article on sending .doc files (article #5). In most cased, we would prefer NOT to receive them.
3. Determine the file sizes. Generally, we want to work with the highest resolution of image files, but there are times that smaller files sized are preferred. After we discuss how they are going to be used, we may determine that smaller files are better to send. If your photos are large from a scan or your digital camera and we determine you can reduce them, you can use PhotoShop or photo editing software to reduce the image size. If that is the case, A good size would be approx. 5"-8" wide or tall (approx. 600 pixels) at 72ppi resolution. The size will probably below 400k each for each image. Save them as JPGs with NO COMPRESSION. This will maintain the image quality and they will transmit quickly over the internet.
4. Rename your photo files. Your digital camera or scans will give some file names such as "MVC-005S.JPG", or "175-7599_IMG.JPG". These file names make no sense to us with the volume of jobs we are servicing. Rename your files something like:
- yourjobname01.jpg5. Send the e-mail attachments in a clear way. Only after we OK you sending us your attachments, put a clear job name in your subject line. Do not send multiple attachments totaling more than 3MB. If you have many pictures, send them in several separate e-mails, each with properly named subject. For example:
Subject: ABC Web Pics 1of5
6. Provide job information. Let us know in the e-mail what we are expecting and provide details of the attached files. It doesn't hurt to list the file names and describe how they are to be used. Include your phone numbers and e-mail address.
Following these steps will help us manage your job and assist us with file organization and reduce production time.
Thank you - FiveStones
Who is FiveStones?
Design Factory specializes in creating custom websites and graphic design.
FiveStones consults on internet website manufacturing and hosting as well as all
aspects of advertising, print, marketing and promotional material design. FiveStones
builds premier websites and graphics according to clients' needs and specifications.
Custom logos, brochures, illustrations, or whatever your company may need for
Communications provides professional communications services including certified
sign language interpreting, instruction and consulting.