{"id":9653,"date":"2008-07-26T20:51:23","date_gmt":"2008-07-27T01:51:23","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/ethicalesq\/2008\/07\/26\/email-etiquette-use-bcc-for-groups-please\/"},"modified":"2013-01-29T10:33:02","modified_gmt":"2013-01-29T15:33:02","slug":"email-etiquette-use-bcc-for-groups-please","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/ethicalesq\/2008\/07\/26\/email-etiquette-use-bcc-for-groups-please\/","title":{"rendered":"email etiquette: use Bcc for groups, please"},"content":{"rendered":"<blockquote>\n<blockquote><p><span style=\"font-size: x-small\"><span style=\"font-size: x-small\"><span style=\"font-family: Arial;font-size: x-small\"><img decoding=\"async\" src=\"http:\/\/cyber.law.harvard.edu\/blogs\/static\/ethicalesq\/Mailneg001.jpg\" alt=\"black envelope\" \/><\/span><\/span><\/span><em><strong> T<\/strong><\/em>wice this past week, an otherwise-thoughtful person sent an email to me and <em>dozens of other people, putting all of our names in the &#8220;To&#8221; field<\/em>. Like many of you reading this now, neither Sender stopped to think that they were <em>invading the privacy<\/em> of recipients who did not want to share their email addresses with one or more of the other addressees &#8212; and who rightly want to make that choice for themselves. Even worse, because the Senders requested or expected the messages to be forwarded to many others, they set the stage for much broader privacy invasion and unwanted spamming. (In addition, they created a great risk of swamped In-Boxes by asking recipients to &#8220;Reply to All&#8221; and not just to the sender).<\/p><\/blockquote>\n<blockquote><p>After trying to diplomatically explain this problem to many correspondents over the past decade using return email, I&#8217;ve finally remembered that I have this little soapbox for exposing and explaining (kvetching and correcting).<\/p><\/blockquote>\n<p><strong><em>Summary<\/em><\/strong>: (explanations and instructions below):<\/p>\n<ul>\n<li><em>Sending Original Email<\/em>: Do <em>not <\/em>send an email message to a group of persons by putting their names in the &#8220;To&#8221; field <em>unless<\/em> you are <em>certain<\/em> that each recipient has already shared his or her email address with every other recipient <em>and<\/em> will not forward their addresses to others. Instead, <em>use the Bcc field<\/em> [from &#8220;background\/blind carbon copy&#8221;]. Each recipient will receive a personally-addressed Bcc copy, with the email address shielded from the other recipients.<\/li>\n<li><em>Forwarding<\/em>: If you are going to forward an email that has the addresses of prior recipients in it (the address is there, even if you only see the name on the To or Cc line), <em>first remove all prior email addresses<\/em>. [Yes, you can delete anything that you see in your email window, the same way you delete any text in a document.]<\/li>\n<\/ul>\n<p>&#8211; share this email with this short URL: http:\/\/tinyurl.com\/BccGroups<\/p>\n<p>.<\/p><\/blockquote>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blogs.law.harvard.edu\/ethicalesq\/files\/2008\/07\/email-manners.gifhttp:\/\/blogs.law.harvard.edu\/ethicalesq\/files\/2008\/07\/email-manners.gif\" alt=\"\" width=\"142\" height=\"56\" \/> <strong><em>L<\/em><\/strong>ucky for all of us, <a href=\"http:\/\/www.netmanners.com\/email-etiquette-expert.html\">Judith Kallos<\/a> has thought about this netiquette problem, and <span style=\"text-decoration: line-through\">hundreds<\/span> thousands of others, and shares her knowledge with clear and lively prose, at <em><a href=\"http:\/\/www.netmanners.com\/\">NetManners.com<\/a><\/em>, plus two weblogs [<a href=\"http:\/\/blog.netmanners.com\/\"><em>E-mail Etiquette Matters<\/em><\/a> and the <em><a href=\"http:\/\/www.businessemailetiquette.com\/\">Business Etiquette Blog<\/a><\/em>], as well as in <a href=\"http:\/\/www.netmanners.com\/email-etiquette-books.html\">several books<\/a>. Her goal: <em>&#8220;Using Technology to Communicate with Knowledge, Understanding and Courtesy!&#8221;<\/em><\/p>\n<p>Therefore, rather than my turgidly judgmental preaching, here are some of Judith Kallos&#8217;s lessons for those who answer &#8220;yes&#8221; to the question: <em>Do you send or forward emails with everyone&#8217;s email address in the To: field?<\/em><\/p>\n<p align=\"center\">&#8220;<a href=\"http:\/\/www.netmanners.com\/\">Email Etiquette Info Courtesy of NetManners.com<\/a>&#8221; <a href=\"\/\/www.emailetiquettepledge.com\/wp-content\/themes\/orange\/images\/clock.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blogs.law.harvard.edu\/ethicalesq\/files\/2008\/07\/clock.jpg\" alt=\"\" width=\"61\" height=\"59\" \/><\/a><\/p>\n<p>Her Essay &#8220;<a href=\"http:\/\/www.netmanners.com\/courtesy1.html\">Courtesy #1<\/a>&#8221; offers the minimal online basics you need to know &#8220;in order to be taken seriously in your online communications,&#8221; and advises:<\/p>\n<p><!--more--><\/p>\n<blockquote><p><em><strong>On those rare occasions where it is necessary to send a group of people<\/strong> the very same email, as a courtesy to those you are sending to, please list all of the recipients email addresses in the BCC field. <\/em>(<strong>B<\/strong>lind <strong>C<\/strong>arbon <strong>C<\/strong>opy &#8211; from the old days when typewriters used carbon paper to create identical copies of a document when it was being typed.)<\/p>\n<p>When an email address is designated in the Blind Carbon Copy field, the recipient will get a copy of the email while their email address remains invisible and protected from the view of the other recipients of the email &#8211; some of whom they may or may not know. <a href=\"http:\/\/www.netmanners.com\/dont-brushoff-privacy.html\">Never expose your contact&#8217;s addresses to strangers!<\/a> If you are not sure how to BCC in your email program, here are site resources that may help you learn the features of your software programs:<\/p>\n<p align=\"center\"><a href=\"http:\/\/www.eudora.com\/techsupport\/\" target=\"_blank\">EUDORA<\/a> <a href=\"http:\/\/home.netscape.com\/products\/index.html?cp=brinavbrincs\" target=\"_blank\">NETSCAPE<\/a> <a href=\"http:\/\/support.microsoft.com\/directory\/faqs.asp?sd=gn&amp;fr=0\" target=\"_blank\">OUTLOOK EXPRESS<\/a> <a href=\"http:\/\/www.apple.com\/macosx\/features\/safari\/\" target=\"_blank\">SAFARI FOR MACS<\/a><\/p>\n<p>Long lists of email addresses at the beginning of any email is an immediate sign that the sender is either a novice\/Newbie &#8211; or doesn&#8217;t care to respect other&#8217;s privacy. None of which, as I am sure you&#8217;ll agree, are complimentary perceptions!<\/p>\n<p>Email addresses are like [private] phone numbers. Only the owner of the email address or phone number is the one to authorize who they want to have it and make it public to. Many folks prefer to decide for themselves who has their email address.<\/p>\n<p>By sending mass mails to a list of folks, you have made that decision for them &#8211; and that is a breach of assumed privacy when communicating with you. Let those you correspond with determine for themselves who they will make their email address known to &#8211; do not make that decision for them! By listing handfuls of email addresses in the email headers for all to see is inconsiderate of each recipient&#8217;s right to privacy.<\/p>\n<blockquote><p><em>[Note from Prof. Yabut<\/em>: If you think it&#8217;s important for recipients to know who else is receiving a particular message, type out the names of those recipients and include them in the text of the message, not in the To field.<em>]<\/em><\/p><\/blockquote>\n<\/blockquote>\n<p><a href=\"http:\/\/www.netmanners.com\/\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blogs.law.harvard.edu\/ethicalesq\/files\/2008\/07\/email-manners_2.jpg\" alt=\"\" width=\"144\" height=\"57\" \/><\/a> In her piece &#8220;<a href=\"http:\/\/www.netmanners.com\/5-rules-for-forwarding-email.html\">5 Rules of Forwarding Emails<\/a>,&#8221; Ms. Kallos tells us how to be truly thoughtful when clicking Forward. (Please read and practice all five). Relevant to our current issues, Judith says:<\/p>\n<blockquote>\n<blockquote><p>1. Don&#8217;t forward anything without editing out all the forwarding &gt;&gt;&gt;&gt;, other email addresses, headers and commentary from all the other forwarders. . . .<\/p><\/blockquote>\n<\/blockquote>\n<blockquote>\n<blockquote><p>5. If you must forward to more than one person, put your email address in the TO: field and all the others you are sending to in the BCC field to protect their email address from being published to those they do not know.<\/p>\n<p>This is a serious privacy issue! Do not perpetuate a breech of privacy started by other forwarders who included their contact&#8217;s addresses in the To: or Cc: field by continuing to forward those visible addresses to your contacts! Remove any email addresses in the body of the email that have been forwarded by those who brush off the privacy of their friends and associates.<\/p><\/blockquote>\n<\/blockquote>\n<p><span style=\"font-family: Arial\">If you&#8217;re not convinced that Email Privacy Etiquette is important, please read Judith&#8217;s manifesto, &#8220;<a href=\"http:\/\/www.netmanners.com\/dont-brushoff-privacy.html\">Don&#8217;t Brush Off Email Privacy!<\/a>&#8221; She says, in part: <\/span><\/p>\n<blockquote><p>Through my email etiquette site, www.NetManners.com, I get inquires on a daily basis from folks who have been on the receiving end of such email and there are two issues they ask me about:<\/p>\n<ol>\n<li>How do I let this person know I don&#8217;t appreciate them publicizing my email address to people I don&#8217;t know? What were they thinking!?<\/li>\n<li>Is it O.K. to email all the other people whose address is in the To: field along with mine about my business or service?<\/li>\n<\/ol>\n<p>So as you can see, your contacts not only do not appreciate their email addresses being made public without their permission but there are those that assume they can then spam those addresses because they are visible! By not respecting your contact&#8217;s privacy you are in fact opening them up to additional unwanted email.<\/p><\/blockquote>\n<p>Because Judith knows part of this problem is that the Bcc option is not easy to find in some programs, she includes <a href=\"http:\/\/www.netmanners.com\/dont-brushoff-privacy.html\">step-by-step instructions<\/a> for using Bcc with the most popular email programs.<\/p>\n<blockquote><p>[<em>Note<\/em>: If like the <em>f\/k\/a<\/em> Gang you use Firefox&#8217;s Thunderbird, just Click the To: button and then click Bcc from the menu.]<\/p><\/blockquote>\n<p><em><strong>M<\/strong><\/em>any thanks to Judith for helping us to communicate online effectively and courteously. I hope we&#8217;ve convinced you to use Bcc and to delete prior email addresses to help preserve the privacy of our correspondents. If you need more incentive, remember that you&#8217;ll be helping to foil spammers (and stalkers), who just love getting such &#8220;live&#8221; email addresses. As Judith says,<\/p>\n<blockquote>\n<blockquote><p><em>&#8220;Show you &#8216;get it&#8217; and respect your contact&#8217;s privacy! Wherever Bcc: may hide, find it and use it!&#8221;<\/em><\/p><\/blockquote>\n<\/blockquote>\n<p align=\"center\">&#8211; Make the NetManners &#8220;<a href=\"http:\/\/www.emailetiquetterevolution.com\/?page_id=5\">Email Etiquette Pledge<\/a>&#8221; <a href=\"\/\/www.emailetiquettepledge.com\/wp-content\/themes\/orange\/images\/clock.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blogs.law.harvard.edu\/ethicalesq\/files\/2008\/07\/clock_2.jpg\" alt=\"\" width=\"107\" height=\"107\" \/><\/a><\/p>\n<blockquote><p><em><strong>p.s.<\/strong><\/em> You can find similar advice <a href=\"http:\/\/www.emailaddresses.com\/guide_etiquette.htm\">here<\/a> and <a href=\"http:\/\/www.emailreplies.com\/#mailings\">there<\/a>. Although there can be shady reasons for using Bcc, commentators (like <a href=\"http:\/\/www.michaelhyatt.com\/fromwhereisit\/2007\/07\/e-mail-etiquett.html\">this one<\/a> and <a href=\"http:\/\/iwillfollow.com\/email.htm\">that one<\/a>) who issue a blanket condemnation of Bcc use as unethical have simply not thought through this issue.<\/p><\/blockquote>\n<p style=\"padding-left: 30px\"><em><strong>afterwords<\/strong><\/em> (October 18, 2008): Although it&#8217;s been around since 2001, I just ran across an excellent article today, &#8220;<a href=\"http:\/\/www.macwrite.com\/critical-mass\/bcc-mac-os-x\">Bcc in Mac OS X<\/a>&#8220;, by Damian Gallop.\u00a0 Damian explains the problem of using To or CC for bulk e-mail:<\/p>\n<p style=\"padding-left: 60px\"><em>It&#8217;s a semi-serious issue for two reasons. First, there truly are consequences. Once you make it onto the Big List that gets resold on the internet for $99 continually, you&#8217;ll rue the day you decided to treat your email address casually. The second reason is that ultimately the whole thing is out of your direct control. When you share your email address, you trust people to use it with respect.<\/em><\/p>\n<p><em><strong>p.p.s<\/strong><\/em>. As long as I&#8217;m covering email pet peeves tonight, let me mention two more:<\/p>\n<ol>\n<li><strong>Please don&#8217;t overuse &#8220;Reply to All.&#8221;<\/strong> Send replies only to persons who really need to see your response. Concur: <a href=\"http:\/\/www.emailreplies.com\/#mailings\">EmailReplies.com<\/a>; and <a href=\"http:\/\/www.michaelhyatt.com\/fromwhereisit\/2007\/07\/e-mail-etiquett.html\">Michael Hyatt<\/a>.<\/li>\n<li><strong>Don&#8217;t use Blank, Generic or Unenlightening Subject Lines<\/strong>: As <a href=\"http:\/\/www.writerswrite.com\/journal\/dec99\/pirillo1.htm\">Chris Parillo<\/a> put it: &#8220;Use a relatively descriptive subject line. I find it really annoying when someone sends me a message with just the word &#8216;Hi&#8217; in it. That tells me absolutely nothing about the message&#8217;s content. I&#8217;m not suggesting that you sum up your life&#8217;s story in one sentence, but I do recommend that you use words that will describe the general purpose of your e-mail.&#8221; The folks at <a href=\"http:\/\/owl.english.purdue.edu\/owl\/resource\/636\/01\/\">Purdue U.<\/a> were a bit more formal: &#8220;Be sure to include a meaningful subject line; this helps clarify what your message is about and may also help the recipient prioritize reading your email&#8221;<\/li>\n<\/ol>\n<p>empty bottle<br \/>\na few words<br \/>\nI would like to take back<\/p>\n<p>\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026 by John Stevenson &#8211; <em>Quiet Enough<\/em> (2004)<\/p>\n<blockquote>\n<blockquote><p>Thanksgiving Day<br \/>\nthe emails come<br \/>\nwith tunes<\/p>\n<blockquote>\n<blockquote><p>mother\u2019s email<br \/>\nX\u2019s after<br \/>\nthe :-)<\/p><\/blockquote>\n<\/blockquote>\n<p>\u2026\u2026\u2026\u2026\u2026\u2026\u2026 <a href=\"http:\/\/blogs.law.harvard.edu\/ethicalesq\/hilary-tann-archive\/\">Hilary Tann<\/a> &#8211; <em>Upstate Dim Sum<\/em><\/p><\/blockquote>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Twice this past week, an otherwise-thoughtful person sent an email to me and dozens of other people, putting all of our names in the &#8220;To&#8221; field. Like many of you reading this now, neither Sender stopped to think that they were invading the privacy of recipients who did not want to share their email addresses [&hellip;]<\/p>\n","protected":false},"author":94,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[900],"tags":[],"class_list":["post-9653","post","type-post","status-publish","format-standard","hentry","category-viewpoint"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6kP1R-2vH","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/ethicalesq\/wp-json\/wp\/v2\/posts\/9653","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/ethicalesq\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/ethicalesq\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/ethicalesq\/wp-json\/wp\/v2\/users\/94"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/ethicalesq\/wp-json\/wp\/v2\/comments?post=9653"}],"version-history":[{"count":9,"href":"https:\/\/archive.blogs.harvard.edu\/ethicalesq\/wp-json\/wp\/v2\/posts\/9653\/revisions"}],"predecessor-version":[{"id":14448,"href":"https:\/\/archive.blogs.harvard.edu\/ethicalesq\/wp-json\/wp\/v2\/posts\/9653\/revisions\/14448"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/ethicalesq\/wp-json\/wp\/v2\/media?parent=9653"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/ethicalesq\/wp-json\/wp\/v2\/categories?post=9653"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/ethicalesq\/wp-json\/wp\/v2\/tags?post=9653"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}