Netiquette IQ Logo
STAY CONNECTED

Contact Us
HOMEFREE NETIQUETTE IQ TESTTHE BOOKBLOGBENEFITSTESTIMONIALSFAQsABOUT

Don't delay... get Netiquette savvy today!

Netiquette IQ Table Of Contents

Introduction

Language and vocabulary trends with email
Email Netiquette - why care?
How many emails are bad?
Good Netiquette
Netiquette last-stand resisters
(Not so) personal letters

Chapter I – Elements of an email

Netiquette language assumptions
Ten precepts of Netiquette

Chapter II – Basics

The From field
The To address line
The Cc field
The Bcc field
Adding Cc and Bcc recipients
Adding a superior to an ongoing thread
Being added as a Bcc
Subject field
Grammar and punctuation in the subject field
Signature address
Options / flags
Email negatives
List of email negatives:

Chapter III – Basic Content

Common fonts
Font attributes
Text
Types of email
Simple format rules:
Basic content
Sentences
Unacceptable short emails:
Conjunctions

Chapter IV – Common Email Mistakes

Placement is everything
It begins at home
Business mistakes

Chapter V – Spelling

Dictionaries and spell-checkers
Thesaurus usage
Misspellings
Time–hourly
Dates.
Numbers
International telephone codes
Letters as phone numbers
Acronyms

Chapter VI – Punctuation

Periods
Commas.
Repeat punctuation
Apostrophe
Asterisk
Bracket
Bullets
Capitals
Colon.
Dash
Exclamation
Hyphen.
Parentheses
Question mark
Quotation mark
Semicolon
Forward slash
Back Slash

Chapter VII – Ambiguity

Most common words to avoid ambiguity
Ten quick ateps to reduce ambiguity
Misused or misplaced identifiers

Chapter VIII – Email Policy

Epolicy security
Password access and protection
Testing
Privacy
Creating a personal email policy
Email policy objectives
Processes
Epolicy dos and don’ts for corporations

Chapter IX – Replies and Forwarding

Replies and forwarding
Times to reply
Replying
Simple reply
General email reply rules
Reply to multiple people or a group
Angry replies
Keeping templates
Persistent emails
Responding to rude email
When not to respond
Emails that lack closure
Netiquette for wrongly addressed email

Chapter X – Sending, Resending, More Forwarding

Times to send (or not)
Weekends and holidays
International email
Hyperbole
Unintended bait and switch
Sending templates
Fax to email
Partial listing of dangerous emails
Three major credit bureaus
Opt in and opt out
Replying to urgent or time-sensitive requests
Urgent emergencies
Mildly important requests
Not-truly-urgent requests
Some rules regarding replying to urgent requests
Auto-reply messages
When not to invoke auto-reply
Forwarding
Resending messages
Actions when an email is wrongly sent
Resending a returned email

Chapter XI – Elements of a business email

Business email content
Virus warning
Employer liability
Contracts
Negligence on statements
Full disclosure
Compliance disclaimers
Department disclaimers
Familiarity in email correspondence
Employment email Netiquette
Job recruitment
Common forms of business communications

Chapter XII – Attachments

Potential hazards of attachments
Meta data and drafts in attachments
Mail To links
Where to place links in email
Placing images within an email
Some definitions

Chapter XIII – Legal Issues

Email privacy
Defamation
What defamation is not
Incorrect assumptions about email ownership
Email privacy - specific legal references
Pen registers and trap-and-trace
Prohibition on access of communications
Intercepting email
Social email privacy

Chapter XIV – Special Occasions

Netiquette for Special Occasions Categories
Retirement announcement by company
Retirement announcement by employee
Ecards.
Holiday email
Business birthdays
Personal birthdays
Other religious and holiday email and ecards
Email Condolences
Resignations
Employer acceptance of employee resignation
Security issues with ecards

Chapter XV – Email Maintenance

Performance
Basic email distribution
The process of mailbox maintenance
Separating business and personal process
Policies for removing spam, junk mail, and chain mail

Chapter XVI – Advanced Netiquette

Wordiness
Simple steps to avoid wordiness
Redundant words and appositives
Redundant pairs
Redundant categories
Run-on sentences
Sentence fragments
Common email fragments
Misplaced modifier
Indirect question
The subtle request or answer
Delivery of bad news
Mixed message
What is tone in an email?
Tone–please and thank you are the golden pair
Tone and emotion
Mirroring

Chapter XVII – More Advanced Netiquette

Imperative mood
Differences between a command and a suggestion
International email
Time zones
Idioms and colloquialisms
Translation software
Culture
Politics
Censoring
Formats for dates, times, money, temperature, and measurement
Traffic
Fallacies in logic and arguments
Hazardous emails
Topics to avoid

Chapter XVIII – Netiquette for Children and Young Adults

Epolicy for children
Safety.
Courtesy
Education
Enforcement and discipline
Monitoring and reporting
Parental responsibilities
Email and messaging overuse
Some electronic alternatives
Texting and email as emergency aids
Cyberbullying
Types of cyberbullying and their potential damage
Cyberbullying guidelines for parents
Preventive measures
Warning signs of cyberbullying: both sides
Warning signs of cyber-bullying victimization
Texting

Chapter XIX – Inferences, Assumptions, and Presumptions

Examples of inference and assumption
Complaints
Following up an email complaint
Complaint readers
Bad email complaint example:
Good email complaint example:

Chapter XX – Appointments

Making appointments
The eternal email meeting
Scheduling group sessions
Email follow-up to meetings
Request or requirements for accepting/declining invitations
Automated invitations
When to send email invitations
Responding to email invitations
Some useful Netiquette tips
Forwarding invitations
Postponements and cancellations
Replying to postponements and cancellations
Requesting confirmations

Conclusion
References

Appendix A – Powerful and Beautiful Words
Appendix B – Irritating Phrases
Appendix C – Writing Numbers
Appendix D – SMTP Error Messages
Appendix E – Email Closings
Appendix F – Key Email and Internet Spellings
Appendix G – United States Domain-Name File Extensions
Appendix H – List of File Extensions
Appendix I – Cardinal Rules of Netiquette
Appendix J – Top Ten Types of Spam
Appendix K – Homeland Security Words to Avoid
Appendix L – Hackers List of Worst Email Passwords
Appendix M – Common abbreviations