{"id":53,"date":"2021-12-22T10:54:39","date_gmt":"2021-12-22T15:54:39","guid":{"rendered":"https:\/\/opentextbc.ca\/comptech\/chapter\/email\/"},"modified":"2022-10-05T13:50:11","modified_gmt":"2022-10-05T17:50:11","slug":"email","status":"publish","type":"chapter","link":"https:\/\/opentextbc.ca\/comptech\/chapter\/email\/","title":{"raw":"Email","rendered":"Email"},"content":{"raw":"<div>\n\nEmail has become an ubiquitous part of most people\u2019s lives. Here are some things to consider to make your email communications more effective.\n<h1>From:<\/h1>\nPeople often have more than one email account, possibly: work, school, personal, business. Separate accounts allow you to organize email you send and receive, so if you don\u2019t have multiple accounts ask yourself if this would be a good choice for you? If so, search the web for \u201cfree email accounts\u201d, there are many providers that will offer you a free email account.\n\nIf your personal email account isn\u2019t professional (e.g. hotbabe@... beerdrinkingchampion@...) consider getting a second account with an email address you wouldn\u2019t be embarrassed to put on your resume (e.g. firstname.lastname@...).\n\nThe email app on your phone\/tablet\/computer likely supports multiple email accounts, so it\u2019s easy to check all your accounts from one app. When you reply to an email, it will be from your account that the message was originally sent to, so this helps keep things organized. When starting to compose a new email though, you will need to consciously pick which email account you want to send \u201cFrom\u201d.\n<h1>To:<\/h1>\n<h2>Address Books<\/h2>\nUse the \u201caddress book\u201d in your email system to keep track of the people you correspond with. Ensure you have an entry for \u201csurname\u201d as well as the \u201cfirst name\u201d, since if you have 2 contacts named Robert, you want to know which one to pick.\n<h2>Distribution Lists<\/h2>\nDo you have a group of people you email regularly, perhaps a group at work, or something like a sports team, non-profit organization, club or bridge group you belong to? Create a distribution list, so all you type is the name of the distribution list, then the email message will be sent to all the addresses in the list. If you are using a distribution list, make a conscious choice about putting it in either the \u201cTo:\u201d field (where everyone will see all the other email addresses the message is being sent to) or putting it in the \u201cBCC:\u201d field (where no one will see all the other email addresses the message is being sent to)\n<h1>Cc:<\/h1>\n\u201cCc\u201d is an abbreviation for \u201cCarbon Copy\u201d. Back in the days before photocopiers, a piece of carbon paper between 2 sheets of paper in a typewriter was the way a copy of the letter\/message was made. In today\u2019s email world, \u201cCc\u201d is typically used to let another person(s) know about the contents of the email. This differs from the \u201cTo:\u201d field, which is usually addressed to the person(s) that we want to do something (e.g. answer a question, make an appointment, etc.), the email address we put in the \u201cCc\u201d field is typically for the \u201cinformation\u201d of that person (not for their action).\n\n[caption id=\"attachment_52\" align=\"aligncenter\" width=\"505\"]<img class=\"wp-image-50 size-full\" src=\"https:\/\/opentextbc.ca\/technicalwritingh5p\/wp-content\/uploads\/sites\/415\/2021\/12\/987456321-1.png\" alt=\"Image of a email window, emphasizing the areas to enter the; TO addresses, Cc addresses, Bcc addresses.\" width=\"505\" height=\"308\"> 9.1 Addressing Email[\/caption]\n<h1>Bcc:<\/h1>\n\u201cBcc\u201d is an abbreviation for Blind Carbon Copy, and is somewhat similar to the \u201cCc\u201d field, with one important difference - visibility of the other recipients of the message. Normally, if there is more than one email address in either the \u201cTo:\u201d or the \u201cCc:\u201d field, everyone receiving a copy of the email can see all the other people\u2019s email addresses that are also receiving a copy.\n\nIf you put an email address in the \u201cBcc\u201d field, any email addresses listed in either the \u201cTo:\u201d or \u201cCc:\u201d field will not know that a copy of the message went to the person(s) in the \u201cBcc:\u201d field; however, the person listed in the \u201cBcc:\u201d field will see the email addresses listed in the \u201cTo:\u201d and \u201cCc:\u201d fields, but not any other email addresses that are also in the \u201cBcc:\u201d field.\n\nSometimes, you might want to send an email to a group of people, and do it in such a way so that the people you are emailing can\u2019t see each other's email address, and also won\u2019t be able to \u201cReply All\u201d to everyone. For example, a realtor sending property listings to their clients, or a business sending out a special promotion to its clients, etc. This could be accomplished by putting all the email addresses of the group in the \u201cBcc:\u201d field, and putting your own email address in the \u201cTo:\u201d field (as most email programs require at least one address in the \u201cTo:\u201d field). It is impolite or \u201cbad form\u201d to reveal people\u2019s e-mail addresses\n\nto other people, without permission. If a) ask you for b)\u2019s e-address, you can forward a)\u2019s request to b) with the message \u201cThis person asked for your e-mail address -- reply if you wish. He too is my friend and I trust him.\u201d.\n<h1>Subject Lines<\/h1>\nA descriptive \u201csubject line\u201d (the one line summary of your email) can be particularly important for effective email communications. Consider the following:\n\nSometimes people will just scan the list of email in their inbox (i.e. they see the subject lines, but not the body of the emails) so a descriptive subject line helps people decide if they should open the email right away (e.g. today\u2019s meeting cancelled), or wait until later (e.g. review this for our end of week meeting).\n\nIf you have had an email exchange with someone about one topic, and then you change topics, ensure you update the subject line.\n<h1>Attachments<\/h1>\nYou can attach documents, pictures, spreadsheets - essentially any type of electronic file to your email messages. Be aware that different email systems have different size limits for their attachments, so if you are prevented from sending a large group of files, you may need to either send a smaller group of files, or compress the size of some of the files (this is common when sending pictures).\n<h1>Etiquette and Best Practice<\/h1>\nThere are certain conventions with respect to email that encourage the polite and efficient exchange of messages:\n<ul>\n \t<li>Choose carefully between \u201cReply\u201d and \"Reply all.\" Unless you think everyone who received the original email needs to see your reply, don\u2019t use \u201cReply all\u201d. No one wants to have email in their inbox that isn\u2019t relevant to them or their job.<\/li>\n \t<li>Focus on one topic per email. If you have 2 distinct things to discuss with someone, consider sending them 2 separate emails. That way, if they know the answer to one thing but not the other, they can answer one message right away, and then work on the answer to the other message.<\/li>\n \t<li>Include a signature block. If the email account you are using belongs to a company, the company likely has a standard or style guide for their signature block. A company signature block usually includes:\n<ul>\n \t<li>A person\u2019s name<\/li>\n \t<li>Their position in the company<\/li>\n \t<li>The person\u2019s company phone number \/ extension<\/li>\n<\/ul>\n<\/li>\n<\/ul>\nA personal email signature block could simply list your name and mobile phone number. If you have multiple email addresses, most email apps support having different signatures for each account.\n<ul>\n \t<li>Don\u2019t SHOUT. Typing in ALL CAPITAL LETTERS is considered shouting, and don\u2019t overuse the exclamation point (!).<\/li>\n \t<li>Proofread. Usually any misspelled words are underlined in red; however, don\u2019t assume that because there are no spelling mistakes that everything got typed in as you intended. For example both the phrases \u201cpublic announcement\u201d and \u201cpubic announcement\u201d are spelled correctly, but it\u2019s likely you wanted the first phrase, not the second, in your email.<\/li>\n \t<li>Watch your tone. If you receive an email that infuriates you, consider waiting to reply, or if you must write the reply right away, then write it, save it, and re-read it later before pressing \u201cSend\u201d. Also, be cautious when using humor, maybe the other person misses the humour, and ends up offended by what is written.<\/li>\n \t<li>Nothing is confidential. You could mark an email as confidential; however, it is extremely easy to forward an email, and there's nothing to stop someone from forwarding your email to someone you didn\u2019t intend to see it - so write accordingly.<\/li>\n<\/ul>\n<h1>Spam Control<\/h1>\n[caption id=\"attachment_52\" align=\"aligncenter\" width=\"414\"]<img class=\"wp-image-51 size-full\" src=\"https:\/\/opentextbc.ca\/technicalwritingh5p\/wp-content\/uploads\/sites\/415\/2022\/10\/image31.png\" alt=\"Picture of an email app screen showing a list of arrived emails with titles suggesting they are spam.\" width=\"414\" height=\"408\"> Figure 9.2 Some unsolicited spam email[\/caption]\n\nSpam is a term used to refer to junk email. According to the <a href=\"https:\/\/www.spamlaws.com\/\">SpamLaws<\/a> website:\n<ul>\n \t<li>More than 80% of emails are spam, which equates to more than 100 billion spam emails being sent on a daily basis.<\/li>\n \t<li>The 3 largest content categories of these messages are:\n<ul>\n \t<li>36% advertising (buy something)<\/li>\n \t<li>32% adult content (porn, dating sites, etc.)<\/li>\n \t<li>27% financial (news, loans, refunds, rewards, etc.)<\/li>\n<\/ul>\n<\/li>\n \t<li>Scams and fraud account for about 2.5% of all spam emails, and phishing emails (identity theft of personal information, credit card information, etc.) make up approximately \u00be of the scam emails.<\/li>\n<\/ul>\nFor spam email that is simply unwanted advertising, Canada\u2019s Anti-Spam Legislation (CASL) and the USA\u2019s Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM Act) requires unsolicited commercial e-mail messages to be labeled and to include opt-out instructions and the sender's physical address to help protect people from receiving email they don\u2019t want. Some laws require email senders to get permission from the owner of an email address prior to any communication.\n\nYou can use the \u201cUnsubscribe\u201d link in commercial email to keep your email manageable. If you have signed up for a newsletter, notice of on-sale items etc., \u201cunsubscribe\u201d from any services you are no longer using - there should be an unsubscribe link, it\u2019s often at the end of the email in the fine print. Note, that \u201cscam\u201d emails will likely not provide a real unsubscribe link, and may try and trick you into providing personal information or installing malware when you try to unsubscribe - do not use the unsubscribe link in scam emails.\n<h1>Phishing Emails<\/h1>\n[caption id=\"attachment_52\" align=\"aligncenter\" width=\"548\"]<img class=\"wp-image-52 size-full\" src=\"https:\/\/opentextbc.ca\/technicalwritingh5p\/wp-content\/uploads\/sites\/415\/2022\/10\/image33.png\" alt=\"Cartoon showing fish being phished for information\" width=\"548\" height=\"398\"> Figure 9.3 A common request in phishing emails[\/caption]\n\nA \u201cphishing\u201d email is an email sent to you with the intent of tricking you into clicking a malicious link, downloading malware, or sharing sensitive information. Phishing can also occur via a text message, a social media post, or a phone call. The scammer is typically after either your: identity, passwords and\/or your money.\n\nSome phishing emails are easy to identify (they appear to come from a business you don\u2019t use, they have poor grammar or spelling), but others can look more legitimate.\n\nBe cautious of any message that:\n<ul>\n \t<li>Has an urgent request (e.g. confirm your password or you will lose access to your account).<\/li>\n \t<li>Says they\u2019ve noticed some suspicious activity or log-in attempts, and want you to click on a link in this message and provide your username and password. Note, some of these messages can be legitimate and may ask you to click on a link to confirm that the activity was yours - the legitimate messages will NOT ask you for your username and password, they will just ask you to click on a link. If for some reason you need to go to this company\u2019s website, don\u2019t use a link in an email to get to the website (it may take you to a look-a-like site), use a bookmark or web search instead.<\/li>\n \t<li>Claims there\u2019s a problem with your account or your payment information (and wants you to follow a link in the message to fix the problem). Similarly to the above, some of these messages can be legitimate, but don\u2019t use a link in an email to get to the company\u2019s website, use a bookmark or web search instead.<\/li>\n \t<li>Requests personal information, such as your date of birth, password, credit card or bank details. If you have an account with this company, shouldn\u2019t they already have all the information they need?<\/li>\n \t<li>Is a message offering money, points or a refund, and wants you to click on a link in the message.<\/li>\n \t<li>You don\u2019t recognize the sender\u2019s email and it's from a free email address (e.g. Gmail, Yahoo Mail, Hotmail, etc.)<\/li>\n \t<li>There is a standard greeting such as \u201cDear customer\u201d instead of your real name.<\/li>\n \t<li>The message is an image instead of text (this is one way spammers attempt to defeat email spam filters).<\/li>\n<\/ul>\nIf you receive an email that appears to come from a company you use (it\u2019s easy for a scammer to do this), and it is requesting any personal information or that you login to your account, do not click on the link in the email, instead search (or use a browser bookmark\/favourite) to navigate to the company\u2019s web site. If the email message was legitimate, you should see a similar message from the company once you log into their website.\n\nStay up-to-date on the latest phishing and other email scams, visit the <a href=\"https:\/\/cyber.gc.ca\/\">Canadian Cyber Centre website<\/a>, or the US Federal Trade Commission\u2019s website on Privacy, Identity and Online Security: <a href=\"https:\/\/www.consumer.ftc.gov\/articles\/how-recognize-and-avoid-phishing-scams\">How Recognize and Avoid Phishing Scams<\/a>.\n<h3>Media Attributions<\/h3>\n<ul>\n \t<li>\"Addressing email\" <a href=\"https:\/\/www.microsoft.com\/en-us\/legal\/intellectualproperty\/copyright\/permissions\">Used with permission from Microsoft<\/a><\/li>\n \t<li>\"Some unsolicited spam email\" <a href=\"https:\/\/www.microsoft.com\/en-us\/legal\/intellectualproperty\/copyright\/permissions\">Used with permission from Microsoft<\/a><\/li>\n \t<li>\"<a class=\"internal\" href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Phish.jpg\">Phish.jpg<\/a>\" by <a class=\"internal\" href=\"https:\/\/commons.wikimedia.org\/wiki\/User:MGA73bot2\">MGA73bot2 <\/a>is licensed under a <a class=\"internal\" href=\"https:\/\/creativecommons.org\/publicdomain\/zero\/1.0\/deed.en\">CC0 1.0 Licence<\/a><\/li>\n<\/ul>\n<\/div>","rendered":"<div>\n<p>Email has become an ubiquitous part of most people\u2019s lives. Here are some things to consider to make your email communications more effective.<\/p>\n<h1>From:<\/h1>\n<p>People often have more than one email account, possibly: work, school, personal, business. Separate accounts allow you to organize email you send and receive, so if you don\u2019t have multiple accounts ask yourself if this would be a good choice for you? If so, search the web for \u201cfree email accounts\u201d, there are many providers that will offer you a free email account.<\/p>\n<p>If your personal email account isn\u2019t professional (e.g. hotbabe@&#8230; beerdrinkingchampion@&#8230;) consider getting a second account with an email address you wouldn\u2019t be embarrassed to put on your resume (e.g. firstname.lastname@&#8230;).<\/p>\n<p>The email app on your phone\/tablet\/computer likely supports multiple email accounts, so it\u2019s easy to check all your accounts from one app. When you reply to an email, it will be from your account that the message was originally sent to, so this helps keep things organized. When starting to compose a new email though, you will need to consciously pick which email account you want to send \u201cFrom\u201d.<\/p>\n<h1>To:<\/h1>\n<h2>Address Books<\/h2>\n<p>Use the \u201caddress book\u201d in your email system to keep track of the people you correspond with. Ensure you have an entry for \u201csurname\u201d as well as the \u201cfirst name\u201d, since if you have 2 contacts named Robert, you want to know which one to pick.<\/p>\n<h2>Distribution Lists<\/h2>\n<p>Do you have a group of people you email regularly, perhaps a group at work, or something like a sports team, non-profit organization, club or bridge group you belong to? Create a distribution list, so all you type is the name of the distribution list, then the email message will be sent to all the addresses in the list. If you are using a distribution list, make a conscious choice about putting it in either the \u201cTo:\u201d field (where everyone will see all the other email addresses the message is being sent to) or putting it in the \u201cBCC:\u201d field (where no one will see all the other email addresses the message is being sent to)<\/p>\n<h1>Cc:<\/h1>\n<p>\u201cCc\u201d is an abbreviation for \u201cCarbon Copy\u201d. Back in the days before photocopiers, a piece of carbon paper between 2 sheets of paper in a typewriter was the way a copy of the letter\/message was made. In today\u2019s email world, \u201cCc\u201d is typically used to let another person(s) know about the contents of the email. This differs from the \u201cTo:\u201d field, which is usually addressed to the person(s) that we want to do something (e.g. answer a question, make an appointment, etc.), the email address we put in the \u201cCc\u201d field is typically for the \u201cinformation\u201d of that person (not for their action).<\/p>\n<figure id=\"attachment_52\" aria-describedby=\"caption-attachment-52\" style=\"width: 505px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-50 size-full\" src=\"https:\/\/opentextbc.ca\/technicalwritingh5p\/wp-content\/uploads\/sites\/415\/2021\/12\/987456321-1.png\" alt=\"Image of a email window, emphasizing the areas to enter the; TO addresses, Cc addresses, Bcc addresses.\" width=\"505\" height=\"308\" srcset=\"https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2021\/12\/987456321-1.png 505w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2021\/12\/987456321-1-300x183.png 300w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2021\/12\/987456321-1-65x40.png 65w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2021\/12\/987456321-1-225x137.png 225w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2021\/12\/987456321-1-350x213.png 350w\" sizes=\"auto, (max-width: 505px) 100vw, 505px\" \/><figcaption id=\"caption-attachment-52\" class=\"wp-caption-text\">9.1 Addressing Email<\/figcaption><\/figure>\n<h1>Bcc:<\/h1>\n<p>\u201cBcc\u201d is an abbreviation for Blind Carbon Copy, and is somewhat similar to the \u201cCc\u201d field, with one important difference &#8211; visibility of the other recipients of the message. Normally, if there is more than one email address in either the \u201cTo:\u201d or the \u201cCc:\u201d field, everyone receiving a copy of the email can see all the other people\u2019s email addresses that are also receiving a copy.<\/p>\n<p>If you put an email address in the \u201cBcc\u201d field, any email addresses listed in either the \u201cTo:\u201d or \u201cCc:\u201d field will not know that a copy of the message went to the person(s) in the \u201cBcc:\u201d field; however, the person listed in the \u201cBcc:\u201d field will see the email addresses listed in the \u201cTo:\u201d and \u201cCc:\u201d fields, but not any other email addresses that are also in the \u201cBcc:\u201d field.<\/p>\n<p>Sometimes, you might want to send an email to a group of people, and do it in such a way so that the people you are emailing can\u2019t see each other&#8217;s email address, and also won\u2019t be able to \u201cReply All\u201d to everyone. For example, a realtor sending property listings to their clients, or a business sending out a special promotion to its clients, etc. This could be accomplished by putting all the email addresses of the group in the \u201cBcc:\u201d field, and putting your own email address in the \u201cTo:\u201d field (as most email programs require at least one address in the \u201cTo:\u201d field). It is impolite or \u201cbad form\u201d to reveal people\u2019s e-mail addresses<\/p>\n<p>to other people, without permission. If a) ask you for b)\u2019s e-address, you can forward a)\u2019s request to b) with the message \u201cThis person asked for your e-mail address &#8212; reply if you wish. He too is my friend and I trust him.\u201d.<\/p>\n<h1>Subject Lines<\/h1>\n<p>A descriptive \u201csubject line\u201d (the one line summary of your email) can be particularly important for effective email communications. Consider the following:<\/p>\n<p>Sometimes people will just scan the list of email in their inbox (i.e. they see the subject lines, but not the body of the emails) so a descriptive subject line helps people decide if they should open the email right away (e.g. today\u2019s meeting cancelled), or wait until later (e.g. review this for our end of week meeting).<\/p>\n<p>If you have had an email exchange with someone about one topic, and then you change topics, ensure you update the subject line.<\/p>\n<h1>Attachments<\/h1>\n<p>You can attach documents, pictures, spreadsheets &#8211; essentially any type of electronic file to your email messages. Be aware that different email systems have different size limits for their attachments, so if you are prevented from sending a large group of files, you may need to either send a smaller group of files, or compress the size of some of the files (this is common when sending pictures).<\/p>\n<h1>Etiquette and Best Practice<\/h1>\n<p>There are certain conventions with respect to email that encourage the polite and efficient exchange of messages:<\/p>\n<ul>\n<li>Choose carefully between \u201cReply\u201d and &#8220;Reply all.&#8221; Unless you think everyone who received the original email needs to see your reply, don\u2019t use \u201cReply all\u201d. No one wants to have email in their inbox that isn\u2019t relevant to them or their job.<\/li>\n<li>Focus on one topic per email. If you have 2 distinct things to discuss with someone, consider sending them 2 separate emails. That way, if they know the answer to one thing but not the other, they can answer one message right away, and then work on the answer to the other message.<\/li>\n<li>Include a signature block. If the email account you are using belongs to a company, the company likely has a standard or style guide for their signature block. A company signature block usually includes:\n<ul>\n<li>A person\u2019s name<\/li>\n<li>Their position in the company<\/li>\n<li>The person\u2019s company phone number \/ extension<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>A personal email signature block could simply list your name and mobile phone number. If you have multiple email addresses, most email apps support having different signatures for each account.<\/p>\n<ul>\n<li>Don\u2019t SHOUT. Typing in ALL CAPITAL LETTERS is considered shouting, and don\u2019t overuse the exclamation point (!).<\/li>\n<li>Proofread. Usually any misspelled words are underlined in red; however, don\u2019t assume that because there are no spelling mistakes that everything got typed in as you intended. For example both the phrases \u201cpublic announcement\u201d and \u201cpubic announcement\u201d are spelled correctly, but it\u2019s likely you wanted the first phrase, not the second, in your email.<\/li>\n<li>Watch your tone. If you receive an email that infuriates you, consider waiting to reply, or if you must write the reply right away, then write it, save it, and re-read it later before pressing \u201cSend\u201d. Also, be cautious when using humor, maybe the other person misses the humour, and ends up offended by what is written.<\/li>\n<li>Nothing is confidential. You could mark an email as confidential; however, it is extremely easy to forward an email, and there&#8217;s nothing to stop someone from forwarding your email to someone you didn\u2019t intend to see it &#8211; so write accordingly.<\/li>\n<\/ul>\n<h1>Spam Control<\/h1>\n<figure id=\"attachment_52\" aria-describedby=\"caption-attachment-52\" style=\"width: 414px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-51 size-full\" src=\"https:\/\/opentextbc.ca\/technicalwritingh5p\/wp-content\/uploads\/sites\/415\/2022\/10\/image31.png\" alt=\"Picture of an email app screen showing a list of arrived emails with titles suggesting they are spam.\" width=\"414\" height=\"408\" srcset=\"https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image31.png 414w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image31-300x296.png 300w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image31-65x64.png 65w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image31-225x222.png 225w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image31-350x345.png 350w\" sizes=\"auto, (max-width: 414px) 100vw, 414px\" \/><figcaption id=\"caption-attachment-52\" class=\"wp-caption-text\">Figure 9.2 Some unsolicited spam email<\/figcaption><\/figure>\n<p>Spam is a term used to refer to junk email. According to the <a href=\"https:\/\/www.spamlaws.com\/\">SpamLaws<\/a> website:<\/p>\n<ul>\n<li>More than 80% of emails are spam, which equates to more than 100 billion spam emails being sent on a daily basis.<\/li>\n<li>The 3 largest content categories of these messages are:\n<ul>\n<li>36% advertising (buy something)<\/li>\n<li>32% adult content (porn, dating sites, etc.)<\/li>\n<li>27% financial (news, loans, refunds, rewards, etc.)<\/li>\n<\/ul>\n<\/li>\n<li>Scams and fraud account for about 2.5% of all spam emails, and phishing emails (identity theft of personal information, credit card information, etc.) make up approximately \u00be of the scam emails.<\/li>\n<\/ul>\n<p>For spam email that is simply unwanted advertising, Canada\u2019s Anti-Spam Legislation (CASL) and the USA\u2019s Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM Act) requires unsolicited commercial e-mail messages to be labeled and to include opt-out instructions and the sender&#8217;s physical address to help protect people from receiving email they don\u2019t want. Some laws require email senders to get permission from the owner of an email address prior to any communication.<\/p>\n<p>You can use the \u201cUnsubscribe\u201d link in commercial email to keep your email manageable. If you have signed up for a newsletter, notice of on-sale items etc., \u201cunsubscribe\u201d from any services you are no longer using &#8211; there should be an unsubscribe link, it\u2019s often at the end of the email in the fine print. Note, that \u201cscam\u201d emails will likely not provide a real unsubscribe link, and may try and trick you into providing personal information or installing malware when you try to unsubscribe &#8211; do not use the unsubscribe link in scam emails.<\/p>\n<h1>Phishing Emails<\/h1>\n<figure id=\"attachment_52\" aria-describedby=\"caption-attachment-52\" style=\"width: 548px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-52 size-full\" src=\"https:\/\/opentextbc.ca\/technicalwritingh5p\/wp-content\/uploads\/sites\/415\/2022\/10\/image33.png\" alt=\"Cartoon showing fish being phished for information\" width=\"548\" height=\"398\" srcset=\"https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image33.png 548w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image33-300x218.png 300w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image33-65x47.png 65w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image33-225x163.png 225w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image33-350x254.png 350w\" sizes=\"auto, (max-width: 548px) 100vw, 548px\" \/><figcaption id=\"caption-attachment-52\" class=\"wp-caption-text\">Figure 9.3 A common request in phishing emails<\/figcaption><\/figure>\n<p>A \u201cphishing\u201d email is an email sent to you with the intent of tricking you into clicking a malicious link, downloading malware, or sharing sensitive information. Phishing can also occur via a text message, a social media post, or a phone call. The scammer is typically after either your: identity, passwords and\/or your money.<\/p>\n<p>Some phishing emails are easy to identify (they appear to come from a business you don\u2019t use, they have poor grammar or spelling), but others can look more legitimate.<\/p>\n<p>Be cautious of any message that:<\/p>\n<ul>\n<li>Has an urgent request (e.g. confirm your password or you will lose access to your account).<\/li>\n<li>Says they\u2019ve noticed some suspicious activity or log-in attempts, and want you to click on a link in this message and provide your username and password. Note, some of these messages can be legitimate and may ask you to click on a link to confirm that the activity was yours &#8211; the legitimate messages will NOT ask you for your username and password, they will just ask you to click on a link. If for some reason you need to go to this company\u2019s website, don\u2019t use a link in an email to get to the website (it may take you to a look-a-like site), use a bookmark or web search instead.<\/li>\n<li>Claims there\u2019s a problem with your account or your payment information (and wants you to follow a link in the message to fix the problem). Similarly to the above, some of these messages can be legitimate, but don\u2019t use a link in an email to get to the company\u2019s website, use a bookmark or web search instead.<\/li>\n<li>Requests personal information, such as your date of birth, password, credit card or bank details. If you have an account with this company, shouldn\u2019t they already have all the information they need?<\/li>\n<li>Is a message offering money, points or a refund, and wants you to click on a link in the message.<\/li>\n<li>You don\u2019t recognize the sender\u2019s email and it&#8217;s from a free email address (e.g. Gmail, Yahoo Mail, Hotmail, etc.)<\/li>\n<li>There is a standard greeting such as \u201cDear customer\u201d instead of your real name.<\/li>\n<li>The message is an image instead of text (this is one way spammers attempt to defeat email spam filters).<\/li>\n<\/ul>\n<p>If you receive an email that appears to come from a company you use (it\u2019s easy for a scammer to do this), and it is requesting any personal information or that you login to your account, do not click on the link in the email, instead search (or use a browser bookmark\/favourite) to navigate to the company\u2019s web site. If the email message was legitimate, you should see a similar message from the company once you log into their website.<\/p>\n<p>Stay up-to-date on the latest phishing and other email scams, visit the <a href=\"https:\/\/cyber.gc.ca\/\">Canadian Cyber Centre website<\/a>, or the US Federal Trade Commission\u2019s website on Privacy, Identity and Online Security: <a href=\"https:\/\/www.consumer.ftc.gov\/articles\/how-recognize-and-avoid-phishing-scams\">How Recognize and Avoid Phishing Scams<\/a>.<\/p>\n<h3>Media Attributions<\/h3>\n<ul>\n<li>&#8220;Addressing email&#8221; <a href=\"https:\/\/www.microsoft.com\/en-us\/legal\/intellectualproperty\/copyright\/permissions\">Used with permission from Microsoft<\/a><\/li>\n<li>&#8220;Some unsolicited spam email&#8221; <a href=\"https:\/\/www.microsoft.com\/en-us\/legal\/intellectualproperty\/copyright\/permissions\">Used with permission from Microsoft<\/a><\/li>\n<li>&#8220;<a class=\"internal\" href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Phish.jpg\">Phish.jpg<\/a>&#8221; by <a class=\"internal\" href=\"https:\/\/commons.wikimedia.org\/wiki\/User:MGA73bot2\">MGA73bot2 <\/a>is licensed under a <a class=\"internal\" href=\"https:\/\/creativecommons.org\/publicdomain\/zero\/1.0\/deed.en\">CC0 1.0 Licence<\/a><\/li>\n<\/ul>\n<\/div>\n","protected":false},"author":123,"menu_order":9,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-53","chapter","type-chapter","status-publish","hentry"],"part":18,"_links":{"self":[{"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/pressbooks\/v2\/chapters\/53","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/wp\/v2\/users\/123"}],"version-history":[{"count":1,"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/pressbooks\/v2\/chapters\/53\/revisions"}],"predecessor-version":[{"id":54,"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/pressbooks\/v2\/chapters\/53\/revisions\/54"}],"part":[{"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/pressbooks\/v2\/parts\/18"}],"metadata":[{"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/pressbooks\/v2\/chapters\/53\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/wp\/v2\/media?parent=53"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/pressbooks\/v2\/chapter-type?post=53"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/wp\/v2\/contributor?post=53"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/wp\/v2\/license?post=53"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}