Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: The Best Practices of Adding People to Emails

Tip of the Week: The Best Practices of Adding People to Emails

Whenever you go to send an email, you might glance at the CC and BCC fields and wonder what they are used for, or perhaps you are an avid user of both. Well, let’s take a look at what CC and BCC are supposed to be used for and whether or not you actually use them for their intended purpose.

Where Do CC and BCC Come From?

CC and BCC are remnants from when paper communication ruled the roost. CC stands for carbon copy, a practice in which a document was copied by layering a carbon sheet between two pieces of paper. Writing utensils would then put pressure on the top sheet of paper with the carbon beneath it applying pressure to the second, creating what is essentially a perfect copy of the message.

In the context of email, CC is sending a copy of a message to another recipient. BCC (or blind carbon copy), on the other hand, allows you to send a copy of a message without the recipients seeing others on the email chain.

When Should You Use CC and BCC?

At first glance, there doesn’t appear to be a major difference between CCing someone and sending a regular email, but there is a bigger one than you might think—especially in terms of proper manners and etiquette. The “To” field and the “CC” field have two different uses. “To” is the field you use to send an email to its main recipients. “CC” is meant to be used when the recipient isn’t directly involved with the conversation, but still wants to be kept in the loop. You can think of CCing someone on an email as providing them with a copy of the email for reference.

BCC is best used when you don’t want other recipients to see who the email was sent to. It’s useful for when you want to respect the privacy of those involved or if you have a long list of recipients that does not necessarily require a mail merge.

Hopefully, this will help you use your email more effectively as a communication tool.

We can help your business learn more about communication solutions and understand how the many technology services you use work toward improving your business. To learn more, reach out to us at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 24 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Business Continuity IT Support Smartphones Communication Smartphone Miscellaneous Mobile Device Small Business Network Browser Collaboration Productivity Cybersecurity Quick Tips Users Business Management Windows Managed IT Services Upgrade Phishing Outsourced IT Ransomware Data Backup Windows 10 Cloud Computing Office Server Save Money Data Recovery Windows 10 Passwords Tech Term Saving Money Holiday Gadgets Chrome Virtualization Social Media Managed IT Services Microsoft Office Automation Managed Service Cybercrime Operating System Artificial Intelligence Facebook Computers BYOD Health Mobile Device Management Networking Internet of Things IT Support Hacking Wi-Fi Spam Remote Managed Service Provider Alert Office 365 Telephone Systems Covid-19 Information Information Technology Employer-Employee Relationship Recovery Router Bandwidth BDR Social Engineering Mobility Applications Human Resources Application Law Enforcement Data Breach Remote Monitoring Big Data Password App History Money Encryption Mobile Computing Data Storage Patch Management Government Remote Computing Private Cloud Mobile Office Managed IT Blockchain Office Tips Apps Paperless Office How To Training VPN IT solutions Entertainment Settings Google Drive Infrastructure Website Voice over Internet Protocol Budget Two-factor Authentication Vulnerability Windows 7 Avoiding Downtime Word Mouse HaaS Servers Bring Your Own Device Data Management Work/Life Balance Data Security Wireless Flexibility Marketing Gmail WiFi Safety RMM Sports HIPAA Redundancy Firewall USB Conferencing Keyboard Virtual Reality Scam Apple Data Protection Social User Error Vendor Management Meetings Save Time Cleaning Vendor Risk Management Hacker Managed Services Staff Software as a Service Display Telephone System The Internet of Things Machine Learning End of Support Lithium-ion battery Connectivity Remote Work Education Physical Security Employee/Employer Relationship Customer Service Printer Hiring/Firing Identity Theft Environment Bluetooth PDF Computing Fax Server Augmented Reality Proactive IT Fraud SaaS Best Practice IT Consultant Business Intelligence Remote Worker YouTube Digital Signage Audit Black Market Worker Network Congestion IT Management Cryptocurrency Humor eWaste Botnet Procurement Document Management IT Plan Workplace Strategy Solid State Drive Wireless Technology Comparison Net Neutrality How to Downtime CES Help Desk Unsupported Software Printing Wearable Technology Retail Hard Drives Data storage Charger Content Management Automobile Instant Messaging Business Technology Excel Access Control Compliance Robot OneNote Computer Care Managed Services Provider Current Events Biometrics Virtual Assistant Computing Infrastructure Telephony Authentication Going Green Virus Database Virtual Desktop Samsung Remote Workers Unified Threat Management Computer Accessories DDoS Battery Value Processor Shadow IT Update SharePoint Legal Spam Blocking Electronic Medical Records Hard Drive Internet Exlporer Google Docs Mobile Administrator Windows 10s Devices Copiers 5G Cast Enterprise Content Management Quick Tip Notifications webinar Accountants Emergency Smartwatch Antivirus Tip of the week MSP Ergonomics Professional Services Microchip Windows 8 Public Cloud Thought Leadership Development Printer Server Employer Employee Relationship Credit Cards OLED IT service Password Management PCI DSS Relocation Assessment Password Manager Virtual Machine Windows Server 2008 2FA Fiber Optics Multi-Factor Security Employee Tools Search Engine Video Games Tablet Twitter Messaging Cabling Television Business Mangement Hypervisor Domains Worker Commute NIST Policy Dark mode Smart Tech Trend Micro Trending Experience Maintenance Scalability Addiction SMS Amazon Default App IaaS Public Computer Recycling Saving Time Business Owner Bloatware Procedure Regulations Wiring dark theme Practices Shopping NarrowBand Transportation Google Search Search Tablets Computer Fan Cache AI Rootkit Amazon Web Services IT Infrastructure Criminal Bing Entrepreneur Safe Mode FinTech iPhone GDPR Consultant Workers Hosted Computing Social Network Benefits Shortcut FENG Wireless Internet Analytics Online Shopping Investment IBM Employee/Employer Relationships Cost Management File Sharing Employees Files Flash Camera Windows 365 Best Available Inventory Chromecast Smart Technology Specifications ISP Social Networking WIndows 7 Wire Video Conferencing Evernote ROI Supercomputer Bitcoin Uninterrupted Power Supply Travel Shortcuts Software Tips Sales Colocation Sync Printers Point of Sale Emails Personal Millennials Cryptomining Running Cable Memory Smart Office Supply Chain Management Monitor Wireless Charging Batteries Monitoring Virtual Private Network Windows 8.1 Netflix Digitize Two Factor Authentication Workforce Windows Media Player User Root Cause Analysis Reputation PowerPoint Cables Windows Server 2008 R2 Streaming Media Knowledge Tech Support Music Content HBO Customer relationships Skype Project Management Email Best Practices Techology Science Nanotechnology IT Assessment Laptop Telecommuting Manufacturing Managing Stress Data loss Customers Cortana Leadership Digital Signature Managed IT Service Troubleshooting Security Cameras Audiobook Outlook Computer Tips Customer Relationship Management Start Menu Warranty Virtual CIO OneDrive Touchpad Cameras Biometric Security Distributed Denial of Service Analyitcs Screen Mirroring HVAC Peripheral Loyalty Google Apps Analysis Using Data Books Politics Programming Frequently Asked Questions Digital Security Cameras Advertising

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code