Blind CC (Bcc): Master Its Use When E-Mailing

If you use Microsoft Outlook (or similar applications) for e-mailing, then you are familiar with the fields at the top of a new mail message, right? Of course, in the "To..." field, you enter the name of one or more persons you intend to receive your message. Use the field labeled "Cc..." (for Carbon Copy - remember how they did it back in 1978 BC, "before computers"?) for anyone who needs to view your e-mail but is not the addressee.

But there's an additional field that you should know about, labeled "Bcc...," which stands for "Blind carbon copy," or the updated version, "Blind courtesy copy." This field is for the names of anyone that needs a copy of your e-mail without the other people (in the "To..." and "Cc..." fields) knowing about it. That's why it's called "Blind."

"But wait a minute," you might be saying. "I don't have a "Bcc" field just after the "Cc" field in my version of Outlook." When you launch a new mail message, you might have "To...," "Cc...," and "Subject..."--nothing more. That's because "Bcc" is on a toggle; you can turn it on and off from your "View" menu. If your "Bcc..." is not showing, you can turn it on when you are in a mail message by going to the "View Menu" and selecting "Bcc Field." A checkmark will appear and the field will become visible at the top of your mail message, just above "Subject...". (Similar applications should also give you the option to turn "Bcc" on if it is not continuously visible.)

You should know about and carefully use "Bcc" for a number of reasons. I'm going to cover some of the most important.

Use Bcc to protect privacy ? When an e-mail is sent to a whole group of people with all of their names in the "To..." or "CC..." fields, each one of them has access to the e-mail address of all the others. Normally this would not be a problem internally, but if you are sending an e-mail to employees as well as some outside of your company, use the Bcc field to hide all of those internal addresses. You will be preventing your company's people from getting spam and other unwanted e-mails.

Use Bcc to keep upper management informed ? Sometimes you are sending an e-mail message at a manager's request, and you want to let the manager know that you complied. It may not be helpful, however, to make the manager's name visible in "Cc," because this may add stress or cause unnecessary concern for the addressee. If you consider that to be the circumstances, use Bcc for the manager's copy. But this is always a judgment call, because sometimes it is important for addressees to know the manager is looking over their shoulder, especially if you have a tight deadline.

Use Bcc to make your message more personal ? Do you feel differently about a message addressed solely to you versus one sent to all of your company's employees? The same principle works in the opposite direction, as well. If you place everyone's name in the Bcc field, then each will have the impression that you wrote your e-mail just for them. Be careful in your wording, however, because this tactic will backfire if your letter contains second-person plurals, such as "All of you may be wondering...".

Use Bcc to keep an archive of your correspondence ? This nifty trick depends of having or obtaining a separate e-mail address from your conventional business address. Place that address in the Bcc field, e.g., "yourname@freemail.com," and Outlook will send a copy of your e-mail to that address. This can be helpful if you are wanting a quick way to keep track of all of the e-mail you send out regarding a particular project or issue.

Caution: When Bcc can backfire ? There are times, however, when you should think twice before entering a person's name in Bcc. If your addressee hits "Reply to all," the reply will not go back to the BCC addressee(s). But still, that reply might not be worded as carefully as it would be if the sender knew everyone listed in Bcc. To put it bluntly, this is how people get insulted and feelings get hurt. If you are dealing with an issue that is the least bit touchy or even volatile, you would do well to steer clear of Bcc.

* * *

Copyright ?2005 Steve Singleton, All rights reserved.

Steve Singleton has written and edited several books and numerous articles on subjects of interest to Bible students. He has been a book editor, newspaper reporter, news editor, and public relations consultant. He has taught Greek, Bible, and religious studies courses Bible college, university, and adult education programs. He has taught seminars and workshops in 11 states and the Caribbean.

Go to his deeperstudy.org for Bible study resources, no matter what your level of expertise. Explore "The Shallows," plumb "The Depths," or use the well-organized "Study Links" for original sources in English translation. Sign up for Steve's free "DeeperStudy Newsletter."

limo Chicago Addison ..
In The News:

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Hackers and scammers portray themselves as legitimate businesses or people with urgent propositions to entice victims to open compromising documents.
A decommissioned Boeing 737 that operated in Indonesia is now a luxurious private villa about 492 feet above the sea in Bali.
If you can't log in to your email account, you might want to try one of these methods to get yourself back in. Kurt “CyberGuy" Knutsson shows you how.
Kurt “CyberGuy" Knutsson introduces you to HERO-BLUE, a biomimetic, multimodal locomotion robot poised to transform underwater exploration and maintenance.
Kurt “CyberGuy" Knutsson reveals how the "Yahoo Boys" scam utilizes deepfake and face-swapping technology to trick people who believe they are in a romantic relationship.
Kurt “CyberGuy" Knutsson: Video shows Tesla Semi can navigate icy conditions, potentially offering a sustainable, all-weather, heavy-duty transport solution amid emissions concerns.
Tech guru Kurt "CyberGuy" Knutsson offers solutions to fixing a personal computer that freezes up. There are a number of reasons this might be happening.
The rollout of Apple's iOS 17 brought a subtle "Rebound" notification tone that's gotten some criticism. Kurt "CyberGuy" Knutsson explains a fix.
Fitness centers and workout studios are starting to establish policies that prohibit shooting phone videos to protect people's privacy.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents
Apple recently notified a small number of iPhone customers in 92 countries that their phones may be under attack by mercenary spyware.
An artificial intelligence-powered home security system can fire paintballs and tear gas at trespassers. The camera identifies human faces and animals.
Technology expert Kim Komando gives her tips and tricks on enhancing your user experience a smartphone and other devices you use everyday.
A new camera called NUCA uses artificial intelligence to create deepfake photos of subjects by stripping away clothing in close to real time.
The Kimberley Kube trail-ready camper has a compact but spacious design and combines luxury, functionality and ruggedness for a weekend getaway.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Emails instructing you to reset your password for an account may be legitimate, or they may be scams. Kurt "CyberGuy" Knutsson explains.
Northrop Grumman's Manta Ray uncrewed underwater vehicle aims to revolutionize undersea missions — it glides through the ocean without human assistance.
Learn how to work Google's calendar application to streamline and organize your daily tasks from technology expert Kim Komando.
If you do not want Facebook to have automatic access to your private photos, follow our tips to protect yourself. Kurt “CyberGuy" Knutsson shows you how.
Kurt “CyberGuy" Knutsson goes into detail about Apple’s recent iOS update that allows iPhone users to instantly translate spoken language simply by using the Action Button.
Safeguarding your digital life with a reliable physical backup isn't just a precaution, it's a necessity. Kurt “CyberGuy" Knutsson provides the essential backup checklist.
Kurt “CyberGuy" Knutsson reveals how a Redditor exposed false recycling claims at their apartment, highlighting a report that only 21% of U.S. recyclables are processed.
Kurt "CyberGuy" Knutsson offers a travel toolkit featuring five technology tools to help you with booking flights and hotels for your summer vacation.

Microsoft CRM Customization ? Programming Closed Email Activity

Microsoft CRM is CRM answer from Microsoft and attempt to... Read More

Great Plains Sales Order Processing and Invoicing Modules ? Tips For Consultants

We'll give you non formal view, based on our consulting... Read More

How to Make Own CMS

Every day millions of new web documents emerge on the... Read More

Anti-Spyware Protection ? Holes in the Shining Armor

Looking at all the ads which promise to get rid... Read More

RSS: Get Notified When Your Favorite Websites Are Updated

RSS (Really Simple Syndication) is a way for a site... Read More

Device Driver Basics

Most people understand that the "hardware" part of their computer... Read More

3 Reasons Why Medical Billing Software is Leading the Way

Since technology changes so quickly, it is hard to begin... Read More

Computer Based Language Development and Spell-checking

Language development computer: Computer-based method for aiding language development seems... Read More

Adware and Spyware Blockers

The most important things you can do for your computer... Read More

Microsoft Navision Integration with Microsoft RMS - Overview for IT Specialist

Microsoft Business Solutions Navision serves both European and American megamarkets.... Read More

Why Stick With Email Clients Like Outlook?

Trying to figure out a stream in banning one email... Read More

Software Piracy - Global Increase

Pirated software is on the increase and now accounts for... Read More

How To Create A Data Capture Procedure Checklist For Your Small Business CRM Software

Fortunately one of the most common reasons cited for the... Read More

Destination: Desktop for Google

First we had the original Google search that evolved into... Read More

Microsoft CRM Integration with IBM Lotus Notes Domino ? Machinery Dealership Example

IBM Lotus Notes with Domino email server is traditional document... Read More

Microsoft CRM for Large Corporation ? Security

Microsoft Business Solutions CRM proved to be reliable solution in... Read More

Document Templates Give You The Perfect Framework For Your Documents

When it comes to running an office, the SOHO entrepreneur... Read More

Five Tips For A Great Software Demo

Whether you need to close a sale, gather end-user feedback,... Read More

Partitioning, Formatting and Reinstalling in Windows 98

Formatting and reinstalling windows 98 is very easy if you... Read More

A Simple Computer Software Definition

What is Software?Software is a set of instruction written to... Read More

Microsoft Great Plains: If You are Orphan Client ? What to Do and FAQ

Microsoft Business Solutions Great Plains, former Great Plains Software eEnterprise,... Read More

The Importance of Timely Timesheets

Whether you are a small consultancy firm, a medium sized... Read More

Microsoft Great Plains Customization Recovery & Upgrade for Large Corporation

At the end of XX century, in the late 1990th... Read More

S is for Spying, Surveillance -- and for Software as Well

Words we choose to describe things and phenomena often show... Read More

FreeDOS

Before September 1995, Microsoft Windows was an MS-DOS program. DOS... Read More

Benton transportation to O'Hare ..