Blind CC (Bcc): Master Its Use When E-Mailing

If you use Microsoft Outlook (or similar applications) for e-mailing, then you are familiar with the fields at the top of a new mail message, right? Of course, in the "To..." field, you enter the name of one or more persons you intend to receive your message. Use the field labeled "Cc..." (for Carbon Copy - remember how they did it back in 1978 BC, "before computers"?) for anyone who needs to view your e-mail but is not the addressee.

But there's an additional field that you should know about, labeled "Bcc...," which stands for "Blind carbon copy," or the updated version, "Blind courtesy copy." This field is for the names of anyone that needs a copy of your e-mail without the other people (in the "To..." and "Cc..." fields) knowing about it. That's why it's called "Blind."

"But wait a minute," you might be saying. "I don't have a "Bcc" field just after the "Cc" field in my version of Outlook." When you launch a new mail message, you might have "To...," "Cc...," and "Subject..."--nothing more. That's because "Bcc" is on a toggle; you can turn it on and off from your "View" menu. If your "Bcc..." is not showing, you can turn it on when you are in a mail message by going to the "View Menu" and selecting "Bcc Field." A checkmark will appear and the field will become visible at the top of your mail message, just above "Subject...". (Similar applications should also give you the option to turn "Bcc" on if it is not continuously visible.)

You should know about and carefully use "Bcc" for a number of reasons. I'm going to cover some of the most important.

Use Bcc to protect privacy ? When an e-mail is sent to a whole group of people with all of their names in the "To..." or "CC..." fields, each one of them has access to the e-mail address of all the others. Normally this would not be a problem internally, but if you are sending an e-mail to employees as well as some outside of your company, use the Bcc field to hide all of those internal addresses. You will be preventing your company's people from getting spam and other unwanted e-mails.

Use Bcc to keep upper management informed ? Sometimes you are sending an e-mail message at a manager's request, and you want to let the manager know that you complied. It may not be helpful, however, to make the manager's name visible in "Cc," because this may add stress or cause unnecessary concern for the addressee. If you consider that to be the circumstances, use Bcc for the manager's copy. But this is always a judgment call, because sometimes it is important for addressees to know the manager is looking over their shoulder, especially if you have a tight deadline.

Use Bcc to make your message more personal ? Do you feel differently about a message addressed solely to you versus one sent to all of your company's employees? The same principle works in the opposite direction, as well. If you place everyone's name in the Bcc field, then each will have the impression that you wrote your e-mail just for them. Be careful in your wording, however, because this tactic will backfire if your letter contains second-person plurals, such as "All of you may be wondering...".

Use Bcc to keep an archive of your correspondence ? This nifty trick depends of having or obtaining a separate e-mail address from your conventional business address. Place that address in the Bcc field, e.g., "yourname@freemail.com," and Outlook will send a copy of your e-mail to that address. This can be helpful if you are wanting a quick way to keep track of all of the e-mail you send out regarding a particular project or issue.

Caution: When Bcc can backfire ? There are times, however, when you should think twice before entering a person's name in Bcc. If your addressee hits "Reply to all," the reply will not go back to the BCC addressee(s). But still, that reply might not be worded as carefully as it would be if the sender knew everyone listed in Bcc. To put it bluntly, this is how people get insulted and feelings get hurt. If you are dealing with an issue that is the least bit touchy or even volatile, you would do well to steer clear of Bcc.

* * *

Copyright ?2005 Steve Singleton, All rights reserved.

Steve Singleton has written and edited several books and numerous articles on subjects of interest to Bible students. He has been a book editor, newspaper reporter, news editor, and public relations consultant. He has taught Greek, Bible, and religious studies courses Bible college, university, and adult education programs. He has taught seminars and workshops in 11 states and the Caribbean.

Go to his deeperstudy.org for Bible study resources, no matter what your level of expertise. Explore "The Shallows," plumb "The Depths," or use the well-organized "Study Links" for original sources in English translation. Sign up for Steve's free "DeeperStudy Newsletter."

move in cleaning service Mundelein ..
In The News:

Kodiak Driver autonomous truck achieves perfect 98 safety score, matching top human fleets in groundbreaking AI evaluation by Nauto's VERA system.
New 401k catch-up contribution rules in 2026 will change taxes for high earners over 50. Learn how scammers exploit these changes and protect your retirement savings.
Kurt Knutsson's guide covers social media privacy protection through location settings, account privacy controls and two-factor authentication to prevent scams and data breaches.
Revolutionary retinal implant restores central vision in 80% of patients with advanced macular degeneration, offering hope where treatments once only slowed blindness.
Learn how to use passkeys on Windows and Mac computers without cameras or fingerprint readers. Discover secure authentication methods that replace passwords.
Tesla's FSD v14.1.2 update reintroduces Mad Max mode, enabling higher speeds and more frequent lane changes than the standard Hurry profile setting.
A phishing email scam targeting American Express customers shows how cybercriminals use fake urgent messages to steal personal and financial information.
Facebook's new Meta AI feature analyzes your camera roll photos to create polished collages automatically, but requires cloud processing and raises privacy concerns.
A New Jersey teenager filed a major lawsuit against AI/Robotics Venture Strategy 3 Ltd. over ClothOff, an AI tool that created fake nude images from her social media photos.
Microsoft reports Storm-2657 cybercriminals sent phishing emails to 6,000 addresses at 25 universities to steal payroll credentials and redirect funds.
Astronomers have discovered asteroid 2025 SC79, a skyscraper-sized space rock orbiting the sun in just 128 days. the second-fastest known.
The Fox News AI Newsletter delivers the latest developments form the world of artificial intelligence, including the technology's challenges and opportunities.
A cyberattack on SimonMed Imaging exposed personal information of 1.2 million patients, including medical records, financial details and identity papers.
Spotify's managed accounts for kids under 13 now available in at least seven countries, allowing parents to filter and block explicit content and songs.
Friendly text conversations about BBQs and social events can lead to WEEX gold trading scams that target older adults with fake investment opportunities.
California company Skyeports creates self-healing glass spheres from Moon regolith that generate solar power and support plant growth for sustainable lunar living.
Cleafy researchers discover fake VPN streaming app Mobdro Pro that installs Klopatra banking Trojan, giving attackers full control over Android devices.
Police departments across the U.S. and Canada are adopting virtual reality training to better prepare officers for high-pressure, real-world situations.
House Bill 469 would prevent AI systems from owning property, serving as executives, or gaining legal personhood in Ohio under Representative Thaddeus Claggett's proposal.
Public voter records expose retirees' personal details to election scammers who create targeted cons using names, addresses, and voting history data.
Instead of fearing what comes next with artificial intelligence, think outside the box. Here are high-earning AI jobs that don't require a computer science degree.
OpenAI CEO Sam Altman says polite words like "please" and "thank you" cost millions annually, while direct prompts may improve ChatGPT accuracy by several points.
Chattee Chat and GiMe Chat exposed intimate conversations and photos, revealing users spent up to $18,000 on AI companions before the breach.
New Instagram parental controls allow families to manage teen screen time and content limits through the Family Center with stricter safety settings.
Third-party security breach at Discord exposes sensitive user information including government IDs, highlighting cybersecurity risks from external service providers.

Microsoft Navision Database Selection: C/SIDE or MS SQL Server - Overview For IT Specialist

There are certain pluses and minuses in both cases and... Read More

Will Adobe Manage to Replace Industry Work Horse Quark Express by Giving Adobe InDesign for Free?

And kill the best layout software in the process of... Read More

Internet Faxing Service Review

The Internet is reshaping every form of communications medium, and... Read More

Design a Web Album Using Adobe Photoshop- Part 2

So let's begin crunching down these 300 images using Adobe... Read More

Run Your Own Search Engine

Our hosted solution allow you to run your own search... Read More

Instant Messenger Clients

If you have been using the Internet for any amount... Read More

Begun, The Browser Wars Have

As Mozilla Firefox nears 10% market share, with well over... Read More

Microsoft CRM Development

Microsoft CRM is CRM answer from Microsoft Business Solutions.The whole... Read More

Seven Reasons Why a Hosted Inventory Management Solution Might Be Right For Your Organization

Upgrading. Downtime. Maintenance. Hardware obsolescence. Implementation issues. The litany of... Read More

Theres Gold in Your Websites Server Log

Many Webmasters have never bothered to view their website's server... Read More

The Opera Alternative

Security flaws have long plagued Internet Explorer (IE), the market-dominating... Read More

Microsoft CRM Integration with Lotus Notes Domino: Messaging Connector ? Future Directions

IBM Lotus Notes Domino and Microsoft CRM (Client Relation Management)... Read More

Microsoft Great Plains Integration Manager ? Working With Text File

Microsoft Business Solutions main middle market ERP application - Microsoft... Read More

Anti-Spyware Protection ? Holes in the Shining Armor

Looking at all the ads which promise to get rid... Read More

Groove Network. Are you in it?

If you are in a business that passes documents around... Read More

Microsoft RMS ? Great Plains Integration ? Overview For IT Specialist

Microsoft Great Plains and Microsoft Retail Management System (Microsoft RMS)... Read More

Passwords Used In Microsoft Word Documents

You would like to protect your documents, wouldn't you? Reasons... Read More

Think Of This

Think of this, first we had the HAM Radio, then... Read More

15 Questions to Ask Your Software Vendor

When making a decision to buy any piece of software... Read More

Microsoft Great Plains: exchange & brokerage ? implementation notes

If you company is small or mid-size special products or... Read More

Builders Beware

Which Type of Shop Can Rely On A Home Built... Read More

Business Plan Software Review: Ultimate Business Planner?

One of the main reasons business owners and entrepreneurs use... Read More

Linux ? Keyboard Or Mouse

Just stress testing one of the latest Linux distributions. Been... Read More

Crystal Reports For Microsoft Navision - Overview For Programmer/IT Specialist

Let us give you - developer some hints in the... Read More

Backing Up And Restoring Your MySQL Database

If you've been using MySQL database to store your important... Read More

insured cleaning company Highland Park ..