Blind CC (Bcc): Master Its Use When E-Mailing

If you use Microsoft Outlook (or similar applications) for e-mailing, then you are familiar with the fields at the top of a new mail message, right? Of course, in the "To..." field, you enter the name of one or more persons you intend to receive your message. Use the field labeled "Cc..." (for Carbon Copy - remember how they did it back in 1978 BC, "before computers"?) for anyone who needs to view your e-mail but is not the addressee.

But there's an additional field that you should know about, labeled "Bcc...," which stands for "Blind carbon copy," or the updated version, "Blind courtesy copy." This field is for the names of anyone that needs a copy of your e-mail without the other people (in the "To..." and "Cc..." fields) knowing about it. That's why it's called "Blind."

"But wait a minute," you might be saying. "I don't have a "Bcc" field just after the "Cc" field in my version of Outlook." When you launch a new mail message, you might have "To...," "Cc...," and "Subject..."--nothing more. That's because "Bcc" is on a toggle; you can turn it on and off from your "View" menu. If your "Bcc..." is not showing, you can turn it on when you are in a mail message by going to the "View Menu" and selecting "Bcc Field." A checkmark will appear and the field will become visible at the top of your mail message, just above "Subject...". (Similar applications should also give you the option to turn "Bcc" on if it is not continuously visible.)

You should know about and carefully use "Bcc" for a number of reasons. I'm going to cover some of the most important.

Use Bcc to protect privacy ? When an e-mail is sent to a whole group of people with all of their names in the "To..." or "CC..." fields, each one of them has access to the e-mail address of all the others. Normally this would not be a problem internally, but if you are sending an e-mail to employees as well as some outside of your company, use the Bcc field to hide all of those internal addresses. You will be preventing your company's people from getting spam and other unwanted e-mails.

Use Bcc to keep upper management informed ? Sometimes you are sending an e-mail message at a manager's request, and you want to let the manager know that you complied. It may not be helpful, however, to make the manager's name visible in "Cc," because this may add stress or cause unnecessary concern for the addressee. If you consider that to be the circumstances, use Bcc for the manager's copy. But this is always a judgment call, because sometimes it is important for addressees to know the manager is looking over their shoulder, especially if you have a tight deadline.

Use Bcc to make your message more personal ? Do you feel differently about a message addressed solely to you versus one sent to all of your company's employees? The same principle works in the opposite direction, as well. If you place everyone's name in the Bcc field, then each will have the impression that you wrote your e-mail just for them. Be careful in your wording, however, because this tactic will backfire if your letter contains second-person plurals, such as "All of you may be wondering...".

Use Bcc to keep an archive of your correspondence ? This nifty trick depends of having or obtaining a separate e-mail address from your conventional business address. Place that address in the Bcc field, e.g., "yourname@freemail.com," and Outlook will send a copy of your e-mail to that address. This can be helpful if you are wanting a quick way to keep track of all of the e-mail you send out regarding a particular project or issue.

Caution: When Bcc can backfire ? There are times, however, when you should think twice before entering a person's name in Bcc. If your addressee hits "Reply to all," the reply will not go back to the BCC addressee(s). But still, that reply might not be worded as carefully as it would be if the sender knew everyone listed in Bcc. To put it bluntly, this is how people get insulted and feelings get hurt. If you are dealing with an issue that is the least bit touchy or even volatile, you would do well to steer clear of Bcc.

* * *

Copyright ?2005 Steve Singleton, All rights reserved.

Steve Singleton has written and edited several books and numerous articles on subjects of interest to Bible students. He has been a book editor, newspaper reporter, news editor, and public relations consultant. He has taught Greek, Bible, and religious studies courses Bible college, university, and adult education programs. He has taught seminars and workshops in 11 states and the Caribbean.

Go to his deeperstudy.org for Bible study resources, no matter what your level of expertise. Explore "The Shallows," plumb "The Depths," or use the well-organized "Study Links" for original sources in English translation. Sign up for Steve's free "DeeperStudy Newsletter."

limo prices to midway Crystal Lake west of Randal .. Lockport Chicago limo O’Hare
In The News:

Creating an email alias can help clean up your inbox by organizing emails based on purpose, like creating different aliases for shopping, newsletters and work.
A multipurpose robotic system promises to transform how items are stacked onto pallets, aiming to maximize space utilization and reduce shipping costs.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
The number of people affected by a UnitedHealth data breach in February 2024 was actually higher than previously reported and was the largest medical data breach in U.S. history.
A phishing campaign uses Google Calendar to schedule fake meeting invitations that appear legitimate, redirecting targets to phishing sites.
Toll road text scam: Fake messages claim unpaid fees, seek payment via fraudulent links. Kurt “CyberGuy" Knutsson says this scam is becoming increasingly sophisticated and widespread.
Kurt “CyberGuy" Knutsson says these steps ensure that your friends and family get to the exact moment you want them to see. Try it out and streamline your sharing experience.
Tech expert Kurt “CyberGuy" Knutsson offers tips on how to protect your identity: Be vigilant, monitor accounts, use smart security, know theft response.
Tech expert Kurt “CyberGuy" Knutsson says cybercriminals are exploiting iMessage phishing protection, tricking users to reactivate links.
It's hard to imagine life without in-flight Wi-Fi these days – but sky-high web surfing comes with its own set of privacy concerns. Here's how to protect yourself.
Over 400,000 cases of credit card fraud were reported in 2024 to the Federal Trade Commission. The CyberGuy explains how to protect against becoming another victim.
A nondescript metal box transforms into a fully functional electric motorcycle that blurs the line between vehicle and urban infrastructure.
Many apps unrelated to location still ask users for tracking permission, and Texas Attorney General Ken Paxton has filed a lawsuit seeking to end this alleged practice by Allstate.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Melody, the artificial intelligence-powered robot, is life-sized and represents a move toward creating robots that resemble people in appearance and interaction.
Here are five easy smartphone rules from the National Security Agency that you can follow to better protect your mobile device from hackers and scammers.
A U.S. robotics company has developed "Jennie," a robotic pet powered by artificial intelligence that's designed to comfort those facing mental health challenges.
Healthcare records for more than 184 million Americans were breached in 2024, but you can take steps to minimize that risk. Kurt the CyberGuy explains.
The Skyrider X1 from Rictor claims to be the "first amphibious flying passenger motorcycle," and it combines land and air travel in one sleek design.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Home inventory and restoration apps help itemize and track every item in your home in the event you have to make an insurance claim after a natural disaster.
The White House launched a new cybersecurity safety label, the U.S. Cyber Trust Mark, intended to help consumers make informed decisions on smart device safety.
Today's tech can help make life so much easier — if you know how to use it. Here are a few tips on the quickest and best ways to make your phone, laptop and other devices work for you.
Tech expert Kurt “CyberGuy" Knutsson offers Windows 11 restart fixes: Update drivers, run system scans and check hardware.
Sony and Honda's Afeela 1 EV launches with advanced tech and entertainment for $89,900. Tech expert Kurt “CyberGuy" Knutsson gives his takeaways.

Off The Record - Tips For Picking Recording Software

Need software to record your voice, streaming audio or musical... Read More

Imagine if Everyone Working In Your Office Was In Synch?

Microsoft-Outlook is a pretty amazing program. So much more than... Read More

EDI: Electronic Document Interchange for Microsoft Great Plains ? Overview for Software Developer/Pr

Microsoft Great Plains - Microsoft Business Solutions accounting and ERP... Read More

How to Backup Windows XP Home Edition

Your computer cost you from hundreds to thousands of dollars,... Read More

A Guide To Purchasing Professional XP Icons Online And Enhancing Your Applications

Icons are used everywhere; right from software applications, to internet... Read More

eCommerce development for Microsoft Great Plains: tools and highlights for programmer

Microsoft Business Solutions Great Plains, former Great Plains Software Dynamics... Read More

Corel WordPerfect 7 Macro Programming Example

Case study: A secretary using Corel WordPerfect 7 is often... Read More

What is Shareware?

Shareware is software that you can try before you buy;... Read More

Great Plains Dexterity History and Programming Overview

As of now - Great Plains Dynamics/eEnterprise is transformed/renamed into... Read More

Five Reasons for Using an O/R Mapping Tool

So, why should you use any O/R mapping tool? I... Read More

Can You Calculate Complex Financial Calculations?

Are you a whiz at calculating financial information? Not the... Read More

Microsoft Great Plains - Typical Problems And Fixes ? Overview For IT Administrators

How to delete the user? This is the first problem... Read More

Who Is Minding Your Sensitive Data?

Stealing company information used to be the specialty of spies... Read More

Microsoft Retail Management System (RMS) SQL Customization ? Overview for Programmer

Microsoft Retail Management System serves retail single store as well... Read More

Great Plains Dexterity Programming ? Overview For Developer

Looks like Microsoft Great Plains becomes more and more popular,... Read More

Microsoft Great Plains Integrations - Tips for Developer

In this short FAQ style article we would like to... Read More

Adware and Spyware

What is 'adware'?Adware is basically software or scripts that are... Read More

Microsoft Great Plains: Dexterity vs. eConnect ? FAQ

Microsoft Business Solutions Great Plains, former Great Plains Software Dynamics/eEnterprise... Read More

Five Steps to Rapid Development with TierDeveloper 4.0

Follow the steps below to quickly design, generate, and deploy... Read More

.Net Charts and Graphs Interact with Businesses and Customers

Bar charts, bar graphs, and any other chart or graph... Read More

SQL: Querying Microsoft Great Plains ? Overview for Database Administrator/Developer

Looks like Microsoft Great Plains becomes more... Read More

Microsoft Great Plains implementation: Restaurants Supply Chain Management Example

Microsoft Great Plains serves majority of US based horizontal and... Read More

Microsoft Great Plains IV: Inventory Management

Great Plains Inventory Management (IV) module gives your business a... Read More

Microsoft CRM Customization ? Programming Closed Email Activity

Microsoft CRM is CRM answer from Microsoft and attempt to... Read More

Spyware Protection: A Must for Any Home Computer

Now that spyware is the single most dangerous threat to... Read More

taxi o'hare Auburn ..