Saturday, February 1, 2014

Netiquette in forewarding invitations - avoid taking this for granted!




Netiquette in forwarding invitations


Considerable care and thought should always be given to forwarding invitations. Core etiquette and Netiquette principles maintain almost sacrosanct adherence to avoid misusing the privacy of communications. If a situation is presented where an invitee wishes to add someone to a private meeting, social event, or other gathering, there are a number of steps that should be taken:


1. Seek permission of the inviter (original sender).

2. Determine who should be on the distribution list.

3. Copy the original invitee.

4. Remove unnecessary threads, but keep confidentiality clauses and disclaimers.

5. Identify that this is a forwarded document.

6. Ask the recipient not to forward the document, or attach a legal notice, if necessary.
7. Never assume a sender will approve of forwarding correspondence.

8. Do not forward documents if under nondisclosure or confidentiality agreements.

9. Never add controversial, discriminatory, or derogatory comments

to the basic text.

10. Explain briefly and clearly to the recipient why the invitation is

being forwarded. One should be mindful that some people will be offended because they were not original invitees.
11. One may be selective in showing a full list of invitees, depending on any number of reasons, including size of the list, possible effect on attendance, specific instructions, or any number of other reasons.

Hello:
This meeting invitation is being forwarded to you with permission of (invitee). We both agreed you were inadvertently omitted from the initial list. Kindly excuse this oversight.
 
Sincerely,

Paul J. Babicki
Tabula Rosa Systems
609 8181802 office
609 462 8031 cell
www.tabularosa.net 

 ====================

+++++++++++++++++++++++++++++++++++++++++


In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.



I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.



Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.


If you have not already done so, please view the trailer for my book below.

Friday, January 31, 2014

Crossware Mail Signature - A Great Product for Email! Plus a Chrome Security Update



To all please view this video. The product can be purchased through Tabula Rosa Systems, www.tabularosa.net




 +++++++++++++++++++++++++++++++++++++++++++++++++ 







National Cyber Awareness System:

01/28/2014 11:57 AM EST

Original release date: January 28, 2014
Google has released Google Chrome 32.0.1700.102 for Windows, Mac, Linux and Chrome Frame to address multiple vulnerabilities. These vulnerabilities could allow a remote attacker to cause a denial of service or bypass intended security restrictions.
US-CERT encourages users and administrators to review the Google Chrome Release blogentry and follow best-practice security policies to determine which updates should be applied.

+++++++++++++++++++++++++++++++++++++++++


In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.



I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.



Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

If you have not already done so, please view the trailer for my book below. 





Thursday, January 30, 2014

5 Electronic Laws you may not know about - via Netiquette IQ


Several posts have appeared in this blog regarding email privacy and censorship. These are from 1/13, 4/12, 5/16, 5/24 and 5/27. There has been an explosion of discussion  recently regarding email being intercepted by the NSA and other government agencies. There is still a great deal to be learned from what is really happening. To understand the dynamics best, I have put together a list of  laws which have been enacted regarding email intercept. The next few blogs will provide detail on these and what they are meant to accomplish. It is important to note that there have been communication laws since 1986. Any one of these makes for the active surveillance of a person or entity based on certain conditions. Here is a favorite quote of mine which sums up the state of privacy.

"For email, the old postcard rule applies. Nobody else is supposed to read your postcards, but you'd be a fool if you wrote anything private on one."

- Judith Martin
----------------------------------------------------------------------
The following is a list of the United States laws:

ECPA (1986) Electronic Communication and Privacy Act
Calea (1994) Communications Assistance for Law Enforcement
Patriot Act (2001) revised in 2006 Established Homeland Security laws
FISA ((2008) Foreign Intelligence Surveillance Act
FAA FISA (2012) Amendments Act

Look for upcoming posts to define what each act is intended to do . . . 
+++++++++++++++++++++++++++++++++++++++++++++++++ 

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.



I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.



Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace. Below is the trailer for my book.


 


Wednesday, January 29, 2014

Today is security Privacy Day! How Secure is Personal Information? via Netiquette IQ



Here is a set of privacy tips for personal information. Many of these recommendations are not new, but do you, as readers, actually have have these deployed? Take another look and commit to making at least one or two of the items listed your priority. Remember taht good security is a key part of Netiquette!



Data Privacy Day: How secure is your personal information?
January 28, 2014
  
Posted by Karen Neuman, Chief Privacy Officer, and Bobbie Stempfley, Acting Assistant Secretary for the Office of Cybersecurity and Communications

January 28 is Data Privacy Day, a nationwide effort to encourage everyone to protect their privacy and personal data online and educate them on how to do so. As we spend increasingly more time on the Internet at home, at work and on the go, it is essential that we know how to protect our personal information online.
Most of us use our mobile devices to check our email, read the news, and interact on social media Web sites. However, by connecting to the Internet via an unsecure network or downloading an app without knowing how our information will be used, we potentially jeopardize our personal data and put ourselves at risk to theft, fraud and abuse.
Everyone can guard against potential online risks by taking steps to protect our privacy and control our digital footprint using the following simple tips from the Department of Homeland Security’s Stop.Think.Connect.TM Campaign:
·         Secure your devices. Keep your devices from prying eyes. Set passcodes or pass phrases (long passwords) to be sure only you can access your smartphone, tablet or computer.
·         Only connect to networks you trust. Check the Wi-Fi settings on your mobile device and make sure you only connect manually to known and secure networks.
·         Secure your accounts. Passwords are no longer the only protection from would-be hackers. Enable two-factor authentication to add another layer of security. To learn more about two-factor authentication, click here.
·         Beware what you share. When you choose to share information with anyone in your networks, they can easily forward or post it somewhere else. Avoid sharing compromising photos and information.
·         Make passwords long, strong and unique. Passwords should be different for each account, have as many characters as allowed, and include numbers, symbols, and capital and lowercase letters. 
·         Think before you app. Before downloading a mobile app, understand what information (such as your location, access to social networks, etc.) the app will access and adjust your privacy settings appropriately. 
·         Back it up. Store digital copies of your documents, photos, music and other valuable information on an external hard drive.

Data Privacy Day is led by the National Cyber Security Alliance, a nonprofit, public-private partnership dedicated to cybersecurity education and awareness, and advised by a committee of privacy professionals. 
For more information, including additional tips to stay safe online, please visit www.dhs.gov/stopthinkconnect.  

+++++++++++++++++++++++++++++++++++++++++++++++++ 

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.



I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.



Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.