Saturday, May 3, 2014

10 Core Netiquette Forms of Business Mail - From Netiquette IQ




None of the different email categories have more of a need to employ Netiquette than business-related emails. Basically, virtually all categories of Netiquette are important within the business email. The composition and distribution of business emails requires full attention and care. This is in part because no category of email, other than solicitation or junk mail, is typically as distanced interpersonally as this category is.
             Any item related to a business email can have a profound or immediate effect in the business correspondence. This can be something such as the capitalization of a word, a punctuation mark, or the salutation.
            Personal, casual, or even generic emails present far more tolerance to Netiquette mistakes. For example, an email sent to a relative who  does not capitalize their name will rarely be taken badly, but a similar error in a message sent to a stranger in a business context might easily be noticed and reacted to negatively. There is a great deal of detail involved with business. These will be presented in blog postings (see http://netiquetteiq.blogspot.com). The specifics will be characteristics of these forms:
1.         Business to business
2.        Business to customer
3.        Marketing
4.        Invitations
5.         Business introductions
6.        Cover—résumés
7.        Cover—other attachments
8.        Newsletters
9.        Complaints
10.          Employment—offer/acceptance/decline
11.          Scheduling
12.          Memorandum of understanding
13.          Cover—proposal
14.          Reference
15.          Billing—reminders/invoices/other notifications
16.          Promotion
17.          Letter of credit
18.          Acknowledgement of receipt
19.          Nondisclosure
20.          Thank-you


Netiquette IQ - A Book Review



For those of you unfamiliar with my book, here is a review of it published by Kirkus Reviews
Kirkus Reviews last Fall. If you enjoy this blog, I believe the book will provide both a short term and long term value!

TITLE INFORMATION
NETIQUETTEIQ
A Comprehensive Guide to Improve, Enhance and Add Power to Your Email
Babicki, Paul
CreateSpace (264 pp.)
$18.95 paperback
ISBN: 978-1481849524; September 14, 2013
BOOK REVIEW
A revealing primer on the art of effective emails and other communications.
Babicki, in his debut self-help guide, covers the many peculiarities of computerized messaging: How to shape an eye-catching subject line; how to troubleshoot error messages from a returned email; what the file-extension suffixes on attachments mean; what the email time stamp tells others about your personality (night owl vs. early riser); and how to
craft a corporate email security policy. His advice on these sometimes-arcane topics is precise—“RTF format should only be used when it is certain that the recipient uses Outlook”—while also remaining intelligible to laypeople. The author also instructs readers on time-honored principles of proper English and clear expression. He delves with detailed
lucidity into rules of grammar, punctuation and usage; prescribes the proper formatting of numbers and dates; and inveighs against the dangling participle. He also explores the tonal shadings of different kinds of salutations, crusades for concise and gracious style, warns against the gassy redundancy of such wordings as “final outcome” and “at an early time,” and appends a blacklist of “the most irritating phrases,” from “out of the box” to “team player.” Good writing grows from good thinking, so he instructs readers on the pitfalls of logical fallacies, from the ad hominem attack to the begged question, and on the distinctions between assumption, presumption and inference. Furthermore, since communication is the cornerstone of civilized life, he limns its legal and moral underpinnings in copyright and plagiarism strictures, codes of courteous Internet deportment and techniques for pacifying flame wars. (He recommends a “Zen” approach, for example, in replying to angry missives.) The result is a mashup of Strunk and White, Miss Manners, Aristotle and Microsoft Help, all laid out in a well-organized, very readable text sprinkled with amusing examples and phrased in the tart, aphoristic style of an exacting schoolmaster (“The better it sounds, the more it is trusted”). Overall, Babicki’s technical expertise and literary aplomb make this a fine manual for the everyday scribe. A comprehensive, stimulating guide to getting the word out.


Friday, May 2, 2014

Netiquette and LinkedIn - Some Observations - Via Nertiquette IQ


LinkIn is arguably the most influential social media product. Of course, Netiquette applies to it as significantly as it does to email. Here are some excellent tips from the article below. These are approaches not to take! Refer to this blog and others for positive tips.


Monday, April 14th, 2014 CareerSearch

LinkedIn “Netiquette” Are You Asking for Too Much Too Soon?
I was recently interviewed by my hometown newspaper, the New York Post, about the do’s and don’ts of LinkedIn etiquette. One of the biggest problems I see with people’s approach to using LinkedIn for job search is that many have unrealistic expectations for the online relationship and ask for too much too soon.
Something strange seems to happen to some people when they network online. It’s as if some people think that none of the common rules for building relationships exist. Could you imagine ever saying any of the following things over the phone or in person to someone you don’t know?
  1. I’ve seen you walking down this block in the neighborhood before. Want to meet for coffee?
  2. Someone told me we used to work for the same company that employs 20,000 people. Want to chat sometime?
  3. I found your number in the phone book. Maybe we have something in common.
  4. I heard through the grapevine that you work for a company where I would really like to work. Can you tell me more about what it’s like to work there?
  5. I found you in the 1997 student alumni directory. I’m a graduate of the class of 1980. Would you like to compare notes?
  6. I know I’ve never actually met you before and you have no idea who I am. But someone suggested I say “since you are someone I know and trust, I would like to add you to my network.” Does that work for you? (Hint: that’s verbatim from a LinkedIn template that people seem to use whether they know you or not).
  7. You looked like someone I should know so I followed you home, made note of your address and then did a search to find your phone number. Would love to meet formally sometime.
  8. I found your name and number written on a cocktail napkin at a local restaurant and I decided to call you. I figured, “what do I have to lose?”
Of course you wouldn’t say any of these things! So why do people think this approach will work online? If you are using LinkedIn or other social media tools to connect with others, create authentic relationships and recognize that the affinity will grow over time. Even on Twitter where there are generally no gatekeepers for connecting with others, it’s still advisable to follow the person for awhile and create a supportive and non-threatening dialogue before bringing the relationship face to face.
I am a fairly open connector on LinkedIn as well as other social media platforms. But I have to know a little bit about you and why you want to connect before I accept. Isn’t that just common sense?
========================================
  In addition to this blog, I have authored the premiere book on Netiquette, " Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". You can view my profile, reviews of the book and content excerpts at:
 www.amazon.com/author/paulbabicki
 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ Rider University and  PSG of Mercer County, NJ.

 Great Reasons for Purchasing Netiquette IQ
·         Get more email opens.  Improve 100% or more.
·         Receive more responses, interviews, appointments, prospects and sales.
·         Be better understood.
·         Eliminate indecision.
·         Avoid being spammed 100% or more.
·         Have recipient finish reading your email content. 
·         Save time by reducing questions.
·         Increase your level of clarity.
·         Improve you time management with your email.
·        Have quick access to a wealth of relevant email information.
Enjoy most of what you need for email in a single book.
===========================================

Netiquette - Security Bulletin - Microsoft Vulernability Updates for This Week Via Netiquette IQ

As many of you readers know, Netiquette puts out security bulletins on a regular basis from US-CERT. There are a multitude this week. Security is an essential part of Netiquette as it maximizes the integrity of your electronic communications in many ways.

Kindly refer to the link:

MS14-021 



============================================
 In addition to this blog, I have authored the premiere book on Netiquette, " Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". You can view my profile, reviews of the book and content excerpts at:
 www.amazon.com/author/paulbabicki
 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ Rider University and  PSG of Mercer County, NJ.

 Great Reasons for Purchasing Netiquette IQ
·         Get more email opens.  Improve 100% or more.
·         Receive more responses, interviews, appointments, prospects and sales.
·         Be better understood.
·         Eliminate indecision.
·         Avoid being spammed 100% or more.
·         Have recipient finish reading your email content. 
·         Save time by reducing questions.
·         Increase your level of clarity.
·         Improve you time management with your email.
·        Have quick access to a wealth of relevant email information.
Enjoy most of what you need for email in a single book.
===========================================

Thursday, May 1, 2014

Netiquette Quote of The Day - Privacy - Via Netiquette IQ

Earlier this week, I did a post of surveillance and privacy. The desire for humans to have some sort of privacy is not new. This quote beautifully conveys the message of how devastating a lack of privacy can be .
===============================================
"Sarcasm: the last refuge of modest and chaste-souled people when the privacy of their soul is coarsely and intrusively invaded."
Fyodor Dostoevsky
============================================
 In addition to this blog, I have authored the premiere book on Netiquette, " Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". You can view my profile, reviews of the book and content excerpts at:
 www.amazon.com/author/paulbabicki
 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ Rider University and  PSG of Mercer County, NJ.

 Great Reasons for Purchasing Netiquette IQ
·         Get more email opens.  Improve 100% or more.
·         Receive more responses, interviews, appointments, prospects and sales.
·         Be better understood.
·         Eliminate indecision.
·         Avoid being spammed 100% or more.
·         Have recipient finish reading your email content. 
·         Save time by reducing questions.
·         Increase your level of clarity.
·         Improve you time management with your email.
·        Have quick access to a wealth of relevant email information.
Enjoy most of what you need for email in a single book.
===========================================

Netiquette IQ - Tabula Rosa Newsletter and Our New Podcast on May 3rd

Safend Data Protection from WAVE; Innovative Company Culture a workshop with Frank Wander May 15th; from the Netiquette IQ blog: Three Types of Email, and an interview with the "landing expert," Alex Freund, a career and interviewing coach.

Products, Blogs and Speakers

Each week we will highlight one of our products, share a Netiquette IQ Blog and direct you to our BlogTalkRadio program which airs on Saturday's at Noon , EST.

Tabula Rosa Systems (TRS) is dedicated to providing Best of Breed Technology and Best of Class Professional Services to our Clients.  TRS offers product design, implementation and support services on all products that we represent. Additionally, TRS provides expertise in Network AnalysiseBusiness, Application ProfilingePolicy and eBusiness Troubleshooting.

A special thank you to David Schuchman for his MailChimp expertise.


Safend Data Protection Suite

Complete Visibility, 

Control and Protection

More than 60 percent of corporate data lives not on servers but on laptops, tablets, and other vulnerable devices. That’s right: the usual server-oriented gateway solutions and written (i.e. easy to ignore) security policies won’t cover even half of your data—or your butt.
The Wave alternative is to guard each individual endpoint. Our Safend Data Protection Suite goes wherever your devices go, on or off your network, online or offline. Which means it protects your data from the full range of modern risks: device theft, missent emails, flash drives, portable hot spots … even (and no other product can say this) hardware keyloggers. All the stuff your nightmares are made of. And it’s managed with a single console.
  • Finalist, “Best Data Loss Prevention,” 2012 SC Magazine Award
  • Winner,  2012 Global Excellence Awards in endpoint security
  • Five stars from SC Magazine
  • Multiple industry certifications
Compliance made 
simple
Safend Data Protection Suite enforces security policies automatically. Careless or just plain busy end users can’t ignore the rules. It even comes with security policies preconfigured to meet PCI, HIPAA, SOX, and other regulations. And with its array of logs and reporting tools, proof of compliance can be as easy as printing out a report.

Built in-house for better performance and stability

Unlike competing products (Symantec’s, McAfee’s), ours is built entirely in-house—not with third-party components that leave multiple softwares running in the background. So your machines won’t slow down or, worse, crash.

All at a price you can live with

Partly because we keep it simple, Safend Data Protection Suite costs less than competing products. For example, its single-agent architecture means that you can add any module in the suite without adding more software to run it. You just buy the license and turn it on. And of course we give you a deal when you buy the whole suite.
Not convinced you need us? We invite you to download Auditor at no charge. It can be an eye-opener.

Data mapping

Safend Discoverer

Find out where you’re vulnerable: locate and map stored data. The need for new security measures will quickly become apparent. Discoverer is the only such tool that’s managed with a single console. More

Data loss prevention

Safend Inspector

For the age of the mobile device, an affordable, truly custom solution to content control, whether users are on or off the company network, online or offline. Preconfigured security policies make compliance automatic. More

Reliable encryption

Safend Encryptor 

Laptops are easy to lose or steal. With Encryptor, any sensitive data on them (or on your desktops, for that matter) can’t be read by the wrong people. So a lost laptop is just a lost laptop—not a news story. More

Endpoint monitoring

Safend Protector 

By logging every movement of data in and out of your organization, Protector makes everything your people are doing with their devices 100 percent visible. It’s built-in accountability. More

Security compliance

Safend Reporter 

Reporter identifies common security breaches—and gives you the analysis you need to make sense of them. It also makes compliance as easy as sending a email or clicking “print.” More

BYOD security

Safend Mobile Protection

Custom, content-aware policies help you prevent sensitive information from leaking through unsecured mobile devices. Safend Mobile Protection blocks emails with sensitive data from being delivered to mobile devices.
For more information, call Tabula Rosa Systems at 609-818-1802, or email sales@tabularosa.net

May 15, 2014

http://www.itexcellenceinstitute.com/

How to Create an Innovative Culture

Innovate or Perish. Every firm now faces daunting challenges: Cloud, Mobile, Social Media, Big Data, Security and an Employee Disengagement Crisis. Some are even calling this the end of business as we know it!
At this half-day workshop you will learn how to avoid becoming a casualty.
This is an Interactive Leadership Workshop Led by Frank Wander, Author of Transforming IT Culture
Space is Limited. 
Please Click Here to Reserve Your Seat Now.


Three Types of Email

Writing effective and proper emails, utilizing good Netiquette, necessitate an understanding of what type of email one is writing. The following represent several of these.

Every email can be categorized into arguably, at least ten unique types.  All of these share common Netiquette principles.  Additionally, there are unique attributes and particulars which are specific to each category.  As such, insuring proper adherence and optimizing best practices within each mail type insures the best possible results.  There are obvious differences, attributes and nuances for each and these will be discussed in this section.

1)  Personal – Clearly this type of email allows for the greatest flexibility, particularly with immediate family.  Moreover, this type of email tolerates the greatest range of Netiquette interpretation.  Despite allowing for exceptions these should not go so far as to affect and carry over into authoring other more formal and structured compositions.  Remember the rule of “composing emails consistently.”  The composer of personal emails should, at a minimum, keep within the basic rules of Netiquette. In a personal email, the salutation, body, closing and signature can accommodate the most flexibility.

2)  Introductory – This category of email can be a personal, business or solicitation form.  By its very name, the usual common thread is that it is a first time message and might very well be one that is not expected by the recipient.  Therefore, special attention must be given to the subject line and first paragraph in order to a) be opened; b) be read; and c) be effective.

In terms of the subject line, an attention producing or recognizable description is very important, particularly if the sendee has no reason to open the communication from seeing the user’s name, organization or cc receipts.  For example, if the message is referral precipitated, the person should be mentioned in the subject line such as:

“John Brown suggested I contact you”

“Our mutual friend John Brown”

If there is not a common thread, a short and pertinent subject title is very important.

The first paragraph of an introductory message should get straight to the issue.  If there is a referral, the party should be mentioned right away:

“My name is Sam Smith. We have not previously met and the reason for this email is Jane Brown suggested I contact you."  Any amenities can be done later.  Keep the overall email short and purposeful.  State a next step or action and specifically give the recipient a convenient way to reply.

3) Emotive - These types of email express some sort of emotion ranging from congratulatory to ones of sympathy.  These can be personal, business or informative.  They might be addressed to a single individual or to an entire company.  Similar to the introductory email, these should be brief and provide for an explanation or purpose of the email in the first sentence or paragraph.  Any niceties or supplemental information can be added after this.  Keeping the message on key is usually the most appropriate and most adherent to Netiquette.  Requests for replies are usually not appropriate.


Upcoming Events on
BlogTalkRadio,
Saturdays at Noon (EST)


5/3 (Noon) EST
Alex Freund
Known as the "landing expert," Alex is an effective and successful career and interviewing coach. He is prominent in several on- and off-line job-search networking groups, conducts workshops on effective resume development and use of LinkedIn in the job-search process, teaches a career development seminar, and publishes a blog designed especially for job seekers.

5/10 (Noon) EST
Gene Salvadore
Founder, President and CEO of Convergent Search Group, Inc., and Managing Director of CompuSearch of Cranberry brings with him more than a decade of engineering sales and executive search experience including prior employment within the Management Recruiter International network. Gene has worked comprehensively with clients throughout the United States building national sales and sales engineering teams focused upon network and enterprise systems providers. Utilizing his extensive contacts throughout the industry and strategic partnerships with other key recruiters who similarly specialize in his area of expertise, he possesses a unique understanding of the key players and the specifics of their highly sophisticated product offerings.

5/17 (Noon) EST
Wanda Ellett
FounderG45 Consulting, a certified Minority-Woman owned, privately held firm dedicated to providing outstanding service for their clients.  Their team consists of energetic solution driven professionals, spanning many industries, specializing in Technology and Finance.