When you quote another person, edit out whatever isn't
directly applicable to your reply. By including the entire
message, you'll only annoy those reading it.
* Note that if you USE ALL CAPITAL LETTERS, people will
think you're shouting.
Finally, smile with me about the following story: According to Time magazine (7/19/93, p. 58), three women who corresponded with Mr. X over the network discovered his duplicity and went public on the network. The incident sparked a lively debate over electronic etiquette (and ruined Mr. Casanova's chances for further romance).
Fax services weigh less than your computer's printer —————————————————————————— Many online services let you send electronic mail as fax messages. This is an interesting feature when in that far away place without a printer. Send the draft contract or other texts to your hotel's fax machine or to your client's office to get a printout on paper.
Privacy ———- The level of online privacy differs by network, service, and application. Whatever these services may claim, always expect that someone, somewhere, is able to watch, even record. All mailbox services have at least one person authorized to access your personal mail box in case of an emergency. Most of the time they not have a right to read it without your permission, but they can. In some countries, mailbox services may let outsiders (like the police) routinely read your private email to check for 'illegal' contents. In this respect, email is not safer than ordinary mail. The good news is that most 'inspectors' and 'sysops' are good, honest people. On the other hand, it is useful to know your situation. It is not safe to send sensitive information (like credit card details) by private electronic mail. True, the probability that an outsider should get hold of and take advantage of such information is small, but it definitely is not 100 percent safe.
Encrypt your email to protect sensitive information.
Always assume that someone is recording all that is being said in online conferences, chats, and other interactive social gatherings. In chats, anyone using a personal computer as a terminal can log the conversation, or use screen dump just to capture 'interesting parts'. Many PC users can scroll back the screen. They can wait and decide whether to save the conversation in a file until after the conversation has taken place. With these capabilities widely available, users of chats and talk should always assume that their conversations are being recorded. Do not say indiscreet things in small, informal discussions. It may be recorded and reposted under embarrassing circumstances. The program PGP has become the defacto international Internet standard for public key encryption. For more on privacy, check out ETHICS-L@MARIST.BITNET. The files RFC 1113 through 1115 are about 'Privacy enhancements for Internet electronic mail' (see appendix 1 for how to get them). Usenet has alt.privacy (Privacy issues in cyberspace), and comp.society.privacy (Effects of technology on privacy).
File transfers through the Internet —————————————————- The Internet is a term used of a network interconnecting hundreds of thousands of computer centers around the world. These centers use different types of hardware and software, and different methods of file transfer. What method to use for file transfers depends on the source host and the type of mailbox computer that you are using. The transfer usually takes place in two steps:
1. Transferring files from a remote data center to your local
mailbox host.
2. Transfer from your local mailbox host to your personal
computer.