The Professional Development Institute®
Harvard University Global SystemTM
Harvard® Planner Group
About Us  Home  Upcoming Seminars  Harvard® Planners  Books  Français
Harvard® Frameworks & Templates: Innovation, Negotiation, Project, Risk, Responsibility Charts

Contact us:  rsvp@eharvard.org 24/7 voicemail:  +1-819-772-7777  Toll free:  1-800-HARVARD  

Practical Workshop for Administrative Assistants & Executive Secretaries
Applying Harvard University Global System™ Tools

How to Harness the Power of Email
Best Practices, Proven Methology and Practical Techniques
E-Mail Protection, Risk Prevention and Policing



Avoid inadvertently creating risky emails:

Please be careful when addressing an email to many people most of them do not know each other but can see each other email address. With the email addresses in the row designated by the word "TO", the names will be stored in each recipient PC and may inadvertently fall in the wrong hands. Every person on the list is exposed to at least three dangerous risks:

  1. Some of the recipients may unknowingly fall victim of viruses, including Trojan Horses and other malicious programs that scan email folders, collect and transmit the addresses to spammers, many of whom are offshore beyond the reach of the FBI and RCMP. As a result of a message similar to yours displaying my email address under the “TO” row, I was spammed and lost days recovering from an insidious attack that passed through my firewall, antivirus software and intrusion prevention systems.

  2. Other recipients do print the email message and will, sooner or later, innocently discard it in a refuse bin where a growing number of dumpster divers collect and resell each e-mail address in the black markets to resellers, spammers and innocent end users. Repeat offenders have been caught with printed email sheets. As a cover, some also pick soft drinks and beer cans to avoid suspicion.

  3. There have also been instances where email recipients have added names to their own list for unsolicited marketing.

  4. Solution:

    • Address the message to yourself and list everyone in the "Blind Carbon Copy" row titled Bcc. Since most email users ignore the covert theft of information taking place daily in their own computers, the fewer machines storing our email address, the lesser the risk of being spammed.
    • Educate your correspondents, friends and family members by sharing the hyperlink www.executive.org/email.
    • Request from the sender of such risky emails to immediately delete your email address from all their computer files and systems such as Outlook, Webmail, Lotus Notes, Eudora, other groupware and desktop search engines (such as Google Desktop which keeps copies of deleted files) embedded in their machines.
    • Consider contacting directly all recipients of the risky email and requesting they take the necessary steps to do the same and avoid serious consequences to everyone involved.

© A. P. Martin, 2010. All rights reserved.
Excerpts from Chapter 8: How to Harness the Power of Email in Alain Paul Martin:

Flawless Time Management:
Managing Priorities, Deadlines, Meetings, E-Mail, Interruptions and Saying No

Published by executive.org Press.

E-mail skills are extensively discussed in Practical Skills for Administrative Assistants & Executive Secretaries, a workshop applying Harvard University Global System Tools™.


Top of this page Top of this page

International 
The Professional Development Institute® PDI Inc.
PDI Conference Campus & Harvard® Worldwide Order Center
Toll-free: USA and Canada: 1-800-HARVARD (1-800-427-8273). +1-819-772-7777
Monday through Thursday: 9 AM to 4:00 PM, EDT. Voicemail: 24 hours 7 days
Important: Sorry, all visits by appointment only. No walk-ins.
70 Technology Boulevard, Gatineau, QC J8Z 3H8 CANADA. 
We are 10-minute drive from downtown Ottawa (Parliament),
Canada's capital, near the magnificent Gatineau Federal Park.

Intellectual Property