Argentum IT LLC Blog

Argentum IT LLC has been serving the Louisville area since 2010, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: What’s the Point of CC and BCC in My Email?

Tip of the Week: What’s the Point of CC and BCC in My Email?

We’ve all seen the fields in our email, CC and BCC, and most of us have probably used them before. Let’s consider where we get those terms, and how each of them is properly used.

Where Do CC and BCC Come From?

CC and BCC are holdovers from the good old days of paper communication, where it was common practice to carbon copy a document by layering a carbon sheet between two pieces of paper. When a writing utensil applies pressure to the top sheet of paper, the carbon is applied to the second, making (for all intents and purposes) a perfect copy of the message.

For the time, this method of duplication was efficient and effective, and can still be seen in certain contexts.

In the context of an email, CC—modern shorthand for carbon copy—simply means that you are sending a copy of the message to another recipient, whereas BCC—or blind carbon copy—signifies that the copy is to be sent to a recipient without the other recipients seeing that the BCC’ed person was added as a contact.

When Should You Use CC and BCC?

In fairness, there doesn’t seem to be much difference between CCing someone and sending them a regular email… So why make such a big deal about using the CC field at all?

In a word, manners. While there are few differences between the “To” field and the “CC” field, the intended use of each is the notable exception. “To” is the field that you fill out to send an email to the main recipients. “CC” is what you should use when the recipient isn’t directly involved with the conversation, but they should still be kept in the loop.

Basically, you should use CC when you want someone to have a copy of an email to reference.

BCC, on the other hand, offers its own utilities. When sending an email to a recipient in the BCC field, any of the other recipients will not see who the email was sent to. It is useful for your recipient’s privacy, as well as sending messages to a long list of recipients.

Hopefully, this will help you use your email more effectively as a communication tool.

Argentum IT LLC can help you with other variables in your IT to help use it all as effectively as possible. Give us a call at (502) 473-9330 to find out what we can do for you.

 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Tuesday, August 16 2022

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Network Security Hackers Privacy Software Business Internet Data Innovation Hosted Solutions Malware Efficiency Hardware IT Services Google User Tips Cybersecurity IT Support Disaster Recovery Email Data Backup Microsoft Computer Backup Mobile Devices Workplace Tips VoIP Communication Business Management Small Business Data Recovery Managed IT Services Ransomware Business Continuity Phishing Miscellaneous Upgrade Smartphone Users Productivity Outsourced IT Android Internet of Things Workplace Strategy Saving Money Windows 10 Windows 10 Managed IT Services Network IT Support Remote BDR Tech Term Passwords Automation Mobile Device Management Covid-19 Windows Office 365 Apps Gadgets Social Media Server Virtualization Cybercrime Managed Service Provider Save Money Spam Office Employer-Employee Relationship Data Security Alert Data Management Remote Work Firewall The Internet of Things Office Tips Retail Proactive IT Video Conferencing Managed Services Time Management End of Support Printer RMM Smart Devices Troubleshooting Supply Chain Computer Repair Manufacturing Window 10 Bitcoin AI Environment Communitications Voice Myths Audits Copiers Copier Windows Server Outsource IT Employer/Employee Relationships Online Storage Finance Hosted Desktop Threats Innovations Voiceover Internet Protocol Work Processor Policy Internet Service Provider eCommerce Infrastructure Solutions Workstations Going Paperless Windows 11 Scams Remote Working Business Telephone Benchmarks Procedure Fiber Optics Videoconferencing Print Management Managed Services Provider Reviews Authentication Organization Workstation Windows Server 2008 Streaming Azure PCI DSS Net Neutrality Healthcare CRM Cabling Facebook Privacy Leadership Inventory Windows 8.1 Cybersecurty Cost Telework Holidays Computer Tips Active Directory Regulations Compliance Inventory Management Workplace Strategies

Recent Comments

No comments yet.