Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: The Best Practices of Adding People to Emails

Tip of the Week: The Best Practices of Adding People to Emails

Whenever you go to send an email, you might glance at the CC and BCC fields and wonder what they are used for, or perhaps you are an avid user of both. Well, let’s take a look at what CC and BCC are supposed to be used for and whether or not you actually use them for their intended purpose.

Where Do CC and BCC Come From?

CC and BCC are remnants from when paper communication ruled the roost. CC stands for carbon copy, a practice in which a document was copied by layering a carbon sheet between two pieces of paper. Writing utensils would then put pressure on the top sheet of paper with the carbon beneath it applying pressure to the second, creating what is essentially a perfect copy of the message.

In the context of email, CC is sending a copy of a message to another recipient. BCC (or blind carbon copy), on the other hand, allows you to send a copy of a message without the recipients seeing others on the email chain.

When Should You Use CC and BCC?

At first glance, there doesn’t appear to be a major difference between CCing someone and sending a regular email, but there is a bigger one than you might think—especially in terms of proper manners and etiquette. The “To” field and the “CC” field have two different uses. “To” is the field you use to send an email to its main recipients. “CC” is meant to be used when the recipient isn’t directly involved with the conversation, but still wants to be kept in the loop. You can think of CCing someone on an email as providing them with a copy of the email for reference.

BCC is best used when you don’t want other recipients to see who the email was sent to. It’s useful for when you want to respect the privacy of those involved or if you have a long list of recipients that does not necessarily require a mail merge.

Hopefully, this will help you use your email more effectively as a communication tool.

We can help your business learn more about communication solutions and understand how the many technology services you use work toward improving your business. To learn more, reach out to us at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Business Continuity Smartphones Communication IT Support Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Business Management Users Managed IT Services Windows Upgrade Phishing Data Backup Outsourced IT Ransomware Windows 10 Office Server Save Money Cloud Computing Data Recovery Passwords Windows 10 Saving Money Holiday Tech Term Chrome Gadgets Social Media Virtualization Managed Service Managed IT Services Microsoft Office Automation Operating System Facebook Computers Artificial Intelligence Cybercrime BYOD Mobile Device Management Networking IT Support Hacking Internet of Things Wi-Fi Health Information Remote Spam Office 365 Managed Service Provider Telephone Systems Covid-19 Information Technology Alert Bandwidth Router Social Engineering BDR Mobility Recovery Employer-Employee Relationship Money Application Data Breach Encryption Remote Monitoring Applications Big Data Law Enforcement App History Mobile Computing Password Human Resources Apps Paperless Office Remote Computing Mobile Office Government How To Office Tips Training Private Cloud VPN Data Storage Managed IT Patch Management Blockchain Website Two-factor Authentication Budget Servers Mouse HaaS Google Drive Infrastructure Voice over Internet Protocol Data Security Avoiding Downtime Wireless Gmail Flexibility Marketing Settings Bring Your Own Device WiFi Vulnerability Data Management Windows 7 IT solutions Work/Life Balance Entertainment Word Telephone System Staff Virtual Reality Software as a Service Apple USB Machine Learning End of Support Vendor Management Connectivity Social Remote Work Education Physical Security User Error Safety HIPAA Meetings Sports Redundancy Keyboard Vendor Risk Management Managed Services Hacker Display Data Protection The Internet of Things Lithium-ion battery Employee/Employer Relationship Save Time RMM Conferencing Firewall Cleaning Scam IT Management Digital Signage SaaS Botnet IT Plan Battery Network Congestion Shadow IT Update Legal eWaste IT Consultant Procurement Unsupported Software Net Neutrality Workplace Strategy Internet Exlporer Google Docs Humor Help Desk Charger Identity Theft Printing PDF Compliance Computer Care Wearable Technology OneNote Retail Hard Drives Current Events Augmented Reality Telephony Proactive IT Instant Messaging Managed Services Provider Excel Samsung Robot Fraud Best Practice Database Remote Worker YouTube Biometrics Remote Workers Value Black Market Virtual Desktop Cryptocurrency Electronic Medical Records Processor Spam Blocking DDoS Virus Document Management Hiring/Firing Solid State Drive SharePoint Wireless Technology Hard Drive Comparison Unified Threat Management How to Downtime CES Computer Accessories Computing Data storage Customer Service Business Technology Content Management Environment Automobile Access Control Business Intelligence Fax Server Virtual Assistant Computing Infrastructure Printer Worker Authentication Going Green Bluetooth Audit Trend Micro Cables Streaming Media Tablet Public Computer Dark mode Reputation Domains SMS Regulations Tech Support Default App Printer Server Transportation Content Rootkit Project Management Techology Procedure Nanotechnology Laptop Saving Time Telecommuting Computer Fan Shopping Cortana Google Search IaaS dark theme Customers Maintenance AI Digital Signature Bloatware IT Infrastructure Workers Benefits Audiobook Bing Warranty FinTech Touchpad FENG Social Network Google Apps Tablets IBM HVAC Politics Advertising Analysis Flash Entrepreneur Investment Smart Technology Administrator Employees Devices Employee/Employer Relationships Shortcut Software Tips Notifications ISP Supercomputer Windows 365 Enterprise Content Management MSP Video Conferencing Accountants Sync Cost Management ROI Emails Shortcuts Microchip Sales Thought Leadership Social Networking Bitcoin Credit Cards Relocation Personal Password Manager Consultant Cryptomining Point of Sale Password Management Supply Chain Management Multi-Factor Security Netflix Analytics Two Factor Authentication Root Cause Analysis Search Engine Video Games Running Cable Monitoring Twitter Batteries Windows 8.1 NIST Digitize Business Mangement HBO Memory Best Available Knowledge Music Worker Commute Experience Smart Tech Skype WIndows 7 Windows Server 2008 R2 Trending Amazon Data loss Scalability Customer relationships Addiction Email Best Practices IT Assessment Recycling Outlook Manufacturing Leadership Troubleshooting Business Owner Wiring Practices Start Menu NarrowBand Managed IT Service Amazon Web Services Screen Mirroring Science Security Cameras Loyalty Search Computer Tips Cache Virtual CIO Safe Mode iPhone OneDrive Criminal Frequently Asked Questions Biometric Security Books PowerPoint Windows Media Player GDPR Peripheral Hosted Computing Mobile User Windows 10s Using Data Online Shopping Cast Distributed Denial of Service Digital Security Cameras Wireless Internet Customer Relationship Management File Sharing Files Copiers Tip of the week Analyitcs 5G webinar Emergency Employer Employee Relationship Camera Quick Tip Inventory Professional Services Chromecast Programming Managing Stress Specifications Public Cloud Evernote Smartwatch Assessment Ergonomics Wire Colocation Development Windows Server 2008 Uninterrupted Power Supply OLED Travel Cameras Printers Antivirus PCI DSS Tools Virtual Machine Millennials Fiber Optics Wireless Charging Windows 8 Employee Television 2FA Smart Office Monitor IT service Messaging Cabling Virtual Private Network Policy Hypervisor Workforce

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code