A bane or a boon, email has been with us for over a generation now and has transformed business communication in ways we could not have imagined. Today, email is the most common means of formal written communication, both for communication within an organization and for communication with external parties. The purpose of this chapter is to discuss email etiquettes, common practices that you should follow as a matter of courtesy to your recipients as well as to increase the effectiveness of your communication using email. We will look at the advantages and disadvantages of email as a medium in Section 22.2. In each of the subsequent sections, we will look at specific types of emails: job-application emails, enquiry emails, emails to report problems and emails responding to complaints.
As with any tool, email has its own set of advantages and disadvantages. Here are some of the advantages:
Along with these advantages come certain disadvantages:
Next, we will look at different types of email.
This is naturally the first type of email to be discussed, simply because you need to write a good email—along with a good resume—to get into a job in the first place. As a first step, get a decent mail id that contains your name explicitly, even if you may have to add some letters or numbers to it—no ‘cute-one’ or ‘o3tdib’ kind of usernames. Then, find out the correct and official mail id to send your application and follow the basic suggestions given below:
Use an effective ‘subject’line: If you are responding to an advertisement in a newspaper, mention that in the subject line, e.g., ‘Ref: Your Ad Ref HIN/ FOR in The Hindu 12 July 2012—Application for the post of Foreman’. If you are applying through a reference, mention the referring person’s name in the subject line, e.g., ‘Application for Senior Analyst—referred by Dr. Mathur of IIT Delhi’. An effective subject line increases the chances of your resume being considered fit for opening. Do not leave the subject line blank under any circumstance.
Use the right addressing: If you know the specific name of the recipient, make sure you start the mail with ‘Dear Mr. Abraham’ or Dear Ms. Saswati’. Make sure you use the right salutation (Mr/Dr/Ms, etc.). Else, a simple ‘Dear Sir’ or ‘Dear Madam’ would do. If you do not know the gender of the recipient, you can address ‘Dear Sir/Madam’.
Apply the 5F principle but be very brief: Just as the 5F principle (See Chapter 2) opens up your resume to the next stages, applying the same to your cover email can push your application to the resume-screening stage. It is also important that the cover email be very brief.
Make sure you mention the reference: As mentioned earlier, highlight this in the subject line itself and cc the referencing person.
Use footer: The footer of the message should identify your full name, current title, contact address (postal and email), phone/mobile numbers and also give pointers to your website, blog and any social networking site ids (like Facebook/Twitter/LinkedIn, etc.).
Keep a copy for yourself: It is always useful to store a copy for your future reference and not be in a rush to delete it.
In a corporate environment, you frequently solicit information from other people (see Box 22.1).
Componentized development: Today, most (software as well as manufacturing) products are not developed in a monolithic way. Different components are developed by different teams in an inter-dependent way and these parts have to be assembled together to form an integrated whole, which is greater than the sum of its parts. Teams may need to interact with each other and get details about the functionality of the other parts and the interfaces they offer.
Geographic work distribution: Globalization has distributed work across geographies and time zones. It is common in software to find the global delivery model where on-shore, near-shore and off-shore teams have to work together to produce complex pieces of software. In IT-enabled services (ITeS), work originates in one place and gets executed in another location miles away. In manufacturing, design comes from different locations and the actual manufacturing occurs elsewhere. If all the teams are in one location you can walk across to your colleague’s office down the hall and ask him for any clarifications. But, with geographic separation and time zone differences, this option is foreclosed. Email is your only saviour.
Large organizations: When organizations grow in size, they become rather impersonal. For example, you may need to find out the problems encountered by customers by communicating with the customer-support personnel. The customer may be in New York, you may be in Bangalore and the customer support may be in Sydney. In such cases, emails are the best formal means of communication that leave behind a trail and resolve issues quickly.
Let us look at some practical problems in making such enquiries.
So how do you resolve this fundamental issue of whom to send the mail to?
Once you find out whom to contact, there are a few more factors that you need to consider to make your enquiry effective (i.e., for you to get the information you want). These are:
Let us examine these elements in some detail.
We have already seen some tips for effective subject lines in the previous section. In addition to those discussed earlier, the following guidelines would be useful when you are sending an enquiry mail, especially to an unknown person.
A simple introduction of yourself is needed right at the outset, because the recipient probably does not know who you are or what exactly your functional role is in your organization. A possible introduction has been illustrated in Box 22.2.
I would like to introduce myself, Vijay Reddy, from Desi Computers, Inc., in India. As you may be aware, Desi Computers, Inc., manages MIRACLE’s security environment. I am in charge of maintaining the directory and security database.
Note that the introduction clearly brings out your first and last name, your organization and your role in the organization—which sets the tone for the authenticity and relevance of the body of the message (see Box 22.3).
‘I am Vijay. I am in charge of your security.’ (very abrupt, does not have sufficient context) ‘In my role as the directory administrator, I am…’ (again, not providing sufficient context)
‘I am Vijay, a distinguished graduate of IIT. I am currently at Desi Computers, Inc., which was founded…’(very wordy and rambling)
The next aspect of an enquiry email is that you should build in some defense. You are sending this email to get the information you want. You do not necessarily know whether the recipient is the correct one for the subject or whether he will help you. At the least, the recipient should not feel irritated by getting your email. If he is not the right person to service your request, he should be happy to refer you to the right person or forward your email to that person. A typical example of such a defense has been given in Box 22.4.
I am looking for some information on LDAP security. Your name was suggested by your colleague Ms Mary Angelene. (Note that we are establishing rapport and credibility, assuming Mary’s name is well known to the recipient.)
I would appreciate it if you could help me in this. If this issue is not in your group, I offer my sincere apologies. (Again, note that you are preempting any feeling of anger by this apology.) I would appreciate it if you could pass this on to anyone whom you think could help. (You have stated what you want in a polite way.)
(State your request)
Thanks in advance. (Again a very courteous end to the mail that will make it difficult for the person to e-yell at you.)
When you are enquiring, let the recipient see the importance, the urgency and the need for your request, and the sincerity of your requestand the appreciation for a response. Try to remember the following points:
An earnest and to-the-point statement outlining your request (see Box 22.5) should form the essence of your email’s body.
The product release on 28 February is critically dependent on this information and hence, I look forward to your valuable inputs at the earliest and thanks to you in advance.
Do not use this criticality every time that will reduce your credibility and the chances of the recipient responding to you (let alone responding to you in time).
What would you do if there is a real dependency and you must get the other person’s response immediately? In this case, put some thought as to what you think is the right information to approach and state your viewpoint. If you have some idea of what the right action is and you are looking to the other person’s inputs just for confirmation, you can include a default action (‘deemed approval’) in the mail and unless the recipient has serious disputes and expresses his reservations in a reply email, the default action will be taken (see Box 22.6 for an example).
Looking at the issue, my understanding is that the appropriate solution is … . Because the product release on February 28 is critically dependent on this information, can you please get back to me with any corrections by February 10?
Please note that this is not a foolproof method nor should this be used to cover yourself with an ‘I told you so’ later. Exercise caution and demonstrate professionalism in expressing the option you think is best.
Finally, have an effective, positive and courteous closure. Reaffirm your positive attitude (see Box 22.7).
A problem-reporting email arises because a glitch has not been adequately resolved through regular channels. As the author of such email, your motivation should be in problem-resolution and not in lambasting the other person or otherwise venting your feelings. Also, you should be quite tactful in writing such an email and make sure that it coaxes the other party to buy your viewpoint and nudges him into action. You should invoke the right tone, balance and list your suggestions. Remember that people generally do not like to get negative, complaining emails and so, your email should project that you are a reasonable person with a genuine problem that needs to be resolved. Also remember, such emails leave a trail behind and in the rare event the situation gets complicated, your email messages will serve you as a record of the sequence of events.
Direct it to the appropriate person—look at the project plan or the intranet directory or simply ask around and figure out who to hit. At first, fire your email just to that person. If this doesnot work out and you need to escalate the matter, ‘cc’ your email to the person one level above the recipient. You may want to keep your own boss in the loop and ‘cc’ him or her as well. Here too, you have to address some key elements.
Such emails have the following basic structure:
The subject line should clearly and unmistakably introduce the problem to the recipient. As mentioned earlier, the subject line should motivate the recipient to open the email. Vague subject lines like ‘serious problem’ or ‘SOS’ or ‘HELP!!!!!’ are inappropriate. The subject line should bring out two things: the urgency of the situation and a brief abstract of the problem being reported (see Box 22.8).
URGENT: A high priority security violation in the shopping cart application (Note the word URGENT in caps and the specific description of the problem and the area.)
Bug # 278902 from Timbuktu Airways, not resolved for 23 days (Note the specific bug #, the customer name and how long it has been left unresolved.)
Show Stopper: Year-end tax statements program crash at Country Bank of India (Note the word show stopper upfront, specific information of what fails and the customer name.)
The introduction part of the problem-reporting email is similar to that of an enquiry email. For more information, see Boxes 22.9 and 22.10.
I would like to introduce myself, Vijay Reddy, from Desi Computers, Inc. As you may be aware, Desi Computers, Inc. manages MIRACLE’s security environment. I am in charge of maintaining the directory and security database. I am writing this note because of an unresolved, critical problem in the security environment that we have not been able to resolve through the normal channels. (Note that the writer has introduced himself, his role and the specific problem he is encountering and that the problem is not resolved through normal channels—all in a matter of four lines.)
‘I am Vijay. I am in charge of your security and there is a nagging problem.’ (Not a specific description; also a very negative word ‘nagging’ and on the surface, unsubstantiated.)
‘There is the problem… which I have tried umpteen times to resolve but feels like I am knocking my head against the wall. Can’t you guys resolve these simple issues?’ (Very condescending—this mail can invoke fear but not perhaps co-operation from the recipient. He may resolve this problem, but you might have burnt the bridge for resolving future problems.)
In order to get the best result adhere to the following:
It is generally a good idea to have a separate, new paragraph for ‘eliciting action’. Here you insist on a time-bound, reasonable and objective resolution of your problem. Be firm, but courteous. For an example, see Box 22.11.
Given the serious impact the availability of hardware has on our business, I would like to see the hardware (MBI Terminal Controller 3701, with 8MB cache, which is what was originally agreed upon) commissioned at my site in the next two weeks (i.e., before 15 February 2009). Please confirm the specific date of delivery by this weekend so that I can make sure my system administrator is available.
Regards,
Vijay Reddy,
MIRACLE Security Administrator,
Desi Computers, Inc.,
234 Infantry Road
Bangalore 560001
[email protected]
Ph: +91-80-2890-9809
For a problem-reporting email, the closure should have a full signature with the role of the sender so that the credibility and authenticity of the sender is established. There is already a call for action and no specific reaffirmation is required.
The purpose of this type of email is to respond to a problem assigned to you, either directly or by your manager. Certain points need to be remembered when responding to problems over emails:
No one likes to be told that there is a problem in what they do. Even though we asked that you should rein in emotions, it is easier said than done. What you do not want to do is mistakenly send a nasty email to the person who reported the problem before you have edited it. Hence, we strongly recommend that you type the response offline in a notepad or word processing document, check it, make changes as appropriate and finally copy that into your mail and send it across.
Be very clear about who all should receive your reply. Some considerations in this regard are:
The ‘subject’ line is usually not an issue for these mails, because normally you would just need to hit the ‘reply’ button for the original mail. But, if there are too many replies and forwards, it is a good idea to refresh the subject line to avoid the multiple ‘Re’s and ‘Fwd’s that take up all the initial characters of the subject line.
In the body of the email, there is no need to have an elaborate ‘introduction’ as the sender probably knows who you are (or your role in the organization). Always start with a courteous and short preamble and apologize right away for the inconvenience caused, irrespective of what or who caused the problem (see Box 22.12).
Thanks for the mail expressing your concerns. Let me take this opportunity to reassure you that things are under control and also address the specific points you have brought up.
If I may re-state the issues you have brought up, they are:
1.
2.
2.
If the problem message has a numbered list of problems, take them one by one. Even if the problem is not broken into components by the sender, see if you can paraphrase the problems.
Respond to the concerns with clear objective data, not just your perspective. Document clearly resolutions or actions for each item with ‘what-who-when’.
Do not be overly defensive. But do not assume that you are always right or flawless. Be objective and focus only on the specific problem and present a solution that is mutually satisfactory. Do resist the temptation of ‘getting one back’. Conclude with restating major action items and your (that is, your organization’s) intent on customer satisfaction. For an example, see Box 22.13.
I hope that I have addressed all the points that you have brought up in the mail. I once again reiterate our commitment to achieving the common goals and would follow up on taking these action items to completion. I will get in touch with you again a week from now, by when the database backup issue should be resolved.
Regards,
Vijay Reddy,
MIRACLE Security Administrator,
Desi Computers Inc.,
234 Infantry Road
Bangalore 560001
[email protected]
Ph: +91-80-2890-9809
Do keep your promises. Make a follow-through phone call after reaching a reasonable milestone. It is important to register small victories so as to restore or increase customer confidence. Follow the call after such a successful milestone with an email, such as the one in Box 22.14.
Thanks for taking the time for the call we had this morning. I am glad that everything is going as per schedule and we have achieved our first milestone towards resolving the database backup issue. I will follow up next week. In the meanwhile, if there are any specific issues you want to bring up, do not hesitate to email/call me directly.
Regards,
Vijay Reddy,
MIRACLE Security Administrator,
Desi Computers, Inc.,
234 Infantry Road
Bangalore 560001
Ph: +91-80-2890-9809
Status reporting is a typical upward communication done by an employee through an organization’s hierarchy. It occurs fairly frequently, typically on a weekly basis. This is done to keep your manager (as well as other team members) updated. Such status reports are typically documents sent as attachments to an email. They generally follow a template specified at the organizational/group level. The contents of such reports usually include (but are not limited to) the items in Box 22.15.
When you join a job or change projects within your job, make sure you talk to your manager and understand the reporting requirements—including the frequency of reporting, format of reports to be submitted, recipients to be copied and so on.
TEMPLATE FOR STATUS REPORTS [Level B]
Project Id:
Staff Name/User Id:
Period of Reporting:
Start Date:
End Date:
Activities planned and completed
Activities planned and not completed (with reasons for any discrepancy)
Activities not planned and that consumed time (reasons as appropriate)
Plans for the coming period
Red alerts
Some of the email habits that you have developed in college probably have to be unlearnt and undone when you take up a job. Here are some of the things that you may be used to in college which should be avoided when you take up a job:
No personal email from office mail id: In general, keep your personal and official email correspondence separate and do not use your office email id for personal communication. Do not read or write personal email via the office computers, unless there is an urgent need to. In fact, this rule extends beyond email. Do not use office internet (even if after office hours) for Facebook, checking cricket scores, etc.
No forwarding of non-official/chain mails: As a college student, you are probably used to forwarding chain and cascading email—especially those email that you found humorous or otherwise interesting. This is simply a ‘no no’ at work. However, tempting it may be to share an interesting (but not related to work) email with your colleagues at work, realize that this is just an unneeded distraction and a gross abuse of email privileges. Do not look at your colleagues as a bunch of captive recipients for your forwarded emails. In fact, if you send frequent, unimportant emails, you run the risk of being tuned out and ignored by the recipients.
No sexist or politically incorrect emails: While writing or forwarding any official email, be absolutely sure that there are no sexist references or remarks based on caste or political affiliation. Make sure your emails are ‘politically correct’ and that there is no content that can be construed as even borderline offensive to anyone. Not only is political correctness a good social norm but it is the law these days and if you write offensive emails, you run the risk of getting into legal troubles. Remember that emails leave a correspondence trail and you cannot escape the consequences of your action.
No mails with executables as attachments: Executable files are often the primary carriers of viruses. Hence, most organizations ban these in the attachments.
No large attachments: Most organizations place limits on the size of attachments. Make sure you abide by them.
No forwarding of official emails to your personal email ids: Do not forward your official mails to your personal mail ids (like a Gmail id). Some fresh students do this as it is convenient to read the mails in the personal phones or laptops. This is legally not allowed in most organizations.
Do not discuss official matters with anyone outside through email: Never forward any official mail to any outsiders—even if the ‘outsider’ is your spouse or girl friend or boy friend. You would be violating the typical Non-Disclosure Agreement (NDA) of most organizations and would be inviting serious trouble.
Today, email has become ubiquitous and inevitable. It has virtually replaced the postal system of communication that thrived until a few years back. With email being also accepted as the legal and de facto medium of communication in the business context, your ability to succeed will depend heavily on how effectively you use this medium, notwithstanding the lack of body language and voice. The common types of emails and the approaches to make them effective can act as stepping stones to enable you to hone your email skills.
18.119.107.161