Addressing E-mails: To, CC, and BCC defined

Addressing E-mails: To, CC, and BCC defined

When sending E-mail's always remember what each field is for, and the results. If you're mass-mailing groups of people, never use TO or CC, always use BCC.


To:
Primary person or persons you're sending the E-mail to. 
Visible to everyone that receives the E-mail
Tech Info: When there are more than 99 people in this field some E-mail servers will reject delivery of these E-mail's

CC:
(Carbon Copy)
If you're wanting to keep others informed about the E-mail, and want the To: people to know others are also getting the E-mail
Visible to everyone that receives the E-mail who is in the To: and CC: fields
Tech Info: When there are more than 99 people in this field some E-mail servers will reject delivery of these E-mail's


BCC:
(Blind Carbon Copy)
If you're wanting to keep others informed about the E-mail, and want the To: people to know others are also getting the E-mail
They receive the E-mail, and can see the To: and CC: people, but can't see the other BCC: recipients. 
If you're sending out mail to lots of people put yourself in the To: field, and everyone else in the BCC field
Tech Info: When there are more than 99 people in this field some E-mail servers will reject delivery of these E-mail's


    • Related Articles

    • Evaluating E-mail messages - Scam or no scam

      Questions to ask yourself First and foremost look at the from Email address (not the name). Does the email address it's coming from make sense with the subject and contents of the email? If it's from an @gmail.com address, anyone on the planet can ...
    • Understand the E-mail "Read Receipt" or "Return Receipts" requests

      These are the basic rules of the "Read Receipt" or "Return Receipts" on E-mail messages. It's generated by the E-mail client on the receivers end (not the E-mail server) It is a optional request we make of the receiver who can usually choose to ...
    • David's 3 Rules to Staying Safe on a Computer

      Here's David’s 3 rules of staying safe on a computer. It's my attempt at distilling my 25+ years of experience and knowledge down into some simple rules to live by in the digital realm.  Rule Number 1: Keep all software patched and up to date ...
    • The 5 Passwords of life - Keeping your Digital Persona secure and avoiding Identity Theft in the modern day

      3 simple steps to securing your digital identity STEP 1 You should have at the most 5 passwords to remember. Each password is different, and those passwords are never used anywhere else (#5 can be stored in your password manager if you don't check ...
    • Business Hours and Contact Methods with Response Times

      Standard Business Hours Monday thru Friday: 7am-5:30pm After Hours and Weekend Work Short <5min computer questions: No Charge (eg when at the store shopping and you have a quick question) Emergency Work: Billed at after hours emergency rate. Feel ...