Use Sophia to knock out your gen-ed requirements quickly and affordably. Learn more
×

Email Etiquette

Author: Sophia

what's covered
In the previous lesson, you learned to find and verify information online. In this lesson, you will explore how to communicate that information professionally through email. Mastering email conventions is essential for workplace relationships. Specifically, this lesson will cover:

Table of Contents

before you start
Think about the last professional email you sent. Did you consider how your subject line affected the recipient? Email remains a primary workplace communication tool. Written messages rely entirely on text to convey professionalism. Understanding email etiquette helps you communicate effectively and maintain credibility.


1. Professional Tone

Professional tone in email includes your subject lines, greetings, and signatures. These elements create first and last impressions. They establish credibility and help recipients understand your message's purpose.

The table below shows how to write effective subject lines, greetings, and signatures to maintain a clear, professional tone in every email.

Element Best Practices What to Avoid Examples
Subject lines
  • Make subject lines clear and specific so the recipient knows the content and urgency.
  • Help readers prioritize and easily find the message later.
  • Use clear, purposeful subject lines that help readers prioritize your message—phrases like “Action required” or “Response needed by [date]” may be useful when urgency is appropriate.
  • Vague subjects like “Question”
  • Writing in all caps
  • Using excessive punctuation (e.g., “!!!”)
✔ “Budget approval needed by Friday”
✔ “Action required: Submit report by Wednesday”
✘ “HEY!!!”
Greetings
  • Use professional greetings suited to your relationship with the recipient.
  • For formal situations, use greetings like “Dear Mr. Ahmed.”
  • For colleagues, “Hi [Name]” is appropriate.
  • “Good morning” offers a polite, neutral option.
  • For group emails, use inclusive greetings like “Good morning, team.”
  • If unsure, choose the more formal option.
  • Overly casual greetings like “Hey”
  • Skipping a greeting altogether
✔ “Dear Mr. Ahmed”
✔ “Hi Ciara”
✔ “Good morning, team”
✘ “Hey”
Signatures
  • Provide essential contact details: full name, job title, company name, and primary contact info.
  • Keep it professional and concise.
  • Use consistent formatting across email systems.
  • Long, cluttered signatures
  • Unrelated content, excessive graphics, quotes, and inconsistent layouts
✔ Jane Smith, Marketing Coordinator, XYZ Corporation
✘ Large logos, inspirational quotes

try it
Write a short email you might send in a workplace or volunteer setting. Imagine you are asking a question, giving an update, or requesting help.

Focus on three key parts:
  • A subject line that clearly shows what the email is about
  • A greeting that sounds professional and respectful
  • A simple email signature with your name and contact info (real or fictional)
You do not need to write a full message—just these three parts. Then, check your work using the table above. Did you use specific language? Is the tone professional?

The way you format an email makes a big difference in how it is received. The image below compares a poorly formatted email with a professionally written one to show how tone, structure, and clarity can impact workplace communication.

Split-screen showing two email examples side by side: one with poor formatting (vague subject line, casual greeting) and one with professional formatting (clear subject line, appropriate greeting, complete signature).

Clear, thoughtful writing shows that you respect your reader and increases the chances of getting a timely, helpful response.

learn more
To explore more about writing professional emails in the workplace, check out this optional supplemental reading:

28 Email Etiquette Rules for the Workplace

big idea
Professional email tone through clear subject lines, appropriate greetings, and complete signatures establishes credibility and facilitates effective communication.

terms to know
Subject Lines
Brief descriptions summarizing email content and urgency to help recipients prioritize responses.
Greetings
Appropriate openings that matches your relationship with the recipient.
Email Signature
Contact information block including name, title, company, and contact details.


2. Proper Use of Options

Beyond tone and structure, email platforms offer built-in tools like reply options, formatting, and attachments. Knowing how and when to use these features helps you communicate clearly and avoid common mistakes. These features also protect privacy when used correctly.

2a. CC/BCC

Email platforms include options like CC (Carbon Copy) and BCC (Blind Carbon Copy) that help you manage who receives your message. The table below explains when to use each and what to avoid.

Option When to Use What to Avoid
CC When others need to be informed or kept in the loop (e.g., supervisors or team members). Everyone included can see who else received the email. CCing people who do not need the information—it adds unnecessary emails to their inbox and creates clutter and confusion
BCC To send the same message to multiple people without sharing their email addresses. This protects privacy, especially with large or external groups. Using BCC when recipients expect to see who else received the message—this can create confusion or reduce transparency

IN CONTEXT: Sharing Information While Respecting Privacy

You are organizing a volunteer event and need to send details to your team and some outside partners.

You CC your supervisor and a few teammates so they can stay informed and see who is involved. Everyone on the CC list can view the same message and each other’s email addresses.

You also need to send the same information to 15 community partners. To protect their privacy, you BCC them—this way, they will not see each other’s contact information.

If you had used CC instead, you would have accidentally shared their email addresses with the whole group, which is not appropriate for outside contacts.

2b. Reply/Reply All

In addition to choosing who gets your message, it is also important to respond appropriately. Knowing when to use Reply or Reply All helps avoid confusion and unnecessary emails. The table below shows the difference between Reply and Reply All

Option When to Use What to Avoid
Reply When your response is only for the sender—helps keep the conversation focused and avoids extra emails Replying to everyone unless your response is relevant to all
Reply All When everyone on the original message needs to see your reply (e.g., confirming attendance, team updates) Replying to all when your message is meant for one person—always check the recipient list first

EXAMPLE

You confirm a team meeting by clicking “Reply All” so everyone knows you will attend, but later you send a private question to the organizer using “Reply” to avoid cluttering the group thread.

2c. Auto Replies

Sometimes, you may be unavailable for extended periods. In those cases, setting an auto reply helps manage expectations and keeps communication professional.

A well-written auto reply lets others know when you will be back and who to contact if something is urgent. Use the guidelines below to write a clear and helpful message.

  • Use a polite and professional tone.
  • Mention that you are currently unavailable.
  • Include the date you plan to return.
  • Include an alternate contact for urgent matters—such as a colleague or team mailbox—when possible.
  • Keep the message short and clear.
  • Turn off the auto reply once you return.
try it
Imagine you are going to be away from email for one week. Write a short auto-reply message that includes:

  • A polite greeting
  • The dates you will be unavailable
  • An alternate contact (real or fictional) for urgent matters
  • A professional closing
Keep your message brief, use a professional tone, and review it using the bullet points above. Would you feel confident sending it in a workplace setting?

Mastering these tools also builds confidence. When you know how to use features like CC, BCC, Reply All, and auto replies correctly, you can focus more on your message and less on worrying whether you sent it the right way.

big idea
Understanding email options like CC, BCC, Reply, and Reply All helps you communicate efficiently while protecting privacy and reducing inbox clutter.

terms to know
CC (Carbon Copy)
Email function that includes additional recipients while showing all recipients' email addresses.
BCC (Blind Carbon Copy)
Email function that includes additional recipients while hiding their email addresses from other recipients.
Reply
Response function that sends your reply only to the original sender.
Reply All
Response function that sends your reply to all recipients of the original email.
Auto-Reply
Automatic response message sent when you are unavailable for extended periods.


3. Security Tips

Using email in the workplace involves more than writing clearly—it also means protecting your information and avoiding common security risks.

You were introduced to phishing in Tutorial 1.1.4: Digital Hygiene. Phishing means fake emails that try to steal your personal information.

It is important to revisit phishing here, along with other common email threats:

  • Suspicious links may take you to harmful websites that try to trick you.
  • Unsafe attachments are files that may carry harmful software, such as:
    • Viruses, which can damage your computer.
    • Spyware, which secretly collects your personal information.
Recognizing these risks is part of using email responsibly and helps you maintain secure and professional communication. The table below highlights common email security threats and how to handle them.

Threat What to Watch For What to Do Example
Phishing
  • Emails that look like they are from a bank, IT team, or a company you know but seem unusual
  • Messages with urgent requests, spelling errors, or generic greetings like “Dear Customer”
  • Do not click links or share personal info unless you are sure the email is real.
  • Contact the sender another way to confirm.
  • Never send passwords or sensitive financial information (e.g., credit card numbers, bank account details) by email.
An email that says “Your account is locked—click here to reset your password now” from a strange-looking address
Suspicious links
  • Links that do not match the company name
  • Shortened or strange-looking links
  • Emails asking you to click and log in unexpectedly
  • Hover your mouse over the link (without clicking) to see where it really goes.
  • Go directly to the website by typing it yourself.
A link that says "paypal.com" but actually leads to “paypalsecurity-alerts.xyz”
Unsafe attachments
  • Attachments from people you do not know
  • Files that seem out of place or do not match the message
  • Emails urging you to open something quickly
  • Do not open attachments unless you know and trust the sender.
  • Ask the person directly if unsure.
  • Delete the email if it feels suspicious.
A file attached to a vague message like “Open this file immediately” from an unknown sender

learn more
To learn more about spotting phishing attempts and analyzing real email examples, check out this optional supplemental reading:

Examples of Phishing and Scam Emails

try it
Review the three email examples below. For each one, decide what type of security threat it might be—phishing, suspicious link, or unsafe attachment.

A. You receive an email from “[email protected]” saying your bank account is locked. It asks you to click a link to reset your password.

B. A coworker sends an unexpected message with a short link like "bit.ly/3uXr9k" asking you to check out a “quick update.”

C. You get an email from an unknown sender with a file attached named "Invoice_July.zip" and no explanation.

What steps could you take to stay safe if you were not sure about any of these messages?

big idea
Recognizing and avoiding phishing, suspicious links, and unsafe attachments helps protect your personal information, your organization, and your email reputation.

terms to know
Suspicious Links
A link in an email that may lead to a dangerous website or download harmful software; it often looks strange or unexpected.
Unsafe Attachments
Email files that may contain harmful software.
Viruses
A type of harmful software that can damage your computer, delete files, or stop programs from working.
Spyware
Software that secretly collects your personal information—like passwords or browsing habits—without your permission.

summary
In this lesson, you learned the basics of workplace email etiquette. You reviewed how to use a professional tone by writing clear subject lines, polite greetings, and complete signatures.

You also explored the proper use of options like CC/BCC, Reply/Reply All, and auto replies to help you share information the right way and protect others’ privacy.

Finally, you learned security tips to stay safe— such as spotting phishing emails, avoiding suspicious links, and not opening unsafe attachments that could harm your device or steal your information.

These skills help you write emails that are clear, respectful, and secure. In the next lesson, you will learn how to communicate using chats and real-time messaging tools.

Source: THIS TUTORIAL HAS BEEN ADAPTED FROM THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY’S “TRUSTWORTHY EMAIL (SPECIAL PUBLICATION 800-177 REV. 1).” ACCESS FOR FREE AT CSRC.NIST.GOV/PUBS/SP/800/177/R1/FINAL. CONTENT IS IN THE PUBLIC DOMAIN. USE DOES NOT IMPLY ENDORSEMENT BY NIST OR THE U.S. GOVERNMENT.

REFERENCES

Herrity, J. (2025, June 7). 28 email etiquette rules for the workplace. Indeed. www.indeed.com/career-advice/career-development/email-etiquette

Rose, S., Nightingale, J., Garfinkel, S., & Chandramouli, R. (2019). Trustworthy email (NIST Special Publication 800-177 Rev. 1). National Institute of Standards and Technology. csrc.nist.gov/pubs/sp/800/177/r1/final

University of Virginia. (n.d.). Examples of phishing and scam emails. Information Security. security.virginia.edu/examples-phishing

Terms to Know
Auto-Reply

Automatic response message sent when you are unavailable for extended periods.

BCC (Blind Carbon Copy)

Email function that includes additional recipients while hiding their email addresses from other recipients.

CC (Carbon Copy)

Email function that includes additional recipients while showing all recipients' email addresses.

Email Signature

Contact information block including name, title, company, and contact details.

Greetings

Appropriate openings that matches your relationship with the recipient.

Reply

Response function that sends your reply only to the original sender.

Reply All

Response function that sends your reply to all recipients of the original email.

Spyware

Software that secretly collects your personal information—like passwords or browsing habits—without your permission.

Subject Lines

Brief descriptions summarizing email content and urgency to help recipients prioritize responses.

Suspicious Links

A link in an email that may lead to a dangerous website or download harmful software; it often looks strange or unexpected.

Unsafe Attachments

Email files that may contain harmful software.

Viruses

A type of harmful software that can damage your computer, delete files, or stop programs from working.