247:
32:
307:
In some cases, the use of blind carbon copy may be viewed as mildly unethical. The original addressee of the mail (To: address) is left under the impression that communication is proceeding between the known parties, and is knowingly kept unaware of others participating in the primary communication.
212:
To tighten the focus of an existing email correspondence. By "moving people to BCC," a sender can remove non-essential parties from the recipient list so that future reply-all's will not include them. It is customary to include a parenthetical note indicating that certain recipients have been moved
315:
Depending on the particular email software used, the recipient may or may not know that the message has been sent via Bcc. In some cases, 'undisclosed recipients' placed in the To: line (by the software) shows that Bcc has been used. In other cases, the message appears identical to one sent to a
172:
Bcc: Blind carbon copy to tertiary recipients who receive the message. The primary and secondary recipients cannot see the tertiary recipients. Depending on email software, the tertiary recipients may only see their own email address in Bcc, or they may see the email addresses of all primary and
208:
To send a message to multiple parties with none of them knowing the other recipients. This can be accomplished by addressing a message to oneself (or, in some email clients, leaving the To: field empty) and filling in the actual intended recipients in the Bcc:
311:
A related risk is that by (unintentional) use of "reply to all" functionality by someone on Bcc, the original addressee is (inadvertently) made aware of this participation. For this reason, it is in some cases better to separately forward the original e-mail.
200:
To send a copy of one's correspondence to a third party (for example, a colleague) when one does not want to let the recipient know that this is being done (or when one does not want the recipient to know the third party's
339:
and not the original meaning; the historic RFC 733 has an explicit "blind carbon" annotation in its definition of the Bcc: header field syntax. "Cc:" and "Bcc:" mean "carbon copy" and "blind carbon copy" respectively.
143:
In some circumstances, the typist creating a paper correspondence must ensure that multiple recipients of such a document do not see the names of other recipients. To achieve this, the typist can:
136:) is a message copy sent to an additional recipient, without the primary recipient being made aware. This concept originally applied to paper correspondence and now also applies to
193:
Bcc is often used to prevent an accidental "Reply All" from sending a reply intended for only the originator of the message to the entire recipient list. Using Bcc can prevent an
408:
177:
It is common practice to use the Bcc: field when addressing a very long list of recipients, or a list of recipients who should not (necessarily) know each other, e.g. in
213:
to BCC. This can be done out of courtesy to uninterested parties, or as a way of politely cutting off non-essential parties from the thread going forward.
316:
single addressee. The recipient does not necessarily see the email address (and real name, if any) originally placed in the To: line.
268:
49:
294:
115:
228:
by avoiding the accumulation of block-list e-mail addresses available to all Bcc: recipients, which often occurs in the form of
96:
68:
507:
497:
272:
53:
154:
Set the ribbon not to strike the paper, which leaves names off the top copy (but may leave letter impressions on the paper).
462:
75:
502:
257:
395:
Boodhoo, Niala; Carey, Bridget (2009-08-25). "Be careful when you 'reply all' to e-mail". Miami Herald. pp. C8.
82:
276:
261:
42:
64:
487:
409:"This week in data/cyber/tech: criminals using AI, BCC emails gone wrong, and monitoring in the toilets"
17:
369:
158:
With email, recipients of a message are specified using addresses in any of these three fields:
326:
a meaningful substitute for the names can be placed in the body of the message, e.g. '', or ''.
89:
435:
221:
323:
their real names, but not their email addresses, can be listed in the body of the message, or
492:
466:
482:
217:
476:
229:
178:
372:(West Virginia, USA). 1998-01-18. page P5B. NewsBank record number 100F35638A890441.
319:
When it is useful for the recipients to know who else has received a Bcc message,
148:
459:
349:
246:
194:
166:
31:
439:
336:
427:
456:
385:(Georgia, USA). 2009-08-30. page E15. NewsBank record number 103419444.
225:
202:
397:
NewsBank record number 200908250100KNRIDDERFLMIAMIH_poked-08-25-09.
381:
Husted, Bill. "Bad e-mail habits can be bothersome, embarrassing".
205:
address, assuming the other recipient is in the To: or Cc: fields).
137:
426:
Crocker, D.; Vittal, J.; Pogran, K. T.; Henderson, D. A. (1977).
173:
secondary recipients but will not see other tertiary recipients.
240:
25:
335:
The interpretation of "Bcc:" as "blind courtesy copy" is a
368:
Stout, Chris. "DEAR NERD: Blind carbons hide addresses."
428:"Standard for the format of ARPA network text messages"
189:
There are a number of reasons for using this feature:
169:
to secondary recipients—other interested parties
147:
Add the names in a second step to each copy, without
56:. Unsourced material may be challenged and removed.
8:
432:IETF Request for Comments (RFC) Pages - Test
275:. Unsourced material may be challenged and
16:"bcc:" redirects here. For other uses, see
295:Learn how and when to remove this message
116:Learn how and when to remove this message
361:
7:
273:adding citations to reliable sources
54:adding citations to reliable sources
407:Machin, Edward (February 9, 2024).
14:
383:The Atlanta Journal-Constitution
245:
30:
41:needs additional citations for
1:
460:Cyber Security Tip ST04-008
524:
15:
216:To prevent the spread of
162:To: Primary recipients
508:Office administration
498:Computing terminology
269:improve this section
50:improve this article
18:BCC (disambiguation)
469:, "Benefits of BCC"
331:Carbon vs. courtesy
65:"Blind carbon copy"
23:Email functionality
503:Computing acronyms
465:2013-02-20 at the
370:Charleston Gazette
305:
304:
297:
130:blind carbon copy
126:
125:
118:
100:
515:
444:
443:
423:
417:
416:
404:
398:
396:
392:
386:
379:
373:
366:
300:
293:
289:
286:
280:
249:
241:
218:computer viruses
121:
114:
110:
107:
101:
99:
58:
34:
26:
523:
522:
518:
517:
516:
514:
513:
512:
473:
472:
467:Wayback Machine
453:
448:
447:
425:
424:
420:
406:
405:
401:
394:
393:
389:
380:
376:
367:
363:
358:
346:
333:
301:
290:
284:
281:
266:
250:
239:
197:from happening.
187:
122:
111:
105:
102:
59:
57:
47:
35:
24:
21:
12:
11:
5:
521:
519:
511:
510:
505:
500:
495:
490:
488:Business terms
485:
475:
474:
471:
470:
452:
451:External links
449:
446:
445:
418:
399:
387:
374:
360:
359:
357:
354:
353:
352:
345:
342:
332:
329:
328:
327:
324:
303:
302:
253:
251:
244:
238:
235:
234:
233:
214:
210:
206:
198:
186:
183:
175:
174:
170:
163:
156:
155:
152:
124:
123:
38:
36:
29:
22:
13:
10:
9:
6:
4:
3:
2:
520:
509:
506:
504:
501:
499:
496:
494:
491:
489:
486:
484:
481:
480:
478:
468:
464:
461:
458:
455:
454:
450:
441:
437:
433:
429:
422:
419:
414:
410:
403:
400:
391:
388:
384:
378:
375:
371:
365:
362:
355:
351:
348:
347:
343:
341:
338:
330:
325:
322:
321:
320:
317:
313:
309:
299:
296:
288:
278:
274:
270:
264:
263:
259:
254:This section
252:
248:
243:
242:
237:Disadvantages
236:
231:
230:chain letters
227:
223:
219:
215:
211:
207:
204:
199:
196:
192:
191:
190:
184:
182:
180:
179:mailing lists
171:
168:
164:
161:
160:
159:
153:
150:
146:
145:
144:
141:
139:
135:
132:(abbreviated
131:
120:
117:
109:
98:
95:
91:
88:
84:
81:
77:
74:
70:
67: –
66:
62:
61:Find sources:
55:
51:
45:
44:
39:This article
37:
33:
28:
27:
19:
431:
421:
412:
402:
390:
382:
377:
364:
334:
318:
314:
310:
306:
291:
282:
267:Please help
255:
188:
176:
157:
149:carbon paper
142:
133:
129:
127:
112:
106:October 2015
103:
93:
86:
79:
72:
60:
48:Please help
43:verification
40:
350:Carbon copy
195:email storm
167:Carbon copy
477:Categories
356:References
285:April 2024
76:newspapers
440:2070-1721
413:ropesgray
337:backronym
256:does not
463:Archived
344:See also
185:Benefits
457:US-CERT
277:removed
262:sources
226:malware
90:scholar
493:Typing
438:
224:, and
209:field.
203:e-mail
92:
85:
78:
71:
63:
483:Email
138:email
97:JSTOR
83:books
436:ISSN
260:any
258:cite
222:spam
165:Cc:
69:news
271:by
134:Bcc
52:by
479::
434:.
430:.
411:.
220:,
181:.
140:.
128:A
442:.
415:.
298:)
292:(
287:)
283:(
279:.
265:.
232:.
151:;
119:)
113:(
108:)
104:(
94:·
87:·
80:·
73:·
46:.
20:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.