Knowledge (XXG)

Blind carbon copy

Source 📝

247: 32: 307:
In some cases, the use of blind carbon copy may be viewed as mildly unethical. The original addressee of the mail (To: address) is left under the impression that communication is proceeding between the known parties, and is knowingly kept unaware of others participating in the primary communication.
212:
To tighten the focus of an existing email correspondence. By "moving people to BCC," a sender can remove non-essential parties from the recipient list so that future reply-all's will not include them. It is customary to include a parenthetical note indicating that certain recipients have been moved
315:
Depending on the particular email software used, the recipient may or may not know that the message has been sent via Bcc. In some cases, 'undisclosed recipients' placed in the To: line (by the software) shows that Bcc has been used. In other cases, the message appears identical to one sent to a
172:
Bcc: Blind carbon copy to tertiary recipients who receive the message. The primary and secondary recipients cannot see the tertiary recipients. Depending on email software, the tertiary recipients may only see their own email address in Bcc, or they may see the email addresses of all primary and
208:
To send a message to multiple parties with none of them knowing the other recipients. This can be accomplished by addressing a message to oneself (or, in some email clients, leaving the To: field empty) and filling in the actual intended recipients in the Bcc:
311:
A related risk is that by (unintentional) use of "reply to all" functionality by someone on Bcc, the original addressee is (inadvertently) made aware of this participation. For this reason, it is in some cases better to separately forward the original e-mail.
200:
To send a copy of one's correspondence to a third party (for example, a colleague) when one does not want to let the recipient know that this is being done (or when one does not want the recipient to know the third party's
339:
and not the original meaning; the historic RFC 733 has an explicit "blind carbon" annotation in its definition of the Bcc: header field syntax. "Cc:" and "Bcc:" mean "carbon copy" and "blind carbon copy" respectively.
143:
In some circumstances, the typist creating a paper correspondence must ensure that multiple recipients of such a document do not see the names of other recipients. To achieve this, the typist can:
136:) is a message copy sent to an additional recipient, without the primary recipient being made aware. This concept originally applied to paper correspondence and now also applies to 193:
Bcc is often used to prevent an accidental "Reply All" from sending a reply intended for only the originator of the message to the entire recipient list. Using Bcc can prevent an
408: 177:
It is common practice to use the Bcc: field when addressing a very long list of recipients, or a list of recipients who should not (necessarily) know each other, e.g. in
213:
to BCC. This can be done out of courtesy to uninterested parties, or as a way of politely cutting off non-essential parties from the thread going forward.
316:
single addressee. The recipient does not necessarily see the email address (and real name, if any) originally placed in the To: line.
268: 49: 294: 115: 228:
by avoiding the accumulation of block-list e-mail addresses available to all Bcc: recipients, which often occurs in the form of
96: 68: 507: 497: 272: 53: 154:
Set the ribbon not to strike the paper, which leaves names off the top copy (but may leave letter impressions on the paper).
462: 75: 502: 257: 395:
Boodhoo, Niala; Carey, Bridget (2009-08-25). "Be careful when you 'reply all' to e-mail". Miami Herald. pp. C8.
82: 276: 261: 42: 64: 487: 409:"This week in data/cyber/tech: criminals using AI, BCC emails gone wrong, and monitoring in the toilets" 17: 369: 158:
With email, recipients of a message are specified using addresses in any of these three fields:
326:
a meaningful substitute for the names can be placed in the body of the message, e.g. '', or ''.
89: 435: 221: 323:
their real names, but not their email addresses, can be listed in the body of the message, or
492: 466: 482: 217: 476: 229: 178: 372:(West Virginia, USA). 1998-01-18. page P5B. NewsBank record number 100F35638A890441. 319:
When it is useful for the recipients to know who else has received a Bcc message,
148: 459: 349: 246: 194: 166: 31: 439: 336: 427: 456: 385:(Georgia, USA). 2009-08-30. page E15. NewsBank record number 103419444. 225: 202: 397:
NewsBank record number 200908250100KNRIDDERFLMIAMIH_poked-08-25-09.
381:
Husted, Bill. "Bad e-mail habits can be bothersome, embarrassing".
205:
address, assuming the other recipient is in the To: or Cc: fields).
137: 426:
Crocker, D.; Vittal, J.; Pogran, K. T.; Henderson, D. A. (1977).
173:
secondary recipients but will not see other tertiary recipients.
240: 25: 335:
The interpretation of "Bcc:" as "blind courtesy copy" is a
368:
Stout, Chris. "DEAR NERD: Blind carbons hide addresses."
428:"Standard for the format of ARPA network text messages" 189:
There are a number of reasons for using this feature:
169:
to secondary recipients—other interested parties
147:
Add the names in a second step to each copy, without
56:. Unsourced material may be challenged and removed. 8: 432:IETF Request for Comments (RFC) Pages - Test 275:. Unsourced material may be challenged and 16:"bcc:" redirects here. For other uses, see 295:Learn how and when to remove this message 116:Learn how and when to remove this message 361: 7: 273:adding citations to reliable sources 54:adding citations to reliable sources 407:Machin, Edward (February 9, 2024). 14: 383:The Atlanta Journal-Constitution 245: 30: 41:needs additional citations for 1: 460:Cyber Security Tip ST04-008 524: 15: 216:To prevent the spread of 162:To: Primary recipients 508:Office administration 498:Computing terminology 269:improve this section 50:improve this article 18:BCC (disambiguation) 469:, "Benefits of BCC" 331:Carbon vs. courtesy 65:"Blind carbon copy" 23:Email functionality 503:Computing acronyms 465:2013-02-20 at the 370:Charleston Gazette 305: 304: 297: 130:blind carbon copy 126: 125: 118: 100: 515: 444: 443: 423: 417: 416: 404: 398: 396: 392: 386: 379: 373: 366: 300: 293: 289: 286: 280: 249: 241: 218:computer viruses 121: 114: 110: 107: 101: 99: 58: 34: 26: 523: 522: 518: 517: 516: 514: 513: 512: 473: 472: 467:Wayback Machine 453: 448: 447: 425: 424: 420: 406: 405: 401: 394: 393: 389: 380: 376: 367: 363: 358: 346: 333: 301: 290: 284: 281: 266: 250: 239: 197:from happening. 187: 122: 111: 105: 102: 59: 57: 47: 35: 24: 21: 12: 11: 5: 521: 519: 511: 510: 505: 500: 495: 490: 488:Business terms 485: 475: 474: 471: 470: 452: 451:External links 449: 446: 445: 418: 399: 387: 374: 360: 359: 357: 354: 353: 352: 345: 342: 332: 329: 328: 327: 324: 303: 302: 253: 251: 244: 238: 235: 234: 233: 214: 210: 206: 198: 186: 183: 175: 174: 170: 163: 156: 155: 152: 124: 123: 38: 36: 29: 22: 13: 10: 9: 6: 4: 3: 2: 520: 509: 506: 504: 501: 499: 496: 494: 491: 489: 486: 484: 481: 480: 478: 468: 464: 461: 458: 455: 454: 450: 441: 437: 433: 429: 422: 419: 414: 410: 403: 400: 391: 388: 384: 378: 375: 371: 365: 362: 355: 351: 348: 347: 343: 341: 338: 330: 325: 322: 321: 320: 317: 313: 309: 299: 296: 288: 278: 274: 270: 264: 263: 259: 254:This section 252: 248: 243: 242: 237:Disadvantages 236: 231: 230:chain letters 227: 223: 219: 215: 211: 207: 204: 199: 196: 192: 191: 190: 184: 182: 180: 179:mailing lists 171: 168: 164: 161: 160: 159: 153: 150: 146: 145: 144: 141: 139: 135: 132:(abbreviated 131: 120: 117: 109: 98: 95: 91: 88: 84: 81: 77: 74: 70: 67: –  66: 62: 61:Find sources: 55: 51: 45: 44: 39:This article 37: 33: 28: 27: 19: 431: 421: 412: 402: 390: 382: 377: 364: 334: 318: 314: 310: 306: 291: 282: 267:Please help 255: 188: 176: 157: 149:carbon paper 142: 133: 129: 127: 112: 106:October 2015 103: 93: 86: 79: 72: 60: 48:Please help 43:verification 40: 350:Carbon copy 195:email storm 167:Carbon copy 477:Categories 356:References 285:April 2024 76:newspapers 440:2070-1721 413:ropesgray 337:backronym 256:does not 463:Archived 344:See also 185:Benefits 457:US-CERT 277:removed 262:sources 226:malware 90:scholar 493:Typing 438:  224:, and 209:field. 203:e-mail 92:  85:  78:  71:  63:  483:Email 138:email 97:JSTOR 83:books 436:ISSN 260:any 258:cite 222:spam 165:Cc: 69:news 271:by 134:Bcc 52:by 479:: 434:. 430:. 411:. 220:, 181:. 140:. 128:A 442:. 415:. 298:) 292:( 287:) 283:( 279:. 265:. 232:. 151:; 119:) 113:( 108:) 104:( 94:· 87:· 80:· 73:· 46:. 20:.

Index

BCC (disambiguation)

verification
improve this article
adding citations to reliable sources
"Blind carbon copy"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
email
carbon paper
Carbon copy
mailing lists
email storm
e-mail
computer viruses
spam
malware
chain letters

cite
sources
improve this section
adding citations to reliable sources
removed
Learn how and when to remove this message
backronym

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.