Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 5, Issue 14;   April 6, 2005: Email Ethics

Email Ethics

by

Ethics is the system of right and wrong that forms the foundation of civil society. Yet, when a new technology arrives, explicitly extending the ethical code seems necessary — no matter how civil the society. And so it is with email.

The rules of civil society apply equally to all conduct, including that carried out with email. Whatever you would consider unethical in life is also unethical in email. For instance, if lying is unethical, so is lying in email.

Power poles after Hurricane Rita, 2005

Holly Beach, Louisiana, October 3, 2005: Power poles lean precipitously along Highway 27, which borders the Gulf of Mexico in lower Cameron Parish. Thousands of poles were either leaning or fallen due to Hurricane Rita's powerful winds. Although these are power poles, one can imagine the poles that carry the cables that make up the Internet, metaphorically drooping under the weight of all the email we send, much of it worthless. Photo by Win Henderson of the U.S. Federal Emergency Management Agency.

Somehow, though, it seems easier to cross the line in email than it does elsewhere in life. Your own values determine where the line is for you. To find your own line, try these on for size:

Denial
If you claim not to have read or received a message when you actually have, you're over the line.
Disclosing someone else's email address for harm
If you subscribe someone else to a newsletter, hoping to flood him or her with unwanted junk, you're over the line.
Abusive omission
If you intentionally omit someone from a To list for purposes of harm or harassment, you're over the line.
Misidentifying yourself
If you supply a false email address just to get someone out of your hair, you're over the line.
Faking a mishap
If it's unethical in real life,
it's unethical in email
If you broadcast an embarrassing message to cause harm to someone, intending later to claim that you sent it for FYI or by accident, you're over the line.
Dragging your feet
If you intentionally delay sending a message so as to deprive the recipient of time-critical opportunities or information, intending later to claim that you did in fact inform the recipient, you're over the line.
Silence
If you choose not to reply to someone so as to give offense, you're over the line. Even worse if you later claim that you did reply.
Misrepresenting a quote
If you excerpt a previous message, and alter it in any way other than to indicate deletions, you're over the line. Acceptable indications of deletion are replacement by ellipsis (…) or <snip>, or inserting short phrases in brackets for clarification.
Pleading false confusion
If you claim not to understand a message, when you actually do, so as to cause delay, you're over the line.
Intentional ambiguity
If you write a message ambiguously — to slow things down, to cause confusion, or to mislead — with the intention of later claiming, "Gee, I thought it was clear," you're over the line.
Wandering eyes
If you read other people's email without permission, either at their desks (whether or not they're present), or by any other means, you're over the line. Except, of course, if it's part of your job.
Forgery
If you edit the headers in an excerpted or forwarded message so as to misrepresent the time, date, author, subject, or routing of the message, you're way over the line.
Masquerade
If you send email from another's account without permission, for the purpose of deceiving someone, pretending that you're the owner of the account, you're over the line.

Most of us have been tempted to cross the line now and then. Next time you feel the temptation, imagine how it would feel to receive such a message. No doubt, whether you know it or not, you already have. Go to top Top  Next issue: Shining Some Light on "Going Dark"  Next Issue

Do you have an addition to this list? Send it to me.

101 Tips for Writing and Managing EmailAre you so buried in email that you don't even have time to delete your spam? Do you miss important messages? So many of the problems we have with email are actually within our power to solve, if we just realize the consequences of our own actions. Read 101 Tips for Writing and Managing Email to learn how to make peace with your inbox. Order Now!

Where There's Smoke There's EmailAnd if you have organizational responsibility, you can help transform the culture to make more effective use of email. You can reduce volume while you make content more valuable. You can discourage email flame wars and that blizzard of useless if well-intended messages from colleagues and subordinates. Read Where There's Smoke There's Email to learn how to make email more productive at the organizational scale — and less dangerous. Order Now!

Your comments are welcome

Would you like to see your comments posted here? rbrenUahvTZekFmcARHhTner@ChacfuPUJnoNHbsYcKzroCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Ethics at Work:

The rabbit that went down the rabbit-holeIt Might Be Legal, but It's Unethical
Now that CEOs will be held personally accountable for statements they make about their organizations, we can all expect to be held to higher standards of professional ethics. Some professions have formal codes of ethics, but most don't. What ethical principles guide you?
Shaking an orange treeWhen You Aren't Supposed to Say: III
Most of us have information that's "company confidential," or even more sensitive than that. Sometimes people who want to know what we know try to suspend our ability to think critically. Here are some of their techniques.
A field of Cereal RyeApproval Ploys
If you approve or evaluate proposals or requests made by others, you've probably noticed patterns approval seekers use to enhance their success rates. Here are some tactics approval seekers use.
A view of the damage to the Apollo 13 Service ModuleThe Attributes of Political Opportunity: The Finer Points
Opportunities come along even in tough times. But in tough times like these, it's especially important to sniff out true opportunities and avoid high-risk adventures. Here are some of the finer points to assist you in your detective work.
Harry Stonecipher, former CEO of The Boeing CompanyPersonnel-Sensitive Risks: II
Personnel-sensitive risks are risks that are difficult to discuss openly. Open discussion could infringe on someone's privacy, or lead to hurt feelings, or to toxic politics or toxic conflict. If we can't discuss them openly, how can we deal with them?

See also Ethics at Work, Effective Communication at Work, Conflict Management, Writing and Managing Email and Virtual and Global Teams for more related articles.

Forthcoming issues of Point Lookout

Frederick Douglass, ca. 1879, famed abolitionist and ex-slaveComing June 20: Managing Dissent Risk
In group decision making, dissent risk is the risk that dissents about important decisions will be rejected without due consideration. As a result, group decision quality can suffer, and some groups will actually eject dissenters. How can we manage dissent risk? Available here and by RSS on June 20.
Puppies waiting intently for a shot at the treatAnd on June 27: Interrupting Others in Meetings Safely: I
In meetings we sometimes feel the need to interrupt others to offer a view or information, or to suggest adjusting the process. But such interruptions carry risk of offense. How can we interrupt others safely? Available here and by RSS on June 27.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenEeaKxXUnLYcUEBGKner@ChacCcehmhmgoKVThgGVoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info

Public seminars

The Race to the South Pole: The Power of Agile Development
On 14The Race to the Pole: An Application of Agile Development December 1911, four men led by Roald Amundsen reached the South Pole. Thirty-five days later, Robert F. Scott and four others followed. Amundsen had won the race to the pole. Amundsen's party returned to base on 26 January 1912. Scott's party perished. As historical drama, why this happened is interesting enough. Lessons abound. Among the more important lessons are those that demonstrate the power of the agile approach to project management and product development. Read more about this program. Here's a date for this program:

The Power Affect: How We Express Our Personal Power
Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Follow me at Google+ or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
101 Tips for Managing ConflictFed up with tense, explosive meetings? Are you the target of a bully? Learn how to make peace with conflict.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.