E-Mail

The ( also ) e- mail [i ː Meil ] (short mail, . Eng electronic mail for " electronic mail " or e- mail) is electronically in the computer networks transmitted, letter-like message.

E -mail is - regarded as the most important and most -used service on the Internet, not least because it allows e-mail, text messages, as well as digital documents (ie such as graphics or Office documents ) typically in - even before the World Wide Web a few seconds around the world deliver.

  • 5.1 The e- mail address
  • 5.2 The path of a typical e -mail (principle)
  • 5.3 Delivery and read receipts
  • 6.1 storage
  • 6.2 delivery of an e -mail server and protocols involved 6.2.1 Protocols Used
  • 7.1 Practical advantages over paper mail
  • 7.2 spam
  • 7.3 authenticity, privacy and integrity 7.3.1 Comparison with the postcard
  • 7.10.1 General
  • 7.10.2 judgment of the District Court of Cologne 2006
  • 8.1 Austria
  • 8.2 Germany

Articles and spelling

Standard Linguistically has in Germany the female form ( " e- mail ") of the grammatical gender largely prevailed, on the other hand, while both forms are found in Switzerland, the neuter ("the e- mail " ) in Austria and in parts of southwestern Germany use. The Austrian dictionary lists both the feminine and the neuter form, called the latter but first.

According to the dictionary, Wahrig and the official rules of the German language is "E -mail " the only correct spelling. Addition, however, the wörterbuchlich / officially incorrect spellings Email (not to be confused with the melting coating enamel / enamel), email as well as email, e -mail, e -mail, e- mail or simply mail or mail prevalent.

Also correct, but less common is the German term " e- mail".

History

Before the advent of e- mail messages were as letter or telegram, and later as telex and teletex ( the latter two were first digital transmission method ), fax transmitted. The late 1980s, then began the road to success the email - it was one of the first applications that took advantage of the possibilities of the ARPANET. The introduction of e -mail was not specifically planned, but conquered the network because of the user behavior. This surprised the Arpanet initiators, because even 1967, Lawrence Roberts, who later became the director of IPTO, said the possibility of exchange of messages among network participants is not an important motivation to build a network of scientific computers ( " not an important motivation for a network of scientific computers ").

As the inventor of e- mail via computer networks is considered Ray Tomlinson. He was involved in the research firm Bolt, Beranek and Newman ( BBN ) in the development of the operating system TENEX and dealt inter alia with the program SNDMSG for transmission of messages among users of the mainframe computer and the Protocol CPYNET for transferring files between computers. Programs such as SNDMSG existed from the early 1960s. They allowed users to mailboxes of other users of the same computer to add text. A mailbox at the time was nothing more than a single file that could read only one user. Tomlinson in 1971 came up with the idea CPYNET to change so that it could complement existing files and then incorporate it into SNDMSG. The first application of this combination was a message from Tomlinson to his colleagues, in which he announced the end of 1971, now that you could send messages over the network by anfügte the user name of the addressee, the character " @" and the hostname of the machine.

Parallel to the Internet developed in the early 1980s in most networks, systems with which messages were transmitted. These included mailbox systems, X.25, and Novell BTX. These systems were strongly repressed the mid-1990s through the spread of the Internet. The protocol RFC 822 RFC 822 dates back to 1982 was replaced in 2001 by RFC 2822, which in turn was replaced by RFC 5322 in 2008.

In Germany on August 3rd 1984 at 10:14 CET clock received the first Internet e- mail: Michael Rotert of the University of Karlsruhe (TH ) received under his address " Rotert @ germany" read a message from Laura Breeden ( " breeden @ SCNet sh.arpa " ) to the U.S. platform CSNET from Cambridge (Massachusetts ), for electronic communication of scientists who had been sent the day before ( on August 2, 1984, 12:21 clock ). A copy of this e -mail was only later at the head of the project, Werner Zorn ( " anger @ germany" ), sent.

" Welkome in CSNET! Michael, This is your official welcome to CSNET. "

Today, emails are usually sent via SMTP. To retrieve the emails from the target server, there are several methods, such as the POP3 or IMAP protocol or Webmail. X.400 is an open standard, which is mainly used in the LAN or WAN.

The first major e- mail discussion group, which originated in the Arpanet, was a mailing list called "SF - LOVERS " in which a series of DARPA researchers in public discussions about science fiction involved ( Rheingold, 1994). SF- LOVERS emerged in the late 1970s to the Arpanet. First, an attempt was made to intervene, however, because such activities had to be done even in the most liberal interpretation with little research. For some months the list was therefore locked. Finally, the leaders of the DARPA but were convinced by the argument that SF - LOVERS an important pilot project to investigate the management and operations of large mailing lists was ( Hood, 1993). The system engineers had to rebuild the system repeatedly, so that it could cope with the explosion in the volume of messages.

In 2012, a total of 3.375 billion people around the world possessed an active e- mail account.

Access to e- mails

To write, to shipping, to receive and read e -mails, there are two possibilities ( user interface ).

To use e- mail, a mail program, even e- mail client or mail user agent (MUA ) called, are used. One such program is installed locally on the user's computer and communicates with one or more e- mail inboxes.

Alternatively, you can access via webmail to his e -mail. Here, the user is editing his emails in his web browser. This is made possible by a web application on the web server of the e- mail provider, which in turn accesses the e- mail mailbox on the server.

And formatting an e -mail

Construction of an e -mail

E -mails are internally divided into two parts: the header with header lines and the body with the actual content of the message. In addition, further subdivisions are defined within a body yet.

Header - the header of the email

The header above the header of an e -mail provide information about the way that e- mail has taken, and provide references to the sender, recipient, date of creation, format the content and stations of the transmission. The user will not need many details from the headers, in the normal case. Therefore, offer e- mail programs, hide the header to the ground data such as sender, recipient and date. If required, the header can always be made ​​fully visible again.

Body - the content of the e -mail

The body of an e -mail is separated by a blank line of the header, and contains the information to be transmitted in one or more parts.

An e -mail must per RFC 5322 section 2.3 contain only characters from the 7 -bit ASCII character set. If other characters such as German umlauts, or data, such as images, transferred, the format in the header section declares and the data must be appropriately coded. Is regulated by the ff RFC 2045 (see also MIME and Base64). Current e- mail programs encode text and attachments (see below) automatically when needed.

The message may consist of a plaintext, a formatted text (eg HTML) and / or binary data ( for example, an image or a fax, see below for file attachments ) are made. Also, several formats are sent as alternatives or any other files are attached. The conclusion may not form signature and footer. All these additional components are optional, that are not necessarily present in an email.

Formatting in HTML

In HTML formatted emails are sometimes unintentionally and unconsciously, sent through the default e -mail program you use, especially of Microsoft programs, sometimes consciously, to use writing awards can, such as e- mail newsletters.

Although the HTML format is standardized, it was not originally intended for use in e-mails. This led, among other things, that there are many, even conceptual vulnerabilities in the HTML rendering engines of e -mail programs existed in the past, who on the one hand contributed to the spread of e -mail worms and other, unintended information about the recipient have revealed ( Web beacons ). This situation has improved over time, and known issues, such as the default active content (eg JavaScript) or the automatic loading of external images, have been mitigated by other settings. The often inconsistent disabling potentially dangerous HTML features in different e -mail programs, however, also has the effect that optical effects or formatting is not displayed as it was intended by the sender.

HTML emails are reputed to be less secure than plain text emails. As the past has shown that the rendering of HTML emails is prone to vulnerabilities than the display plain text, recommend even today many IT advisor and software manufacturers HTML viewing of emails at least in the preview window of the e -mail program to disable or completely excluded.

Delivery of an e -mail (principle)

The e- mail address

The path of a typical e -mail (principle)

In a typical case, an e -mail takes the following route from a sender (in the example: Anja ) through the Internet to an addressee (in the example: Bertram ), shown at right.

Special features: Often, there will be at Anya's Internet service provider and Anya's e -mail provider are one and the same company. If Anja and Bertram have their e -mail accounts with the same e -mail provider, eliminating step 3

Delivery and read receipts

Depending on the version of the email program used the sender of an email can request a delivery confirmation and / or a read receipt.

If a delivery is requested, the sender ( in the above example Anja ) a Delivery Status Notification (DSN ) in the form of an e- mail as soon as his email was successfully stored in the mailbox of the recipient and the architectures involved support this. Based on the above example, this occurred in time immediately after Step 4

If a read receipt is requested, the sender ( in the above example Anja ) is a Message Disposition Notification (MDN ) in the form of an e -mail if the recipient ( in the above example Bertram ) opens the question put to him e-mail and throwing this confirmation not prevented. Based on the above example, this occurred in time directly in step 6 when opening the email. The read receipt can not be interpreted so that the recipient has the e-mail actually read or even understood.

As such, these confirmations have - but non- legal but an informational - character of a throw - registered mail ( delivery confirmation ) or a registered letter with acknowledgment of receipt ( read receipt ) in Germany.

Technical details

The format of an email is determined by the RFC 5322. Then there are e- mails only of text characters (7- bit ASCII characters). In order to be able to transmit other characters, other Internet standards were defined with the help of 8- bit characters are encoded in ASCII. The default Quoted-Printable encoding, for example, the letter " ß" as a string "= DF". Width using the standards have the MIME - series found with the help of not only special characters in texts, but also binary files can be encoded, for example, to send them as e- mail attachments.

The total size of e- mails is not limited in principle. In reality, however, limits show by technical or administrative restrictions of systems that transmit or receive e -mail. E -mail providers, e- mail accounts and participated mail server can limit the size of an e -mail. In such cases, the limiting mail server should send a bounce message to the sender ( error message).

Storage

Where the messages are permanently stored depends instead on the technology used of the end user. Does he use a web interface, so the emails are generally kept on the mail server. If he uses a mail program that reads the mail using the IMAP protocol, then the e -mails are also kept on a mail server. Originally, before the alternative protocol POP that the mail is fetched from the server and deleted there at the same time. The client is therefore responsible for saving on its local storage. In newer versions of POP but it is also possible to leave the mail on the server, which also depends on the settings of the server.

E -mails are not stored individually ( locally or on the mail server ) often as separate files, but summarized in container files. mbox is a way commonly used on Unix / Linux, an alternative is Maildir.

For individual e -mails, among other things, the file extension. Eml familiar.

The Mail Pegasus Mail program (short PMail ) uses its own mail folder.

Delivery of an e -mail server and protocols involved

Example of a sequence:

Protocols used

  • SMTP is a protocol for mail delivery and transport. To send an e- mail program you need the name of an SMTP relay computer, often referred to as an SMTP server. This corresponds to when sending a postal letter to the mail box in the district.
  • POP3 is used to retrieve mail from the e- mail inbox of a mail server. For the mail, it corresponds to the transition to the mail slot on the front door.
  • IMAP also serves to access mailboxes that are on a mail server. Unlike POP3, IMAP is designed to leave the mail on the server and to manage them in folders.
  • SMAP is a further development of IMAP, which is still in the experimental stage.

Nowadays mainly SMTP, POP3 and IMAP are in use, often in conjunction with SSL encryption (see SMTPS, POP3S and IMAPS ).

Pros and Cons

The E -mail system has some advantages and disadvantages, which are listed below:

Practical advantages over paper mail

As a major benefit of e- mails is to be mentioned that it can be quickly transmitted (in the range of a few seconds), and read by the recipient. The practical effort to send an e- mail and receive is lower because there is no printing, enveloping, addressing, franking and postal box throw the sender and no Briefkastenentleeren and opening letters at the receiver is needed. Data written to the computer letters can be directly and easily sent by e- mail and read by the recipient directly on the computer and possibly further processed.

Also the financial single expense ( cost of sending an e- mail) is normally low ( in materials and postage costs ) if the number of e -mails are processed or the necessary infrastructure ( computers with Internet access ) anyway the sender and receiver for further use is available. In addition, the effort and cost advantage is the greater, the more recipients to receive the same e -mail ( newsletter ). E -mail services are usually free on the Internet for private use. You are financed generally through advertising.

With regard to the environmental performance of e- mails in particular, there are various discussions and views as well as the Internet and computer technology in general. At least e-mails are so far more environmentally friendly, as they directly consume no paper and no material transport ( truck, train, plane, ship, etc. ) need.

E -mails have over normal paper mail the advantage that their addresses and sender texts (email addresses ) are noticeably shorter than normal paper -mail addresses with Name, Street / PO Box, postal code, town and country. E- mail addresses can be selected largely free and there is no obligation to one's name in plain text (eg michael.mueller @ xyz.org ) as the e- mail address, provided that the domain owner ( xyz.org ) has no rules about the format of their e -mail addresses set up or no laws are broken. Instead, just as pseudonyms are selectable, so a higher anonymity is achieved because the e -mail address is not or only partially ( about the domain derived ) makes statement or permit conclusions about the name, origin, gender, address, geosozialen status, etc. Likewise, the possession of several different e- mail addresses is possible.

In the practical handling emails also offer advantages over paper mail. An e- mail can be sent to multiple recipients, even with hidden lists of recipients (BCC ) can be used to ensure that the complete list of recipients can not be seen by any receiver. E -mails can be easily archived on the computer and the archives can easily be searched to quickly retrieve an e -mail. Also sent and deleted e -mails can be automatically archived.

E -mail systems furthermore offer some practical automatisms. E- mails can be automatically redirect to desire either to another e- mail address or other communication channels, such as SMS or fax. Also, the reverse is also possible, that is the transmission of a fax or a text message to an email address. If desired, an automatic reply can be sent to the sender ( for example, a Out of Office message) or there is a notification that a new message has arrived and when an e -mail. Also, an automatic sorting of unwanted emails ( spam filters & personal blacklists ) or an automatic sorting into different folders according to freely definable criteria is possible.

Another advantage is that of e-mails more files of any type can be added, which can continue to use the receiver. E -mails can be encrypted for privacy and electronic signature for authentication. Similarly, ( such as address or telephone number) mitverschickt attached to an e - mail with further information on request digital business cards, which the recipient address be easier to fill with e- mail contacts and can maintain.

Also when replying to e- mails to show practical benefits. Replies to e -mails can be started easily and quickly by the sender and the CC recipients of the original e- mail are automatically adopted as the recipient of the response. Can also be quoted or added in replies, the contents of the original email to take in the response better terms or to respond or to document the discussion thread.

Spam

The efficiency of e-mail. Due to the massive traffic from spam, so e- mails that are sent to the recipient unsolicited and often contain advertising, partially restricted in the sense that the processing of spam e- mails cost the receiver time Since about 2002, more than 50 % since 2007 and about 90 % of global e - mail traffic is spam. In 2010, about 107 trillion emails were sent, with a share of 89.1 % spam.

Authenticity, privacy and integrity

Like any means of communication must also e- mail satisfy several requirements in order to qualify as a secure medium of communication allowed. Here are mentioned as the most important criteria of the authenticity, privacy and integrity of an e -mail.

With the authenticity of an email is meant to ensure that the email actually came from the sender, so is an original and not fraudulent. Privacy referred to in emails essentially protection against eavesdropping by third parties during transmission. When integrity is defined as the protection goal that the e- mail content remains complete and unchanged during the transfer.

To achieve authenticity, privacy and integrity already exist various protection mechanisms, as described elsewhere (encryption, sender authentication, Pretty Good Privacy, GNU Privacy Guard, S / MIME). However, these safeguards are not applied in the majority of today's e -mail traffic. However, without these protections traditional e -mails have less protection than a normal postcard.

The following subsection is intended to represent the possible plastic rather low safety standard of a traditional e -mail compared to a postcard.

Comparison with the postcard

Conventional ( non-encrypted ) e- mails are comparable, because their content is delivered open and easy to read with a postcard. Encrypted e -mails comply with a sealed letter, but e -mail encryption is today still the exception. But even in an encrypted e -mail, the subject line is next to the sender and the receivers (like a letter ) in addition to read.

E -mails are stored as mail items in e -mail service providers such as at a post office. Thus unencrypted e -mail such as postcards in the e- mail service providers are readable. In addition, e- mails over normal paper mail can be easily and automatically browse for useful information and evaluate.

To increase the reliability of the e -mail service to be made copies of the e- mail service provider of email and kept for a time, as if the post office to make photocopies of postcards and letters and archive.

As for paper mail can be on request, notifications document ( with return receipt ) or the postal service runs in refusal automatically returned to the sender. Conventional e- mails even have the mechanism of acceptance confirmation, but the recipient can read the e-mail anyway, without being forced to confirm his acceptance to the sender. The refusal to accept as an independent mechanism with feedback to the sender does not exist in conventional e- mail.

A postcard is usually accepted in domestic mail only from one or two at international postal mail company, transported and delivered to the recipient. An e -mail, however, happened on the way through the Internet usually the computers of different companies in different countries. Theoretically, an e- mail quasi make their way across half the globe by many countries over many intermediate stations (computers ), and all participants can read along this. It's not necessarily to assume that the world in all participating countries or by Internet companies involved the secrecy or privacy is a sufficiently high priority.

A burglar must appear in person at a post office, but a hacker can break easily from a distance in an e -mail mailbox ( at vulnerabilities ) without it leaves traceable traces, or burglary is even noticed. Burglars have less to fear risk in e- mail espionage at higher success rate and better tools. However, this requires a high level of qualifications of the burglar.

Security measures are in paper post for everyone to implement simple and comprehensible ( registered letter with acknowledgment of receipt, seals, safe, alarm ... ). For e- mail security measures are much trickier, and only by computer experts reasonably manageable. But carelessness of users, for example, by choosing weak passwords, facilitate the chances of burglars.

Similarly, just as in a letter or a postcard to E- mails can be sent with an incorrect return address, which is, for example, in spam or phishing to watch often. Receiver, copy and blind carbon copy addresses ( e -mail header labeled with TO, CC or BCC ) can be equally fake (email spoofing ).

Paper mail is usually signed in manuscript ( signed) and an impostor must fake the handwriting for fraud, but for the vast majority of e- mails ( signature) is the electronic signature omitted and unsigned e- mails from the receiver despite the lack of or limited legal force generally accepted.

In summary it can be said that in conventional e- mails a much lower standard of safety than that of a postcard is generally accepted, though hardly anyone would remember to send a postcard with personal sensitive data. Presumably, this acceptance of the lack of transparency of e- mail technology is owed because the risks for non-computer experts are not so obvious, is not recognizable or simply are unknown, or the disadvantages to be accepted compared to the many benefits easy.

Evidential value

Even with simple e- mails legally relevant declarations issued and liabilities can be justified. However, e- mails have little probative value because the transmitter is not in the longer term, the possibility of the conventional logs and log mechanisms to prove when he what sent to whom, whether the recipient has received the email or whether it was actually sent. Over time, the data stored in the so-called user account data will be discarded.

Through a digital signature, and especially by a qualified electronic signature in legal relations ( civil law, administrative law ) can be created liabilities that are judicially enforceable easier. Colloquially then spoke of a "digital signature". The mandatory setting a timestamp is also recognized under certain conditions. Details will be regulated, for example in Germany, Austria or Liechtenstein Signature Act. Receiving the message, a signature but not prove this, for example, a is - ideally also signed - response required. Some service providers offer solutions that signature, encryption and automate response ( " e- mail registered mail" ).

In Germany, it is considered in the legal literature that an email is already considered delivered to the input on the server of the recipient provider. The receipt of an e -mail in the personal account ( account) of the receiver is not absolutely necessary in order to achieve the status of being delivered to one. Transmission errors when sending an e -mail of recipient - provider to the individual e -mail account of the recipient could not be made by the beneficiary to provide the legal consequences of e- mail in question. Younger judgments confirm this view. Thus, for example, brokerage contracts and warning letters will be sent to validly by e- mail.

Term

The e-mail was developed differently than, for example, telephone or Internet Relay Chat, not simultaneous (synchronous ) transmit and receive, but as letter post an asynchronous communication medium - the sender can send its message even if the recipient to accept them immediately can.

The term ( transport time of a mail from the sender to the receiver) of the e- mail can be a problem, since they - unlike, for example, the fax - is unpredictable and can vary greatly under unfavorable conditions. The variations of the term are influenced by a variety of parameters, especially through the utilization of mail systems involved and waiting for e-mail transmission capacity of the lines connecting the mail systems. If the mail server of the recipient longer unreachable, or if the mail transfer only at long intervals on the server of the recipient, it may well come to terms of a few days.

The disadvantages of not specifically defined maturity, however, are almost negligible, could ( world's rarely more than a minute ) with today's modern e -mail systems, as only relatively rarely larger errors occur in well-maintained systems are caused by the longer durations. However, delays can occur due to various spam-prevention measures (eg, the greylisting process ) even in modern e- mail systems.

Sender authentication

In 2004, there were several attempts to get the spam problem under control. It competed with the procedures Sender ID from Microsoft, Sender Policy Framework (SPF ), DomainKeys of Yahoo, RMX and AMTP the favor of the implementation. An IETF working group attempted to define a standard. The operation is similar in all procedures. Through an additional entry in the DNS, it should be possible to verify the sending mail server. However, the IETF working group ultimately failed to unsettled claims on the part of Microsoft's. The various methods are now to be implemented in their own process as RFCs.

Documentation

Unlike the call sender and receiver of emails automatically receive a written documentation of the communicated content. These can be stored in the used e- mail program or in a retrieval system and later used for recapitulation.

Local independence

Due to the relatively strong growth of the Internet as an infrastructure of each non - local e- mail system, it is now virtually possible to communicate from any location ( at any time) by e -mail. This location independence is in addition to the time independence and low cost for many people a distinct advantage over the traditional means of communication ( telephone and postal ) dar.

Monitoring

Meanwhile, in many countries the e- mail traffic is monitored by the state. In Germany 2005 Internet service providers since the year obliged to maintain appropriate hardware and software to make a supervision order immediately result can without receiving financial compensation for the ensuing costs.

Release of emails

Generally

A general prohibition to publish e- mails do not exist in Germany. A right of the author may arise to take action against the publication only of the content of the email. Various legal consequences are possible, which can range from injunctive relief, civil law claim for damages in money to criminal liability, other legal consequences are possible.

In civil law, the publication of a letter may violate the copyright of the author, but this is not the case with " general content ". Furthermore, the publication can the general right of the author to hurt, so far take the lower courts following a ruling by the Federal from 1954 in each case an extensive balancing of interests ago. This common law should be applicable to e-mails.

It is assumed that the Court (OLG Rostock, decision of 17 April 2002-2 U 69/ 01 ), an unwritten secondary obligation of both Parties shall in accordance with the regard to business letters, which are changed as part of a contractual cooperation, the letters is confidential treat even on business e -mails applicable, at least if they have been sent encrypted.

Judgment of the District Court of Cologne 2006

The Cologne Regional Court has decided in principle of the judgment to file number 28 O 178/ 06:

The publication of a third-party e- mail to a third party on a website, according to that judgment can constitute an encroachment on the general right of the sender in the form of secret sphere. In this respect, however, the illegality is not indexed, but positively determine in each case, for which a comprehensive goods and balancing of interests is required. Compared to stand the purpose of the publication and the intended purpose of the publishing party and the form, the nature and extent of engagement. A violation triggers an obligation to pay damages.

It represents the regional court the e-mail a sealed letter the same.

The ruling relates to a case have been published in the e- mails that were directed in part to a third party and which have been acquired on the other by the publishing party unfairly. In the event of a release of e- mails that are sent to the victims themselves, the reasoning of the judgment is not applicable.

Quality of communication content

Compared with the spontaneous statements during a telephone conversation provides the written formulation the chance to think through the information to be better content and structure. Similarly, reduces the risk of ill-considered and repented afterwards statement.

On the other hand, it has - in contrast to the telephone call - the author of an e -mail anticipate that his remarks can be found in the long term any number of times and can be forwarded by the recipient with the least effort or even reckless at practically any selection of eavesdroppers. They thus have a stronger public character.

E -mails are talking psychologically from their receivers often perceived as intended by the author as a powerful and harder. In contrast to the telephone call or personal conversation, the immediate feedback is omitted even while composing the communication and thus an important regulatory function.

Commercial use

Austria

  • Since 1 January 2007, in Austria the Commercial Code in force. This one imprint obligation for emails is prescribed for entrepreneurs.

Germany

  • In Germany, by the Law on electronic commercial register and the register of cooperatives and the business register ( EHUG ) of 10 November 2006 since 1 January 2007 for e -mails, faxes, postcards and other writing, replace the business letters, new procedural requirements. These rules also apply to all commercial emails such offers, orders, notices and newsletters. The email must contain the same information as sent in the classical form of a letter news, so for example, the full company name, legal form, place the trade register office, the competent court, as well as the trade register number, all directors or board members and, where appropriate, the Chairman, accordingly. Violations can be punished with fines or reprimanded by competitors. See also signature ( e- mails in commerce).
  • In email to inform customers, invitations to events, etc. may not be registered without their consent in the To or CC field all the email addresses of the recipients, as already addresses constitute personal data and may not be disclosed to third parties. The BCC field can be used in accordance with any problems for corresponding mail because the recipient list is not to be seen among the recipients here.

Usage

For the classic letter (English Snail Mail ) is variously to distinguish the term snail mail used.

2003 forbade the French Ministry of Culture the use of the word e- mail in official letters from governmental entities and sat instead, the French -sounding word " courriel " (from " courrier électronique "). The term was already common in the 1990s in French-speaking Quebec.

Although the Yiddish language is even stronger than the German of the English language influences that are not foreign-language terms בליצפאסט (Flash Post) and בליצבריוו (lightning letter ) have been enforced there.

An email with unfriendly, and unpleasant abmahnendem content is referred to in popular English as nastygram. E -mails in an aggressive tone while hot Flame -mails.

85757
de