E-mail Blind Copy (Bcc) Addresses Are Secure

BY STANLEY ZAROWIN

Key to Instructions

To help readers follow the instructions in this article, we used two different typefaces:

Boldface type is used to identify the names of icons, agendas and URLs.

Sans serif type shows the names of files and the names of commands and instructions that users should type into the computer.


Can a spammer grab the addresses off an e-mail’s blind copy (Bcc)? Several people in my office insist it can be done.

Rest assured, the claim of insecurity is a legend that pops up from time to time. You can confirm its safety by sending yourself an e-mail (see screenshot below) and include yourself as a Cc (copy) and a Bcc (blind copy).

When it arrives, it looks like this:

When you send a message, names and addresses in the Bcc are automatically stripped out by the sending server (usually the Internet Service Provider) after they are transmitted so they are never available to the recipients.

SPONSORED REPORT

Revenue recognition: A complex effort

Implementing the new standard requires careful judgment. Learn how to make significant accounting judgments and document them and collaborate with peers for consistent application.

VIDEO

How to Excel pivot a general ledger

The general ledger is a vast historical data archive of your company's financial activities, including revenue, expenses, adjustments, and account balances. J. Carlton Collins, CPA, shows how to prepare data for, and mine data with, PivotTables.

QUIZ

News quiz: Taking an economic snapshot and looking to the future

Recent news included IRS actions that affect individuals and partnerships and a possibly influential move by a Big Four accounting firm.Take this short quiz to see how much you know about the news.