E-mail Blind Copy (Bcc) Addresses Are Secure

BY STANLEY ZAROWIN

Key to Instructions

To help readers follow the instructions in this article, we used two different typefaces:

Boldface type is used to identify the names of icons, agendas and URLs.

Sans serif type shows the names of files and the names of commands and instructions that users should type into the computer.


Can a spammer grab the addresses off an e-mail’s blind copy (Bcc)? Several people in my office insist it can be done.

Rest assured, the claim of insecurity is a legend that pops up from time to time. You can confirm its safety by sending yourself an e-mail (see screenshot below) and include yourself as a Cc (copy) and a Bcc (blind copy).

When it arrives, it looks like this:

When you send a message, names and addresses in the Bcc are automatically stripped out by the sending server (usually the Internet Service Provider) after they are transmitted so they are never available to the recipients.

SPONSORED REPORT

2019 State of Financial Reporting Survey

We surveyed nearly 600 finance and accounting professionals on their month-end close and reporting processes. See the results.

VIDEO

What RPA is and how it works

Robotic process automation is like an Excel macro that can work on multiple applications, says Danielle Supkis Cheek, CPA. RPA can complete routine, repetitive tasks such as data entry, freeing up employee time from lower-level chores.