Your First Email: Harmless or High-Risk?
Page 1Why this matters: Email is our primary external signal. Misuse can leak data, hurt our brand, or create legal risk.
Quick Thought Experiment
Imagine you're about to email a big potential customer. Which draft would you actually send from your new @startup address?
Tap an option.
What Our Email Policy Actually Covers
Page 2From Heavy SOP to Startup-Ready Guide
Our full "Enterprise Email Usage, Electronic Communications, and Record Retention" SOP is detailed on purpose. For day one, you need a simple mental model:
- Use company email primarily for work.
- Write as if your message could be forwarded to legal, press, or a regulator.
- Protect anything confidential or customer-related.
Behind the scenes, the policy focuses on scope (who and what it applies to) and interpretation (we choose the safest option when in doubt).
Exploring the Official SOP PDF
Page 3Visual Preview of the Manual
Here are thumbnail previews of the full "Enterprise Email Usage, Electronic Communications, and Record Retention Manual" you saw in your onboarding pack.
Click any page below to highlight it as your "anchor" reference while you proceed through this lesson.
Where Work Email Is (and Isn't) Okay
Page 4Use for Work First, Humans Always
Company email is for legitimate business purposes: customers, partners, recruiting, internal work. Light personal use is fine when it doesn't:
- Disrupt your work or others' work.
- Bypass our security controls (e.g., forwarding to personal inbox).
- Violate our anti-harassment or conduct policies.
Sending Confidential Information Safely
Page 5Classify Before You Send
Before hitting send, quickly label the content in your head:
Anything "Confidential" must use approved encryption or secure sharing tools, not bare attachments.
No Expectation of Privacy
Page 6Assume Every Email Is Discoverable
Our systems log, archive, and may inspect email for security and compliance. That means your message could later be reviewed during an incident, audit, or legal request.
Practice a simple rule: never put into company email what you wouldn't be comfortable seeing quoted on a slide in front of the exec team.
Phishing and Technical Safeguards
Page 7Our Controls + Your Habits
We use multi-factor authentication, spam and malware filters, and domain protection (DMARC, DKIM, SPF). These reduce, but don't remove, risk.
Your job is to:
- Verify unexpected requests over another channel.
- Be skeptical of links and attachments, especially from new senders.
- Report suspicious emails instead of just deleting them.
Is This an Acceptable Use?
Knowledge CheckYou want to email yourself some customer data to your personal Gmail account so you can "finish the deck tonight." What does our policy expect you to do?
Reporting Problems and Representing the Brand
Page 8Report Fast, Communicate Carefully
If you suspect phishing, spoofing, or account misuse, report it immediately using our security channel rather than trying to fix it alone.
For public-facing topics (legal, press, funding, incidents), only designated spokespeople should email externally on behalf of the company.
Key Takeaways Before You’re Tested
SummaryWhat to Remember This Week
- Email is business-first: use it professionally and sparingly for personal matters.
- Classify content mentally (Public, Internal, Confidential) before sending.
- Never route confidential data through personal email or unsanctioned tools.
- Assume messages can be monitored, archived, and discovered later.
- Our systems block many threats, but you must stay alert for phishing.
- Report security issues quickly and avoid acting as an unofficial spokesperson.
- The detailed SOP is your reference; this lesson is your day-to-day checklist.
Read This Before You Start the Quiz
Assessment IntroHow the Assessment Works
You’ll answer a short set of scenario-based questions about email usage and security. You need at least 80% to complete this protocol.
- One correct answer per question.
- No per-question feedback; you’ll see only your final score.
- You can retake the lesson if you don’t pass on the first try.
Take a breath and think about the safest, most policy-aligned answer in each situation.
Assessment Question 1
Assessment Q1Assessment Question 2
Assessment Q2Assessment Question 3
Assessment Q3Assessment Question 4
Assessment Q4Your Email Usage Readiness Score
ResultsYour assessment score based on this attempt: