Progress
0%
Attention Activity
Your First Email: Harmless or High-Risk?
Screen 1 of 13
What's in this lesson: Startup-ready email etiquette, security basics, and our official policy, plus a scored assessment.
Why this matters: Email is our primary external signal. Misuse can leak data, hurt our brand, or create legal risk.
Why this matters: Email is our primary external signal. Misuse can leak data, hurt our brand, or create legal risk.
Quick Thought Experiment
Imagine you're about to email a big potential customer. Which draft would you actually send from your new @startup address?
Choose a draft above to see how it aligns with our email policy.
Foundations
What Our Email Policy Actually Covers
Screen 2 of 13Policy Essentials
For day one, you need a simple mental model:
- Use company email primarily for work.
- Write as if your message could be forwarded to legal or regulators.
- Protect confidential and customer data at all times.
Reference Document
Exploring the Official SOP
Page 3Policy Preview
Click a page to highlight it as your "anchor" reference.
Select a page thumbnail to see context.
Select a page thumbnail above to see a larger preview here.
Acceptable Use
Appropriate Use Standards
Screen 4 of 13Professional Boundaries
Company email is for legitimate business: customers, partners, recruiting. Light personal use is fine if it doesn't:
- Disrupt work or systems.
- Bypass security controls.
- Violate conduct or harassment policies.
Confidentiality
Data Classification
Screen 5 of 13Classify Before Sending
Blog posts, public docs, job descriptions.
Org charts, internal notes, non-PII process docs.
Customer PII, financials, contracts, roadmaps. Use encryption.
Knowledge Check
Is This an Acceptable Use?
Knowledge CheckYou want to email customer data to your personal account to "finish work tonight." What should you do?
Select an option to check.
Summary
Key Takeaways
Screen 7 of 13- Email is business-first and professionally tone-critical.
- Classify content (Public, Internal, Confidential) every time.
- Never route sensitive data through personal accounts.
- Assume all messages are discoverable and monitored.
- Report security issues immediately via designated channels.
Assessment
Final Knowledge Check
Assessment Intro📝
Assessment Guidelines
You need 80% to pass. Scenarios are based on the policy standards covered.
- 4 Questions total.
- One correct answer per question.
- Next button is enabled once you select an answer.
Assessment
Question 1
AQ1Assessment
Question 2
AQ2Assessment
Question 3
AQ3Assessment
Question 4
AQ4Results
Protocol Outcome
ResultsAssessment complete. Your final score:
--%