What is good practice for Information Protection when using E‐Mail ?
a. Open E‐Mail attachments sent from strangers
b. Creating / participating in chain letters and other forms of junk mail
c. If you suspect that an e‐mail may be fraudulent, contact the IT support
d. Reply to the suspected e‐mail to figure out if it is legitimate