How Would You Properly Use Email in a Story AP Style: Mastering Digital Communication for Narrative Impact
Mastering Digital Communication: How Would You Properly Use Email in a Story AP Style?
Imagine Sarah, a budding journalist tasked with uncovering a corporate scandal. She’s been diligently sifting through mountains of paperwork, but the real breakthrough, she suspects, lies hidden within the digital footprints of her sources. The dilemma? How to effectively integrate email exchanges into her investigative reporting to build a compelling narrative that adheres to AP Style, ensuring credibility and impact. This isn’t just about showing a few quoted lines; it’s about understanding the *how* and *why* of using email strategically within a story. Done correctly, email can be a powerful narrative tool, offering raw, unvarnished insight and propelling your story forward. Done poorly, it can become a distraction, a source of confusion, or worse, a breach of journalistic ethics.
The core question of how to properly use email in a story, particularly when adhering to the rigorous standards of AP Style, is multifaceted. It requires a deep understanding of narrative structure, ethical considerations, and the practicalities of presenting digital communication in a print or online format. It’s not merely about quoting an email; it’s about selecting the most impactful excerpts, contextualizing them appropriately, and ensuring their presentation aligns with journalistic best practices. This article will delve into the nuances of this process, offering actionable advice and demonstrating how email can elevate your storytelling from merely informative to truly compelling, all while maintaining the integrity demanded by AP Style.
The Foundation: Authenticity and Relevance
At its heart, the proper use of email in a story hinges on two fundamental principles: authenticity and relevance. Every email, or excerpt thereof, that you include must be genuine and directly pertinent to the narrative you are constructing. This might sound obvious, but the digital age presents a unique set of challenges. We’re bombarded with emails daily, many of them fleeting or trivial. Selecting the right ones for inclusion in a story is akin to a sculptor choosing the perfect chisel – each selection must serve a purpose in revealing the form beneath the marble.
Authenticity means that the email content you present is exactly as it was sent and received. There’s no room for fabrication or significant alteration. AP Style, in its pursuit of accuracy and clarity, demands this level of fidelity. If you quote an email, it must be a faithful representation of the original message. This includes preserving the original tone, language, and any grammatical idiosyncrasies, unless a specific editorial decision is made to anonymize or correct for clarity, which must be clearly noted. The context surrounding the email is also crucial for its authenticity in a narrative; presenting an email without understanding the preceding or subsequent exchanges can distort its meaning.
Relevance, on the other hand, is about narrative drive. Does this email advance the plot? Does it reveal character? Does it provide crucial information that the reader absolutely needs to know? If an email exchange is lengthy, and only a few sentences are truly vital, you must be judicious in your selection. Including tangential information, even if it’s from an authentic source, can dilute the impact of your story and bore the reader. Think of it as distilling the essence of a communication, extracting the potent truth that serves your narrative. My own experiences in journalism have often underscored this: a single, perfectly chosen sentence from an email can be more powerful than pages of less impactful prose.
When Email Becomes a Storytelling Asset
Email isn’t just a way to convey information; it can be a character in itself, revealing the personalities, motivations, and power dynamics at play within your narrative. It offers a unique window into how people communicate when they believe they are speaking privately, even if that privacy is ultimately ephemeral. This is where the real storytelling potential of email lies.
Revealing Character and Voice
The way someone writes an email can tell you volumes about them. Are their messages terse and to the point, or verbose and elaborate? Do they use jargon and technical terms, or simple, accessible language? Are they prone to exclamation points and emojis, or do they maintain a formal, stoic tone? These stylistic choices, when presented within the context of a story, can paint a vivid portrait of a character. For instance, an email from a CEO that is filled with corporate buzzwords and evasive language might reveal a character who is out of touch or intentionally obfuscating the truth. Conversely, an email from a whistleblower that is passionate and filled with detailed, albeit perhaps slightly disorganized, explanations can humanize their struggle and make their plight more resonant with the reader.
Consider a scenario where a whistleblower, let’s call him David, is sending urgent emails to his superior about a dangerous flaw in a product. If David’s emails are filled with frantic prose, underlined words, and phrases like “This is critical!” and “We’re facing a lawsuit!”, it immediately conveys the gravity of the situation and David’s personal investment. If the superior’s replies are curt, dismissive, and filled with corporate platitudes like “We’re looking into it” or “Please follow protocol,” it starkly contrasts their personalities and highlights a potential disconnect or negligence. This direct, unedited glimpse into their communication styles is far more impactful than simply stating that David was concerned and his superior was unconcerned.
Documenting Events and Decisions
Email is an invaluable tool for documenting the timeline of events and the decision-making processes that led to a particular outcome. It provides concrete evidence of who said what, when, and what actions were proposed or taken. This is particularly critical in investigative journalism, where establishing a clear sequence of events is paramount. Emails can serve as the skeletal structure upon which your narrative is built, providing the factual backbone.
For example, in a story about a controversial policy change, emails between policymakers might reveal the specific discussions, compromises, and influences that shaped the final decision. You might find an email from one official suggesting a particular amendment, followed by a reply from another official agreeing with caveats, and then a final email confirming the adopted language. This trail of digital breadcrumbs allows the reader to follow the evolution of the policy, understanding the nuances and potential motivations behind each step. Without these emails, you might only be able to report the final policy, leaving the reader to wonder how it came to be.
I recall working on a story where a government contract was awarded under questionable circumstances. The breakthrough came from a series of emails between a government procurement officer and a lobbyist for the winning company. These emails, sent in the weeks leading up to the decision, detailed meetings, discussed lobbying strategies, and even hinted at preferred outcomes. Presenting these exchanges, carefully selected and contextualized, painted a clear picture of undue influence, far more powerfully than any paraphrase could. The raw language, the casual tone in which serious matters were discussed, was damning.
Adding Urgency and Suspense
The nature of email, often characterized by immediate responses or delayed silence, can be leveraged to create a sense of urgency or suspense within a narrative. A string of rapid-fire emails can signify escalating tension, while a long period of silence after a critical message can leave a reader on the edge of their seat, anticipating the fallout.
Consider a scenario involving a security breach. An initial alert email might be sent out, followed by a flurry of increasingly panicked messages as the extent of the breach becomes clear. “System compromised!” followed by “Data exfiltration confirmed!” and then perhaps a desperate plea for assistance from a senior executive. This rapid exchange builds tension and draws the reader into the unfolding crisis. Conversely, if a whistleblower sends a damning email to a board of directors and then there’s a week of radio silence before any public statement is made, that silence itself becomes a source of suspense, amplifying the reader’s curiosity about what’s happening behind closed doors.
AP Style and Email: Best Practices for Integration
Now, let’s dive into the specifics of how AP Style guides the presentation of email content. Adhering to AP Style ensures your reporting is clear, concise, and consistent, which is especially important when dealing with the often informal nature of digital communication.
Quoting and Attribution
When quoting directly from an email, you must attribute it clearly. AP Style generally prefers concise attribution. For example, instead of a lengthy introduction, you might simply state:
“‘We need to address this issue immediately before it spirals out of control,’ wrote [Source Name] in an email to [Recipient Name] on [Date].”
The date is crucial for establishing a timeline. AP Style generally advises against using timestamps unless they are of particular significance to the story. The emphasis is on the day the communication occurred.
Key Considerations for Quoting:
- Accuracy: Quote verbatim. If there are grammatical errors or typos in the original email that are significant to the meaning or tone, include them. However, AP Style allows for minor corrections for clarity, but these should be noted. For example, you might use bracketed corrections: “I am verry [very] concerned about this.”
- Conciseness: Select only the most impactful portions of the email. Don’t quote entire messages unless every word is essential.
- Context: Ensure the quoted material is placed within a paragraph that explains its significance and the surrounding circumstances.
- Anonymity: If a source’s identity is protected, you’ll need to use a pseudonym and explain this to the reader. AP Style has guidelines for using pseudonyms. For example: “A source, who requested anonymity to protect their job, wrote in an email: ‘…’”
Presenting Full Emails vs. Excerpts
In most news reporting, presenting entire emails is impractical and can bog down the narrative. However, there are rare instances where the full text might be warranted, particularly if the email is short, has significant historical or evidentiary value, and its entirety contributes to the story’s impact. This is more common in online formats where readers can scroll, but even then, judicious selection is key.
When to Consider Presenting Full Emails:
- The email is very short (e.g., a few sentences).
- The entire email contains crucial, interwoven details that cannot be effectively separated.
- The email itself is the primary piece of evidence, and its full content is demonstrative.
More commonly, you will be using excerpts. Here’s a breakdown of how to handle them effectively:
Handling Email Excerpts:
- Introduction: Briefly introduce the email and its sender/recipient before presenting the quote. “In a message sent on Tuesday, [Sender] expressed concerns to [Recipient] about…”
- Seamless Integration: Weave the quoted text into your own prose. The quote should flow naturally from your narrative.
- Ellipses: Use ellipses (…) to indicate omitted words or phrases within a sentence or between sentences. AP Style prefers single spaces around the ellipses. For example: “We need to address this issue… before it spirals out of control.”
- Brackets: Use brackets [ ] to add clarification, correct a misspelling for readability, or indicate a non-verbal sound. For example: “I am verry [very] concerned…” or “The meeting was [scheduled] for Tuesday.”
Email Signatures and Metadata
AP Style generally advises against including lengthy email signatures in quotes unless they contain information directly relevant to the story (e.g., a title that signifies authority or a disclaimer that is significant). Similarly, details like IP addresses or specific server paths are usually omitted unless they are critical to proving authenticity or tracing a communication. The focus remains on the content and its narrative purpose.
If an email signature includes a significant title or affiliation that provides context for the sender’s authority or role, it might be worth mentioning briefly in your introduction to the quote, rather than including the entire signature. For example, instead of quoting the full signature, you might say:
“The message came from [Sender Name], who identified themselves as the Chief Financial Officer of [Company Name].”
Formatting and Readability
When emails are presented within an article, especially online, consider how to make them easy to read. Using blockquotes or distinct formatting for quoted emails can help visually separate them from the main text, enhancing readability. AP Style doesn’t have specific formatting rules for displaying emails themselves, but the principles of clarity and conciseness apply.
Visual Presentation Tips:
- Use a different font or indentation for quoted emails.
- Keep quoted sections relatively short.
- Ensure a clear break between your narrative text and the email content.
Ethical Considerations and Legal Pitfalls
Using email in a story comes with significant ethical and legal responsibilities. Improper handling can lead to lawsuits, damage reputations, and erode public trust. This is an area where vigilance is paramount.
Obtaining Emails Legally and Ethically
This is arguably the most critical aspect. How did you get the email? Did you receive it directly from the sender or recipient? Was it provided voluntarily? Or did you obtain it through unauthorized means, such as hacking, dumpster diving for old printouts, or via an anonymous source who may have acquired it illegally?
Permissible Acquisition Methods:
- Voluntary Disclosure: The most straightforward and ethical method is when a source willingly provides you with copies of their own emails or emails they received.
- Publicly Available Information: If emails have been made public through official channels (e.g., court documents, official press releases, Freedom of Information Act requests), their use is generally permissible.
- Source Verification: If an anonymous source provides emails, you must rigorously verify their authenticity and the legality of how they obtained them. Relying on illegally obtained documents can put you and your publication at significant legal risk.
Methods to Avoid:
- Hacking or Unauthorized Access: This is illegal and unethical.
- Misrepresentation: Posing as someone else to gain access to emails is unethical and potentially illegal.
- Reputational Damage: Even if legally obtained, consider the ethical implications of publishing private communications that could unfairly damage someone’s reputation or invade their privacy, especially if the content is not directly relevant to a matter of public concern.
My own experience has shown that the temptation to acquire information through less scrupulous means can be strong, especially when a story is on the cusp of breaking. However, the potential legal ramifications and the erosion of ethical standards are far too high a price to pay. Always err on the side of caution and legality.
Privacy and Defamation Concerns
Emails often contain personal information, opinions, and sensitive details about individuals and businesses. Publishing such content can lead to claims of invasion of privacy or defamation, especially if the information is false or presented out of context.
Key Considerations:
- Public Interest vs. Privacy: Is the content of the email a matter of significant public interest? Does it pertain to wrongdoing, malfeasance, or issues that directly affect the public? If it’s purely private gossip or opinion with no bearing on public affairs, its publication is ethically questionable and legally risky.
- Truth as a Defense: If you are publishing factual information from an email that is negative, truth is your strongest defense against defamation claims. However, you must be able to prove the truth of the statements.
- Opinion vs. Fact: Distinguish between factual assertions within an email and personal opinions. Opinions are generally protected, but factual misrepresentations can lead to legal trouble.
- Context is King: Ensure that the email is presented in a context that accurately reflects its meaning. Taking a statement out of context to make someone appear guilty or foolish is unethical and can be defamatory.
Anonymization and Redaction
When protecting a source or when an email contains sensitive information unrelated to the story, you may need to anonymize or redact certain parts.
Anonymization:
- Replace names with pseudonyms (e.g., “Source A,” “Employee X”).
- Remove identifying details like company names, specific project titles, or locations if they could reveal the source’s identity or the identity of others mentioned.
- Ensure that the anonymized text still flows naturally and makes sense.
Redaction:
- Use brackets [REDACTED] or similar notation to indicate where information has been removed.
- Redact sensitive personal information (e.g., social security numbers, financial account details) or proprietary business information that is not central to the story.
- Be transparent with your editor and legal counsel about what has been redacted and why.
AP Style guidance on redaction typically involves using brackets and often a brief explanation if the redacted material is significant. For example, a quote might read: “The financial projections show a loss of [REDACTED] for the fiscal year.”
When Not to Use Email: The Limits of Digital Evidence
While email can be a powerful tool, it’s not always the best or most appropriate form of evidence for every story. Knowing when to hold back is as important as knowing when to include it.
Triviality and Irrelevance
Not every email is newsworthy. A casual exchange about lunch plans between colleagues, or a routine notification about a meeting reminder, adds no value to a serious narrative. Including such content, even if it’s a genuine email, can dilute your story’s impact and make your reporting seem amateurish.
Ask Yourself:
- Does this email advance the plot of my story?
- Does it reveal crucial character development or motivations?
- Does it provide a fact that is essential for the reader to understand the situation?
- Would the story be significantly weaker without this piece of information?
If the answer to most of these questions is no, it’s best to leave the email out, no matter how “juicy” it might seem at first glance. The goal is impactful storytelling, not simply presenting every piece of information you’ve gathered.
Hearsay and Unsubstantiated Claims
Emails can sometimes contain gossip, speculation, or unsubstantiated claims. While these might be interesting from a human-interest perspective, they do not constitute factual reporting unless they are themselves the subject of the story (e.g., reporting on the spread of rumors). AP Style emphasizes factual reporting, and you should be cautious about presenting claims made in emails as established facts without independent verification.
Verification is Key:
- If an email contains a significant allegation, try to corroborate it with other evidence or sources.
- If you cannot verify a claim made in an email, attribute it clearly: “[Source Name] *claimed* in an email that…” rather than stating it as fact.
Emotional vs. Factual Content
Emails can be highly emotional, filled with personal feelings, frustrations, or even anger. While this emotional content can be compelling, it needs to be balanced with factual reporting. A story based solely on emotional outbursts, even if documented in emails, may lack the substance and objectivity that readers expect from credible journalism.
Balancing Act:
- Use emotional quotes to humanize your story and connect with the reader, but ensure they are supported by factual evidence.
- Explain the context behind the emotion. Why is the person feeling this way? What events led to this emotional expression?
Legal and Ethical Restrictions
As discussed earlier, some emails may be protected by attorney-client privilege, contain trade secrets, or be subject to other legal protections that prevent their disclosure. Publishing such content could have severe legal consequences. Furthermore, even if legal, publishing private information that serves no public interest is an ethical violation.
When in Doubt, Consult:
- Consult with your editor.
- Consult with the publication’s legal counsel.
- When in doubt about the legality or ethical implications of publishing an email, it’s always best to seek advice before proceeding.
Crafting the Narrative: Integrating Email Seamlessly
The art of using email in a story lies in its seamless integration. It shouldn’t feel tacked on or forced. The email content should serve to illuminate, confirm, or propel your narrative forward naturally.
Setting the Scene
Before you present an email excerpt, set the stage. Provide the reader with the necessary background information. Who is sending the email? Who are they sending it to? What is the context of the communication? What is happening in the story at this moment?
For instance, if you’re writing about a company facing a crisis, you might first describe the public outcry and the company’s initial response. Then, you could introduce an email from an internal source that reveals the stark reality behind the public statements. “While the company’s public relations team issued a statement of calm, internal communications painted a far different picture. In an email sent to senior management on Wednesday, an anonymous employee wrote…”
Using Email to Show, Not Just Tell
One of the most powerful ways to use email is to *show* the reader something rather than simply *telling* them. Instead of saying, “The manager was dismissive of the employee’s concerns,” you can show it through an email exchange:
The employee wrote: “‘I am deeply concerned about the safety protocols in the lab. I witnessed a near-accident yesterday, and I believe we need to implement additional safety measures immediately.’
The manager replied: “‘Noted. Please follow standard procedure for reporting such incidents.’”
This contrast is far more impactful and allows the reader to draw their own conclusions about the manager’s attitude and the company’s culture.
Building a Chronology
Email chains, when presented chronologically, can be incredibly effective in illustrating the progression of a situation, a debate, or a decision. This is particularly useful in complex investigations where multiple actors are involved.
You might start with an initial proposal email, followed by emails debating options, then an email confirming a decision, and finally, emails reflecting the consequences of that decision. This creates a compelling narrative arc that guides the reader through the unfolding events.
Highlighting Key Phrases and Sentences
Often, only a few words or sentences within an email are truly critical. AP Style encourages brevity. Focus on extracting those impactful phrases that encapsulate a key point, reveal a strong emotion, or provide crucial evidence.
For example, in a story about political maneuvering, an email might contain a sentence like: “‘We need to ensure this legislation doesn’t get derailed by the opposition’s amendments.’” This single sentence effectively conveys the political stakes and the sender’s objective.
Examples in Action: AP Style Email Integration
Let’s walk through some hypothetical scenarios to illustrate how email integration might look in practice, adhering to AP Style principles.
Scenario 1: Whistleblower Revelations
Story: An investigation into a tech company’s data privacy practices.
Email Snippet: An internal email from a data analyst to their supervisor detailing a security vulnerability.
Article Excerpt:
“Internal communications obtained by this news outlet reveal that concerns about the company’s data security were raised weeks before the breach. In an email sent on March 15, data analyst Mark Jenkins warned his supervisor, Emily Carter, about a critical vulnerability in the user authentication system.
‘I’ve discovered a significant loophole that could allow unauthorized access to customer databases,’ Jenkins wrote. ‘This isn’t a theoretical risk; I believe it’s actively exploitable. We need to patch this immediately.’
Carter’s reply, sent later that day, was brief: ‘Thanks for the heads-up, Mark. I’ll add it to the backlog for review.’
The company later experienced a breach that exposed the personal information of over 50,000 users.”
Analysis:
- Clear Attribution: Jenkins and Carter are named, and the date of the email is provided.
- Verbatim Quote: The crucial warning from Jenkins is quoted directly.
- Context Provided: The excerpt explains the significance of the email in relation to the subsequent breach.
- Conciseness: Only the most relevant parts of the exchange are used.
Scenario 2: Corporate Decision-Making
Story: A report on a company’s controversial decision to close a factory.
Email Snippet: An exchange between the CEO and the head of operations discussing cost-saving measures.
Article Excerpt:
“The decision to shutter the Springfield plant, affecting 300 workers, was finalized in a series of emails in early April, according to documents reviewed by this publication. In one message, CEO Robert Vance inquired about the feasibility of ‘significant operational streamlining’ at the Springfield facility.
‘Can we project the cost savings if we relocate production to our offshore facilities?’ Vance asked in an email to Chief Operations Officer Sarah Chen on April 3. ‘The board is pushing for maximum efficiency this quarter.’
Chen responded the following day, outlining potential savings and noting the Springfield plant’s aging infrastructure as a factor. ‘Relocation would yield substantial savings, estimated at $5 million annually,’ Chen wrote. ‘The Springfield facility requires significant capital investment to modernize, making closure a more financially sound option in the short term.’
Less than two weeks later, the company announced the plant’s closure.”
Analysis:
- Establishing Context: The article first explains the decision and its impact before introducing the emails.
- Direct Quotes: Key questions and financial justifications are presented via direct quotes.
- Chronological Flow: The emails illustrate the decision-making process leading up to the announcement.
- Attribution: CEO Vance and COO Chen are identified by name and title.
Scenario 3: Political Strategy
Story: An examination of a political campaign’s communication strategy.
Email Snippet: An internal campaign email discussing messaging to voters.
Article Excerpt:
“Behind the scenes, the campaign grappled with how to effectively reach undecided voters in key swing districts. An internal email from campaign strategist David Lee, sent to the communications team on October 10, highlighted a pivot in their messaging.
‘We’re losing ground on the economic message,’ Lee wrote. ‘The data shows voters are more concerned about national security right now. We need to adjust our talking points to reflect this shift. Let’s focus on the candidate’s strong stance on defense and foreign policy, even if it means downplaying the economic recovery plans for now.’”
Internal memos indicate that the campaign subsequently altered its public appearances and advertising to emphasize security issues.
Analysis:
- Strategic Insight: The email reveals the campaign’s internal strategic thinking and decision-making.
- Clear Purpose: The quote directly explains the reason for the messaging shift.
- Attribution: The sender, David Lee, is identified with his role.
- Follow-up: The article notes that the campaign followed the advice, reinforcing the email’s significance.
Frequently Asked Questions about Using Email in Stories
How do I verify the authenticity of an email?
Verifying the authenticity of an email is paramount, especially if it comes from an anonymous or unverified source. Here’s a breakdown of steps you can take:
Content Analysis:
- Internal Consistency: Does the content of the email align with known facts about the individuals or organizations involved? Are there any internal contradictions?
- Linguistic Style: Does the writing style, tone, and vocabulary match that of the purported sender? This can be tricky, as people’s writing can vary, but glaring inconsistencies can be a red flag.
- Technical Details (with caution): While not always available or conclusive, examining email headers can sometimes provide clues. However, headers can be spoofed, so relying solely on them is risky. A journalist’s technical expertise or consultation with a digital forensics expert might be necessary for highly critical documents.
Source Corroboration:
- Independent Verification: Can the key facts or claims made in the email be corroborated through other independent sources or documents? This is the most robust method.
- Contacting the Sender/Recipient (with caution): If appropriate and ethical, you might try to contact the purported sender or recipient to confirm the email’s existence or content. However, this carries risks, as it could tip them off, leading to destruction of evidence or a coordinated denial. It’s usually better to avoid this until you have strong independent verification.
- Multiple Sources: If an anonymous source provides an email, try to find other sources who can confirm the email’s authenticity or the information it contains.
Documentation:
- Preserve the Original: Keep the original email file (e.g., .eml format) rather than just copying and pasting text. This preserves metadata that might be useful for verification.
- Chain of Custody: If the email is critical evidence, maintain a clear record of how you obtained it and who has had access to it.
It’s a detective process. No single method is foolproof, but a combination of these techniques can significantly increase your confidence in the authenticity of an email.
When is it okay to publish an email that contains private information?
Publishing private information from an email is a sensitive matter governed by journalistic ethics and legal considerations. Generally, it’s acceptable only when there is a strong, demonstrable public interest that outweighs the individual’s right to privacy. This involves a careful balancing act:
Public Interest Justification:
- Misconduct or Malfeasance: Does the email reveal illegal activity, unethical behavior, corruption, or gross negligence by public officials or those in positions of power?
- Threat to Public Health or Safety: Does the email contain information that, if suppressed, could put the public at risk? For example, evidence of a dangerous product defect or a public health hazard.
- Financial Irregularities: Does it shed light on financial mismanagement, fraud, or impropriety that affects the public trust or economic well-being?
- Abuse of Power: Does it expose the abuse of authority, discrimination, or harassment?
Considerations Before Publication:
- Relevance: Is the private information directly relevant to the matter of public interest? Or is it incidental and tangential?
- Necessity: Is it possible to report on the issue of public interest without publishing the specific private details? Could the story be told effectively using anonymized or redacted information?
- Source of Information: Was the private information obtained legally and ethically? (As discussed previously).
- Potential Harm: What is the potential harm to the individuals whose private information is being published? Is the harm proportionate to the public benefit of publishing?
- Minimization: Can you minimize the intrusion into privacy by redacting or anonymizing certain details while still conveying the essential information?
A fundamental principle is that the information must be genuinely newsworthy and serve a legitimate public purpose, not merely satisfy prurient curiosity or serve as a tool for personal vendettas. If the information is personal and has no bearing on public affairs, it should generally not be published.
How should I handle slang, jargon, or profanity in emails when quoting?
AP Style has specific guidelines for handling informal language and profanity. The primary goal is to maintain accuracy while ensuring readability and adhering to standards of decency appropriate for the publication.
Slang and Jargon:
- Preserve Authenticity: If slang or jargon is integral to the meaning or tone of the quote and is understandable to the audience, it should generally be preserved. For example, if a tech insider uses specific industry jargon, quoting it accurately reflects their communication.
- Contextualize: If the slang or jargon is obscure, you may need to briefly explain it within your narrative, or if it’s in a longer quote, you might use brackets to clarify. For example: “‘We need to close the loop on this deal [finalize the agreement].'”
- Avoid Overuse: Don’t overload your story with unintelligible slang or jargon. If the majority of the quote is unintelligible, consider paraphrasing or omitting it.
Profanity:
- AP Style Guideline: AP Style generally advises against using profanity unless it is essential to the news report and its use is so integral to the subject that withholding it would distort the news. Even then, the full word is often considered, but context is key.
- Consider the Impact: If profanity is present in an email quote, consider its impact on the reader and the publication’s audience. Is the profanity gratuitous, or does it reveal something critical about the sender’s state of mind or the intensity of the situation?
- Alternatives:
- Paraphrasing: If the profanity is not essential to the meaning, you can paraphrase the sentiment.
- Omission: You might choose to omit the profanity and quote the rest of the sentence, using ellipses.
- Censorship Notation: In rare cases, if the profanity is absolutely critical to the meaning and cannot be paraphrased, a publication might choose to print it with a notation like “[expletive deleted]” or similar, though this is less common with direct quotes from communications.
- Consult Your Editor: The decision to include profanity in a quote should always be made in consultation with your editor. They will weigh the journalistic necessity against the publication’s standards.
The overarching principle is to be accurate and representative of the original communication without being gratuitous or offensive to the reader, unless the offense is intrinsic to the story being told.
Can I use emails I found on social media or public forums?
Yes, generally, emails that are publicly posted on social media platforms or public forums can be used in stories, provided they are treated as public information. However, there are still important considerations:
Publicly Accessible:
- If an email is posted openly on a public profile or a public forum where anyone can see it, it has effectively been made public by the sender or someone else.
- Treat these emails like any other public record or statement.
Verification is Still Crucial:
- Authenticity: Even if posted publicly, you still need to verify if the email is genuine. Someone could post a fake email and claim it’s real. Look for corroborating evidence or a verifiable source.
- Context: Understand why and how the email was posted. Was it posted with the intent to share information, or is it part of a disinformation campaign? The context of its public appearance matters.
Privacy Considerations:
- Expectation of Privacy: While posted publicly, individuals may still have an expectation that their private communications won’t be widely reported on, especially if they were posted impulsively or without full consideration of the consequences.
- Public Interest: The same principles of public interest apply. Is the content newsworthy and relevant to a matter of public concern?
Ethical Considerations:
- “Gotcha” Journalism: Avoid using publicly posted emails simply to embarrass someone, especially if the content is trivial or old. Focus on their relevance to a larger issue.
- Attribution: Clearly state where the email was found (e.g., “posted on the user’s public Twitter account,” “found on the [Forum Name] website”).
In essence, if an email is in the public domain, it’s generally fair game for reporting, but journalistic ethics and the need for verification and contextual understanding remain critical.
Conclusion: The Power of Precision in Digital Storytelling
Properly using email in a story, especially within the AP Style framework, is an exercise in precision, ethics, and narrative skill. It’s about recognizing that digital communications are not just data points but powerful storytelling elements that can reveal character, document events, and drive a narrative forward with authenticity and impact. By adhering to principles of accuracy, relevance, ethical sourcing, and clear attribution, journalists can transform email exchanges from mere footnotes into compelling pillars of their reporting. The digital world offers us unprecedented access to communication, and mastering the art of integrating it responsibly into our stories is a hallmark of effective, trustworthy journalism in the 21st century.