Promising Practices Promising PracticesPromising Practices
A forum for government's best ideas and most innovative leaders.

Is It Wrong to Plagiarize From an Email?

Pavel Ignatov/

Last year, before the launch of my first book, I promised my publisher that I would send an email about it to my friends, colleagues, and former students. I spent hours agonizing over the wording of the first draft, wanting to make sure that I wasn’t spamming the people close to me, but sending something they’d be happy to read. After several days of tinkering, I finally sent it out.

A few weeks later, I was in for a surprise. A colleague had written a book, and he sent an email announcing it to his network, using the text from my message . . . verbatim.

I was taken aback, but I didn’t say anything. I like and respect the guy, and after all, it was just an email. I didn’t want to embarrass him or damage the relationship; I’m sure he meant no harm by it. You could even make a case for interpreting the event as positive feedback. As Charles Caleb Colton famously said, “Imitation is the sincerest [form] of flattery.”

Later that month, I received an email from a different friend who was releasing a book. He had reproduced my message too, word for word, with a few minor adjustments to reflect the content of his book. How could this be? I would never use someone else’s sentences and pass them off as my own. Plagiarism is a cardinal sin in academia, and one of the perpetrators is a fellow professor.

Maybe I was overreacting, though. If two different people found it acceptable to use my words, I might be in the minority in thinking that it crossed an ethical line. The authors clearly didn’t think it was wrong to copy my email without rephrasing it: if they had any qualms, surely they would have removed me from their email lists!

I decided to let it go, but it didn’t go away. In recent months, it has happened three more times. When I described the situation to people close to me, they were mad. As a psychologist who studies motivation, it’s my job to analyze situations that make people angry and approach them with curiosity. To understand it better, I began reading about plagiarism.

Traditionally, courts of law have distinguished between two ways that people can plagiarize the work of others. One is kleptomnesia, a lovely term coined by the psychologist Dan Gilbertto describe accidental, unconscious plagiarism. It occurs when you encounter someone else’s idea, forget the source, and come to believe it was your own. Kleptomnesia has many famous victims, from George Harrison of the Beatles to Helen Keller and Robert Louis Stevenson. In my situation, kleptomnesia clearly wasn’t the culprit, since only people with an eidetic memory—or a freakish amount of free time—would commit more than 400 e-words to memory without realizing they came from someone else.

The other kind of plagiarism is intentional: It’s a conscious, deliberate attempt to steal someone else’s ideas and get away with it. This doesn’t seem like a plausible explanation either. My colleagues copied an email, not a literary masterpiece.

The Internet has cracked down on kleptomnesia and intentional plagiarism. Now, online tools can instantly crawl through millions of records to see if your writing is authentically yours. Yet the digital era has opened the door for a third kind of plagiarism. It’s what I suspect happened to my friends.

Let’s call it cut-and-paste plagiarism. They started out by copying my email as a template, edited it a bit, and then moved on to other tasks. When they came back to it, they genuinely didn’t remember how many of the sentences weren’t original.

It’s all too easy to make this mistake. Most people are careful with books and articles, recognizing that the safest way to avoid cut-and-paste plagiarism is to not cut and paste at all. But email is a gray area. If you like a phrase that a friend coins in an email, can you start using it? Is it wrong that I started signing emails “Cheers, Adam” without acknowledging that I was following the lead of my favorite professor, Brian Little? If I cite him below each signature, should I also clarify that I became especially fond of the habit after spending a sabbatical in England, and list the names of the colleagues who also favor this bit of British cheer?

When I shared a draft of this post with another author I know, he replied that e-plagiarism happened to him recently too, and he felt I was “being too charitable.” After he sent a note announcing his book to an email list, another author “ripped off most of my email word-for-word,” laments this author, who asked not to be named:

I complained—to her, to the publication that sent it on her behalf, and to her book editor. She didn’t respond. Her publication said it wasn’t a big deal. And her book editor apologized profusely. Strange.

You’d figure a writer ought to know better. Plagiarism is a no-no. And an email sent to several thousand people isn’t private communication. It’s much closer to something that’s published. The funny thing is, if she had asked in advance to use some of my language, I likely would have said yes. But since she apparently tried to pull a fast one, I didn’t shed any tears when her book turned out to be a huge flop.”

Where should we draw the line on what counts as email plagiarism? Needless to say, I think a single word is fair game for the taking. Here’s my proposal:

If you use a full sentence or more from an email that someone else wrote, quote it and attribute it to that person. Otherwise, take the high road and rewrite it from scratch in your own words.

If you’re one of the authors who borrowed my email message, I don’t hold it against you. In fact, I’m grateful that you provided the fodder for this post. I couldn’t have written it without you.



(Image via Pavel Ignatov/

July 31, 2012Whart, ... ]

Adam Grant is the youngest tenured professor at Wharton. He has been recognized as Wharton’s single-highest-rated teacher, one of BusinessWeek’s favorite professors, and one of the world’s 40 best business professors under 40. Previously, he was a record-setting advertising director at Let’s Go Publications, an All-American springboard diver, and a professional magician. Adam is the author of the New York Times and Wall Street Journal bestseller Give and Take: A Revolutionary Approach to Success. He earned his Ph.D. in organizational psychology from the University of Michigan, completing it in less than three years, and his B.A. from Harvard University, magna cum laude with highest honors and Phi Beta Kappa honors. He has been honored with the Excellence in Teaching Award for every class that he has taught and has presented for leaders at organizations such as Google, the NFL, Merck, Pixar, Goldman Sachs, Facebook, Microsoft, Apple, the United Nations, the World Economic Forum, and the U.S. Army, Navy, and Air Force.

Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • The Big Data Campaign Trail

    With everyone so focused on security following recent breaches at federal, state and local government and education institutions, there has been little emphasis on the need for better operations. This report breaks down some of the biggest operational challenges in IT management and provides insight into how agencies and leaders can successfully solve some of the biggest lingering government IT issues.

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

  • Ongoing Efforts in Veterans Health Care Modernization

    This report discusses the current state of veterans health care


When you download a report, your information may be shared with the underwriters of that document.