Netiquette Rules.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
Digital Disasters Laura M Cyberbulling Digital Reputation Identity Theft Offensive or Illegal Content Sexting Unwanted Contact.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
What is identity theft, and how can you protect yourself from it?
INTERNET SAFETY FOR STUDENTS
Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
This week is anti-bullying week.
Internet Safety/Cyber Ethics
What do I need to know?.   Instant Messages  Social Networking.
Basics: Getting Started Uploading and Sharing Videos on YouTube. Basics: Getting Started Uploading and Sharing Videos on YouTube. 1.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
INTERNET SAFETY FOR STUDENTS
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
(c) the7sisters.co.uk A Revision of staying safe on the Internet Internet Safety.
AND SPAM BY OLUWATOBI BAKARE
ICT Essential Skills. (electronic mail) Snail Mail.
E-Safety Challenge College. Learning Objectives To assess the risks faced when online and how to use the options available to protect yourself.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Information guide.
A Student’s Guide to Proper and Safe Web Behavior
Computers and the Internet. Key Information: Key Information: Even if you delete your mail, messages may remain on servers or backup devices for.
INTERNET SAFETY Sergeant Karl Youngblood Barbara Burchard Information adapted from the
By: Daniel Krueger ITC 525: Computers for Educators Summer II 2010 Click Here to Begin.
CYBERSAFETY Presentations Keeping Safe on the Internet.
Lisa Jolynn Elrod I NTERNET S AFETY MICROSOFT CLIPART.
Staying Safe Online Keep your Information Secure.
Reliability & Desirability of Data
IT security By Tilly Gerlack.
Donette Mullinix ED 505 UWA Clipart:
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
CYBERBULLYING. What is it? Cyber bullying is bullying or harassment that happens online. It can happen in an , a text message, an online game, or.
Unit 2—Using the Computer Lesson 14 and Electronic Communication.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Information provided by Microsoft CYBERETHICS.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
By Todd Bennett.  Netiquette  Fair Use and Copyright  Plagiarism  Safety Computer Internet.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
Preparing s Using Etiquette Lesson A4-3.
Preparing s Using Etiquette. Learning Objectives Define . List the parts of an and an header. List rules for etiquette.
Cassidy Culligan Digital Citizenship Project ED 505.
Electronic Communication Presentation. Attachments Files you attach and send with an message.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
INTERNET SAFETY Sergeant Karl Youngblood Barbara Burchard Information adapted from the
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Julie Latham Digital Citizenship: An Informational Guide.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Any criminal action perpetrated primarily through the use of a computer.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Learn how to protect yourself against common attacks
Unit 4 IT Security.
Personal spaces.
Netiquette.
Unit 11 Communication & Collaboration
ICT Communications Lesson 3: Internet Life and Privacy
Presentation transcript:

Netiquette Rules

Be Careful What You Post Everyone uses the internet, so do not put anything on it you do not want anyone else to see because they might find it.

Everyone includes your Mother, family, friends, employers, and law enforcement. There are ways to keep your social networking pages discreet. Use the privacy settings in your account profile to block anyone but friends from viewing your page. Use a personal e-mail that your school/employer does not have as the contact e-mail on your account. Set up your account under a nick name rather than your real name. Do not include information about your occupation or school in your profile. If you are doing something illegal or that you are not supposed to be doing, know that the internet is monitored by law enforcement for various reasons.

Protect Your Financial Identity Shop on secure sites because it protects your information.

A lock in the lower left hand corner and https:// in the address bar lets you know a site is secure. Secure websites encrypt data to prevent hackers from accessing your personal information. Websites purchase security certificates from third party companies who provide encryption services.

Spell check and proof read e-mail before sending it because errors make you look uneducated.

Steps For Spell Checking & Proofreading Messages: Misspelled words project a negative image. If you are using Hotmail or Microsoft Outlook make sure the spell check feature is turned on. For Yahoo mail, you must click the spell check button. Proof read e-mail because spell checkers do not catch all grammar errors. Steps For Spell Checking & Proofreading Messages: Make sure the spell checker is on or click the button when you finish writing. If there is no spell checker write the message in a word processing program with a spell checker. Then copy and paste it into the e-mail. Proofread by re-reading the message after you spell check it. Finally, click send.

Obey the law because IP addresses and ISP's are tracked.

As you can see from the box below, websites track IP addresses and ISP information. Search Engines save searches matched with IP Addresses and it may become illegal to search for illegal things. Saved search information can be matched to an IP address and traced to the user of the computer through a number of different methods. Proper netiquette is to obey the laws of the country you are in.

Stay away from spam and pop-up advertising for security reasons.

Spam and Pop-Up expose your computer to spyware and viruses Spam and Pop-Up expose your computer to spyware and viruses. Spyware programs can track your keystrokes and steal your credit card information when you make a purchase. In addition, spam and pop-up advertising are bad netiquette because they are unsolicitated.

Do not flame because it can give you a bad reputation.

A flame is a written personal insult communicated through the internet A flame is a written personal insult communicated through the internet. Personal insults are done by lower people because they feel they have to bring a person down. Do not respond to them because it brings you down to the level. Writing or responding to personal insults is low class and ineffective communication.

Use personal e-mail accounts for messages to friends and family because school e-mail is for educational purposes only.

School e-mail is official school communication because the school owns the rights to the domain. Since the school owns the domain it has the right to read your e- mail. We routinely read student e-mail for a number of reasons from security to monitoring students.

Tell the truth in your social networking profiles to create the best experience.

Telling the truth in your profile makes the experience better because your friends have an accurate information about who you are. Lying in your online profile prevents effective communication because the people you are communicating with are basing their communication on lies.

Do not send e-mail late at night because it may call your lifestyle into question.

If you send e-mail late at night the recipient know what time you sent the message and may call your lifestyle into question. For example, sending an e-mail to a potential employer at 2:00 AM is bad netiquette because you should be asleep at 2:00 AM. You may subject yourself to more scrutiny because you sent an e-mail late at night calling your lifestyle into question.

The more e-mail you send the greater chance of sending a bad message The more e-mail you send the greater chance of sending a bad message. The more e-mail you receive the better informed you are because you are receiving more information.