Etiquette in the Workplace

Slides:



Advertisements
Similar presentations
Online Privacy A Module of the CYC Course – Personal Security
Advertisements

How to protect yourself, your computer, and others on the internet
Cyber Safety Assessment Review
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Victoria ISD Common Sense Media Grade 6: Scams and schemes
SECURITY CHECK Protecting Your System and Yourself Source:
1 Identity Theft and Phishing: What You Need to Know.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
What is identity theft, and how can you protect yourself from it?
Hurricane Katrina Avoid Falling Prey to Donation Scams - Click to Proceed - Brought to you by The Louisiana State Fire Marshal.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Phishing on the Internet? Presented by Naveed Farooq Naveed Farooq Admin Nidokidos Network Make Money Online | Join Nidokidos Forum |
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
How It Applies In A Virtual World
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
A Student’s Guide to Proper and Safe Web Behavior
SAFETY What to be aware of and how to avoid problems. **This is not meant to make you fearful of . The goal of this discussion is to make sure.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
By: Daniel Krueger ITC 525: Computers for Educators Summer II 2010 Click Here to Begin.
By: Mrs. McGinnis Sept,  Fradulent online shops  Sites that distruibute pirated music, videos and software  Bogus charity websites  Sites that.
Contents  What is Cyber Bullying?   Credit Card  Social Networking Sites  Phones  End Slide.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Scams & Schemes Common Sense Media.
IT security By Tilly Gerlack.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
Electronic Etiquette Communication Skills for and Blogs.
 Facebook  Twitter  MySpace  Windows LiveSpace.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
 Student – Rules and Etiquette. Communication  |ˈēmāl|  Noun or Verb  messages distributed by electronic means from one computer.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Identity Theft Since 2005, there has been a dramatic increase in the occurrence of identity theft among students online.
LIBS100 Etiquette and Hoaxes May 16, 2005 L. Galloway.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
And more……. ‘Leadership and communication are inseparable. You can’t have one without the other.’ ---Claude I. Taylor.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Professional Communications Mrs. Lopez-Wyatt. Why is etiquette important? We interact more with written word and the number of users and usage rates.
Use the subject field to indicate the purpose of the .
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Take a Second Look Before You Send a Message. Do Not Default to "Reply All”
By Toby Reed.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
is short for electronic mail!. What is ? An electronic message sent from one computer to another. saves money and time compared to regular.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Category.
A Student’s Guide to Proper and Safe Web Behavior
Fraud Protection.
Fraud protection.
Phishing, identity theft, and more
Learn how to protect yourself against common attacks
Lesson 3 Safe Computing.
What to be aware of and how to avoid problems.
Phishing is a form of social engineering that attempts to steal sensitive information.
How to Protect your Identity Online PIYUSH HARSH
What is Phishing? Pronounced “Fishing”
Presentation transcript:

Email Etiquette in the Workplace - : SH – helps people know how important it is, what it’s about : CONCISE – reading a screen is harder than reading text, plus people get TONS of email : PROF – your email is an extension of you – how people view your email may affect how they view you. Especially important – job query emails, professional communication, etc : PUNC/ABBR – punctuate correctly – all caps often perceived as SHOUTING : ADDR – when applying for a job, don’t put an email address like “bigmuscles@hotmail.com” on your resume, looks silly and unprofessional : READ – avoid stupid mistakes that make you look hasty, incompetent or careless : PRIVACY – keep in mind that there is NO expectation of privacy. ALL your emails belong to your company, your school; private email are subject to subpoena etc : SIG – this is common courtesy and lets the recipient know who it’s from (an email address like hotmama@yahoo.com won’t tell them : WORDS ONLY – don’t joke if it might be misunderstood : USE AS APPROPRIATE – email overuse reading

Email Etiquette Always use a subject heading and a signature Be concise and to the point Be professional Use proper layout, punctuation, grammar. Do not use abbreviations like “b4” and “I’ll get back 2 u” in business correspondence. Capitalization and “flaming” Use professional address in professional communication : SH – helps people know how important it is, what it’s about : CONCISE – reading a screen is harder than reading text, plus people get TONS of email : PROF – your email is an extension of you – how people view your email may affect how they view you. Especially important – job query emails, professional communication, etc : PUNC/ABBR – punctuate correctly – all caps often perceived as SHOUTING : ADDR – when applying for a job, don’t put an email address like “bigmuscles@hotmail.com” on your resume, looks silly and unprofessional : READ – avoid stupid mistakes that make you look hasty, incompetent or careless : PRIVACY – keep in mind that there is NO expectation of privacy. ALL your emails belong to your company, your school; private email are subject to subpoena etc : SIG – this is common courtesy and lets the recipient know who it’s from (an email address like hotmama@yahoo.com won’t tell them : WORDS ONLY – don’t joke if it might be misunderstood : USE AS APPROPRIATE – email overuse reading

Email Etiquette Read it before you send it Privacy- anyone can forward, print or copy your words Remember that the recipient only has your words Don’t use email when a phone call or visit is more appropriate

Email Hoaxes www.snopes.com Excellent site for checking potential hoaxes or rumors Never forward such an email unless you know for sure it is true (and even then maybe not!) Show snopes, show a few examples, let them do some searching. Show Hand out emails, assignment is to EMAIL ME THREE PARAGRAPHS, CORRECT BASED ON THE ETIQUETTE ABOVE Para 1 – summarize the email – what is it claiming or asking? Para 2 – what is the status of the email – is it true, false, or undetermined> Para 3 – summarize the history of the hoax – where did it come from? Where has it been seen before? Is it old or new?

Email Hoaxes and Scams Phishing Legitimate looking e-mail that attempts ot to scam the user into surrendering private information that will be used for identity theft. User is directed to site where they are asked for personal info. Phishing : email purports to come from legitimate source (ebay) 411: Nigerian person offers to give you money if you help him get money out of the country (so-called after section 411 of the criminal code) Charities: forward this and you’ll donate money, etc Something for nothing: do this and you’ll get free money, a coupon, etc Moral Outrage: political figure guilty of this or that, government wants to outlaw this or that, etc Silliness: elf bowling, generic jokes, etc – everyone has probably seen them before

Phishing Never ever click the links within the text of the e-mail. Always delete the e-mail immediately

Email Hoaxes and Scams Nigerian 411/419 Scams You are asked to assist foreign nationals who have funds to transfer *temporarily* into your account. You must provide your banking info, company info. Leads to theft of YOUR money

Email Hoaxes and Scams Charities Phony charities soliciting funds via email May also capture your credit card info Only donate to legitimate charities through their Web sites or reputable sites

Email Hoaxes and Scams Something for Nothing Free phones, goods services Even if you don’t lose $, spammers can dump spyware or programs on your computer to steal information

Email Hoaxes and Scams Moral Outrage Example: rumor that Middle Eastern people were cheering in a restaurant watching WTC’s crumble on 9-11-01 These rumors spread all over via email, in some cases surveillance tapes showed that this did not happen - businesses hurt anyway.

General silliness/Chain letter Email Hoaxes and Scams General silliness/Chain letter Tinky Winky is Gay!!!! Sponge Bob and Barney are promoting a homosexual agenda!!!! Forward this message to 10 friends and your deepest desire will come true!!!!

Snopes Assignment Read your email, then go to www.snopes.com and search for it. Write me a 3-para email (use the email etiquette points!) Para 1: summarize the email – what is claiming or asking? Para 2: what is the status of the email (true, false, undetermined) Para 3: what is the history of the email? Where did it come from? Is it old or new? Show snopes, let them do some searching. Show Hand out emails, assignment is to EMAIL ME THREE PARAGRAPHS, CORRECT BASED ON THE ETIQUETTE ABOVE Para 1 – summarize the email – what is it claiming or asking? Para 2 – what is the status of the email – is it true, false, or undetermined> Para 3 – summarize the history of the hoax – where did it come from? Where has it been seen before? Is it old or new?