E behaviour code brochure englishDocument Transcript
A WORKING DRAFT
Internet access is a human right.Even The Universal Declaration of Human Rights and Convention on
the Rights of the Child can identify and explain universal human rights standards in a new context: the
Internet. To protect our rights on the Internet we must know our human rights. Both documents can
support and expand the capacity of the Internet as a medium for civil social and educational
development and ensure our rights to privacy, security, equality, freedom of speech,
We all have responsibility for realizing human rights within ourpossibilities.
THE UNIVERSAL DECLARATION OF
All human beings are born free and equal in dignity and rights.They are endowed with reason and
conscience and should act towards one another in a spirit of brotherhood.
Everyone is entitled to all the rights and freedoms without distinction of any kind.
Using the Internet must be addressed as part of their entitlement to dignity, to participate in social and
cultural life, and to respect for their human rightshe right to non-discrimination in the enjoyment of all
Everyone has the right to life, liberty and security of person.
No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence,
nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law
against such interference or attacks.
Everyone has the right to freedom of opinion and expression; this right includes freedom to hold
opinions without interference and to seek, receive and impart information and ideas through any media
and regardless of frontiers.
Everyone has the right to seek, receive and impart information and ideas through the Internet.
Everyone has the right to freedom of peaceful assembly and association.
Everyone has the right to education.
Convention on the Rights of the Child
States Parties undertake to respect the right of the child to preserve his or her identity,
including nationality, name and family relations as recognized by law without unlawful
The child shall have the right to freedom of expression; this right shall include freedom to
seek, receive and impart information and ideas of all kinds, regardless of frontiers, either
orally, in writing or in print, in the form of art, or through any other media of the child’s
States Parties shall respect the right of the child to freedom of thought, conscience and
No child shall be subjected to arbitrary or unlawful interference with his or her privacy,or
correspondence, nor to unlawful attacks on his or her honour and reputation.
2. The child has the right to the protection of the law against such interference or attacks.
States Parties recognize the important function performed by the mass media and shall ensure
that the child has access to information and material from a diversity of national and
international sources, especially those aimed at the promotion of his or her social, spiritual
and moral well-being and physical and mental health.
States Parties shall take all appropriate educational measures to protect the child from all
forms of mental violence.
States Parties recognize the right of the child to education.
States Parties agree that the education of the child shall be directed to the development of
respect for human rights and fundamental freedoms.
States Parties shall protect the child against all other forms of exploitation prejudicial to any
aspects of the child’s welfare.
COMPUTER CLASSROOM RULES
-Work in the computer classroom is possible only when the computer
classroom is free.
-In the classroom we enter quietly and sit down at your place.
-We don't bring food or drinks into the classroom.
-Only students and teachers and those who are authorized can use
computers in the computer classroom.
-We must work according to the instructions of the teacher and use
only agreed equipment.
- We do not run any software or print any job or use the computer
and the Internet in a way that is not for educational purposes.
-We interfere in the settings of the computer only with permission
of the teacher.
- We may not manipulate the equipment in such a way that might
cause damage such as unplugging or plugging equipment cords, turning
switches on or off to the computer monitors, or printers, or
speakers, or mistreating the equipment in any way.
- If a computer isn't working, we notify the teacher.
- You may not personalize the computers by:
Installing screen savers
b. Changing the desktop background
c. Adding, changing or moving icons on the desktop.
- A student will not cause another student to lose work, time, or
- We maintain silence and refrain from disturbing other users.
- We take all your belongings with you when leaving the computer
room and we always keep the computer room environment clean.
- We turn off the computer accordingly after use.
RULES ON USING THE INTERNET IN THE COMPUTER CLASSROOM:
- We only use links and internet websitesaccording to the
instructions of the teacher.
-It is forbidden to use inappropriate websites.
-We don’t play games unless they are part of the course work.
Watching films and listening to music are not allowed.
- We don't use social networks sites.
-We don't download unknown files.
- We don’t post offending messages on the Internet.
Possible consequences for breaking rules /Penalties for Misconduct in the Computer
- The teacher can suspend the offending student’s computing
facilities privileges during the lesson.
-If a student is caught vandalizing equipment in anyway:
consequences will include paying for repairs, clean up, possible failure
and removal from lesson.
- Failure to adhere to the rules will result in other actions
appropriated under the schools formal discipline policy.
- Cleaning the computer room from top to bottom.
STEPS FOR INTERNET AND
Keep safe by being careful not to give out personal
information – such as your full name, email address, phone
number-to people you are chatting with online.Do not give out
identifying personal information without getting your parents’
Don’t use “lazy” passwords, such as 1234. Instead, come up with
a longer password that contains letters and numbers/characters,
preferably one that references something significant only to you.
Meeting someone you have only been in touch
with online can be dangerous. Only do so with your parents’ or
carers’ permission and even then only when they can be present.
accepting emails, messages, or opening files,
pictures or texts from people you don’t know or trust can lead
to problems – they may contain viruses or nasty messages!
Information you find on the internet may not
be true, or someone online may be lying about who they are.Not
everything you read online is grammatically correct.
Tell your parent, carer or a trusted adult if someone
or something makes you feel uncomfortable or worried,
or if you or someone you know is being bullied online.
Use firewalland antivirus software-A firewall is a barrier
between something that is potentially dangerous and
something that you want to keep safe.
Update Microsoft Windows - Even with the newest
computer, there are updates to be applied. There have been
significant security holes discovered in all versions of
Windows so it's important to update your computer's
operating system as soon as possible.
Install security patches on other softwares. Vulnerabilities in
software are constantly being discovered and they don't
discriminate by vendor or platform. It's not simply a matter of
updating Windows; at least monthly, check for and apply
updates for all software you use.
Block Spyware - spyware and viruses often go hand-in-hand
but can take many forms. Some 'hijack' your web browser
and redirects you to their website. Others quietly download
and install trojans, keylogger programs, etc. to your computer
so hackers can take control of your computer later. Install and
run an anti-spyware program.
Backup your important data often. Use external USB hard
drives to store all of your "data", documents, photos, music
as well as USB "thumb" drives that you can carry on your
Secure your browser.To ensure optimum browsing safety,
essential of sites -- such as your banking or regular
ecommerce sites. Not only will you enjoy safer browsing,
you'll be able to eliminate unwanted pop-ups as well.
Don't fall victim to virus hoaxes. Dire-sounding email
spreading fear, uncertainty and doubt about non-existent
threats serve only to spread needless alarm and may even
cause you to delete perfectly legitimate files in response.
RULES OF NETIQUETTE
THE MAIN RULE: Treat others as you would like to be treated.
RESPECT OTHERS' COPYRIGHTS: There are wonderful things online, information for
everyone on just about any topic! However, these things have copyrights and licenses.
DON'T TYPE IN ALL CAPS: It hurts our eyes. It makes people think you are shouting at them.
It's okay to type in caps to accentuate a word or two, but please don't do it all the time everywhere
DON'T SPAM (a.k.a. junkmail): Don’t send spam messages!Don't contribute to
worthlessinformation on the Internet bysending or responding to masspostingsofchainletters,
BE HONEST: Don’t pretend to be someone else.
USE PROPER GRAMMAR & SPELLING.
NO "FLAMING": Flaming is a form of verbal abuse when you intentionally attack or disrespect
somebody for whatever reason. Maybe you didn't agree with something they said, but there's a
nice way to share a different point of view without name calling or attacking someone.
RESEARCH YOUR FACTS/CITE SOURCES: There is so much information online, so it can
be very difficult to distinguish what is true and not true. Before posting something or forwarding
emails make sure it is factual and cite sources if possible to boost your credibility. Not only will
this help keep down on the hoaxes and insanity floating around online, but it can help make you
build a solid reputation online.
USE APPROPRIATE EMOTICONS (EMOTION ICONS) TO HELP CONVEY
MEANING. Use "smileys" or punctuation such as :-) to convey emotions. See website list of
emoticons at http://netlingo.com/smiley.cfm and