SlideShare a Scribd company logo
DIGITAL ETIQUETTE By Kelsey and Keyana
WHAT IS DIGITAL ETIQUETTE?
Digital Etiquette is a basic set of rules that you should follow in
order to make the internet better for others and for yourself.
WHY IS IT IMPORTANT?
Cyber bullying is a huge issue on the internet.
Having “Netiquette” can help prevent it.
HOW TO HAVE DIGITAL ETIQUETTE
Manners matter! Not only
are they important in
everyday life, but they are
also important while on the
DON’T be like this guy.
6 RULES TO HAVING DIGITAL
ETIQUETTE
1)If you make any social media account,
make sure the screen name is appropriate
2)Before you hit “send”, make sure you
double-check what you write to make
sure it’s not offensive
3) It’s fine to comment and make status
updates, but if they come off as nasty and
rude, then log off and write it down
somewhere. You can get it off your chest
without having to send it
4) ALWAYS use proper grammar when typing
5) Photos, texts, and videos can be posted,
copied, forwarded, downloaded, and
Photoshopped real fast. If it invades their
privacy, keep it to yourself!
6) Don’t say something online that you wouldn’t
say to someone’s face.
WHAT IT MEANS TO US
Digital Etiquette teaches others to be
courteous and respectful on the internet
It can also save lives and help stop
cyberbullying
Overall, watch what you say even while on the
internet
Using Digital Etiquette can make the internet a
much better place

More Related Content

What's hot

Netiquette
NetiquetteNetiquette
Netiquettepafafo
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
Amanda lee
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
kelly kusmulyono
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
nitss007
 
Netiquette powerpointbooth
Netiquette powerpointboothNetiquette powerpointbooth
Netiquette powerpointbooth
kabooth
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
RoshanMaharjan13
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
RJ Khan
 
Digital literacy powerpoint project
Digital literacy powerpoint projectDigital literacy powerpoint project
Digital literacy powerpoint project
TDENN01
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquetteklknight79
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
Kermit Agbas
 
Netiquette Presentation
Netiquette PresentationNetiquette Presentation
Netiquette Presentation
sydnee15
 
The essential rules of netiquette by Halina
The essential rules of netiquette by HalinaThe essential rules of netiquette by Halina
The essential rules of netiquette by Halina
Self-employed
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointshannonmf
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
WonderingAriana
 
Netiquette by Ankush Agrawal
Netiquette by Ankush AgrawalNetiquette by Ankush Agrawal
Netiquette by Ankush Agrawal
Ankush Agrawal
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
Apostolos Syropoulos
 

What's hot (20)

Netiquette
NetiquetteNetiquette
Netiquette
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Netiquette powerpointbooth
Netiquette powerpointboothNetiquette powerpointbooth
Netiquette powerpointbooth
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Digital literacy powerpoint project
Digital literacy powerpoint projectDigital literacy powerpoint project
Digital literacy powerpoint project
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquette
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Netiquette Presentation
Netiquette PresentationNetiquette Presentation
Netiquette Presentation
 
The essential rules of netiquette by Halina
The essential rules of netiquette by HalinaThe essential rules of netiquette by Halina
The essential rules of netiquette by Halina
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Netiquette2
Netiquette2Netiquette2
Netiquette2
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Values
ValuesValues
Values
 
Netiquette by Ankush Agrawal
Netiquette by Ankush AgrawalNetiquette by Ankush Agrawal
Netiquette by Ankush Agrawal
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 

Similar to Digital Etiquette

Teens on the net
Teens on the netTeens on the net
Teens on the net
talandronmmp
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
MsCCostello
 
Digital citizenship@
Digital citizenship@Digital citizenship@
Digital citizenship@
MsCCostello
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
MsCCostello
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
MsCCostello
 
Film 260
Film 260Film 260
Film 260
madelaine8979
 
Digital Citizenship Survival Kit
Digital Citizenship Survival KitDigital Citizenship Survival Kit
Digital Citizenship Survival Kit
Elizabeth Eastman
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
Mohamed ElGabry
 
Libby naylor tech 2k14
Libby naylor tech 2k14Libby naylor tech 2k14
Libby naylor tech 2k14Marq2014
 
Netiquettes
NetiquettesNetiquettes
Netiquettes
kanika sharma
 
Meaghan technology report
Meaghan technology reportMeaghan technology report
Meaghan technology report
Marq2014
 
Internet safety
Internet safetyInternet safety
Internet safetykohlerj
 
Why your digital reputation matters?
Why your digital reputation matters? Why your digital reputation matters?
Why your digital reputation matters?
Parakum Pathirana
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Tyler Shields
 
AmazingICT_eSafety_2018
AmazingICT_eSafety_2018AmazingICT_eSafety_2018
AmazingICT_eSafety_2018
Richard Fitzwarine-Smith
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette13sh
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette13sh
 
cybersecurity and Bullying
cybersecurity and Bullying cybersecurity and Bullying
cybersecurity and Bullying
Karthik Kumar
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
Marian Merritt
 

Similar to Digital Etiquette (20)

Teens on the net
Teens on the netTeens on the net
Teens on the net
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship@
Digital citizenship@Digital citizenship@
Digital citizenship@
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Film 260
Film 260Film 260
Film 260
 
Digital Citizenship Survival Kit
Digital Citizenship Survival KitDigital Citizenship Survival Kit
Digital Citizenship Survival Kit
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
 
Libby naylor tech 2k14
Libby naylor tech 2k14Libby naylor tech 2k14
Libby naylor tech 2k14
 
Netiquettes
NetiquettesNetiquettes
Netiquettes
 
Meaghan technology report
Meaghan technology reportMeaghan technology report
Meaghan technology report
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Why your digital reputation matters?
Why your digital reputation matters? Why your digital reputation matters?
Why your digital reputation matters?
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
AmazingICT_eSafety_2018
AmazingICT_eSafety_2018AmazingICT_eSafety_2018
AmazingICT_eSafety_2018
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
cybersecurity and Bullying
cybersecurity and Bullying cybersecurity and Bullying
cybersecurity and Bullying
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

Digital Etiquette

  • 1. DIGITAL ETIQUETTE By Kelsey and Keyana
  • 2. WHAT IS DIGITAL ETIQUETTE? Digital Etiquette is a basic set of rules that you should follow in order to make the internet better for others and for yourself.
  • 3. WHY IS IT IMPORTANT? Cyber bullying is a huge issue on the internet. Having “Netiquette” can help prevent it.
  • 4. HOW TO HAVE DIGITAL ETIQUETTE Manners matter! Not only are they important in everyday life, but they are also important while on the DON’T be like this guy.
  • 5. 6 RULES TO HAVING DIGITAL ETIQUETTE 1)If you make any social media account, make sure the screen name is appropriate 2)Before you hit “send”, make sure you double-check what you write to make sure it’s not offensive
  • 6. 3) It’s fine to comment and make status updates, but if they come off as nasty and rude, then log off and write it down somewhere. You can get it off your chest without having to send it 4) ALWAYS use proper grammar when typing
  • 7. 5) Photos, texts, and videos can be posted, copied, forwarded, downloaded, and Photoshopped real fast. If it invades their privacy, keep it to yourself! 6) Don’t say something online that you wouldn’t say to someone’s face.
  • 8. WHAT IT MEANS TO US Digital Etiquette teaches others to be courteous and respectful on the internet It can also save lives and help stop cyberbullying
  • 9. Overall, watch what you say even while on the internet
  • 10. Using Digital Etiquette can make the internet a much better place