SlideShare a Scribd company logo
Lesson 3
Netiquette: Rules of Behavior on the
Internet. The etiquette guidelines that
govern behavior when communicating
on the Internet have become known as
netiquette. Netiquette covers not only
only rules of behavior during
discussions but also guidelines that
reflect the unique electronic nature of
the medium.
Jul 24, 2013
Rules of Netiquette
1. Online Security,
Safety and Ethics
2. Internet Threats
3. Protecting Reputations Online
4. Copyright
5. Contextualized Online Search
and Research Skill
Remember the human
You need to remember that you are talking to a real person when
you are online.
The internet brings people together who would otherwise never
meet.
Remember this saying when sending an email: Would I say
email: Would I say this to the person’s face.
Adhere to the same standards online that you followin real life
You need to behave the same way online that you do in
real life.
You need to remember that you can get caught doing
things you should not be doing online just like you can in
real life.
You are still talking to a real person with feelings even
though you can’t see them.
Know where you are
in cyberspace
Always take a look around when you enter
a new domain when surfing the web.
Get a sense of what the discussion group
is about before you join it.
Respect other people’s time and bandwidth
Remember people have other things to do besides
read your email. You are not the center of their world.
Keep your post and emails to a minimum by saying
what you want to say.
Remember everyone won’t answer your questions.
Make yourself look
good online
Remember to always check your spelling and
grammar before posting.
Always know what you are talking about and make
saying it.
Be polite and pleasant to everyone.
Share expert knowledge
Ask questions online
Share what you know online.
Post the answers to your questions online
because someone may have the same question
you do.
Help keep flame wars
under control
Netiquette does not forbid flaming.
Netiquette does however forbid people
who are flaming to hurt discussion
groups by putting the group down.
Respect other
people’s privacy
Do not read other people’s mail without their
permission.
Going through other people’s things could cost you,
your job or things or you could even go to jail.
Not respecting other people’s privacy is bad
Netiquette.
Don’t abuse your power
Do not take advantage of other people just
because you have more knowledge or power
than them.
Treat others as you would want them to treat you
if the roles were reversed.
Be forgiving of other people’s mistakes
Do not point out mistakes to people online.
Remember that you were once the new kid on the
block.
You still need to have good manners even though
you are online and can not see the person face to
face.
The Internet, truly, is a powerful tool. It can
be used to promote your business, gain new
friends, and stay in touch with the old ones. It is
also a source of entertainment through games,
online communities, and everything in between.
But like most things in this world, there is always
the “other side of the coin”. The internet is one of
the most dangerous places, especially if you do
not know what are you doing with it. But there is
no need to worry; it is never that late. 
Type of
Information
Risks
1. First Name There is a risk in sharing your first
name. Chances are, a hacker may
already know plenty of stuff about you
even if you only give out your first
name. Likewise, you cannot just walk in
a room and start introducing yourself to
everyone. You do not know whom you
can come across with.
Type of
Information
Risks
2. Last Name If sharing your first name is a small
risk, having both your first and last is
more risky. You will be vulnerable to
being searched for using search
engines, which include image search.
Matching a name with a face is a
modus to several cybercrimes like
identity theft.
Type of
Information
Risks
3. Middle Name
Sharing your middle name
alone is probably not the
most risky of these shared
information, but sharing
your full name would be.
Type of
Information
Risks
4. Current and
previous school(s)
Most people who steal
identities study their
subject. They can use this
information for verification
purposes.
Type of
Information
Risks
5. Your cellphone
number
Your cellphone number should not be
posted over the Internet. The Internet
is a public place. It is the same as
posting your number on a billboard.
You would not want random
strangers to text or call you, or
worse, pretend that they are
someone else.
Type of
Information
Risks
6. The name of
your mother and
father
Risky, yet not as risky as posting their
full names, especially your mother’s
maiden name. In fact, you may have
already encountered many websites
that require your mother’s maiden
name as an answer to a secret
question whenever you lose your
password.
Type of
Information
Risks
7. The name of
your siblings Disclosing this is a
huge risk. Strangers
may pretend or use
their identity to dupe
you.
Type of
Information
Risks
8. Your address Hopefully, you answered “no” to
this one. Giving the Internet
your number is one thing; giving
them your address is a whole
other level. It would be much
easier for criminals to find you.
Type of
Information
Risks
9. Your home
phone number
This shared information is more
risky than sharing your personal
phone number. Scams usually use
this information to deceive you, one
of which is when a stranger
pretends to know your parents or
pretends to be you.
Type of
Information
Risks
10. Your birthday Letting people know your
birthday is probably a must if
you want to get as many gifts
as possible. But having it in
your profile makes you
vulnerable to identity theft.
The Internet is defined as the information
superhighway. This means that anyone has
access to his highway, can place information, and
can grab that information. Any information, even
things that you have set privately, can be
accessed one way or another. This is why social
networking sites like Facebook continue to
improve their security features. The threat of
cybercrimes is very real. While you may not
experience the threat now, whatever information
we share today could affect our future.
1.
Be mindful of what you share online
and what site you
share it to.
2.
Do not just accept terms and
conditions;
read it.
3.
Check out the privacy policy page of a
website to learn how the website handles
the information you share.
4.
Know the security features of the social
networking site you use. By keeping your profile
private, search engines will not be able to scan
your profile.
5.
Do not share your password
with anyone.
6.
Avoid logging in to public, networks/Wi-Fi.
Browsing in “incognito (or private) mode”, a
feature of the browser , will not protect you from
hackers.
7.
Do not talk to strangers whether
online or
face-to-face.
8.
Never post anything about a future
vacation. It is similar to posting, “Rob
my house
at this date”.
9.
Add friends you know in
real life.
10.
Avoid visiting untrusted
websites.
11.
Install and update an antivirus software on
your computer. Use only one antivirus
software to avoid conflicts.
12.
If you have a Wi-Fi at home,
make it a private network by
adding a password.
13.
Avoid downloading anything from untrusted
websites. You are most vulnerable in peer-to-peer
downloads (torrents) as the download is most
likely not monitored by the site owner.
14.
Buy the software; do not use
pirated ones.
15.
Do not reply or click links
from suspicious emails.
Leelet

More Related Content

What's hot

Empowerment Technologies - Module 4
Empowerment Technologies - Module 4Empowerment Technologies - Module 4
Empowerment Technologies - Module 4Jesus Rances
 
The 10 core rules of netiqutte
The 10 core rules of netiqutteThe 10 core rules of netiqutte
The 10 core rules of netiqutteMudgeoTorso1091
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteJuan Miguel Palero
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Jesus Rances
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT TechnologiesMaria Eloisa Blanza
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
Interactive Multimedia - Empowerment Technologies
 Interactive Multimedia - Empowerment Technologies Interactive Multimedia - Empowerment Technologies
Interactive Multimedia - Empowerment TechnologiesMark Jhon Oxillo
 
Empowerment Technologies - Module 5
Empowerment Technologies - Module 5Empowerment Technologies - Module 5
Empowerment Technologies - Module 5Jesus Rances
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SJuvywen
 
Imaging and Design for Online Environment
Imaging and Design for Online EnvironmentImaging and Design for Online Environment
Imaging and Design for Online EnvironmentAngelito Quiambao
 
Online Systems, Functions, and Platforms
Online Systems, Functions, and PlatformsOnline Systems, Functions, and Platforms
Online Systems, Functions, and PlatformsMaria Eloisa Blanza
 
Online platforms for ICT Content Development
Online platforms for ICT Content DevelopmentOnline platforms for ICT Content Development
Online platforms for ICT Content DevelopmentAngelito Quiambao
 
Media and Information Literacy- Performance Task (Project) Digital Poster Ma...
Media and Information Literacy- Performance Task (Project)  Digital Poster Ma...Media and Information Literacy- Performance Task (Project)  Digital Poster Ma...
Media and Information Literacy- Performance Task (Project) Digital Poster Ma...Arniel Ping
 
Advanced Presentation Skills - Empowerment Technologies
Advanced Presentation Skills - Empowerment TechnologiesAdvanced Presentation Skills - Empowerment Technologies
Advanced Presentation Skills - Empowerment TechnologiesMark Jhon Oxillo
 
11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change11 Developing ICT Project for Social Change
11 Developing ICT Project for Social ChangeTeodoro Llanes II
 
Contextualized online search and research skill
Contextualized online search and research skillContextualized online search and research skill
Contextualized online search and research skillAngela Giva
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATSJazzyNF
 

What's hot (20)

Empowerment Technologies - Module 4
Empowerment Technologies - Module 4Empowerment Technologies - Module 4
Empowerment Technologies - Module 4
 
The 10 core rules of netiqutte
The 10 core rules of netiqutteThe 10 core rules of netiqutte
The 10 core rules of netiqutte
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT Technologies
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Interactive Multimedia - Empowerment Technologies
 Interactive Multimedia - Empowerment Technologies Interactive Multimedia - Empowerment Technologies
Interactive Multimedia - Empowerment Technologies
 
Empowerment Technologies - Module 5
Empowerment Technologies - Module 5Empowerment Technologies - Module 5
Empowerment Technologies - Module 5
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1S
 
Imaging and Design for Online Environment
Imaging and Design for Online EnvironmentImaging and Design for Online Environment
Imaging and Design for Online Environment
 
Online Systems, Functions, and Platforms
Online Systems, Functions, and PlatformsOnline Systems, Functions, and Platforms
Online Systems, Functions, and Platforms
 
Online platforms for ICT Content Development
Online platforms for ICT Content DevelopmentOnline platforms for ICT Content Development
Online platforms for ICT Content Development
 
Media and Information Literacy- Performance Task (Project) Digital Poster Ma...
Media and Information Literacy- Performance Task (Project)  Digital Poster Ma...Media and Information Literacy- Performance Task (Project)  Digital Poster Ma...
Media and Information Literacy- Performance Task (Project) Digital Poster Ma...
 
Advanced Presentation Skills - Empowerment Technologies
Advanced Presentation Skills - Empowerment TechnologiesAdvanced Presentation Skills - Empowerment Technologies
Advanced Presentation Skills - Empowerment Technologies
 
11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change
 
INTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTEINTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTE
 
Contextualized online search and research skill
Contextualized online search and research skillContextualized online search and research skill
Contextualized online search and research skill
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 

Similar to Rules of Netiquette

Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
 
Lesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptxLesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptxGrayzon Gonzales, LPT
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdfjessa451416
 
The 10 commandments of the common computer (1)
The 10 commandments of the common computer (1)The 10 commandments of the common computer (1)
The 10 commandments of the common computer (1)MudgeoTorso1091
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest5558240
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfMelchorTolentino2
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3guest3e462b5
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfBryanSmile
 
Darius jones internet safety
Darius jones internet safetyDarius jones internet safety
Darius jones internet safetyJennifer Spann
 
Internet Saftey Final
Internet Saftey FinalInternet Saftey Final
Internet Saftey Finalguest252cc9
 
Online privacy
Online privacyOnline privacy
Online privacyjo-jo23
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Parenting & Education
 
EM TECH_Online Safety and security .pptx
EM TECH_Online Safety and security .pptxEM TECH_Online Safety and security .pptx
EM TECH_Online Safety and security .pptxOliverSasutana2
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social mediasanjeev kumar
 

Similar to Rules of Netiquette (20)

Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Lesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptxLesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptx
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
The 10 commandments of the common computer (1)
The 10 commandments of the common computer (1)The 10 commandments of the common computer (1)
The 10 commandments of the common computer (1)
 
Netiquettes.pptx
Netiquettes.pptxNetiquettes.pptx
Netiquettes.pptx
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdf
 
Heads up!
Heads up!Heads up!
Heads up!
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
 
Darius jones internet safety
Darius jones internet safetyDarius jones internet safety
Darius jones internet safety
 
Internet Saftey Final
Internet Saftey FinalInternet Saftey Final
Internet Saftey Final
 
Online privacy
Online privacyOnline privacy
Online privacy
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
 
EM TECH_Online Safety and security .pptx
EM TECH_Online Safety and security .pptxEM TECH_Online Safety and security .pptx
EM TECH_Online Safety and security .pptx
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 

More from Leelet1121

MAPEH 9 Dance Etiquette
MAPEH 9 Dance EtiquetteMAPEH 9 Dance Etiquette
MAPEH 9 Dance EtiquetteLeelet1121
 
Nature and Background of Outdoor Recreation
Nature and Background of Outdoor RecreationNature and Background of Outdoor Recreation
Nature and Background of Outdoor RecreationLeelet1121
 
Different Types of Philippine Folk Dances
Different Types of Philippine Folk DancesDifferent Types of Philippine Folk Dances
Different Types of Philippine Folk DancesLeelet1121
 
Dance As An Art
Dance As An ArtDance As An Art
Dance As An ArtLeelet1121
 
Benefits of Dance
Benefits of DanceBenefits of Dance
Benefits of DanceLeelet1121
 
Sports Injuries (Grade 11 PE and HEALTH)
Sports Injuries (Grade 11 PE and HEALTH)Sports Injuries (Grade 11 PE and HEALTH)
Sports Injuries (Grade 11 PE and HEALTH)Leelet1121
 
Important Aspects to Consider in Learning a Sport
Important Aspects to Consider in Learning a SportImportant Aspects to Consider in Learning a Sport
Important Aspects to Consider in Learning a SportLeelet1121
 
Module 3: Developmental Stages in Middle and Late Adolescence
Module 3: Developmental Stages in Middle and Late AdolescenceModule 3: Developmental Stages in Middle and Late Adolescence
Module 3: Developmental Stages in Middle and Late AdolescenceLeelet1121
 
Module 2: Developing the Whole Person
Module 2: Developing the Whole PersonModule 2: Developing the Whole Person
Module 2: Developing the Whole PersonLeelet1121
 
Eating disorders and mental health challenges
Eating disorders and mental health challengesEating disorders and mental health challenges
Eating disorders and mental health challengesLeelet1121
 
Powers of the mind
Powers of the mindPowers of the mind
Powers of the mindLeelet1121
 
Parts of the brain
Parts of the brainParts of the brain
Parts of the brainLeelet1121
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsLeelet1121
 
First Aid of Common Emergencies in Outdoor Activities
First Aid of Common Emergencies in Outdoor ActivitiesFirst Aid of Common Emergencies in Outdoor Activities
First Aid of Common Emergencies in Outdoor ActivitiesLeelet1121
 
Safety Practices in Outdoor Recreation
Safety Practices in Outdoor RecreationSafety Practices in Outdoor Recreation
Safety Practices in Outdoor RecreationLeelet1121
 
Organization and Management of Sports Events
Organization and Management of Sports EventsOrganization and Management of Sports Events
Organization and Management of Sports EventsLeelet1121
 
Introduction to ICT (Web 1.0 and Web 2.0)
Introduction to ICT (Web 1.0 and Web 2.0)Introduction to ICT (Web 1.0 and Web 2.0)
Introduction to ICT (Web 1.0 and Web 2.0)Leelet1121
 

More from Leelet1121 (20)

MAPEH 9 Dance Etiquette
MAPEH 9 Dance EtiquetteMAPEH 9 Dance Etiquette
MAPEH 9 Dance Etiquette
 
Nature and Background of Outdoor Recreation
Nature and Background of Outdoor RecreationNature and Background of Outdoor Recreation
Nature and Background of Outdoor Recreation
 
Different Types of Philippine Folk Dances
Different Types of Philippine Folk DancesDifferent Types of Philippine Folk Dances
Different Types of Philippine Folk Dances
 
Dance As An Art
Dance As An ArtDance As An Art
Dance As An Art
 
Benefits of Dance
Benefits of DanceBenefits of Dance
Benefits of Dance
 
Sports Injuries (Grade 11 PE and HEALTH)
Sports Injuries (Grade 11 PE and HEALTH)Sports Injuries (Grade 11 PE and HEALTH)
Sports Injuries (Grade 11 PE and HEALTH)
 
Important Aspects to Consider in Learning a Sport
Important Aspects to Consider in Learning a SportImportant Aspects to Consider in Learning a Sport
Important Aspects to Consider in Learning a Sport
 
Module 3: Developmental Stages in Middle and Late Adolescence
Module 3: Developmental Stages in Middle and Late AdolescenceModule 3: Developmental Stages in Middle and Late Adolescence
Module 3: Developmental Stages in Middle and Late Adolescence
 
Module 2: Developing the Whole Person
Module 2: Developing the Whole PersonModule 2: Developing the Whole Person
Module 2: Developing the Whole Person
 
Eating disorders and mental health challenges
Eating disorders and mental health challengesEating disorders and mental health challenges
Eating disorders and mental health challenges
 
Powers of the mind
Powers of the mindPowers of the mind
Powers of the mind
 
Parts of the brain
Parts of the brainParts of the brain
Parts of the brain
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
3. Lesson 1.B
3. Lesson 1.B3. Lesson 1.B
3. Lesson 1.B
 
Sports ppt6
Sports ppt6Sports ppt6
Sports ppt6
 
Sports ppt5
Sports ppt5Sports ppt5
Sports ppt5
 
First Aid of Common Emergencies in Outdoor Activities
First Aid of Common Emergencies in Outdoor ActivitiesFirst Aid of Common Emergencies in Outdoor Activities
First Aid of Common Emergencies in Outdoor Activities
 
Safety Practices in Outdoor Recreation
Safety Practices in Outdoor RecreationSafety Practices in Outdoor Recreation
Safety Practices in Outdoor Recreation
 
Organization and Management of Sports Events
Organization and Management of Sports EventsOrganization and Management of Sports Events
Organization and Management of Sports Events
 
Introduction to ICT (Web 1.0 and Web 2.0)
Introduction to ICT (Web 1.0 and Web 2.0)Introduction to ICT (Web 1.0 and Web 2.0)
Introduction to ICT (Web 1.0 and Web 2.0)
 

Recently uploaded

PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePedroFerreira53928
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxricssacare
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345beazzy04
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online PresentationGDSCYCCE
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsCol Mukteshwar Prasad
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...Nguyen Thanh Tu Collection
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxShibin Azad
 
How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17Celine George
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfbu07226
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPCeline George
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfjoachimlavalley1
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxbennyroshan06
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resourcesdimpy50
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersPedroFerreira53928
 
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTelling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTechSoup
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticspragatimahajan3
 

Recently uploaded (20)

PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptx
 
How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
Operations Management - Book1.p  - Dr. Abdulfatah A. SalemOperations Management - Book1.p  - Dr. Abdulfatah A. Salem
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTelling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceutics
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 

Rules of Netiquette

  • 2. Netiquette: Rules of Behavior on the Internet. The etiquette guidelines that govern behavior when communicating on the Internet have become known as netiquette. Netiquette covers not only only rules of behavior during discussions but also guidelines that reflect the unique electronic nature of the medium. Jul 24, 2013
  • 3. Rules of Netiquette 1. Online Security, Safety and Ethics 2. Internet Threats 3. Protecting Reputations Online 4. Copyright 5. Contextualized Online Search and Research Skill
  • 4. Remember the human You need to remember that you are talking to a real person when you are online. The internet brings people together who would otherwise never meet. Remember this saying when sending an email: Would I say email: Would I say this to the person’s face.
  • 5. Adhere to the same standards online that you followin real life You need to behave the same way online that you do in real life. You need to remember that you can get caught doing things you should not be doing online just like you can in real life. You are still talking to a real person with feelings even though you can’t see them.
  • 6. Know where you are in cyberspace Always take a look around when you enter a new domain when surfing the web. Get a sense of what the discussion group is about before you join it.
  • 7. Respect other people’s time and bandwidth Remember people have other things to do besides read your email. You are not the center of their world. Keep your post and emails to a minimum by saying what you want to say. Remember everyone won’t answer your questions.
  • 8. Make yourself look good online Remember to always check your spelling and grammar before posting. Always know what you are talking about and make saying it. Be polite and pleasant to everyone.
  • 9. Share expert knowledge Ask questions online Share what you know online. Post the answers to your questions online because someone may have the same question you do.
  • 10. Help keep flame wars under control Netiquette does not forbid flaming. Netiquette does however forbid people who are flaming to hurt discussion groups by putting the group down.
  • 11. Respect other people’s privacy Do not read other people’s mail without their permission. Going through other people’s things could cost you, your job or things or you could even go to jail. Not respecting other people’s privacy is bad Netiquette.
  • 12. Don’t abuse your power Do not take advantage of other people just because you have more knowledge or power than them. Treat others as you would want them to treat you if the roles were reversed.
  • 13. Be forgiving of other people’s mistakes Do not point out mistakes to people online. Remember that you were once the new kid on the block. You still need to have good manners even though you are online and can not see the person face to face.
  • 14.
  • 15. The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with the old ones. It is also a source of entertainment through games, online communities, and everything in between. But like most things in this world, there is always the “other side of the coin”. The internet is one of the most dangerous places, especially if you do not know what are you doing with it. But there is no need to worry; it is never that late. 
  • 16. Type of Information Risks 1. First Name There is a risk in sharing your first name. Chances are, a hacker may already know plenty of stuff about you even if you only give out your first name. Likewise, you cannot just walk in a room and start introducing yourself to everyone. You do not know whom you can come across with.
  • 17. Type of Information Risks 2. Last Name If sharing your first name is a small risk, having both your first and last is more risky. You will be vulnerable to being searched for using search engines, which include image search. Matching a name with a face is a modus to several cybercrimes like identity theft.
  • 18. Type of Information Risks 3. Middle Name Sharing your middle name alone is probably not the most risky of these shared information, but sharing your full name would be.
  • 19. Type of Information Risks 4. Current and previous school(s) Most people who steal identities study their subject. They can use this information for verification purposes.
  • 20. Type of Information Risks 5. Your cellphone number Your cellphone number should not be posted over the Internet. The Internet is a public place. It is the same as posting your number on a billboard. You would not want random strangers to text or call you, or worse, pretend that they are someone else.
  • 21. Type of Information Risks 6. The name of your mother and father Risky, yet not as risky as posting their full names, especially your mother’s maiden name. In fact, you may have already encountered many websites that require your mother’s maiden name as an answer to a secret question whenever you lose your password.
  • 22. Type of Information Risks 7. The name of your siblings Disclosing this is a huge risk. Strangers may pretend or use their identity to dupe you.
  • 23. Type of Information Risks 8. Your address Hopefully, you answered “no” to this one. Giving the Internet your number is one thing; giving them your address is a whole other level. It would be much easier for criminals to find you.
  • 24. Type of Information Risks 9. Your home phone number This shared information is more risky than sharing your personal phone number. Scams usually use this information to deceive you, one of which is when a stranger pretends to know your parents or pretends to be you.
  • 25. Type of Information Risks 10. Your birthday Letting people know your birthday is probably a must if you want to get as many gifts as possible. But having it in your profile makes you vulnerable to identity theft.
  • 26. The Internet is defined as the information superhighway. This means that anyone has access to his highway, can place information, and can grab that information. Any information, even things that you have set privately, can be accessed one way or another. This is why social networking sites like Facebook continue to improve their security features. The threat of cybercrimes is very real. While you may not experience the threat now, whatever information we share today could affect our future.
  • 27.
  • 28. 1. Be mindful of what you share online and what site you share it to.
  • 29. 2. Do not just accept terms and conditions; read it.
  • 30. 3. Check out the privacy policy page of a website to learn how the website handles the information you share.
  • 31. 4. Know the security features of the social networking site you use. By keeping your profile private, search engines will not be able to scan your profile.
  • 32. 5. Do not share your password with anyone.
  • 33. 6. Avoid logging in to public, networks/Wi-Fi. Browsing in “incognito (or private) mode”, a feature of the browser , will not protect you from hackers.
  • 34. 7. Do not talk to strangers whether online or face-to-face.
  • 35. 8. Never post anything about a future vacation. It is similar to posting, “Rob my house at this date”.
  • 36. 9. Add friends you know in real life.
  • 38. 11. Install and update an antivirus software on your computer. Use only one antivirus software to avoid conflicts.
  • 39. 12. If you have a Wi-Fi at home, make it a private network by adding a password.
  • 40. 13. Avoid downloading anything from untrusted websites. You are most vulnerable in peer-to-peer downloads (torrents) as the download is most likely not monitored by the site owner.
  • 41. 14. Buy the software; do not use pirated ones.
  • 42. 15. Do not reply or click links from suspicious emails.