0% found this document useful (0 votes)
59 views

3 Rules of Netiquette

The document discusses rules of netiquette and online safety. It provides information on internet threats like malware, cyber citizenship, internet security, online ethics, copyright law, and how to write an email. Maintaining online safety and security and behaving ethically online are important topics covered.

Uploaded by

patrick lungay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views

3 Rules of Netiquette

The document discusses rules of netiquette and online safety. It provides information on internet threats like malware, cyber citizenship, internet security, online ethics, copyright law, and how to write an email. Maintaining online safety and security and behaving ethically online are important topics covered.

Uploaded by

patrick lungay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 49

RULES OF NETIQUETTE

EMPOWERMENT TECHNOLOGIES
GET A ¼ SHEET OF PAPER
NUMBER YOUR PAPERS 1 TO 15
WRITE ‘NS’ IF THE LISTED DATA IS NOT
SHARED ELSE WRITE ‘S’ IF THE ITEM IS
SHARED
‘NS’ - NOT SHARED ‘S’ - SHARED
1. Mother’s and Father’s name 6. Email Address
2. Sibling’s Name 7. First Name
3. Home Address 8. Last Name
4. Home Phone Number 9. Current and Previous School
5. Birthday 10. Cell Phone Number
THE MORE “NOT SHARED (NS)” YOU HAVE,
THE SAFER YOU ARE ONLINE.
ONLINE SAFETY
HOW SAFE DO YOU THINK YOU ARE?
ONLINE SAFETY
Is the knowledge of maximizing the user’s personal safety and security risks to private
information and property associated with using the internet and the self-protection
from computer crime in general.
THINK BEFORE YOU CLICK!
INTERNET THREATS
MALWARE
MALWARE
An umbrella term used to refer to a variety of forms of hostile or intrusive software.
1. Virus - a malicious program designed to replicate itself and transfer from one
computer to another.

1. Worm - are similar to viruses in that they replicate functional copies of


themselves and can cause the same type of damage.

1. Trojan Horse - is disguised as useful program but once downloaded or installed,


leaves your PC unprotected and acts as “PATHWAY” that allows for other
malwares; even hackers to enter your system.
4. Spyware - a program that runs in the background without the user’s knowledge.

4. Adware - a software that generates revenue for its developer by automatically


generating online advertisements in the user interface of the software or on a
screen presented to the user during the installation process.

4. Bots - an automated process that interacts with other networks. Bots often
automate tasks and provide information or services that would otherwise be
conducted by a human being.
CYBER CITIZEN
CYBER CITIZEN
A person who utilizes technology in an appropriate manner including etiquette,
communication, education, access, commerce, responsibility, rights, safety, and
security.
INTERNET SECURITY
- Branch of computer security specifically related to the Internet, often involving
browser security but also work network security on a more general level as it
applies to other applications or operating systems as a whole.

- Its objective is to establish rules and measures to use against attacks over the
Internet.
MALWARE PROTECTION AND PREVENTION
ONLINE ETHICS
- Refers to patterns and behavior used when on the Internet,
guided both by law and personal philosophy.

- By understanding legal ramifications and trusting personal


philosophy used in other areas of life can help a person
determine his or her online ethics.
IS IT LEGAL OR ETHICAL?
- Taking a child away from an abusive parent when you are not directly related to
said child.

- Seeing someone who is in critical condition at the hospital whom you care deeply
about but aren’t directly related to.

- Digging up someone’s grave because they wanted to be cremated but were buried
instead.

- Talking on the phone to your friend who is having a panic attack while driving to
where they are.
DO YOU AGREE?
- Most kinds of lying are perfectly legal, but lying is generally recognized as being
unethical

- Breaking promises is generally legal, but is widely thought of as unethical.


ONLINE ETHICS: MAJOR CONCERNS
- Protection of private information

- Limits of a presumed freedom of expression

- Issues of libel
ONLINE ETIQUETTE
ONLINE ETIQUETTE / NETIQUETTE
The correct or acceptable way of communicating or behaving on
the Internet.
RULES OF NETIQUETTE
RULES OF NETIQUETTE
1. TOWN DOWN YOUR TOWN
a. How do you use emoticons or how do you express your emotions without
facial reactions.
b. When creating a formal email, make sure that your tone and meaning is truly
clear from the words alone.

1. TEST FOR CLARITY


a. Messages may clear to you as a writer but turn out to be confusing to another
reader.
RULES OF NETIQUETTE

3. DO NOT ASSUME.

3. REPLY PROMPTLY

3. COMPRESS FILES BEFORE SENDING VIA EMAIL


COPYRIGHT LAW
COPYRIGHT LAW
- “Original works of authorship”
- This protection is available to both published and unpublished works.
COPYRIGHT INFRINGEMENT
- the use of works protected by copyright law without permission, infringing
certain exclusive rights granted to the copyright holder, such as the right to
reproduce, distribute, display or perform the protected work, or to make
derivative works.
COPYRIGHT LAW PROTECTS
- Any original creation, and grants the holder of the copyright
exclusive control over when, how and by whom their work
may be copied, distributed, or exhibited.
- Literary Works
- Paintings
- Photographs
- Drawings
- Films
- Music
- Choreography
- Sculpture
COPYRIGHT LAW DOES NOT PROTECT
- The underlying ideas of a creative work, and it doesn’t protect facts.
- Copyright does not protect the ff.:
- Ideas of a creative work
- It does not protect facts
HOW DO YOU PROTECT YOUR IDEAS?
PATENT
- An exclusive right granted for an invention, which is a
product or a process that provides, in general, a new way of
doing something, or offers a new technical solution to a
problem.
WRITING AN EMAIL

You might also like