0% found this document useful (0 votes)
15 views7 pages

Lesson 1.1 - Safety and Etiquette Online

The document outlines essential guidelines for online safety, etiquette, and ethics, emphasizing the importance of protecting personal information and maintaining respectful communication. It discusses risks such as cyberbullying and phishing, providing tips for safe internet use and netiquette. Additionally, it highlights the significance of respecting ownership and privacy in computing, along with the legal framework governing online interactions.

Uploaded by

Gelsa G. Dragon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views7 pages

Lesson 1.1 - Safety and Etiquette Online

The document outlines essential guidelines for online safety, etiquette, and ethics, emphasizing the importance of protecting personal information and maintaining respectful communication. It discusses risks such as cyberbullying and phishing, providing tips for safe internet use and netiquette. Additionally, it highlights the significance of respecting ownership and privacy in computing, along with the legal framework governing online interactions.

Uploaded by

Gelsa G. Dragon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Lesson 1.

1: Safety and Etiquette Online


Create an informative video of the following topics then present it in class.

What is Internet Safety? Coleen


Why is it important to stay safe online?
Most of us are ‘connected’ via our laptops, mobile phones, tablets or personal
computer. The potential for the internet to be a valuable and a fun resource for
entertainment, making friends, keeping in touch and learning is huge. But if you use
the internet, you could be at risk of illegal activity or abuse - be it bullying, fraud or
something more serious. Unlike seeing someone face to face, on the net, people
aren't always what they first seem.

In the same way you learn about safety when you leave the house, it is important to
learn how to stay safe online. These are skills that will stay with you for life.

Some Golden Rules to Stay Safe Online

 Don't give out personal information such as your address or phone number.
 Don’t send pictures of yourself to anyone, especially indecent pictures.
 Don't open emails or attachments from people you don't know.
 Don't become online ‘friends’ with people you don't know.
 Never arrange to meet someone in person who you've met online.
 If anything you see or read online worries you, tell someone about it.

Social networking

Social networking websites and apps, such as Facebook, MySpace, Instagram, Viber,
Tumblr, SnapChat, Ask.fm and Twitter have become incredibly popular in recent
years.

Most users are genuine, but because it is so easy to hide your real identity, it is
possible to come into contact with people you would normally avoid.

The Risks (Privacy)

The internet offers you a lot of freedom and this can lead some people to behave in
ways they would not behave in public.

They might:
 say things on a status update / post / tweet they would never say face to face
 give out personal information about themselves or others (including photos) that
they would normally keep private

Cyber bullying

Cyber bullying can work in the same way as bullying in the playground; the victim
feels frightened and alone, while the bully tries to hide from being caught.
 Comments, images and videos about a person can be posted online causing the
victim to feel frightened and upset.
 It is even possible for cyber bullies to hack into the victim's personal accounts and
harass them from within their own user profile.
 Often cyber bullies feel braver because they can't be seen, but it can be the most
traceable form of bullying because there's evidence that it's happened.
 But because bullies think they can cover up their identity online sometimes people
who wouldn't normally bully might do so online.

Sexting

Sexting usually refers to sending and receiving rude messages or videos of:
 naked pictures
 'underwear shots'
 any sexual texts, images or videos

These images or videos can be sent from a boyfriend or girlfriend or a friend or


someone you've met online. You also may have sent a sexual photo, video or text to
someone else.

Tips so you stay safe on social networking sites Ralf


 Never give out personal information.
 Do not make friends you don't already know personally.
 Maybe use an email address that does not include your name.
 Always use a ‘strong’ password. That is, don't use any names or words that
someone might guess, like the name of your dog or your favorite singer. Use
random letters or numbers and change your password regularly.
 Use the strongest privacy setting when you set up your profile. This means that
only your friends will be able to view your information.
 Pictures and videos can be shared very easily across the internet, so make sure
you are very careful when uploading - even if you only share it with friends, it can
easily be spread much further than that.
 Be very careful about sharing content online - especially if it isn't yours to share.
Illegal downloads are definitely best avoided.
 Never meet up with anyone you have met online.
 Make sure you know about the safety features on any networking site. Some, for
example, have a ‘panic button’ which you can press if you see something that
shouldn't be there.
 If anything happens online that you don't like, tell someone.

Other types of internet use: Spam &, Phishing


Spam

Spam is usually considered to be electronic junk mail or junk newsgroup postings.


Some people define spam even more generally as any unsolicited email. Real spam
is generally email advertising for some product sent to a mailing list or newsgroup.

The term spam can also be used to describe any "unwanted" email from a company
or website -- typically at some point a user would have agreed to receive the email
via subscription list opt-in -- a newer term called graymail is used to describe this
particular type of spam.

Why Spam is a Problem?

In addition to wasting people's time with unwanted email, spam also eats up a lot of
network bandwidth. Consequently, there are many organizations, as well as
individuals, who have taken it upon themselves to fight spam with a variety of
techniques. But because the Internet is public, there is really little that can be done
to prevent spam, just as it is impossible to prevent junk mail. However, some online
services have instituted policies to prevent spammers from spamming their
subscribers.

Phishing

The act of sending an email to a user falsely claiming to be an established


legitimate enterprise in an attempt to scam the user into surrendering private
information that will be used for identity theft. Phishing email will typically direct the
user to visit a website where they are asked to update personal information, such as
a password, credit card, social security, or bank account numbers, that the
legitimate organization already has. The website, however, is bogus and will capture
and steal any information the user enters on the page.

Examples of Phishing Scams

BDO updates

Why is Phishing Successful for Scammers?

Phishing emails are blindly sent to thousands, if not millions of recipients. By


spamming large groups of people, the "phisher" counts on the email being read by a
percentage of people who actually have an account with the legitimate company
being spoofed in the email and corresponding webpage.

What is Netiquette? Jham

https://www.youtube.com/watch?v=QhdFjBp-jGs

By definition, etiquette is "the customary code of polite behavior in society or


among members of a particular profession or group." In the online
environment, netiquette, or Internet etiquette, is a way of defining professionalism
through network communication. one with regards to online communication in order
to maintain common courtesy.

Netiquette Tips

Regardless of the type of communication used, you should always keep in mind the
following:
 Be respectful: Treat others the way you want to be treated. Use polite
language and avoid using offensive words or phrases that could be hurtful to
others.
 Use proper grammar and spelling: Avoid using excessive abbreviations or
slang, and use proper punctuation and spelling to ensure clear
communication.
 Be mindful of tone: Online communication can be misinterpreted easily, so
make sure your tone is clear and appropriate. Avoid using all caps, which can
come across as shouting.
 Keep it professional: Remember that online communication is still a form of
professional communication, especially when communicating with professors,
instructors, and administrators.
 Use appropriate channels: Use the appropriate communication channels
for the situation. For example, use email for longer, more formal messages,
and instant messaging or texting for quick, informal messages.
 Use appropriate subject lines: Use clear and specific subject lines in your
emails, so that the recipient knows what the message is about.
 Avoid spamming: Avoid sending unsolicited messages or spamming others
with unnecessary messages.
 Don't overshare personal information: Be mindful of the information you
share online, as it can be accessible to anyone. Avoid sharing sensitive or
personal information in public online spaces.
 Respect others' time: Be considerate of others' time and avoid sending
messages outside of regular business hours, unless it's urgent.
Remember, good netiquette is about being respectful, professional, and considerate
in your online communication. By following these guidelines, you can build positive
relationships with your peers and professors while avoiding misunderstandings and
conflicts.

Computer Ethics

ETHICS IN GENERAL

A guideline is needed to stop the current technology products from being exploited
for example replicating original CDs and selling them as pirated software, this
unethical behavior can be controlled by the code of conducts.

Unethical refers to any code of conducts that are not conforming to approved
standards of social or professional behavior. Computer ethics is a system of moral
standards or values used as a guideline for computer users.

WHY DO WE NEED ETHICS AND LAW IN COMPUTING?

RESPECTING OWNERSHIP

We must respect ownership by not stealing other people’s work either by


duplicating or distributing it. Duplicating and distributing copies of audio tapes,
video tapes and computer programs without permission and authorization from the
individual or company that created the program are immoral and illegal.
RESPECTING PRIVACY AND CONFIDENTIALITY

We should respect other people's privacy and confidentiality by refraining ourselves


from reading their mails or files without their permission. If we do so, it is
considered as violating an individual’s rights to privacy and confidentiality.
RESPECTING PROPERTY

Property here means ownership. Since an individual data and information are
considered as property, therefore, an act of tampering and changing electronic
information is considered as vandalism and disrespect for other people’s property.

THE TEN COMMANDMENTS OF COMPUTER ETHICS Jinwhil

The United States Institute of Computer Ethics has come out with the Ten
Commandments of Computer Ethics. These principles consider the effective code of
conducts for the proper use of information technology.

The Ten commandments of computer ethics are:

1. You shall not use a computer to harm other people.


2. You shall not interfere with other people's computer work.
3. You shall not snoop around in other people's computer files.
4. You shall not use a computer to steal.
5. You shall not use a computer to bear false witness.
6. You shall not copy or use proprietary software for which you have not paid.
7. You shall not use other people's computer resources without authorization or
proper compensation.
8. You shall not appropriate other people's intellectual output.
9. You shall think about the social consequences of the program you are writing or
the system you are designing.
10. You shall always use a computer in ways that ensure consideration and respect
for your fellow humans.

UNETHICAL COMPUTER CODE OF CONDUCTS

With the advancement of ICT, it is easy for anyone to retrieve your information from
the Internet. You may not realize that when you fill a form on the Internet, your
information may be exposed and stolen.
Examples of unethical computer code of conducts include:
• modifying certain information on the Internet, affecting the accuracy of the
information
• selling information to other parties without the owner’s permission
• using information without authorization
• involvement in stealing software
• invasion of privacy

Intellectual property refers to any product of human intellect that is unique and has
value in the market place. This covers ideas, inventions, unique name, computer
program codes and many more.
ETHICAL COMPUTER CODE OF CONDUCTS

Examples of ethical computer code of conducts include:


• sending warning about viruses to other computer users
• asking permission before sending any business advertisements to others
• using information with authorization

Republic Act 10175 – Cybercrime Prevention Act

Protecting Student’s Privacy

Similar to in-person instruction, online instruction is provided exclusively for


educational purposes for IUSD students. Parents, students, and/or others are not
authorized to audio or video record, stream, or share in any way, distance learning
instruction or services without the express consent of all participants. This includes
instruction or services provided via telephone or a video conferencing platform.
Online instruction and educational activities that occur via web/video conferencing
platforms may be recorded for educational purposes. The recordings may be shared
with other students enrolled in the class and/or their parents/guardians, and/or with
district personnel or other school officials with a legitimate educational interest in
reviewing such recordings. Students and parents are not to record, photograph, or
share any online instructional activities without the consent of all of the
participants, or unless prior approval for such recording has been granted.
The Family Educational Rights and Privacy Act (“FERPA”) and all applicable federal
and state student data privacy laws applies to online learning. Students
participating in classes or group services at schools typically work together. The
same will occur when students receive instruction virtually, (i.e., they typically will
be able to view the other students participating in group instruction/services). We
ask parents to respect confidentiality as they would during the in-person school
instruction.

Guidelines for Student Participation in Online Instruction


The following guidelines are intended to promote a safe and secure learning
environment for all students.
 Students should not share their login information, meeting or Zoom links, or
passwords with others. Students should use their first and last names, not
false or made up names.
 School and classroom rules apply to the virtual instruction environment.
 Students are expected to engage and participate in all Digital Citizenship
lessons taught by their classroom teacher. Teachers may use the provided
curriculum and tailor it to the developmental needs of their students.
 Students who use inappropriate language, share inappropriate images, or in
any way behave inappropriately on a video conference may be subject to
appropriate discipline.
 Students should not conduct audio or video recordings or take screenshots of
virtual class meetings or activities unless they have received prior permission
to do so from a teacher or authorized official.
 To the extent possible, students should participate in virtual instruction from
a quiet and neutral area that is free of distractions.
 Students should dress appropriately for virtual instruction sessions.
 Once the virtual instruction session or meeting is over, students should be
sure to close out of the meeting platform entirely. Students should also
ensure that cameras are covered and that microphones are turned off to
avoid inadvertent transmission following the meeting.

You might also like