You are on page 1of 43

Lesson 3

Netiquette: Rules of Behavior on the


Internet. The etiquette guidelines that
govern behavior when communicating
on the Internet have become known as
netiquette. Netiquette covers not only
only rules of behavior during
discussions but also guidelines that
reflect the unique electronic nature of
the medium.
Jul 24, 2013
Rules of Netiquette
1. Online Security,
Safety and Ethics
2. Internet Threats
3. Protecting Reputations Online
4. Copyright
5. Contextualized Online Search
and Research Skill
Remember the human

You need to remember that you are talking to a real person when
you are online.
The internet brings people together who would otherwise never
meet.
Remember this saying when sending an email: Would I say
email: Would I say this to the person’s face.
Adhere to the same standards online that you follow in real life

You need to behave the same way online that you do in


real life.
You need to remember that you can get caught doing
things you should not be doing online just like you can in
real life.
You are still talking to a real person with feelings even
though you can’t see them.
Know where you are
in cyberspace

Always take a look around when you enter


a new domain when surfing the web.
Get a sense of what the discussion group
is about before you join it.
Respect other people’s time and bandwidth

Remember people have other things to do besides


read your email. You are not the center of their world.
Keep your post and emails to a minimum by saying
what you want to say.
Remember everyone won’t answer your questions.
Make yourself look
good online

Remember to always check your spelling and


grammar before posting.
Always know what you are talking about and make
saying it.
Be polite and pleasant to everyone.
Share expert knowledge

Ask questions online


Share what you know online.
Post the answers to your questions online
because someone may have the same question
you do.
Help keep flame wars
under control

Netiquette does not forbid flaming.


Netiquette does however forbid people
who are flaming to hurt discussion
groups by putting the group down.
Respect other
people’s privacy

Do not read other people’s mail without their


permission.
Going through other people’s things could cost you,
your job or things or you could even go to jail.
Not respecting other people’s privacy is bad
Netiquette.
Don’t abuse your power

Do not take advantage of other people just


because you have more knowledge or power
than them.
Treat others as you would want them to treat you
if the roles were reversed.
Be forgiving of other people’s mistakes

Do not point out mistakes to people online.


Remember that you were once the new kid on the
block.
You still need to have good manners even though
you are online and can not see the person face to
face.
The Internet, truly, is a powerful tool. It can
be used to promote your business, gain new
friends, and stay in touch with the old ones. It is
also a source of entertainment through games,
online communities, and everything in between.
But like most things in this world, there is always
the “other side of the coin”. The internet is one of
the most dangerous places, especially if you do
not know what are you doing with it. But there is
no need to worry; it is never that late. 
Type of
Risks
Information
. First Name
1 There is a risk in sharing your first
name. Chances are, a hacker may
already know plenty of stuff about you
even if you only give out your first
name. Likewise, you cannot just walk in
a room and start introducing yourself to
everyone. You do not know whom you
can come across with.
Type of
Risks
Information
. Last Name
2 If sharing your first name is a small
risk, having both your first and last is
more risky. You will be vulnerable to
being searched for using search
engines, which include image search.
Matching a name with a face is a
modus to several cybercrimes like
identity theft.
Type of
Risks
Information
. Middle Name
3
Sharing your middle name
alone is probably not the
most risky of these shared
information, but sharing
your full name would be.
Type of
Risks
Information
. Current and
4

previous school(s)
Most people who steal
identities study their
subject. They can use this
information for verification
purposes.
Type of
Risks
Information
. Your cellphone Your cellphone number should not be
5

number posted over the Internet. The Internet


is a public place. It is the same as
posting your number on a billboard.
You would not want random
strangers to text or call you, or
worse, pretend that they are
someone else.
Type of
Risks
Information
6 . The name of Risky, yet not as risky as posting their
your mother and full names, especially your mother’s
father maiden name. In fact, you may have
already encountered many websites
that require your mother’s maiden
name as an answer to a secret
question whenever you lose your
password.
Type of
Risks
Information
. The name of
7

your siblings Disclosing this is a


huge risk. Strangers
may pretend or use
their identity to dupe
you.
Type of
Risks
Information
. Your address
8
Hopefully, you answered “no” to
this one. Giving the Internet
your number is one thing; giving
them your address is a whole
other level. It would be much
easier for criminals to find you.
Type of
Risks
Information
9. Your home This shared information is more
phone number risky than sharing your personal
phone number. Scams usually use
this information to deceive you, one
of which is when a stranger
pretends to know your parents or
pretends to be you.
Type of
Risks
Information
. Your birthday
10
Letting people know your
birthday is probably a must if
you want to get as many gifts
as possible. But having it in
your profile makes you
vulnerable to identity theft.
The Internet is defined as the information
superhighway. This means that anyone has
access to his highway, can place information, and
can grab that information. Any information, even
things that you have set privately, can be
accessed one way or another. This is why social
networking sites like Facebook continue to
improve their security features. The threat of
cybercrimes is very real. While you may not
experience the threat now, whatever information
we share today could affect our future.
1.
Be mindful of what you share online
and what site you
share it to.
2.
Do not just accept terms and
conditions;
read it.
3.
Check out the privacy policy page of a
website to learn how the website handles
the information you share.
4.
Know the security features of the social
networking site you use. By keeping your profile
private, search engines will not be able to scan
your profile.
5.
Do not share your password
with anyone.
6.
Avoid logging in to public, networks/Wi-Fi.
Browsing in “incognito (or private) mode”, a
feature of the browser , will not protect you from
hackers.
7.
Do not talk to strangers whether
online or
face-to-face.
8.
Never post anything about a future
vacation. It is similar to posting, “Rob
my house
at this date”.
9.
Add friends you know in
real life.
10.
Avoid visiting untrusted
websites.
11.
Install and update an antivirus software on
your computer. Use only one antivirus
software to avoid conflicts.
12.
If you have a Wi-Fi at home,
make it a private network by
adding a password.
13.
Avoid downloading anything from untrusted
websites. You are most vulnerable in peer-to-peer
downloads (torrents) as the download is most
likely not monitored by the site owner.
14.
Buy the software; do not use
pirated ones.
15.
Do not reply or click links
from suspicious emails.
Leelet

You might also like