0% found this document useful (0 votes)
24 views2 pages

The Netiquette

The document outlines guidelines for online communication, known as netiquette, emphasizing the importance of privacy settings, strong passwords, and ethical behavior in digital interactions. It includes the Ten Commandments of Computer Ethics and general moral imperatives related to computing, highlighting the need to avoid harm, respect others' privacy, and be honest. Additionally, it discusses internet protection laws, such as the Cybercrime Prevention Act of 2012, aimed at safeguarding information and communication technologies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views2 pages

The Netiquette

The document outlines guidelines for online communication, known as netiquette, emphasizing the importance of privacy settings, strong passwords, and ethical behavior in digital interactions. It includes the Ten Commandments of Computer Ethics and general moral imperatives related to computing, highlighting the need to avoid harm, respect others' privacy, and be honest. Additionally, it discusses internet protection laws, such as the Cybercrime Prevention Act of 2012, aimed at safeguarding information and communication technologies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

THE NETIQUETTE 7.

Use Privacy Setting and Sharing Controls: Social media


platforms offer privacy settings and controls that help you
HOW SAFE ARE YOU? decide who can access your content.
8. Protecting your devices: Protect your devices by locking
devices and your screens.
9. Use a Long and Unique Password: Choose a password
that is hard to guess, made up of numbers, letters and
symbols.
10. Think Before you reveal: Think more before you post
something that could damage your reputation and that
someone could use to embarrass or hurt you.

Ten Commandments of Computer Ethics by the


Computer Ethics Institute:

1. Thou shalt not use a computer to harm other people.


2. Thou shalt not interfere with other people's computer
work.
3. Thou shalt not snoop around in other people's computer
files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy or use proprietary software for which
you have not paid.
7. Thou shalt not use other people's computer resources
without authorization or proper compensation.
8. Thou shalt not appropriate other people's intellectual
output.
9. Thou shalt think about the social consequences of the
Network Etiquette (Netiquette) program you are writing or the system you are designing.
Netiquette refers to the do’s and don’ts of online communication. It 10. Thou shalt always use a computer in ways that ensure
covers both common courtesy and the informal “rules of the road” consideration and respect for your fellow humans.
of cyberspace. Netiquette is short for "Internet etiquette." Just like
etiquette is a code of polite behavior in society, netiquette is a code Composing a Message (New/ Reply/ Forward). Check your mail
of good behavior on the Internet. This includes several aspects of regularly; ignoring a mail message is discourteous and confusing to
the Internet, such as email, social media, online chat, web forums, the sender. Conversely, never assume that simply because you have
website comments, multiplayer gaming, and other types of online sent a message, it has been read. Treat the security of email
communication. messages about the same as a message on a postcard. If you have
Ethics sensitive messages to send, use some form of encrypting, or use
Ethics deals with placing a value on acts according to whether they another more secure medium. Encourage others to communicate
are good or bad. It is also called moral philosophy, the discipline with you by email. Ensure you give them your correct email
concerned with what is morally good and bad and morally right and address.
wrong. The term is also applied to any system or theory of moral Writing Styles. Be very careful how you express yourself, especially
values or principles. if you feel heated about the subject. Try to keep the message fairly
brief. Keep paragraphs and messages short and to the point. Make
Tips to Stay Safe Online your message “concise”, not cryptic. Make sure that the “subject”
1. Check the URL: the URL might look okay in a message or field of your message is meaningful.
email but might take you to a page setup to extract Use Descriptive Titles. The subject line of an email enables a person
personal information. It is best to type a URL into a with a limited amount of time to decide whether to read your
webpage instead of clicking the link. message or article. As a courtesy, indicate what the message is
2. Outsmart “Phishing” Attempts: Never provide your about before they take the time to read it.
personal and financial information to an unsolicited email, Be Careful with Humour and Sarcasm. When communicating face-to-
SMS, phone call or website even if they appear to be face, your body language and voice tones can be seen and heard, but
legitimate. with email, it is easy for a remark meant to be funny to be
3. Always Check the Sender’s Email Address: Misspellings misinterpreted as you aren’t being seen or heard in person.
and other typos that could indicate that they are not the Be Careful with Expressions of Anger. Again, because communicating
real senders. Learn to Spot Tell - Tale Signs of a Secure with email has the informal properties of conversation without the
Site: Secure sites have URLs that start with https:// and it corresponding benefits of voice and body language, messages are
should have a padlock icon in the browser frame. often misconstrued and generate unexpected angry responses.
4. Learn to Spot Tell - Tale Signs of a Secure Site: Secure Be Careful What You Say About Others. Think more before you post
sites have URLs that start with https:// and it should have personal information about yourself or others.
a padlock icon in the browser frame. Spelling Flames Considered Harmful. Remember that we all make
5. Shop Safely with Reputable Online Retailers and mistakes, and that there are many users on the network who use
Marketplace: Online shoppers should feel empowered to English as a second language. If you feel that you must make a
do their research about products and sellers before comment on the quality of a posting, please do so by personal mail,
making a purchase. not on the network (public post).
6. Use a safe and trusted payment method when
shopping online: For additional security, choose to pay
with a payment service that has programs to protect you.
General Moral Imperatives from the Code of Ethics and
Professional Code of Association for Computing Machinery

1. Contribute to society and human well-being - This principle


concerning the quality of life of all people affirms an obligation to
protect fundamental human rights and to respect the diversity of all
cultures.
2. Avoid harm to others - This principle use of computing
technology in ways that result in harm to any of the following:
users, the general public, employees and employers. Harmful
actions include intentional destruction or modification of files and
programs leading to serious loss of resources or unnecessary
expenditure of human resources such as the time and effort
required to purge systems of “computer viruses.”
3. Be honest and trustworthy - Honesty is an essential component
of trust. An internet user has a duty to be honest about his or her
own qualifications, posts and messages.
4. Be fair and take action not to discriminate - The values of
equality, tolerance, respect for others and the principles of equal
justice that govern this imperative.
5. Honor property rights including copyrights and patents -
Violation of copyrights, patents, trade secrets and the terms of
license agreements is prohibited by the law.
6. Give proper credit for intellectual property - One must not
take credit for other’s ideas or work, even in cases where the work
has not been explicitly protected by copyright, patent, etc.
7. Respect the privacy of others - It is the responsibility of
everyone to maintain the privacy and integrity of data describing
individuals.
8. Honor confidentiality - The ethical concern is to respect all
obligations of confidentiality to employers, clients and the users
unless discharged from such obligations by requirements of the law
or other principles of this Code.

Internet Protection
To protect users from people eavesdropping on private
information, computer developers have proposed intrusion-
detection systems that can detect any illegitimate use of an
information site or system. Both the national communities and the
international community have also given attention to
comprehensive protection laws, an example of which is the
Cybercrime Prevention Act of 2012, officially recorded as
Republic Act No. 10175 introduced by Senator Edgardo Angara in
the Philippine Senate. RA 10175 Section 2 states the declaration of
policy, “ The State recognizes the vital role of information and
communications industries such as content production,
telecommunications, broadcasting electronic commerce, and data
processing, in the nation’s overall social and economic development.
The State also recognizes the importance of providing an
environment conducive to the development, acceleration, and
rational application and exploitation of information and
communications technology (ICT) to attain free, easy, and intelligible
access to exchange and/or delivery of information; and the need to
protect and safeguard the integrity of computer, computer and
communications systems, networks, and databases, and the
confidentiality, integrity, and availability of information and data
stored therein, from all forms of misuse, abuse, and illegal access by
making punishable under the law such conduct or conducts. In this
light, the State shall adopt sufficient powers to effectively prevent and
combat such offenses by facilitating their detection, investigation, and
prosecution at both the domestic and international levels, and by
providing arrangements for fast and reliable international
cooperation.”

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy