Guideline about responsible use of social networks
Guideline about responsible use of social networks
Guideline about responsible use of social networks
• Social networking web sites such as and are 
useful Internet tools to keep in touch with friends 
and family, and can be utilized to meet new 
people with similar interests. 
• These sites have become very popular among 
teens. 
• These sites can be a positive 
and beneficial resource for 
youth, but only if they used 
them in the responsible way.
• Too often, however, adolescents include too 
much personal information, talk about things 
that could get them into trouble, or otherwise 
place themselves at risk by what they share on 
their online profiles. 
• Virtually everyone that uses the media needs 
to understand the benefits of responsible use 
and the consequences of irresponsible use.
• We could establish three major areas within 
which we can group the main risks associated 
with tic's and social networks: 
• EXPOSURE TO HARMFUL CONTENT, 
• EXCESSIVE TIME COMMITMENT 
• AND THE POSSIBILITY OF CONTACT WITH 
POTENTIALLY HAZARDOUS TO THE PHYSICAL 
OR MENTAL INTEGRITY OF PERSONS.
• The main risks that we may face are: 
• ABUSIVE AND ADDICTIVE USE 
• That often results in heavy dependence or 
abuse and social isolation and / or waiver to 
be with friends
• VIOLATION OF RIGHTS OF INDUSTRIAL OR 
INTELLECTUAL PROPERTY 
• Closely related to the phenomenon, 
widespread illegal downloading at all ages
• ACCESS TO INAPPROPRIATE CONTENT 
• The ability to access inappropriate content 
capable offend the sensibilities contained 
pursued by the law, fake content ...
• CYBERBULLYING 
• A risk bolstered by the ease offered by tic's 
hiding under false identities, which has caused 
the number of cases of harassment has 
increased considerably, becoming a teen pop 
phenomenon.
• GROOMING AND SEXUAL HARASSMENT 
• The grooming define a tactic commonly used 
by pedophiles to contact potential victims.
• THREATS TO PRIVACY 
• Privacy in the network is the ability of 
individuals to control what information 
reveals self on the set of Internet and control 
who can access it.
• ECONOMIC RISK AND / OR FRAUD 
• Any internet user can be subject to fraud or 
computer scam. Highlight phishing, a form of 
fraud in order to try to get users to their data, 
passwords, bank accounts, credit card 
numbers, identities, all possible data before 
being used fraudulently.
• TECHNICAL AND / OR RISK MALWARE 
• The use of the Internet can expose you to 
viruses and other malicious software 
(malware).
• ONLY CONNECT WITH THOSE 
YOU KNOW OR THOSE YOU ARE 
CERTAIN CAN BE TRUSTED.
• DON’T ADD PEOPLE AS 
“FRIENDS” UNLESS YOU KNOW 
THEM IN REAL LIFE.
• DON’T ACCUMULATE THOUSANDS OF 
“FRIENDS” ONLY FOR INCREASE THE LIST. 
JUST REMEMBER THAT THESE PEOPLE HAVE 
OPEN ACCESS TO ALL OF YOUR POSTED 
CONTENT AND INFORMATION.
• DON’T PUT ANYTHING ONLINE 
YOU WOULDN’T WANT YOUR 
WORST ENEMY TO KNOW.
• USE THE STRONGEST PRIVACY 
SETTINGS THAT STILL ALLOW 
YOU THE FLEXIBILITY YOU NEED 
TO USE THE SITE IN THE WAY 
YOU WANT.
• MAKE SURE YOU SET YOUR PROFILE TO 
“PRIVATE” SO THAT YOU CAN CONTROL 
WHO HAS EASY ACCESS TO YOUR 
INFORMATION.
• SHARE ONLY INFORMATION THAT 
IS ABSOLUTELY NECESSARY, 
ESPECIALLY WHEN YOU MAY NOT 
KNOW WHO YOUR NETWORK OF 
FRIENDS MIGHT BE SHARING IT 
WITH.
• USE DISCRETION WHEN PUTTING 
PICTURES ON YOUR PROFILE
• BE WARY OF POSTS THAT ARE 
EITHER OFFERING SOMETHING TOO 
GOOD TO BE TRUE. TRUST YOUR 
INSTINCT IF SOMETHING SEEMS 
SUSPICIOUS. AND IF YOU KNOW 
IT’S A FRAUD, REPORT IT TO THE 
SOCIAL NETWORKING SITE.
• ALWAYS HAVE UP-TO-DATE, REPUTABLE 
SECURITY SOFTWARE INSTALLED ON 
EVERY DEVICE YOU ARE USING TO 
CONNECT TO THE INTERNET/SOCIAL 
NETWORKING SITES.
• CHOOSE A SECURE BROWSER. 
• Most of the activities conducted by our focus 
on Internet browser so make a right choice is 
important.
• USE ADDITIONAL PLUGINS FOR THE 
BROWSER 
• It is suitable install some plugins to your 
browser to increase blocking infected web 
sites.
• TAKE CARE TO PROTECT YOUR COMPUTER 
• Install an antivirus on your operating system, 
there are many free and low heavy options.
• UPGRADE YOUR APPLICATIONS 
• It is very important to keep our updated 
applications, because in addition to offering 
the most improved version of the application 
or program normally have associated safety 
improvements.
• COMMON SENSE 
• If sail without common sense the chances of 
problems have increased considerably. Do not 
sail suicidally, before clicking on a link on that 
page well think you're already which can take 
you. There is no better tool than oneself, to 
monitor which pages you enter and leave in 
these data.
• RESPECT 
• I use ICT respecting others, respecting me and 
making me respect.
• FREEDOM 
• I exercise my right to freedom and respect of 
others.
• IDENTITY 
• I am taking my identity securely in my 
interaction with others in technological 
environments.
• INTEGRITY 
• I protect my integrity and personal safety and 
that of others.
• PRIVACY 
• I'm responsible with my privacy and that of 
others.
• AUTONOMY 
• I use ICT for the free development of my 
personality and autonomy, and through it I do 
acknowledge and respect my beliefs and 
thoughts, and those of others.
• QUALITY OF LIFE 
• I use ICT to improve my quality of life, making 
sure to seek a healthy and peaceful 
environment.
• CARE AND BEHAVIOR 
• I'm aware that minors require special care 
and support in the use of ICT.
• RESPECT THE LAW 
• I do not use ICT to promote, query, view, buy 
and share activities outside the law or any 
other behavior that violates human rights.
Guideline about responsible use of social networks
Guideline about responsible use of social networks
Guideline about responsible use of social networks
Guideline about responsible use of social networks
Guideline about responsible use of social networks
Guideline about responsible use of social networks

More Related Content

PDF
Responsible Use of Social Media in the Philippines
PPTX
Cyberbullying powerpoint
PPTX
Social Media Awareness
PDF
Power of social media
PPT
Social Media Awareness for Students
PPTX
Cyberbullying
PPTX
Empowerment technology
PPSX
Social Media
Responsible Use of Social Media in the Philippines
Cyberbullying powerpoint
Social Media Awareness
Power of social media
Social Media Awareness for Students
Cyberbullying
Empowerment technology
Social Media

What's hot (20)

PPTX
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
ZIP
Cyber bullying
PPTX
Power Point Cyber-bullying
PPTX
communication
PPT
Social Media Safety Presentation
PPTX
Social Media and the Future of Privacy
PDF
Social Media: Risks and Benefits
PPTX
Cyber security for kids
PPTX
Impacts of social media on students
PPTX
Role of social media in personal life
PPTX
Assistive Media
PPTX
Social Media and Children
PPTX
Cyber bullying Presentation
PPTX
Social media Advantages and Disadvantages
PPTX
Cyber Bullying
PPTX
Internet Addiction , causes , symptoms and consequences
PPTX
Online safety and security
PPTX
Social media
PPTX
Stop Cyberbullying
PPTX
Social media privacy and safety
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyber bullying
Power Point Cyber-bullying
communication
Social Media Safety Presentation
Social Media and the Future of Privacy
Social Media: Risks and Benefits
Cyber security for kids
Impacts of social media on students
Role of social media in personal life
Assistive Media
Social Media and Children
Cyber bullying Presentation
Social media Advantages and Disadvantages
Cyber Bullying
Internet Addiction , causes , symptoms and consequences
Online safety and security
Social media
Stop Cyberbullying
Social media privacy and safety
Ad

Viewers also liked (7)

PDF
Social networking as enabler of social responsibility and sustainability
PPTX
Tips to stay safe and responsible on social media
PPTX
Seminario You Tube-Marketing
DOC
social networking site
PDF
social networking sites
PPT
Three cultures. toledo
DOCX
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...
Social networking as enabler of social responsibility and sustainability
Tips to stay safe and responsible on social media
Seminario You Tube-Marketing
social networking site
social networking sites
Three cultures. toledo
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...
Ad

Similar to Guideline about responsible use of social networks (20)

PPTX
Cyber citizenship imen tekaya
PPTX
Cyber Awareness.pptx
PPTX
Digital Literacy and Its Impact 2.0.pptx
PPTX
Undergraduate Student Presentation STOP.THINK.CONNECT™ NATIONAL CYBERSECURIT...
PPTX
Ethics in Cyber Space
PPTX
INTERNET SAFER DAY-2021.pptx
PPT
7881096.pptetststdydsttshsthsstshhstetej
PPT
7881096.pptsssysgssssttstststststssstttw
PPTX
Safely Traveling the Web 2015
PPTX
sabhira khadgi MYP Presentation for students.pptx
PPTX
Information Security Awareness: at Work, at Home, and For Your Kids
PPTX
Rules of Netiquette Empowerment Technologies Lesson
PPTX
empowerment technologies Powerpoint presentation
PDF
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
PPTX
Cyber citizenship
PPTX
Lesson 2 - Rules of Netiquette (Information and Communication Technology)
PPTX
Chp-15 Cyber Safety ppt-std 11.pptx
PPTX
2. ETECH Module 2 - Internet Safety and Security.pptx
PPTX
ONLINE IDENTITY SAFETY junior school notes
PPTX
Module-9. DIGITAL.CYBER-LITERACY.pptx
Cyber citizenship imen tekaya
Cyber Awareness.pptx
Digital Literacy and Its Impact 2.0.pptx
Undergraduate Student Presentation STOP.THINK.CONNECT™ NATIONAL CYBERSECURIT...
Ethics in Cyber Space
INTERNET SAFER DAY-2021.pptx
7881096.pptetststdydsttshsthsstshhstetej
7881096.pptsssysgssssttstststststssstttw
Safely Traveling the Web 2015
sabhira khadgi MYP Presentation for students.pptx
Information Security Awareness: at Work, at Home, and For Your Kids
Rules of Netiquette Empowerment Technologies Lesson
empowerment technologies Powerpoint presentation
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Cyber citizenship
Lesson 2 - Rules of Netiquette (Information and Communication Technology)
Chp-15 Cyber Safety ppt-std 11.pptx
2. ETECH Module 2 - Internet Safety and Security.pptx
ONLINE IDENTITY SAFETY junior school notes
Module-9. DIGITAL.CYBER-LITERACY.pptx

More from profesorjulioperez (20)

PPSX
Proyecto Erasmus plus KA101 Sistema educativo sueco
PPSX
Miércoles solidarios versión en inglés
PPSX
INCLUD-ED PROJECT
PPTX
Path of sport
PPSX
Active breaks at school
PPT
PROYECTO INCLUD-ED
PPTX
MADRID DE LOS AUSTRIAS
PPTX
Erasmus+ 2017 englishversion3
PPT
Miércoles solidarios
PDF
Diary of MEETING IN Slovakia by Marta and Gloria
PPSX
Balance breakfast
PDF
Erasmus calendar 2017 spain
PPSX
ERASMUS PATH OF HISTORY OF RIVAS
PPT
Traditional Spanish games
PPSX
Path of nature madrid
PPTX
Spanish national Narks
PPSX
Nature of rivas
PDF
Madrid in christmas marta g.
DOCX
Relación de personas participantes
PDF
Comenius Bilateral 201315 Octubre 2014Ayuntamiento rivas vacia...us une rivas...
Proyecto Erasmus plus KA101 Sistema educativo sueco
Miércoles solidarios versión en inglés
INCLUD-ED PROJECT
Path of sport
Active breaks at school
PROYECTO INCLUD-ED
MADRID DE LOS AUSTRIAS
Erasmus+ 2017 englishversion3
Miércoles solidarios
Diary of MEETING IN Slovakia by Marta and Gloria
Balance breakfast
Erasmus calendar 2017 spain
ERASMUS PATH OF HISTORY OF RIVAS
Traditional Spanish games
Path of nature madrid
Spanish national Narks
Nature of rivas
Madrid in christmas marta g.
Relación de personas participantes
Comenius Bilateral 201315 Octubre 2014Ayuntamiento rivas vacia...us une rivas...

Recently uploaded (20)

PPTX
What’s under the hood: Parsing standardized learning content for AI
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 1).pdf
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
PDF
Journal of Dental Science - UDMY (2021).pdf
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PDF
HVAC Specification 2024 according to central public works department
PDF
Uderstanding digital marketing and marketing stratergie for engaging the digi...
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
Complications of Minimal Access-Surgery.pdf
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
PDF
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI .pdf
What’s under the hood: Parsing standardized learning content for AI
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 1).pdf
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
A powerpoint presentation on the Revised K-10 Science Shaping Paper
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
Journal of Dental Science - UDMY (2021).pdf
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
HVAC Specification 2024 according to central public works department
Uderstanding digital marketing and marketing stratergie for engaging the digi...
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
Unit 4 Computer Architecture Multicore Processor.pptx
Complications of Minimal Access-Surgery.pdf
Paper A Mock Exam 9_ Attempt review.pdf.
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
Share_Module_2_Power_conflict_and_negotiation.pptx
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI .pdf

Guideline about responsible use of social networks

  • 4. • Social networking web sites such as and are useful Internet tools to keep in touch with friends and family, and can be utilized to meet new people with similar interests. • These sites have become very popular among teens. • These sites can be a positive and beneficial resource for youth, but only if they used them in the responsible way.
  • 5. • Too often, however, adolescents include too much personal information, talk about things that could get them into trouble, or otherwise place themselves at risk by what they share on their online profiles. • Virtually everyone that uses the media needs to understand the benefits of responsible use and the consequences of irresponsible use.
  • 6. • We could establish three major areas within which we can group the main risks associated with tic's and social networks: • EXPOSURE TO HARMFUL CONTENT, • EXCESSIVE TIME COMMITMENT • AND THE POSSIBILITY OF CONTACT WITH POTENTIALLY HAZARDOUS TO THE PHYSICAL OR MENTAL INTEGRITY OF PERSONS.
  • 7. • The main risks that we may face are: • ABUSIVE AND ADDICTIVE USE • That often results in heavy dependence or abuse and social isolation and / or waiver to be with friends
  • 8. • VIOLATION OF RIGHTS OF INDUSTRIAL OR INTELLECTUAL PROPERTY • Closely related to the phenomenon, widespread illegal downloading at all ages
  • 9. • ACCESS TO INAPPROPRIATE CONTENT • The ability to access inappropriate content capable offend the sensibilities contained pursued by the law, fake content ...
  • 10. • CYBERBULLYING • A risk bolstered by the ease offered by tic's hiding under false identities, which has caused the number of cases of harassment has increased considerably, becoming a teen pop phenomenon.
  • 11. • GROOMING AND SEXUAL HARASSMENT • The grooming define a tactic commonly used by pedophiles to contact potential victims.
  • 12. • THREATS TO PRIVACY • Privacy in the network is the ability of individuals to control what information reveals self on the set of Internet and control who can access it.
  • 13. • ECONOMIC RISK AND / OR FRAUD • Any internet user can be subject to fraud or computer scam. Highlight phishing, a form of fraud in order to try to get users to their data, passwords, bank accounts, credit card numbers, identities, all possible data before being used fraudulently.
  • 14. • TECHNICAL AND / OR RISK MALWARE • The use of the Internet can expose you to viruses and other malicious software (malware).
  • 15. • ONLY CONNECT WITH THOSE YOU KNOW OR THOSE YOU ARE CERTAIN CAN BE TRUSTED.
  • 16. • DON’T ADD PEOPLE AS “FRIENDS” UNLESS YOU KNOW THEM IN REAL LIFE.
  • 17. • DON’T ACCUMULATE THOUSANDS OF “FRIENDS” ONLY FOR INCREASE THE LIST. JUST REMEMBER THAT THESE PEOPLE HAVE OPEN ACCESS TO ALL OF YOUR POSTED CONTENT AND INFORMATION.
  • 18. • DON’T PUT ANYTHING ONLINE YOU WOULDN’T WANT YOUR WORST ENEMY TO KNOW.
  • 19. • USE THE STRONGEST PRIVACY SETTINGS THAT STILL ALLOW YOU THE FLEXIBILITY YOU NEED TO USE THE SITE IN THE WAY YOU WANT.
  • 20. • MAKE SURE YOU SET YOUR PROFILE TO “PRIVATE” SO THAT YOU CAN CONTROL WHO HAS EASY ACCESS TO YOUR INFORMATION.
  • 21. • SHARE ONLY INFORMATION THAT IS ABSOLUTELY NECESSARY, ESPECIALLY WHEN YOU MAY NOT KNOW WHO YOUR NETWORK OF FRIENDS MIGHT BE SHARING IT WITH.
  • 22. • USE DISCRETION WHEN PUTTING PICTURES ON YOUR PROFILE
  • 23. • BE WARY OF POSTS THAT ARE EITHER OFFERING SOMETHING TOO GOOD TO BE TRUE. TRUST YOUR INSTINCT IF SOMETHING SEEMS SUSPICIOUS. AND IF YOU KNOW IT’S A FRAUD, REPORT IT TO THE SOCIAL NETWORKING SITE.
  • 24. • ALWAYS HAVE UP-TO-DATE, REPUTABLE SECURITY SOFTWARE INSTALLED ON EVERY DEVICE YOU ARE USING TO CONNECT TO THE INTERNET/SOCIAL NETWORKING SITES.
  • 25. • CHOOSE A SECURE BROWSER. • Most of the activities conducted by our focus on Internet browser so make a right choice is important.
  • 26. • USE ADDITIONAL PLUGINS FOR THE BROWSER • It is suitable install some plugins to your browser to increase blocking infected web sites.
  • 27. • TAKE CARE TO PROTECT YOUR COMPUTER • Install an antivirus on your operating system, there are many free and low heavy options.
  • 28. • UPGRADE YOUR APPLICATIONS • It is very important to keep our updated applications, because in addition to offering the most improved version of the application or program normally have associated safety improvements.
  • 29. • COMMON SENSE • If sail without common sense the chances of problems have increased considerably. Do not sail suicidally, before clicking on a link on that page well think you're already which can take you. There is no better tool than oneself, to monitor which pages you enter and leave in these data.
  • 30. • RESPECT • I use ICT respecting others, respecting me and making me respect.
  • 31. • FREEDOM • I exercise my right to freedom and respect of others.
  • 32. • IDENTITY • I am taking my identity securely in my interaction with others in technological environments.
  • 33. • INTEGRITY • I protect my integrity and personal safety and that of others.
  • 34. • PRIVACY • I'm responsible with my privacy and that of others.
  • 35. • AUTONOMY • I use ICT for the free development of my personality and autonomy, and through it I do acknowledge and respect my beliefs and thoughts, and those of others.
  • 36. • QUALITY OF LIFE • I use ICT to improve my quality of life, making sure to seek a healthy and peaceful environment.
  • 37. • CARE AND BEHAVIOR • I'm aware that minors require special care and support in the use of ICT.
  • 38. • RESPECT THE LAW • I do not use ICT to promote, query, view, buy and share activities outside the law or any other behavior that violates human rights.