SlideShare a Scribd company logo
3
Most read
4
Most read
9
Most read
Rules of Netiquette
What is Netiquette?
Netiquette is a made-up word from the words net and etiquette.
Netiquette thus describes the rules of conduct for respectful and
appropriate communication on the internet.
Netiquette is often referred to as etiquette for the internet. These are
not legally binding rules, but recommended rules of etiquette.
Netiquette is mostly used for dealing with unknown people on the
internet. The rules of netiquette very depending on the platform and
its participants .
Don't give out personal
information such as your
address or phone number.
Don't send pictures of
yourself to anyone,
especially indecent pictures.
Don't open emails or
attachments from people
you don't know.
Some Golden Rules
Don't become online 'friends'
with people you don't know.
Never arrange to meet
someone in person who you've
met online.
If anything you see or read
online worries you, tell
someone about it.
The internet offers you a lot of freedom and this can lead some people to
behave in ways they would not behave in public.
They might:
say things on a status update / post/tweet they would never say face to
face
give out personal information about themselves or others (including photos)
that they would normally keep private
The Risk(Privacy)
Cyber bullying can work in the same way as bullying in the playground: the victim feels
frightened and alone, while the bully tries to hide from being caught.
Comments, images and videos about a person can be posted online causing the victim to
feel frightened and upset.
It is even possible for cyber bullies to hack into the victim's personal accounts and harass
them from within their own user profile.
Often cyber bullies feel braver because they can't be seen, but it can be the most
traceable form of bullying because there's evidence that it's happened.
But because bullies think they can cover up their identity online sometimes people who
wouldn't normally bully might do so online
Cyber bullying
Cyber stalking
Harassment on the internet can be just as frightening as other forms of
stalking.
Women and girls are usually the victims of this kind of behavior.
They might be harassed by an ex- boyfriend or girlfriend who is upset about
the end of their relationship, for example.
It can also begin when a purely online friendship turns sour.
It can even begin entirely at random, by one online stranger towards another.
Inappropriate content
Beware of the sites you visit- the internet has many sites
featuring sex, violence and drug abuse - and other illegal
activities.
Often anyone can access these sites, even when parental
controls are in place.
You could be encouraged to view them via content shared by
others on social networking sites.
Online Grooming
Pedophiles have been known to use this method to contact young people
by disguising themselves as another young person. This can lead to
gaining the trust of an individual and their friends. These false
relationships based on lies can often pave way for exposure to upsetting
images and online content and in some cases arranging a meeting in
person.
Online grooming is the term used to describe inappropriate behavior
towards a young person, putting them at risk to a sexual offence.
Even if nothing dangerous does happen, knowing you may have had
contact with somebody like this can be extremely upsetting.
Making 'friends'
We all know it's not healthy to spend hours and hours in front of a computer
screen. But another problem with social networking is the pressure you can feel
to make sure you have lots of 'friends'. But here are some things to remember:
Friendships made online are made by clicking a button rather than taking to
people and sharing experiences.
Being online "friends" with someone is much less meaningful than face to face
friendship.
You can easily fall out with an online 'friend' because of a misunderstood
comment.
It is far easier, and healthier, to sort out arguments and problems when you
can talk to someone face to face.
Internet Threats:
SPAM -unwanted email mostly from bots or advertisers.
It can be used to send malware.
Spam is usually considered to be electronic junk mail or junk newsgroup postings. Some
people define spam even more generally as any unsolicited email. However, if a long-
lost brother finds your email address and sends you a message, this could hardly be
called spam, even though it is unsolicited. Real spam is generally email advertising for
some product sent to a mailing list or newsgroup.
PHISHING- Its goal is to acquire sensitive personal
information like passwords and credit card details.
The act of sending an email to a user falsely claiming to be an established legitimate
enterprise in an attempt to scam the user into surrendering private information that
will be used for identity theft.
Phishing email will typically direct the user to visit a website where they are asked
to update personal information, such as a password, credit card, social security, or
bank account numbers, that the legitimate organization already has. The website,
however, is bogus and will capture and steal any information the user enters on the
page.
Malware - stands for malicious software
Types: Virus, Worm, Trojan, Spyware, Adware
A computer virus is a program or piece of code that is loaded
onto your computer without your knowledge and runs against
your wishes. Viruses can also replicate themselves. All computer
viruses are man- made. A simple virus that can make a copy of
itself over and over again is relatively easy to produce. Even such
a simple virus is dangerous because it will quickly use all
available memory and bring the system to a halt.
Think Before You Click
1. Before you post something on the web, ask these questions to
yourself: Would you want your parents or grandparents to see it?
Would you want your future boss to see it? Once you post
something on the web, you have no control of who sees your
posts.
2. Your friends depend on you to protect their reputation online.
Talk to your friends about this responsibility. serious
3. Set your post to "private." In this way, search engines will not be
able to scan that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other's reputation, ask
the one who posted it to pull it down or report it as inappropriate.
Thank you!!

More Related Content

PPTX
PPTX
coloration technique facial prosthesis
DOC
PPT
Dental Articulators /certified fixed orthodontic courses by Indian dental aca...
PPTX
01- Occlusion in prosthodontics introduction -5th year
PPTX
Unit 2 Obturators.pptx
PPT
Distraction osteogenesis
coloration technique facial prosthesis
Dental Articulators /certified fixed orthodontic courses by Indian dental aca...
01- Occlusion in prosthodontics introduction -5th year
Unit 2 Obturators.pptx
Distraction osteogenesis

What's hot (20)

PPTX
Implant supported fixed bridge for edentulous mandible
PPTX
Fixed functional appliances in Orthodontics
PPTX
Orthodontic management of impactions
PPTX
orthodontic case presentation
PPTX
Malocclusion
PPT
Esthetics / orthodontics courses in india
PPT
Presentation1/ dental crown & bridge courses
PPTX
INTERCEPTIVE ORTHODONTICS.pptx
PPTX
Award Winning AAID Table Clinic Presentation
PPTX
Articulators
PPT
Anatomy and physiology of denture bearing areas /certified fixed orthodontic...
PPTX
Classification systems for partially edentulous arches
PPTX
Lecture 6 correction of dentofacial deformities
PPTX
COGS Burstone analysis for orthognathic surgery
PPTX
Implant
PDF
ILAKKANAM Tamil TNPSC group4 Examination
PPT
Treatment of class II
PPTX
prosthetic options in implant
PPT
Mandibular reconstruction / oral surgery courses
PPT
Canine impaction 1
Implant supported fixed bridge for edentulous mandible
Fixed functional appliances in Orthodontics
Orthodontic management of impactions
orthodontic case presentation
Malocclusion
Esthetics / orthodontics courses in india
Presentation1/ dental crown & bridge courses
INTERCEPTIVE ORTHODONTICS.pptx
Award Winning AAID Table Clinic Presentation
Articulators
Anatomy and physiology of denture bearing areas /certified fixed orthodontic...
Classification systems for partially edentulous arches
Lecture 6 correction of dentofacial deformities
COGS Burstone analysis for orthognathic surgery
Implant
ILAKKANAM Tamil TNPSC group4 Examination
Treatment of class II
prosthetic options in implant
Mandibular reconstruction / oral surgery courses
Canine impaction 1
Ad

Similar to Rules of Netiquette (20)

PPTX
EMPOWERMENT TECHNOLOGIES LESSON 2 - NETIQUETTE
PPTX
Rules of Netiquette
PDF
PPTX
Cyber bullying
PDF
MindMake - Online Safety Talking to your Kids Parental Control
PPTX
Lecture in Empowerment Technologies week 2.pptx
DOCX
Gloria flores
PPTX
Cyber wellness 2
PDF
Cyber safety tips
PPT
Christian Middle School Internet Safety
PPT
Internet Safety
PPTX
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
PPT
Cyber safety
PPTX
Lesson 2 rules of netiquette
DOCX
Jonathan cullishpuma
PPTX
EMPOWERMENT TECHNOLOGIES LESSON 2
PPTX
Lesson 2 empowermentttttttttttttttt.pptx
PPTX
Lesson 2 empowermentttttttttttttttt.pptx
PPTX
Cyberbullying
PPT
Presentation to parents
EMPOWERMENT TECHNOLOGIES LESSON 2 - NETIQUETTE
Rules of Netiquette
Cyber bullying
MindMake - Online Safety Talking to your Kids Parental Control
Lecture in Empowerment Technologies week 2.pptx
Gloria flores
Cyber wellness 2
Cyber safety tips
Christian Middle School Internet Safety
Internet Safety
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
Cyber safety
Lesson 2 rules of netiquette
Jonathan cullishpuma
EMPOWERMENT TECHNOLOGIES LESSON 2
Lesson 2 empowermentttttttttttttttt.pptx
Lesson 2 empowermentttttttttttttttt.pptx
Cyberbullying
Presentation to parents
Ad

Recently uploaded (20)

PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
Indian roads congress 037 - 2012 Flexible pavement
PPTX
Introduction to Building Materials
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
RMMM.pdf make it easy to upload and study
PDF
Trump Administration's workforce development strategy
PDF
IGGE1 Understanding the Self1234567891011
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PPTX
Lesson notes of climatology university.
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Indian roads congress 037 - 2012 Flexible pavement
Introduction to Building Materials
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Paper A Mock Exam 9_ Attempt review.pdf.
Unit 4 Skeletal System.ppt.pptxopresentatiom
History, Philosophy and sociology of education (1).pptx
Chinmaya Tiranga quiz Grand Finale.pdf
RMMM.pdf make it easy to upload and study
Trump Administration's workforce development strategy
IGGE1 Understanding the Self1234567891011
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
Lesson notes of climatology university.

Rules of Netiquette

  • 2. What is Netiquette? Netiquette is a made-up word from the words net and etiquette. Netiquette thus describes the rules of conduct for respectful and appropriate communication on the internet. Netiquette is often referred to as etiquette for the internet. These are not legally binding rules, but recommended rules of etiquette. Netiquette is mostly used for dealing with unknown people on the internet. The rules of netiquette very depending on the platform and its participants .
  • 3. Don't give out personal information such as your address or phone number. Don't send pictures of yourself to anyone, especially indecent pictures. Don't open emails or attachments from people you don't know. Some Golden Rules Don't become online 'friends' with people you don't know. Never arrange to meet someone in person who you've met online. If anything you see or read online worries you, tell someone about it.
  • 4. The internet offers you a lot of freedom and this can lead some people to behave in ways they would not behave in public. They might: say things on a status update / post/tweet they would never say face to face give out personal information about themselves or others (including photos) that they would normally keep private The Risk(Privacy)
  • 5. Cyber bullying can work in the same way as bullying in the playground: the victim feels frightened and alone, while the bully tries to hide from being caught. Comments, images and videos about a person can be posted online causing the victim to feel frightened and upset. It is even possible for cyber bullies to hack into the victim's personal accounts and harass them from within their own user profile. Often cyber bullies feel braver because they can't be seen, but it can be the most traceable form of bullying because there's evidence that it's happened. But because bullies think they can cover up their identity online sometimes people who wouldn't normally bully might do so online Cyber bullying
  • 6. Cyber stalking Harassment on the internet can be just as frightening as other forms of stalking. Women and girls are usually the victims of this kind of behavior. They might be harassed by an ex- boyfriend or girlfriend who is upset about the end of their relationship, for example. It can also begin when a purely online friendship turns sour. It can even begin entirely at random, by one online stranger towards another.
  • 7. Inappropriate content Beware of the sites you visit- the internet has many sites featuring sex, violence and drug abuse - and other illegal activities. Often anyone can access these sites, even when parental controls are in place. You could be encouraged to view them via content shared by others on social networking sites.
  • 8. Online Grooming Pedophiles have been known to use this method to contact young people by disguising themselves as another young person. This can lead to gaining the trust of an individual and their friends. These false relationships based on lies can often pave way for exposure to upsetting images and online content and in some cases arranging a meeting in person. Online grooming is the term used to describe inappropriate behavior towards a young person, putting them at risk to a sexual offence. Even if nothing dangerous does happen, knowing you may have had contact with somebody like this can be extremely upsetting.
  • 9. Making 'friends' We all know it's not healthy to spend hours and hours in front of a computer screen. But another problem with social networking is the pressure you can feel to make sure you have lots of 'friends'. But here are some things to remember: Friendships made online are made by clicking a button rather than taking to people and sharing experiences. Being online "friends" with someone is much less meaningful than face to face friendship. You can easily fall out with an online 'friend' because of a misunderstood comment. It is far easier, and healthier, to sort out arguments and problems when you can talk to someone face to face.
  • 10. Internet Threats: SPAM -unwanted email mostly from bots or advertisers. It can be used to send malware. Spam is usually considered to be electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited email. However, if a long- lost brother finds your email address and sends you a message, this could hardly be called spam, even though it is unsolicited. Real spam is generally email advertising for some product sent to a mailing list or newsgroup.
  • 11. PHISHING- Its goal is to acquire sensitive personal information like passwords and credit card details. The act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. Phishing email will typically direct the user to visit a website where they are asked to update personal information, such as a password, credit card, social security, or bank account numbers, that the legitimate organization already has. The website, however, is bogus and will capture and steal any information the user enters on the page.
  • 12. Malware - stands for malicious software Types: Virus, Worm, Trojan, Spyware, Adware A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are man- made. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt.
  • 13. Think Before You Click 1. Before you post something on the web, ask these questions to yourself: Would you want your parents or grandparents to see it? Would you want your future boss to see it? Once you post something on the web, you have no control of who sees your posts. 2. Your friends depend on you to protect their reputation online. Talk to your friends about this responsibility. serious 3. Set your post to "private." In this way, search engines will not be able to scan that post. 4. Avoid using names. Names are easy for search engines to scan. 5. If you feel that a post can affect you or other's reputation, ask the one who posted it to pull it down or report it as inappropriate.