SlideShare a Scribd company logo
1 of 20
Ethics In Cyberspace
Department Of Media & Communication Studies
Islamic International University Islamabad
Muhammad Faheem
MS II-398-FSS.MSMC/F18
Sir Ramzan Azhar
Media Ethics, Laws, Policies and Strategies in Pakistan
What are Ethics
• Understanding how your actions affect other people
• Taking personal responsibility for your actions
• “Ethics is about putting principles into action.
• Consistency between what we say and what our actions
say is a matter of integrity.”
Unethical vs Illegal
• What is unethical is not necessarily illegal.
• The definitions of “Right” and “Wrong” are not clear.
• Also, the distinction between what is illegal and what is
unethical is not always obvious
What do we mean by
CYBERETHICS ?
• Cyber ethics is the philosophic study of ethics pertaining
to computer networks, encompassing user behavior.
• what networked computers are programmed to do, and
how this affects individuals and society.
• Cyber-Ethics is the Ethics applied to the online
environment.
Concerned about Cyber
Ethics ?
• Anonymous posting to blogs, websites and social media can
encourage bad behavior anytime.
• Information in cyberspace can be accessed globally.
• what is right and wrong for Internet users can do
• Understand security, privacy issues, and major negative
impacts of IT on cyberspace.
• Computer Networks can be threatened by many internal and
external hazards internationally,
Why Cyber Ethics ?
• Cyber Ethics underpin actions that must be taken not
only to harness the power of the IT itself, but also to
survive its revolution so it should be the concern of
everyone.
Three main types of
Ethical issues
• Privacy
IT enables exchange of information on a large scale enables increased
potential for disclosing information and violating the privacy
• Access Right
The topic of computer security and access right has moved quickly
from being a low priority for corporations to high priority for government
agencies.
• Harmful Actions
Harm to any of users, the general public, employees, and employers .
Harmful actions include intentional destruction or modification of files
and programs leading to serious loss of resources or unnecessary
expenditure of human resources.
Acceptable Use Policy
• Disregard for technology or network rules and policies.
This could be willful or unintended disregard
Piracy
• Unauthorized duplication
and distribution of items
such as games, software,
DVDs, music, etc.
• End User License
Agreement Violation : When
you purchase a game or CD,
you are purchasing a license
to USE them; you do not
OWN them.
Plagiarism
• Using another person’s ideas, words, images, or original
works as your own without acknowledging the source.
Cyber-bullying
• "Cyber-bullying" is when a child or teen is tormented,
threatened, harassed, humiliated, embarrassed, or
otherwise targeted by another child or teen using the
Internet, interactive and digital technologies, or cell
phones.
Cyber-libel
• Deliberate misrepresentation of people or events.
• False statements that harm another’s reputation.
Worms and Viruses
• Malicious programs shared with the intent of affecting
the performance of a computer.
Violating Privacy
• Using another person’s password to access his or her
email or documents online, distributing private
information of or about another.
Cyber-stalking
• The use of the Internet, email, or other electronic
communications devices to stalk another person.
Ask Your Self
• Is it ok to display personal information about other on the
Internet ?
• Who owns digital data ( such as music, movies, books,
webpages etc.) and what should users be allowed to do
with it ?
• Who is allowed to access the data and information?
• How can we safeguards to ensure that the information
can be accessed only by the right person or
organizations?
The Rules of Ethical
Cyber Activity
• Basic Rule – Do not do something in cyber space that you
would consider wrong or illegal in everyday life
• Do not use rude or offensive language
• Do not be a bully on the Internet. Do not call peoples name,
lie about them, send embarrassing pictures of them, or
anything else to try to heart them.
• Don't encourage the cyber bullies. Do report cyber bullying.
• Do use internet for research and information but don't use
copyrighted information as your own.
The Rules of Ethical
Cyber Activity
• Do not break into someone else's computer.
• Do not attempt to infect or in any way try to make
someone else's computer unusable.
• Don't share personal information too easily.
• Do use the internet to expand your social and business
network but don't hamper other in doing so
Internet Safety
• Guard your privacy : What people know about you is up
to you.
• Protect your reputation: Self-reflect before you self-
reveal. What's funny or edgy today could cost you
tomorrow.
• Nothing is private online: Anything you say or do can be
copied, pasted and sent to billions of people without your
permission.
Internet Safety
• Assume everyone is watching: There is huge vast
audience out there. Someone you don't know also has
access to your information.
• Apply the golden rule: If you don't want it done to you,
then don't do it with someone else.
• Watch the clock : A virtual hug never matches a real one.
Balance your life.

More Related Content

What's hot

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 

What's hot (20)

Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 

Similar to Ethics in Cyber Space

Ethicsincyberspace (3)
Ethicsincyberspace (3)Ethicsincyberspace (3)
Ethicsincyberspace (3)
Maria Obaidi
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
CatherineBagaan
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
Zephyrum
 

Similar to Ethics in Cyber Space (20)

ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Respect%20 yourself/Respect Others
Respect%20 yourself/Respect OthersRespect%20 yourself/Respect Others
Respect%20 yourself/Respect Others
 
Guideline about responsible use of social networks
Guideline about responsible use of social networksGuideline about responsible use of social networks
Guideline about responsible use of social networks
 
7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej
 
7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw
 
COMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptxCOMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptx
 
Cyber citizenship imen tekaya
Cyber citizenship imen tekayaCyber citizenship imen tekaya
Cyber citizenship imen tekaya
 
Ethicsincyberspace (3)
Ethicsincyberspace (3)Ethicsincyberspace (3)
Ethicsincyberspace (3)
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
 
Digital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptxDigital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptx
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Privacy and safety
Privacy and safetyPrivacy and safety
Privacy and safety
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 

More from Muhammad Rawaha Saleem

More from Muhammad Rawaha Saleem (20)

Basic functions of light in film production | Film Academy
Basic functions of light in film production | Film AcademyBasic functions of light in film production | Film Academy
Basic functions of light in film production | Film Academy
 
Sound Effects in Film Production | Film Academy
Sound Effects in Film Production | Film AcademySound Effects in Film Production | Film Academy
Sound Effects in Film Production | Film Academy
 
Types of Cameras used in Film Production | Film Academy
Types of Cameras used in Film Production | Film AcademyTypes of Cameras used in Film Production | Film Academy
Types of Cameras used in Film Production | Film Academy
 
Casting Crew - Job Descriptions | Film Production
Casting Crew - Job Descriptions | Film ProductionCasting Crew - Job Descriptions | Film Production
Casting Crew - Job Descriptions | Film Production
 
Cinematography | Film Production
Cinematography | Film ProductionCinematography | Film Production
Cinematography | Film Production
 
Screenplay Format | Film Production
Screenplay Format | Film ProductionScreenplay Format | Film Production
Screenplay Format | Film Production
 
Portrayal of Islam on Media
Portrayal of Islam on MediaPortrayal of Islam on Media
Portrayal of Islam on Media
 
Pakistan Telecommunication (PTA) Act 1996
Pakistan Telecommunication (PTA) Act 1996Pakistan Telecommunication (PTA) Act 1996
Pakistan Telecommunication (PTA) Act 1996
 
Press Council of Pakistan Ordinance 2002 and its Code of Ethics
Press Council of Pakistan Ordinance 2002 and its Code of EthicsPress Council of Pakistan Ordinance 2002 and its Code of Ethics
Press Council of Pakistan Ordinance 2002 and its Code of Ethics
 
Constitution, Mission and Code of Practice of Press Institute of Pakistan (PI...
Constitution, Mission and Code of Practice of Press Institute of Pakistan (PI...Constitution, Mission and Code of Practice of Press Institute of Pakistan (PI...
Constitution, Mission and Code of Practice of Press Institute of Pakistan (PI...
 
Constitution, Mission and Code of Practice of Pakistan Federal Union of Journ...
Constitution, Mission and Code of Practice of Pakistan Federal Union of Journ...Constitution, Mission and Code of Practice of Pakistan Federal Union of Journ...
Constitution, Mission and Code of Practice of Pakistan Federal Union of Journ...
 
PEMRA's Broadcasting Regulations and Code of Conduct for Broadcasters
PEMRA's Broadcasting Regulations and Code of Conduct for BroadcastersPEMRA's Broadcasting Regulations and Code of Conduct for Broadcasters
PEMRA's Broadcasting Regulations and Code of Conduct for Broadcasters
 
Pakistan broadcasting corporation Act 1973 & Pakistan Television Act
Pakistan broadcasting corporation Act 1973 & Pakistan Television ActPakistan broadcasting corporation Act 1973 & Pakistan Television Act
Pakistan broadcasting corporation Act 1973 & Pakistan Television Act
 
Intellectual Property Organization Ordinance 2007, Copy Rights Ordinance 1962...
Intellectual Property Organization Ordinance 2007, Copy Rights Ordinance 1962...Intellectual Property Organization Ordinance 2007, Copy Rights Ordinance 1962...
Intellectual Property Organization Ordinance 2007, Copy Rights Ordinance 1962...
 
Defamation Ordinance 2002 and Contempt of Court Act 1976
Defamation Ordinance 2002 and Contempt of Court Act 1976Defamation Ordinance 2002 and Contempt of Court Act 1976
Defamation Ordinance 2002 and Contempt of Court Act 1976
 
Censorship of Films Rules 1979 and Code of Censorship of Films
Censorship of Films Rules 1979 and Code of Censorship of FilmsCensorship of Films Rules 1979 and Code of Censorship of Films
Censorship of Films Rules 1979 and Code of Censorship of Films
 
Associated Press of Pakistan Corporation Act & National Press Trust Ordinance
Associated Press of Pakistan Corporation Act & National Press Trust OrdinanceAssociated Press of Pakistan Corporation Act & National Press Trust Ordinance
Associated Press of Pakistan Corporation Act & National Press Trust Ordinance
 
Comparative Analysis of Game Shows in Ethical Perspective
Comparative Analysis of Game Shows in Ethical PerspectiveComparative Analysis of Game Shows in Ethical Perspective
Comparative Analysis of Game Shows in Ethical Perspective
 
Strategic Plan of Action for a health based TV Program in the Light of Ethics
Strategic Plan of Action for a health based TV Program in the Light of EthicsStrategic Plan of Action for a health based TV Program in the Light of Ethics
Strategic Plan of Action for a health based TV Program in the Light of Ethics
 
Self Regulation and Code of Conduct
Self Regulation and Code of ConductSelf Regulation and Code of Conduct
Self Regulation and Code of Conduct
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Recently uploaded (20)

Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Ethics in Cyber Space

  • 1. Ethics In Cyberspace Department Of Media & Communication Studies Islamic International University Islamabad Muhammad Faheem MS II-398-FSS.MSMC/F18 Sir Ramzan Azhar Media Ethics, Laws, Policies and Strategies in Pakistan
  • 2. What are Ethics • Understanding how your actions affect other people • Taking personal responsibility for your actions • “Ethics is about putting principles into action. • Consistency between what we say and what our actions say is a matter of integrity.”
  • 3. Unethical vs Illegal • What is unethical is not necessarily illegal. • The definitions of “Right” and “Wrong” are not clear. • Also, the distinction between what is illegal and what is unethical is not always obvious
  • 4. What do we mean by CYBERETHICS ? • Cyber ethics is the philosophic study of ethics pertaining to computer networks, encompassing user behavior. • what networked computers are programmed to do, and how this affects individuals and society. • Cyber-Ethics is the Ethics applied to the online environment.
  • 5. Concerned about Cyber Ethics ? • Anonymous posting to blogs, websites and social media can encourage bad behavior anytime. • Information in cyberspace can be accessed globally. • what is right and wrong for Internet users can do • Understand security, privacy issues, and major negative impacts of IT on cyberspace. • Computer Networks can be threatened by many internal and external hazards internationally,
  • 6. Why Cyber Ethics ? • Cyber Ethics underpin actions that must be taken not only to harness the power of the IT itself, but also to survive its revolution so it should be the concern of everyone.
  • 7. Three main types of Ethical issues • Privacy IT enables exchange of information on a large scale enables increased potential for disclosing information and violating the privacy • Access Right The topic of computer security and access right has moved quickly from being a low priority for corporations to high priority for government agencies. • Harmful Actions Harm to any of users, the general public, employees, and employers . Harmful actions include intentional destruction or modification of files and programs leading to serious loss of resources or unnecessary expenditure of human resources.
  • 8. Acceptable Use Policy • Disregard for technology or network rules and policies. This could be willful or unintended disregard
  • 9. Piracy • Unauthorized duplication and distribution of items such as games, software, DVDs, music, etc. • End User License Agreement Violation : When you purchase a game or CD, you are purchasing a license to USE them; you do not OWN them.
  • 10. Plagiarism • Using another person’s ideas, words, images, or original works as your own without acknowledging the source.
  • 11. Cyber-bullying • "Cyber-bullying" is when a child or teen is tormented, threatened, harassed, humiliated, embarrassed, or otherwise targeted by another child or teen using the Internet, interactive and digital technologies, or cell phones.
  • 12. Cyber-libel • Deliberate misrepresentation of people or events. • False statements that harm another’s reputation.
  • 13. Worms and Viruses • Malicious programs shared with the intent of affecting the performance of a computer.
  • 14. Violating Privacy • Using another person’s password to access his or her email or documents online, distributing private information of or about another.
  • 15. Cyber-stalking • The use of the Internet, email, or other electronic communications devices to stalk another person.
  • 16. Ask Your Self • Is it ok to display personal information about other on the Internet ? • Who owns digital data ( such as music, movies, books, webpages etc.) and what should users be allowed to do with it ? • Who is allowed to access the data and information? • How can we safeguards to ensure that the information can be accessed only by the right person or organizations?
  • 17. The Rules of Ethical Cyber Activity • Basic Rule – Do not do something in cyber space that you would consider wrong or illegal in everyday life • Do not use rude or offensive language • Do not be a bully on the Internet. Do not call peoples name, lie about them, send embarrassing pictures of them, or anything else to try to heart them. • Don't encourage the cyber bullies. Do report cyber bullying. • Do use internet for research and information but don't use copyrighted information as your own.
  • 18. The Rules of Ethical Cyber Activity • Do not break into someone else's computer. • Do not attempt to infect or in any way try to make someone else's computer unusable. • Don't share personal information too easily. • Do use the internet to expand your social and business network but don't hamper other in doing so
  • 19. Internet Safety • Guard your privacy : What people know about you is up to you. • Protect your reputation: Self-reflect before you self- reveal. What's funny or edgy today could cost you tomorrow. • Nothing is private online: Anything you say or do can be copied, pasted and sent to billions of people without your permission.
  • 20. Internet Safety • Assume everyone is watching: There is huge vast audience out there. Someone you don't know also has access to your information. • Apply the golden rule: If you don't want it done to you, then don't do it with someone else. • Watch the clock : A virtual hug never matches a real one. Balance your life.