SlideShare une entreprise Scribd logo
1  sur  33
WHAT’S THAT?
NETIQUETTE
NET ETIQUETTEE or
INTERNET ETIQUETTE– IS A
SET OF SOCIAL
CONVENTIONS (RULES OF
CONDUCT AND BEHAVIOR)
THAT FACILITATE
INTERACTIONS
(communication) BETWEEN
PEOPLE OVER NETWORKS.
(IE: EMAIL, BLOGS,
FORUMS)
1) Spell check and proof                 6) Don’t follow spam
read everything                          links
2) Do not use all caps, it’s             7) Be conservative in
shouting                                 email you send
3) Tell the truth online                 8) Do not send email
and in your profiles                     msgs late @ night
4) Don’t do things you                   9) Shop secure sites (TSL,
wouldn’t do in reality                   SSL)
5) Don’t flame or                        10) Use discretion when
respond                                  sharing online

                                 Source:
                   networketiquette.net/core_rules.html
   KEEP MESSAGES SHORT & TO THE POINT
   USE ACCURATE SUBJECT LINES
   STICK TO THE TOPIC
   REMEMBER, TONE DOESN’T TRANSLATE
    WELL, USE EMOTICONS ()TO HELP
    CLARIFY YOUR TONE OR EMOTIONAL
    FRAME OF MIND
  PERSONAL EMAIL
      BUSINESS EMAIL

   STUDENT NETIQUETTE

   TEACHER NETIQUETTE

 ONLINE CLASS ETIQUETTE

   COLLEGE NETIQUETTE
   DON’T SHARE OTHERS ADDRESSES
   SEND IT IN PLAIN TEXT
   ASK BEFORE FORWARDING
   EMAIL IS NOT IMMEDIATE
   CHECK YOUR EMAIL REGULARLY
   ASK FOR CLARIFICATION
   DON’T ASSUME ANYTHING
   USE AN EMAIL SIGNATURE

             Networketiquette.net/personal_email.h
                              tml
   Follow company culture
   Work email belongs to work
   Use the out of office reply
   Always sign your messages
   Don’t spam
   Use proper salutations
   Use blue or black font, not red
   Check your email regularly
   Scan your inbox before replying
                 networketiquette.net/professional_email.html
   Give people a chance to respond
   Reminders are acceptable
   Acknowledge receipt
   Do not email jokes
   Don’t go above your supervisor
   Make your department look good




                networketiquette.net/professional_email.html
   1) Ask permission

   2) Use good conduct

   3) Appropriate content

   4) Don’t use your name

   5) Keep your address private
                                Source:
                  networketiquette.net/studentk12.html
   6) Don’t reveal your number

   7) No chat rooms

   8) School work only

   9) Report bullies

   10) Ask to email
                                Source:
                  networketiquette.net/studentk12.html
   Don’t access other students files
   Don’t use another students login
   Don’t bring in media from outside the
    classroom (i.e. Cd’s floppy disks, or other
    removable drive/memory device)
   Students also should not teach their classmates
    what they know about the internet



                               Source:
                 networketiquette.net/studentk12.html
   1) Always monitor students

   2) Ensure age appropriate activity

   3) Balance online activity

   4) Zero tolerance for cyber bullies

   5) Filter search engines
                                 Source:
                  networketiquette.net/teachersk12.html
   6) Listen to students

   7) Partner with parents

   8) Don’t post student pictures

   9) Moderate all interaction

   10) Display your internet rues
                                 Source:
                  networketiquette.net/teachersk12.html
   Show students how to use the internet
   Conduct a lesson on search engines for
    educational purposes
   Expose students to new places and cultures,
    illustrating the educational possibilities of the
    internet
   Awareness of cyber bullying should be taught
    before students move on to middle school


                                 Source:
                  networketiquette.net/teachersk12.html
   1) Do your homework

   2) Participate in discussions

   3) Be friendly

   4) Do not digitally disrupt

   5) Site credible sources
                     Networketiquette.net/ecourse.html
   6) Do not plagiarize

   7) Use emoticons

   8) It’s a public domain

   9) Share your knowledge

   10) Don’t be judgmental
                  Networketiquette.net/ecourse.html
   1) Respect opinions

   2) Watch your tone

   3) Avoid sarcasm

   4) Post appropriate material

   5) Stay on topic
                               Source:
                   networketiquette.net/college.html
   6) Contribute frequently

   7) Be forgiving/understanding

   8) Don’t post jokes

   9) Be culturally sensitive

   10) Respect privacy
                               Source:
                   networketiquette.net/colloge.html
   Your email identifies you as a student, as such
    when sending email remember you represent
    your college
   Email between students is generally informal –
    this is not an excuse, however for being mean,
    being a bully or negative in other ways
   When emailing professors use proper
    salutations, if your professor is a doctor
    address him/her as one. Close your email with
    your name, school, class and phone number
                              Source:
                  networketiquette.net/college.html
   FLAMING – The act of posting or sending
    offensive messages over the internet through
    forums, newsgroups, email or instant
    messaging. Flaming occurs when people
    express their views or emotions without
    holding anything back
   SPAM – Spam is the use of electronic
    messaging systems (including most broadcast
    media, digital delivery systems) to send
    unsolicited bulk messages indiscriminately
 DON’TVENT YOUR
 FRUSTRATIONS ON
FACEBOOK OR OTHER
BLOGS, CHAT ROOMS
       ETC!!!
   NEWARK, N.J. (AP) — A New Jersey administrative law judge
    has ruled that a first-grade teacher who wrote that she was a
    "warden for future criminals" on Facebook earlier this year should
    lose her tenured job.
   The state education commissioner now has 45 days to accept,
    reject or modify the decision regarding Jennifer O'Brien.
   The Paterson teacher posted her remark to 333 friends on March
    28. But it was forwarded and several parents saw it.
   O'Brien's lawyer, Nancy Oxfeld, tells The Record newspaper
    (http://bit.ly/v8ERLR) that her client will appeal the ruling,
    which was made public Tuesday. O'Brien had testified that she
    wrote the post in exasperation because several students kept
    disrupting her lessons and one boy had recently hit her.
   But the judge called O'Brien's conduct "inexcusable."
   http://news.yahoo.com/judge-facebook-post-
    cost-job-nj-teacher-
    010230579.html?bouchon=501,ny
   http://en.wikipedia.org/wiki/Spam_(electron
    ic)
   http://www.networketiquette.net
   http://www.techterms.com/definition/flamin
    g
By:
Matt Lanzoni
   Privacy in the classroom is ensuring the rights
    and information of students is not
    compromised.
   This can include personal information about
    the student regarding their residence, family,
    and/or educational records.
   The Family Educational Rights and Privacy Act
    (FEPRA), 1974, mandates that schools must
    have either the student’s (they are 18) or their
    parents (if the student is not 18) permission
    prior to the disclosure of that student’s
    education records. This includes:
         Discussion of the student’s behavior or grades with anyone
          other than the student.
         School work with a grade posted on a bulletin board
   Do not post personal information about
    students online, whether it is your professional
    website displaying student work or the
    school’s website.
   Do not give out personal information or
    education records to anyone without the
    consent of the student or their parent/guardian
    as well as notifying the school administration
    about the release of the information.
   Most schools use a student login and password
    in order to log on to and use a school
    computer.
   Passwords should be longer than 6 characters
    and include both upper-case and lower-case
    numbers as well as numbers.
   Passwords should be changed often, especially
    if any nefarious activity is suspected.
   Make sure students log out of the computers
    when they are done using them.
   With the increased use of Facebook and other
    social networking sites, it is important that
    students utilize safety precautions online as
    well.
   Remind students not to post personal
    information online as well as make their profile
    private so only their friends can view their
    information
   Once you put information online, it is out there
    and can be accessed or saved by anyone for any
    reason they want to.
   Many teachers are now creating blogs or
    websites that their students can log into post
    questions or topics of discussion.
   If you intend to do this, you must be sure that:
         In order to create an account, the site
          creator/administrator/manager (usually the teacher) has
          to authorize and allow it
         Students do not need to give too much personal
          information such as their home address or any phone
          number.
         You continually monitor the site to make sure that the site
          is being properly used and that there are no breaches in the
          privacy of the site.
   More and more emphasis is being placed on
    student privacy and safety.
   Make sure to monitor student use of the
    computer to make sure they are not using it
    improperly.
   If a student’s information is obtained from a
    school’s website or from a school a school
    computer, it will ultimately fall on the school or
    even the teacher.
   To protect yourself and your job, make sure
    your students information is protected.
   Astuto, Angela, et al. "Cyberethics: social ethics teaching in educational
       technology programs." Communication Research Trends 24.4 (2005): 3+.
       Academic OneFile. Web. 28 Nov. 2011.
   Berson, Ilene R., and Michael J. Berson. "Privileges, privacy, and
       protection of youth bloggers in the social studies classroom." Social
       Education 70.3 (2006): 124+. Academic OneFile. Web. 20 Nov. 2011.
   Dyrli, Odvard Egil. "Unwelcome visitors: spyware threatens privacy and
       wastes district technology resources. (The Online Edge)." District
       Administration July 2003: 49. Academic OneFile. Web. 20 Nov. 2011.
   Harris, F. (2010). Teens and privacy: Myths and realities. Knowledge
       Quest, 39(1), 74-79.
   Langendefer, J., & Miyazaki, A. (2009). Privacy in the information
       economy. The Journal of Consumer Affairs, 43(3), 380-388.
   Youn, S. (2009). Determinants of online privacy concern and its influence
       on privacy protection behaviors among young adolescents. The Journal
       of Consumer Affairs, 43(3), 389-418.
   1. What are three teacher netiquette rules?
   2. What are three student netiquette rules?
   3. What is flaming?
   4. What constitutes a strong password?
   5. What federal act guarantees a student’s
    privacy concerning their academic record?
   6. What can you do as a teacher to ensure that
    properly use the school’s computers and that
    their information is safe?

Contenu connexe

Tendances

E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08E Robertson
 
Module 2 lesson 2
Module 2 lesson 2Module 2 lesson 2
Module 2 lesson 2Ira Sagu
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetykirshee
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019KanelandSvihlik
 
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?""Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"DefinetheLine at McGill
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018KanelandSvihlik
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010adewolfe
 
Social networking for schools
Social networking for schoolsSocial networking for schools
Social networking for schoolsPaul Chamberlain
 
Internet Safety Program for Parents
Internet Safety Program for ParentsInternet Safety Program for Parents
Internet Safety Program for ParentsJamie Tubbs
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital CitizenshipKati W
 
Draft summary of lessons
Draft summary of lessonsDraft summary of lessons
Draft summary of lessonsJon Synnott
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017KanelandSvihlik
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016KanelandSvihlik
 
Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethicallyLinda Long
 

Tendances (19)

E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Internet Safety for Educators
Internet Safety for EducatorsInternet Safety for Educators
Internet Safety for Educators
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
Module 2 lesson 2
Module 2 lesson 2Module 2 lesson 2
Module 2 lesson 2
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
 
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?""Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
 
Social networking for schools
Social networking for schoolsSocial networking for schools
Social networking for schools
 
Internet Safety Program for Parents
Internet Safety Program for ParentsInternet Safety Program for Parents
Internet Safety Program for Parents
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Draft summary of lessons
Draft summary of lessonsDraft summary of lessons
Draft summary of lessons
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
 
Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethically
 

En vedette

En vedette (7)

Orals
OralsOrals
Orals
 
Interpersonal skills
Interpersonal skillsInterpersonal skills
Interpersonal skills
 
Interpersonal skills
Interpersonal skillsInterpersonal skills
Interpersonal skills
 
Interpersonal skills
Interpersonal skillsInterpersonal skills
Interpersonal skills
 
Workplace etiquette & manners
Workplace etiquette & mannersWorkplace etiquette & manners
Workplace etiquette & manners
 
Workplace Ethics PowerPoint Presentation
Workplace Ethics PowerPoint PresentationWorkplace Ethics PowerPoint Presentation
Workplace Ethics PowerPoint Presentation
 
Business etiquette
Business etiquette Business etiquette
Business etiquette
 

Similaire à Hot topic

Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07E Robertson
 
Parent training keynote_v3
Parent training keynote_v3Parent training keynote_v3
Parent training keynote_v3bweinert
 
Social Networking Safety
Social Networking SafetySocial Networking Safety
Social Networking SafetyJEM JEM
 
Kerrifredafacebookworkshoppresentationmay2009
Kerrifredafacebookworkshoppresentationmay2009Kerrifredafacebookworkshoppresentationmay2009
Kerrifredafacebookworkshoppresentationmay2009guest276100
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfBryanSmile
 
How good are your internet manners proj. slideshare project this one
How good are your internet manners proj. slideshare project this oneHow good are your internet manners proj. slideshare project this one
How good are your internet manners proj. slideshare project this oneXxxCelesteTxxX
 
How good are your internet manners proj. slideshare project this one
How good are your internet manners proj. slideshare project this oneHow good are your internet manners proj. slideshare project this one
How good are your internet manners proj. slideshare project this oneXxxCelesteTxxX
 
Internet 1 lesson plan
Internet 1 lesson planInternet 1 lesson plan
Internet 1 lesson planQuennith
 
Tec207 -final presentation
Tec207 -final presentationTec207 -final presentation
Tec207 -final presentationSarah Sell
 
Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1Quennith
 
How good are your internet manners proj. slideshare project this one
How good are your internet manners proj. slideshare project this oneHow good are your internet manners proj. slideshare project this one
How good are your internet manners proj. slideshare project this oneXxxCelesteTxxX
 

Similaire à Hot topic (20)

Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Parent training keynote_v3
Parent training keynote_v3Parent training keynote_v3
Parent training keynote_v3
 
Social Networking Safety
Social Networking SafetySocial Networking Safety
Social Networking Safety
 
Kerrifredafacebookworkshoppresentationmay2009
Kerrifredafacebookworkshoppresentationmay2009Kerrifredafacebookworkshoppresentationmay2009
Kerrifredafacebookworkshoppresentationmay2009
 
Netiquettes
NetiquettesNetiquettes
Netiquettes
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
 
Internet manners
Internet mannersInternet manners
Internet manners
 
Internet manners
Internet mannersInternet manners
Internet manners
 
How good are your internet manners proj. slideshare project this one
How good are your internet manners proj. slideshare project this oneHow good are your internet manners proj. slideshare project this one
How good are your internet manners proj. slideshare project this one
 
Internet manners
Internet mannersInternet manners
Internet manners
 
Internet Manners
Internet MannersInternet Manners
Internet Manners
 
How good are your internet manners proj. slideshare project this one
How good are your internet manners proj. slideshare project this oneHow good are your internet manners proj. slideshare project this one
How good are your internet manners proj. slideshare project this one
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Internet 1 lesson plan
Internet 1 lesson planInternet 1 lesson plan
Internet 1 lesson plan
 
Tec207 -final presentation
Tec207 -final presentationTec207 -final presentation
Tec207 -final presentation
 
Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1
 
How good are your internet manners proj. slideshare project this one
How good are your internet manners proj. slideshare project this oneHow good are your internet manners proj. slideshare project this one
How good are your internet manners proj. slideshare project this one
 
Internet manners
Internet mannersInternet manners
Internet manners
 
Internet manners
Internet mannersInternet manners
Internet manners
 
Internet manners
Internet mannersInternet manners
Internet manners
 

Hot topic

  • 2. NETIQUETTE NET ETIQUETTEE or INTERNET ETIQUETTE– IS A SET OF SOCIAL CONVENTIONS (RULES OF CONDUCT AND BEHAVIOR) THAT FACILITATE INTERACTIONS (communication) BETWEEN PEOPLE OVER NETWORKS. (IE: EMAIL, BLOGS, FORUMS)
  • 3. 1) Spell check and proof 6) Don’t follow spam read everything links 2) Do not use all caps, it’s 7) Be conservative in shouting email you send 3) Tell the truth online 8) Do not send email and in your profiles msgs late @ night 4) Don’t do things you 9) Shop secure sites (TSL, wouldn’t do in reality SSL) 5) Don’t flame or 10) Use discretion when respond sharing online Source: networketiquette.net/core_rules.html
  • 4. KEEP MESSAGES SHORT & TO THE POINT  USE ACCURATE SUBJECT LINES  STICK TO THE TOPIC  REMEMBER, TONE DOESN’T TRANSLATE WELL, USE EMOTICONS ()TO HELP CLARIFY YOUR TONE OR EMOTIONAL FRAME OF MIND
  • 5.  PERSONAL EMAIL  BUSINESS EMAIL  STUDENT NETIQUETTE  TEACHER NETIQUETTE  ONLINE CLASS ETIQUETTE  COLLEGE NETIQUETTE
  • 6. DON’T SHARE OTHERS ADDRESSES  SEND IT IN PLAIN TEXT  ASK BEFORE FORWARDING  EMAIL IS NOT IMMEDIATE  CHECK YOUR EMAIL REGULARLY  ASK FOR CLARIFICATION  DON’T ASSUME ANYTHING  USE AN EMAIL SIGNATURE Networketiquette.net/personal_email.h tml
  • 7. Follow company culture  Work email belongs to work  Use the out of office reply  Always sign your messages  Don’t spam  Use proper salutations  Use blue or black font, not red  Check your email regularly  Scan your inbox before replying networketiquette.net/professional_email.html
  • 8. Give people a chance to respond  Reminders are acceptable  Acknowledge receipt  Do not email jokes  Don’t go above your supervisor  Make your department look good networketiquette.net/professional_email.html
  • 9. 1) Ask permission  2) Use good conduct  3) Appropriate content  4) Don’t use your name  5) Keep your address private Source: networketiquette.net/studentk12.html
  • 10. 6) Don’t reveal your number  7) No chat rooms  8) School work only  9) Report bullies  10) Ask to email Source: networketiquette.net/studentk12.html
  • 11. Don’t access other students files  Don’t use another students login  Don’t bring in media from outside the classroom (i.e. Cd’s floppy disks, or other removable drive/memory device)  Students also should not teach their classmates what they know about the internet Source: networketiquette.net/studentk12.html
  • 12. 1) Always monitor students  2) Ensure age appropriate activity  3) Balance online activity  4) Zero tolerance for cyber bullies  5) Filter search engines Source: networketiquette.net/teachersk12.html
  • 13. 6) Listen to students  7) Partner with parents  8) Don’t post student pictures  9) Moderate all interaction  10) Display your internet rues Source: networketiquette.net/teachersk12.html
  • 14. Show students how to use the internet  Conduct a lesson on search engines for educational purposes  Expose students to new places and cultures, illustrating the educational possibilities of the internet  Awareness of cyber bullying should be taught before students move on to middle school Source: networketiquette.net/teachersk12.html
  • 15. 1) Do your homework  2) Participate in discussions  3) Be friendly  4) Do not digitally disrupt  5) Site credible sources Networketiquette.net/ecourse.html
  • 16. 6) Do not plagiarize  7) Use emoticons  8) It’s a public domain  9) Share your knowledge  10) Don’t be judgmental Networketiquette.net/ecourse.html
  • 17. 1) Respect opinions  2) Watch your tone  3) Avoid sarcasm  4) Post appropriate material  5) Stay on topic Source: networketiquette.net/college.html
  • 18. 6) Contribute frequently  7) Be forgiving/understanding  8) Don’t post jokes  9) Be culturally sensitive  10) Respect privacy Source: networketiquette.net/colloge.html
  • 19. Your email identifies you as a student, as such when sending email remember you represent your college  Email between students is generally informal – this is not an excuse, however for being mean, being a bully or negative in other ways  When emailing professors use proper salutations, if your professor is a doctor address him/her as one. Close your email with your name, school, class and phone number Source: networketiquette.net/college.html
  • 20. FLAMING – The act of posting or sending offensive messages over the internet through forums, newsgroups, email or instant messaging. Flaming occurs when people express their views or emotions without holding anything back  SPAM – Spam is the use of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately
  • 21.  DON’TVENT YOUR FRUSTRATIONS ON FACEBOOK OR OTHER BLOGS, CHAT ROOMS ETC!!!
  • 22. NEWARK, N.J. (AP) — A New Jersey administrative law judge has ruled that a first-grade teacher who wrote that she was a "warden for future criminals" on Facebook earlier this year should lose her tenured job.  The state education commissioner now has 45 days to accept, reject or modify the decision regarding Jennifer O'Brien.  The Paterson teacher posted her remark to 333 friends on March 28. But it was forwarded and several parents saw it.  O'Brien's lawyer, Nancy Oxfeld, tells The Record newspaper (http://bit.ly/v8ERLR) that her client will appeal the ruling, which was made public Tuesday. O'Brien had testified that she wrote the post in exasperation because several students kept disrupting her lessons and one boy had recently hit her.  But the judge called O'Brien's conduct "inexcusable."
  • 23. http://news.yahoo.com/judge-facebook-post- cost-job-nj-teacher- 010230579.html?bouchon=501,ny  http://en.wikipedia.org/wiki/Spam_(electron ic)  http://www.networketiquette.net  http://www.techterms.com/definition/flamin g
  • 25. Privacy in the classroom is ensuring the rights and information of students is not compromised.  This can include personal information about the student regarding their residence, family, and/or educational records.
  • 26. The Family Educational Rights and Privacy Act (FEPRA), 1974, mandates that schools must have either the student’s (they are 18) or their parents (if the student is not 18) permission prior to the disclosure of that student’s education records. This includes:  Discussion of the student’s behavior or grades with anyone other than the student.  School work with a grade posted on a bulletin board
  • 27. Do not post personal information about students online, whether it is your professional website displaying student work or the school’s website.  Do not give out personal information or education records to anyone without the consent of the student or their parent/guardian as well as notifying the school administration about the release of the information.
  • 28. Most schools use a student login and password in order to log on to and use a school computer.  Passwords should be longer than 6 characters and include both upper-case and lower-case numbers as well as numbers.  Passwords should be changed often, especially if any nefarious activity is suspected.  Make sure students log out of the computers when they are done using them.
  • 29. With the increased use of Facebook and other social networking sites, it is important that students utilize safety precautions online as well.  Remind students not to post personal information online as well as make their profile private so only their friends can view their information  Once you put information online, it is out there and can be accessed or saved by anyone for any reason they want to.
  • 30. Many teachers are now creating blogs or websites that their students can log into post questions or topics of discussion.  If you intend to do this, you must be sure that:  In order to create an account, the site creator/administrator/manager (usually the teacher) has to authorize and allow it  Students do not need to give too much personal information such as their home address or any phone number.  You continually monitor the site to make sure that the site is being properly used and that there are no breaches in the privacy of the site.
  • 31. More and more emphasis is being placed on student privacy and safety.  Make sure to monitor student use of the computer to make sure they are not using it improperly.  If a student’s information is obtained from a school’s website or from a school a school computer, it will ultimately fall on the school or even the teacher.  To protect yourself and your job, make sure your students information is protected.
  • 32. Astuto, Angela, et al. "Cyberethics: social ethics teaching in educational technology programs." Communication Research Trends 24.4 (2005): 3+. Academic OneFile. Web. 28 Nov. 2011.  Berson, Ilene R., and Michael J. Berson. "Privileges, privacy, and protection of youth bloggers in the social studies classroom." Social Education 70.3 (2006): 124+. Academic OneFile. Web. 20 Nov. 2011.  Dyrli, Odvard Egil. "Unwelcome visitors: spyware threatens privacy and wastes district technology resources. (The Online Edge)." District Administration July 2003: 49. Academic OneFile. Web. 20 Nov. 2011.  Harris, F. (2010). Teens and privacy: Myths and realities. Knowledge Quest, 39(1), 74-79.  Langendefer, J., & Miyazaki, A. (2009). Privacy in the information economy. The Journal of Consumer Affairs, 43(3), 380-388.  Youn, S. (2009). Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. The Journal of Consumer Affairs, 43(3), 389-418.
  • 33. 1. What are three teacher netiquette rules?  2. What are three student netiquette rules?  3. What is flaming?  4. What constitutes a strong password?  5. What federal act guarantees a student’s privacy concerning their academic record?  6. What can you do as a teacher to ensure that properly use the school’s computers and that their information is safe?