collinso_Digital Citizenship Project

Ollie Collins
ED 505
Netiquette on Social Media
 Netiquette is the etiquette guideline for appropriate
behavior when using the internet.
 The dos and don’ts of netiquette include:
 Respect other people’s feelings.
 Respect others’ privacy.
 Use appropriate language.
 Use good grammar and spelling.
 Do not type sentences in all capital letters.
 Do not forward spam.
 Do not plagiarize.
Copyright and Fair Use
 A copyright is the set of exclusive legal rights authors
have over their works for a limited period of time.
 Fair use provisions of the copyright law allow for
limited copying or distribution of published works
without the author's permission in some cases.
Copyright and Fair Use
What you can do
The Fine Print
Printed Material (Short)
• Poem less than 250 words;
250-word excerpt of poem
greater than 250 words
• Articles, stories, or essays less
than 2,500 words
• Excerpt from a longer work
(10 percent of work or 1,000
words, whichever is less)
• One chart, picture, diagram,
or cartoon per book or per
periodical issue
• Two pages (maximum) from
an illustrated work less than
2,500 words,
• Teachers may make multiple
copies for classroom use, and
incorporate into multimedia
for teaching classes.
• Students may incorporate text
into multimedia projects.
Copies may be made only from
legally acquired originals.
• Only one copy allowed per
• Teachers may make copies in
nine instances per class per
• Usage must be “at the
instance and inspiration of a
single teacher,” i.e., not a
directive from the district.
• Don’t create anthologies.
• “Consumables,” such as
workbooks, may not be copied.
• Broadcast (e.g., ABC, NBC,
CBS,UPN, PBS, and local
• Cable (e.g., CNN,MTV, HBO)
• Videotapes made of broadcast
and cable TV programs
• Broadcasts or tapes made
from broadcast may be used for
• Cable channel programs may
be used with permission. Many
programs may be retained by
teachers for years—see Cable in
the Classroom
( for
• Schools are allowed to retain
broadcast tapes for a minimum
of 10 school days.
(Enlightened rights holders,
such as PBS’s Reading Rainbow,
allow for much more.)
• Cable programs are
technically not covered by the
same guidelines as broadcast
Copyright and Fair Use
What you can do
The Fine Print
(for integration into
multimedia or video
• Records
• Cassette tapes
• CDs
• Audio clips on the Web
•Up to 10 percent of a copyright
musical composition may be
reproduced, performed, and
displayed as part of a
•multimedia program produced
by an educator or students.
•A maximum of 30 seconds per
musical composition may be
• Multimedia program must
have an educational purpose.
(for integration into
multimedia or video
• Videotapes
• DVDs
• Laserdiscs
• Multimedia encyclopedias
• QuickTime Movies
• Video clips from the Internet
• Students “may use portions of
lawfully acquired copyright
works in their academic
multimedia,” defined as 10
•percent or three minutes
(whichever is less) of “motion
•The material must be
legitimately acquired (a legal
copy, not bootleg or home
• Copyright works included in
multimedia projects must give
proper attribution to copyright
and Photographs
• Photograph
• Illustration
• Collections of photographs
• Collections of illustrations
•Single works may be used in
their entirety, but no more
than five images by a single
•artist or photographer may be
• From a collection, not more
than 15 images or 10 percent
(whichever is less) may be
•Although older illustrations
may be in the public domain
and don’t need permission
to be used, sometimes they’re
part of a copyright collection.
Copyright ownership
information is available at
• or
 Plagiarism is the act of copying another persons’
work without their permission or proper citation.
Teachers can recognize and stop plagiarism by using
programs such as:
Safety on the Internet
 The careful use and monitoring of internet activities is necessary to
prevent violations to the users’ safety or privacy.
Identity theft occurs when internet hackers illegally gain access to a
users’ personal information for the purpose of stealing their identity.
Reputation management prevents an individual or business’ name
and reputation from being slandered by person with malice intentions.
Using long passwords that have a variety of characters will help
prevent hackers from accessing users’ personal information.
Cyber bullying is harassing, embarrassing, or bullying someone on the
Cyber stalking occurs when an internet user is followed from one
social media to another by someone who continues to make unsolicited
advances or harasses them.
If someone is bullied online, they should report it, block the source,
and get help.
Safety on Your Computer
 It is vital that users be alert when using the internet. Fake
programs that can damage the computer or access personal
information are out there.
Viruses are programs created solely for the purpose of
harming the computers’ data or files.
Phishing is the luring of internet users to fake websites for
the purpose of obtaining their personal information
without the users’ knowledge or permission.
Trojan horses are programs that appear to be valid sites
but are intended to harm the users’ computer.
A worm is a self-replicating program which uses a
computer network to send copies of itself to other
computers on the network.
Protect Your Computer
 Install and regularly update virus protection programs.
 Only download sites that you are certain of.
 Never open email from unknown senders
 Create strong passwords and change the frequently