By: Candace Witherspoon Social Media Netiquette “Netiquette” refers to etiquette on the Internet. Good “netiquette” involves respecting others' privacy. There are three main areas where good “netiquette” is highly stressed: e-mail, online chatting, and newsgroups. It is also the correct or acceptable way of communicating on the Internet. Do’s & Do not’s of Social Media • Do respond and react • Do use social media • Do use privacy settings • Do not surf on your company’s time • Do not display your personal life • Do not connect with everyone a legal device that provides the creator of a work of art or literature, or a work that conveys information or ideas, the right to control how the work is used"(Fishman, 2008, p. 6). is the most significant limitation on the copyright holder's exclusive rights (United States Copyright Office, 2010, para. 1). Copy Right and Fair Use con.t Copyright is the original piece of work, and Fair use is a gray area that refers to the rights of copyright holders which allows limited use of copyrighted material, even without permission. However, there are conditions in which fair use can be claimed are not permanent depending upon certain factors. United States Copyright Office. (2008). Copyright basics. (Circular 1). Retrieved from http://www.copyright.gov/circs/circ01.pdf Fair Use Rules Media- No more than 5 images of an artist/photographer in one program or printing. Copyright notice and attribution required. Print- Single copies for teacher for research, teaching, or class preparation. Video- May be copied for archival purposes or to replace, lost damaged or stolen copies Music- Single copy of up to 10% of a musical composition in print, sound, or multimedia form may be performed and displayed as part of an educator or student multimedia program for educational purposes. Photo- Older illustrations may be in the public domain, but the collection may be copyrighted. Safety on the “Net” Identity Theft- is a crime in which one wrongfully gets and uses another individual's personal information such as: bank account information or credit card information. Here are a few ways of preventing: 1. Always review monthly statements to check accuracy 2. Always check your credit reports 3. Always shred all personal information that comes in the mail whether you use it or not 4. Secure your information on and offline 5. Never carry your social security card in your purse or wallet Password Safety on the Internet Technology is a huge factor in our society today, and almost every program there is you have to login to there must be a user name and password. Passwords are to be kept SAFE at all times!!! Password Safety Tips: • Don’t reveal your password to anyone • Don’t leave it laying around, if so keep it locked up • Be very careful when using WIFI at public places • Do reset your password frequently (n.d.). Retrieved from http://antivirus.about.com/od/securitytips/a/passwordsafe ty.htm Cyber Bullying Cyber bullying- is bullying through email, chat room exchanges, or digital. Cyber bullying, like traditional bullying, involves an disparity of power, aggression, and a negative action that is often repeated. Types of Cyber Bullying Harassment: Repeatedly sending offensive, rude, and insulting messages Denigration: Distributing information about another that is derogatory and untrue through posting it on a Web page, sending it to others through email or instant messaging, or posting or sending digitally altered photos of someone Flaming: Online "fighting" using electronic messages with angry, vulgar language Impersonation: Breaking into an email or social networking account and using that person's online identity to send or post vicious or embarrassing material to/about others. Outing and Trickery: Sharing someone's secrets or embarrassing information, or tricking someone into revealing secrets or embarrassing information and forwarding it to others Cyber Stalking: Repeatedly sending messages that include threats of harm or are highly intimidating, or engaging in other online activities that make a person afraid for his or her safety. (n.d.). Retrieved from http://olweus.org/public/cyber_bullying.page Cyber Stalking Safety tips on Cyber Stalking Be cautious of who you meet on-line Set all settings to private on social networks DO NOT share personal information BLOCK any unwanted messengers The Life of a Computer Computer viruses are created when a programmer creates computer code that has the capability to replicate itself. To protect your home computer against computer viruses, worms, and Trojans, you should invest in anti-virus software. There are several signs to know that your computer has been infected: new files appear out of no where, program size changes, sometimes you will hear strange noises from the computer or the keyboard, and a common sign is when the computer takes longer than normal to load. (Shelly, G.B, Cashman, T.J. & Vermatt, M. E. (2001). Discovering computers 2002: Concepts for a digital world. Boston, MA: Course Technology.) Protecting Your Computer Anti-Virus software Continuously scan your computer Backup your files Be aware of unknown emails Be Alert! Plagiarism Plagiarism- is defined as copying another one’s work. To avoid plagiarism you need to cite the original source and paraphrase. Even when paraphrasing one must still give credit to the source. Teachers are able to recognize plagiarism by utilizing search engines such as Article Checker. Retrieved from(http://www.ehow.com/facts) Works Cited Goodridge, E. (2009, may 01). Steps to prevent identity theft and how to prevent it. (Shelly, G.B, Cashman, T.J. & Vermatt, M. E. (2001). Discovering computers 2002: Concepts for a digital world. Boston, MA: Course Technology.) United States Copyright Office. (2008). Copyright basics. (Circular 1). Retrieved from http://www.copyright.gov/circs/circ01.pdf United States Copyright Office. (2009). Reproduction of copyrighted works by educators and librarians. (Circular 21). Retrieved from http://www.copyright.gov/circs/circ21.pdf United States Copyright Office. (2010). Fair use. (Circular FL-102). Retrieved from http://www.copyright.gov/fls/fl102.html http://www.westminstermo.edu/academics/resources/library/Pages/C opyrightFairUse.aspx Retrieved from http://antivirus.about.com/od/securitytips/a/passwordsafety.htm