Skip to main content

Home/ Digiteen/ Group items matching "permissions" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
19More

digiteen2008 - Digital Etiquette - 3 views

  • Good etiquette is shown by having a proper education, manners and a sense of tact.
  • Etiquette mainly appears when someone has guests, meets with other people, or during meals.
  • Etiquette: Key terms Etiquette: rules governing socially acceptable behavior. Propriety: correct or appropriate behavior. Manners: a polite or well bred social behavior or habits Proper: marked by suitability or rightness or appropriateness. Education: the activities of educating or instructing; activities that impart knowledge or skill. Respect: an attitude of admiration or esteem. Civilized: having a high state of culture and development both social and technological. Social: living together or enjoying life in communities or organized groups. Tact: the ability to speak without offending others. Polite: showing regard for others in manners, speech, behavior. Impression: mental picture: a clear and telling mental image. Cleanliness: the habit of keeping free of superficial imperfections, diligence in keeping clean. Sophisticated: having or appealing to those having worldly knowledge and refinement. Society: an extended social group having a distinctive cultural and economic organization.
  • ...14 more annotations...
  • Digital Etiquette 1. Here is some tips that you should follow when talking online, texting, or emailing: 2. Say Hello before you start talking. It’s polite and it can make somebody happy knowing that somebody is nice enough to say hello. 3. Try to avoid replying “Sure”. A person will go crazy trying to figure out “Sure” what? Also, depending on who you are talking to online, the person may know little of your language and might not understand what you are saying, so be patient. 4. Avoid trailing off. If you stop responding to somebody all of the sudden they might think you’re ignoring them. If you have to go and do something say “BRB” or “one sec”. It will calm any worries, which the person has, who you are communicating to. 5. Don’t post people’s photos without their permission. Somebody might have a religion where they're not allowed to have they're pictures online. 6. Accept differences. Everybody has different beliefs. Don’t make fun of somebody’s religion or country because people can really get offended about what you say. 7. Talk about things that are appropriate. Chat rooms are for anyone who wants to talk to new people. One inappropriate comment can ruin it for everyone. You should always be aware to whom you are talking to and if they ask you to do anything which you feel uncomfortable about then tell an adult immediately so then the problem won't get out of hands. 8. Say bye before you leave the person whether its in person or online. You could seriously hurt somebody’s feelings if you just stop talking to them. 9. Be careful the way you type something. What you write can sound very different than what you mean. Read your writing before you press send. It could save you from an embarrassing situation. 10. Avoid writing in all capital letters. It looks like you're shouting. Wouldn't you think I was shouting if you saw this, DON'T WRITE IN ALL CAPITAL LETTERS.
  • Access Communication Literacy Student Environment Security and Safety Etiquette Rights and Responsibilities Student Life Outside Commerce Law Health and Wellness Class Actions American School of Madrid Spain Anand Vidya Vihar India Aspengrove School Canada Badshah Faisal Islami Institute Bangladesh La Grange USA Pahartali Girls High School Bangladesh Rani Bilashmoni Govt. Boys High School Bangladesh Troy Middle School USA Qatar Academy Qatar Wedderburn College Australia Westwood Schools USA Information Social & Ethical Issues Rubrics Teachers Template sj32 · My Wikis · · My Account · Help · Sign Out · Digital Etiquette page Details and TagsPrint PDF Backlinks Source Delete Rename Redirect Permissions Lock discussion (39) history notify me Details last edit Friday, 12:46 pm by kcaise - 124 revisions Tags none Type a tag name. Press comma or enter to add another. Cancel Table of ContentsDigital Etiquette 1. Overview/Description of the various aspects of the topic. Elementary Aged Students Middle/ High School Aged Students Email Etiquette: BE A SPORT, AND KEEP IT SHORT: NON MIND READERS FRIENDLY, PLEASE!: graTipos and.grammar! can caus cauz ishueezz? (typos and grammar... can cause issues!) BUISNESS FOR BUSYNESS!!! BE PLASTIC-ON-THE-SCREEN-CLEAR!!! A
  • Digital Etiquette or netiquette is a basic set of rules you should follow to make the internet a better place for other people and yourself.
  • When you instant message, chat, or email someone over the internet, that person can't tell if your just joking because they can't see your face. Don't say stuff over the internet that can be taken the wrong way or can hurt someones feelings
  • The internet takes over some peoples lives and people can get brain washed so easily when on the computer. Hacking other computers, using bad language, downloading illegally, and plagiarism are examples of having bad or no etiquette when it comes to the internet.
  • Etiquette is a set of rules dealing with exterior form
  • Middle/ High School Aged Students Teenagers these days are only on the internet to chat with their friends they know, or to look at cool videos or pictures.Myspace and Facebook are easy ways for teenagers to get access to the internet. These two websites have caused a lot of controversies over the internet because some teenagers will put bad pictures on the internet of themselves or other people. Every once in a while fights will occur between people who are trying to make each other look bad. It gives them a bad reputation and it ruins friendships all over the world. I just think that if teenagers would act mature then a lot of these things would not happen.
  • Online plagiarism is where internet users copy or use part of your or someone else's work. It is definitely not acceptable and is becoming a major issue. People need to have the right to place information on the internet knowing that it will not be copied for other people's work. Plagiarism is illegal but people still don't get the message. Plagiarism really could start major problems like people not writing the truth on the internet or making up information just to teach people a lesson. If someone is going to copy other people's work really they are better off handing the work in late or not at all. Using people's ideas is okay if you give them recognition or asked them. Plagiarism is equal to lying, if not worse. People are being generous by putting their knowledge on the internet to help people not to do it for people. Have courtesy and respect- don't copy peoples work use it as a guide and acknowledge them for their work and help. Plagerism- it's illegal so do the right thing.
  • ownloading illegally is one of the things not do in digital etiquette. Using file sharing programs such as KaZaA, Bit Torrent, iMesh, and Lime Wire to share or obtain copyrighted music, movies, games, and other software without the permission of the copyright holder is illegal. Stealing music has lots of effects once done. Some of the effects are listed below. Stealing music is against the law. Stealing music betrays the songwriters and recording artists who create it. Stealing music stifles the careers of new artists and up-and-coming bands. Stealing music threatens the livelihood of the thousands of working people—from recording engineers to Christian music retailers and their staffs —who are employed in this ministry.
  • Downloading Illegally
  • Some ways on avoiding stealing music are: Read user agreements carefully. Check the Web sites of the musicians, record companies, or movie studios to see if they allow distribution of their materials on the Internet. When purchasing music, movies, games, software, or other materials, read the license carefully to learn if you have permission to convert materials to other formats for personal use. Don't share or distribute materials unless you have permission. Of course, there are consequences to this kind of action. For one you can be fined of at least $500 dollars. The online infringement of copyrighted music can be punished by up to 3 years in prison and $250,000 in fines," the website said. "Repeat offenders can be imprisoned up to 6 years. Individuals also may be held civilly liable, regardless of whether the activity is for profit, for actual damages or lost profits, or for statutory damages up to $150,000 per infringed copyright. " To avoid these kinds of consequences you must avoid downloading illegally. I suggest that you follow the ways on avoiding these sort of consequences.
  • Some people have had both positively and negatively affected by internet etiquette. An example of negative etiquette on the internet is like if a person copies somebody's work without their permission and then the person who got copied goes and deletes that person's work
  • Don't type in all caps it looks like you're shouting which can offend some people which are on the other end of the computer because when you are talking to a person in face its easier to get your point across than talking online. Also if you try to do humor on the computer someone might not know that it is humor, and might take it as personal and you can get in trouble in all sorts of ways. Another thing is don't send rude messages or offensive e-mails to one another. It bad manners and it can get way out of hand in no time. Although you might be a pro at cyberspace be nice to the new comers. For a new comer on computers it is like learning a different language for them. Computers take a lot of practice and it is also called for mistakes. So be nice to everyone you meet and also try to help them if you can.
  • Another example is if you do something very funny and one of your friends got you on video tape and he goes and posts it on YouTube
  •  
    What etiquettet is
  •  
    "Digital Etiquette or netiquette is a basic set of rules you should follow to make the internet a better place for other people and yourself"
1More

10 Things Parents Need to Know About Xbox LIVE and Kids Safety - 0 views

  •  
    10 things to do to be safe on xbox live "It's more than just a gaming site. Xbox LIVE users can also chat with each other, send and receive friend requests, and share their profile and gaming stats.xBox Kids Safety uKnowKids Gamertags need to be chosen wisely. Never let your child use part of their name, hometown, or other identifying information in their gamertag. Profiles follow the child, not the console. A child can still access all his Xbox LIVE information from a friend's house. Kids can play games with strangers. Xbox LIVE has a "matchmaking" feature to help your child connect with gamers who have certain gamerscores or live in a certain location. People can privately chat with each other. Up to 8 people can play and talk all at once, but two of them can pair off and talk privately if they want to. You can make your permission mandatory. Through console controls, you can require your permission for your child to send and receive friend requests, accept game or chat invites, or buy Xbox merchandise. You can block who your child hears. You can choose "everyone," "friends," or "no one." Parents are required to help their children set up an account. If your under-18 child has an account and you didn't help set it up, he or she is registered as an adult. Default settings vary by age. Child and teen accounts are mostly "friends only" by default and some features are blocked, but adult profiles are public and have full access to all features. Deactivating Xbox LIVE doesn't cancel the child's account. On the Xbox console there is a setting to disallow Xbox LIVE access from that console - but your child can still access it on others unless you cancel his account."
1More

Totally Free Commercial Use Images ✔ The Ultimate Photo Resource Guide - 1 views

  •  
    As students work on projects, permissions for photos is important, this website lists 50 of the top places to get free photos.
2More

Video Game Addiction - Internet Gaming Addiction - 0 views

  • In this digital age, bullying is no longer relegated to the schoolyard. Bullies can now attack in the place kids should feel the safest -- their homes. Instead of physically harming or verbally attacking their victims, cyberbullies use the Internet, cell phones and other technology to hurt, threaten and embarrass others. Because it is done online, the effect of cyberbullying is more far-reaching and enduring than bullying that occurs at school. Cyberbullies can victimize their targets in a variety of ways, including the following: Creating websites that make fun of or criticize another person Sending mean or threatening emails, instant messages or text messages Pretending to be someone else to trick their victim into revealing personal information Lying about their victim online Breaking into their victim's email or instant messages Posting unflattering or offensive pictures online, without permission Using websites to rate their peers In most instances, the victims of cyberbullying know their attackers. They are often classmates, friends or online acquaintances. One study showed that only 23 percent of victims were bullied by someone they didn't know.
  •  
    You need to keep your private information private and not public. this is what causes Cyberbulling and to prevent it, you need to keep your personal life and activities private. "In this digital age, bullying is no longer relegated to the schoolyard. Bullies can now attack in the place kids should feel the safest -- their homes. Instead of physically harming or verbally attacking their victims, cyberbullies use the Internet, cell phones and other technology to hurt, threaten and embarrass others. Because it is done online, the effect of cyberbullying is more far-reaching and enduring than bullying that occurs at school. Cyberbullies can victimize their targets in a variety of ways, including the following: Creating websites that make fun of or criticize another person Sending mean or threatening emails, instant messages or text messages Pretending to be someone else to trick their victim into revealing personal information Lying about their victim online Breaking into their victim's email or instant messages Posting unflattering or offensive pictures online, without permission Using websites to rate their peers In most instances, the victims of cyberbullying know their attackers. They are often classmates, friends or online acquaintances. One study showed that only 23 percent of victims were bullied by someone they didn't know."
10More

digiteen2008 - Digital Security and Safety - 0 views

  • Middle/ High School Aged Students A lot of middle and high school students are members of websites like Myspace and Facebook. To some teens, these websites become addictive and they become so obsessed with talking to people that they start talking to anybody. They need to learn to not put personal information on their page like their phone number or their address because some of the people who look at that would want to hurt them. Another problem with teens is that some of them download illegal music and videos. Two of the most common sites are Frostwire and Limewire. Another thing some teens do is download free software and then their computers run really slow. That's because spyware is usually packaged with the free software. Three ways to keep your computer safe is "only download free software from reputable sites, kids and teens should be told to ask permission before downloading anything, and you can eliminate most spyware by downloading the free Microsoft Windows Defender and scanning your PC." [2]
  • Many people don't realize how important it is to have a secure password. A password is like a key to the door of your personal space on the internet. It is extremely important to keep your password safe. Some ways to choose a secure password are to use a word(s) that is totally unrelated to you. DO NOT use your maiden name, your dogs name, your phone number, your birthday, or any other things that could be related to you. A word on its own isn't very strong, so to increase strength you can add numbers and or symbols. An example of this is if you use the word " apple ", on its own it won't be very secure. If you were to put some numbers and symbols, then it would make it " apple321 " and it would be more secure. If you were to make some of the lower case letters capitals, "aPpLe321 " then it would be even stronger. If you wanted the most secure password possible, then you could insert some symbols, making it " (aPpLe321) "After 30-60 days of using the same password, it would be wise to alter or change your password. You should also use different passwords for different applications. If you would like to test your password, click here
  • 2. How safety and security positively and negatively impacts people How safety & Security positively impacts people you can know where you can rely on some of the website or blogs you feel comfortable to talk to each other sometimes when you are in a reliable website you don't have to tell every single thing about yourself to people online How safety & Security negatively impacts people sometimes strangers can put weird/inappropriate pictures online of you in other sites without your permission you may accidentally reveal your personal information to other strangers and might get in danger people sometimes bully other people they don't know sometimes, the predators make websites to attack you. They make you think the website is reliable and forces you to tell them your personal information
  • ...7 more annotations...
  • Cyber Stalking: This one of the most dangerous things on the internet; people every day are blackmailed into giving personal info like Accounts, credit card numbers, and others info. If you receive or see: · Threatening E-Mails · Post showing you differently to destroy your character · Info About your life posted on the internet
  • Middle/ High School Aged Students Teenagers everywhere use blogs such as Myspace and Facebook. They need to be safe and secure while they do these, as online predators with bad intents can find you if you give to much information. We as teens must obey online laws and common sense.When online teens usually disregard things there parents tell them. Sexual and online predators can ruin a person's childhood if they are able to find them. They can also put the wrong ideas into the minds of children, making them unwanted and bad for your health.
  • Middle/ High School Aged Students Teens use Myspace and Facebook to talk to their friends and stuff. Although, others that they don't know just might become interested in them. Online predators try their best to find out where you live. If they do, it can be bad for your health and childhood. On one website, I found a story in which a real life person fell in love with someone on the Internet. It turned out she left with him for a while and it turned out he was a sexual predator. Always be safe on the Internet.
  • Middle/ High School Aged Students One possible solution is to be safe while blogging. Also, never have a personal meeting. Never include your full name, address, or school, as they can look up your name and find you. Never put pictures online that could help online predators find you. If someone who talks to you online does not seem right or makes you nervous just stop talking to them and tell an adult. Just let them handle it because they are smarter and wiser in those kind of situations.
  • B. Middle / High School Aged Students Teens need to be safe and never give out information Be careful what they download. Be their selves because they don't need to be what they're not. Not talk to strangers.
  • Blogging Tips for Teenagers Being safe on blogs and other websites is very important. I have found some tips to help us be safer on the Internet, which is an important part of a teenager’s everyday life. The first way to be safe is to avoid posts that enable online predators to find and locate you. This means to not give information out like where you go to hang out, your name (last name especially), where your school is and its name, and especially where you live, because everybody can see what you write including the predator. Most people don't know this, but if you give out your phone number, than anybody, including a predator, can type your phone number into google and then they can see where you live. This helps a predator lead straight to you. If someone asks you for private information, DO NOT give it to them. It should be a red flag for you to ignore him or leave the chat room. Also, in chat rooms, if you feel something is going wrong and you feel uncomfortable with anything, leave the chat room immediately. Never have your screen name the same as a nick name. Online predators can sometimes track you down by screen names, which are private unless you give them out. Remember, if your going to have a blog or belong to a chat room, be safe and follow the rules. Also if you find something abnormal online, tell an adult you know and someone you can trust 100%. Always be yourself when on an online blog, which means never put fake information about yourself. In addition, always be respectful to others. If you write a bad comment, it might come back to you. Also, don’t put many pictures about yourself unless you can trust who your sending pictures to. It only helps online predators having a picture of you. Never, never have an in-person meeting. You never know if the person you are meeting has bad intentions. Be honest about your age. If there is an age limit on a chat room then there is probably a reason for one. You never know what you are getting into on the internet. The last tip is that you shouldn't meet anybody without your parent's permission. The reason is because even though you think you know very well the person by catting with them online for few years, it might be the predator that wants to harm you. The predator might told you the false information that he/she is the same age as you or live near your house. So you have to be careful if you are meeting the right person. Adults Although adults are able to have a form of independence, safety and security is very important. They have to be cautious about doing things like online banking or putting personal information online. Adults who put credit card numbers and other personal information should be aware of pharming and phishing. Many adults believe because they are experienced, they know how to be safe. They need to make sure the website they are putting personal information on is secure. You need to look for the "https" at the link of the website. When adults commonly think of online safety they think of online fraud. Identity takers feed off information given out online. If you are a victim of identity fraud it could have an effect on your future. Other than just internet fraud another thing adults have to worry about while online is cyber stalking. Cyber stalking is another way of harassment through the computer. Cyberstalking includes threatening emails, people posting private information about you for others to see, and posing as you online. Many adults seem to feel like they're older so they are less likely at risk for having predators after them. This is not the case. Websites such as eharmony.com and match.com are websites that leave predators open to find people. If you do plan on meeting someone you meet at one of these sites you should make your date at a public place and make sure not to be alone.
  • Digital Security and Safety is an issue that relates to a person's well-being and safety on a computer. Safety and security are two topics that are closely related. Security is the condition of being protected against danger, loss, and criminals. Safety is the condition of being protected against non-desirable events. Some studies have shown "The odds of becoming a cyber victim have dropped to 1 in 6, from 1 in 4 last year.[1] Some examples of potentially unsafe sites online are Facebook and Myspace, which can sometimes can be dangerous because there can be bullying online. On facebook and myspace you can put your picture or pictures on and some people put inapporaite pictures on, which is not safe because thier are always predators out there on the internet and they could see your picture and ask to meet. If you agree to go and meet them then you could be injured.
2More

The Campus Guide to Copyright Compliance - 0 views

  • Copyright Basics: Fair Use Determining Fair Use Exceptions for Libraries and Archives Exceptions for the use of Materials in an Educational Setting   Fair use is a concept embedded in U.S. law that recognizes that certain uses of copyright-protected works do not require permission from the copyright holder or its agent. These include instances of minimal use that do not interfere with the copyright holder's exclusive rights to reproduce and reuse the work. Fair use is not an exception to copyright compliance; it is more of a "legal defense." That is, if you copy and share a copyright-protected work and the copyright holder claims copyright infringement, you may be able to assert a defense of fair use which you would then have to prove. Fair use is primarily intended to allow the use of copyright-protected works for commentary, parody, news reporting, research and education. However, not all uses in an academic context are automatically considered fair use. The Copyright Act does not spell out the specific types of content reproduction that qualify as fair use. It offers an outline as to how to analyze whether fair use may apply in a particular situation. As a result, the Copyright Act leaves it up to the individual to determine, based upon the factors in Section 107 of the Act, whether fair use applies in each particular circumstance. To avoid a potential legal challenge from the copyright holder, many institutions follow a policy of "when in doubt, obtain permission."
  •  
    digiteen12--2.flatclassroomproject.org
1More

Social networks and kids: How young is too young? - CNN - 1 views

  •  
    Its about how younger kids are getting accounts when they are only like 11 years old. They say that it could damage the children's brains and relationships with one and another. Some kids create their own account without asking their parents permission. Others say that the children try be more older than what they are to get an account.
1More

Recording Industry vs The People: WNET v. Aero, copyright infringement case brought by ... - 1 views

  •  
    This is a small article about a new copyright case. This case is about online streaming Media. The company Areo inc.. is suing cause they didn't give permission for it. This is important cause many consider online media non P2P works.
3More

Online Classroom: Netiquette - 0 views

  • This refers to your efforts to create a sense of online community. Positive climate building can reduce anxiety about communicating online, and contribute to a positive collegial environment. Climate building can be developed by:  Use of first names by participants.  Responding promptly to messages sent to you.  Use of reinforcement phrases (i.e., "Good idea!" or "Thanks for the suggestions," etc.).  Use of personalizing remarks (i.e., a reference to where you are working -- home, office, terminal, what is happening around you, the weather, etc.). Avoiding hostile or curt comments. No objectionable, sexist, or racist language will be tolerated.  Displaying humour.  Promoting cooperation by offering assistance and support to other participants and by sharing ideas.  Beyond Netiquette: Dos and Don'ts   Demonstrating courtesy online is fundamental. (Absolutely no abusive or libelous comments will be permitted.)  Use only your real first and last name online.  Confidentiality: No one else should be given access to any of the conferences (either viewing onscreen or in print), without the previous consent of all participants and conferees.  Copyright & Plagiarism: Don't use the words or text of others without proper acknowledgement of the source (if this was in some public source), or -- if private (as in a conference) unless you first have the author's permission.  The use of humor can be very tricky; sometimes it is seen as sarcasm or derision rather than as funny. Symbols or parenthetic phrases (e.g., :-) or "ha! ha!") can help to convey emotional tone and help to prevent misunderstandings.
  •  
    "Netiquette," or network etiquette, refers to the evolving rules for considerate behaviour on the networks. These guidelines are often posted at the beginning of an online course, or perhaps in the "cafe" or "student center" where all students mingle. Netiquette and Group Dynamics This refers to your efforts to create a sense of online community. Positive climate building can reduce anxiety about communicating online, and contribute to a positive collegial environment. Climate building can be developed by: * Use of first names by participants. * Responding promptly to messages sent to you. * Use of reinforcement phrases (i.e., "Good idea!" or "Thanks for the suggestions," etc.). * Use of personalizing remarks (i.e., a reference to where you are working -- home, office, terminal, what is happening around you, the weather, etc.). * Avoiding hostile or curt comments. No objectionable, sexist, or racist language will be tolerated. * Displaying humour. * Promoting cooperation by offering assistance and support to other participants and by sharing ideas. Beyond Netiquette: Dos and Don'ts * Demonstrating courtesy online is fundamental. (Absolutely no abusive or libelous comments will be permitted.) * Use only your real first and last name online. * Confidentiality: No one else should be given access to any of the conferences (either viewing onscreen or in print), without the previous consent of all participants and conferees. * Copyright & Plagiarism: Don't use the words or text of others without proper acknowledgement of the source (if this was in some public source), or -- if private (as in a conference) unless you first have the author's permission. * The use of humor can be very tricky; sometimes it is seen as sarcasm or derision rather than as funny. Symbols or parenthetic phrases (e.g., :-) or "ha! ha!") can help to convey emotional tone and help to prevent misunderstandings."
  •  
    This is to help people to create a sense of an online community. We want it to be a positive climate on the internet.
1More

Top Five Netiquette Rules in an Online Course (or Anywhere) for Success - 0 views

  •  
    "1- Be friendly, positive and self-reflective. When people cannot see you, and also do not know you, feelings can be hurt if you are not careful in how you express yourself. The old saying, think before you speak is important here. Think before you write. One word of advice is do not respond when you feel angry. Wait. Write it down somewhere and come back to it. When you do, you may find that you no longer feel the same way as you did when you wrote it, because you have had time to reflect about the situation. Last, if you still feel the need to be heard, then edit before you post, and write it in terms that are easily embraced. This is also true when you feel a critique is necessary, say it in a positive tone. Reread what you have written to be sure it is positive. 2- Use proper language and titles. Do not use slang or even profane words in an online education environment, even if they are words you consider, "not so bad," as they will sound offensive to the reader. Do not refer to your professor as "Doc" or by his or her first name, unless it is acceptable with him or her to do so. Also, do not use caps lock when writing. It will insinuate yelling. That would hurt someone's feelings and possibly give him or her the wrong impression of you. 3- Use effective communication. This takes practice and thoughtful writing. Try to speak and write clearly at all times. Again, reread before you respond. Define and restate your words when necessary. Correct a misunderstanding right away. Chances are, if one person felt a certain way about what you said, then another may have as well. Likewise, be mindful of chosen words and joking. Let's say for example, I write, "get out!" This slang term can be interpreted in several ways, either positively or negatively. 4- Professionalism. Leave the characters like smiley faces, and instant message abbreviations out. Your friends may like it, but chances are, your professor will not. Save it for personal conversations or definitely ask
3More

Safety Pledges - 0 views

  • Safety Pledges
  • Internet Safety Pledges "House pledges" or "acceptable-use policies" can help provide clear guidelines for safer Internet use. NetSmartz recommends using the "Internet Safety Pledge" to promote safety discussions and create safer boundaries.
  • Middle and High School Internet Safety Rules Download I WILL THINK BEFORE I POST. I agree not to post information and images that could put me at risk, embarrass me, or damage my future, such as cell & home phone numbers home address sexual messages inappropriate pictures and videos I WILL RESPECT OTHER PEOPLE ONLINE. I will not post anything rude, offensive, or threatening send or forward images and information that might embarrass, hurt, or harass someone take anyone's personal information and use it to damage his or her reputation I WILL BE CAREFUL WHEN MEETING ONLINE FRIENDS IN PERSON. I agree to ask my parent or guardian's permission before going have a parent or guardian accompany me meet in a public place I WILL PROTECT MYSELF ONLINE. If someone makes me feel uncomfortable or if someone is rude or offensive, I will not respond save the evidence tell my parent, guardian, or another trusted adult report to the website, cell phone company, CyberTipline.com, or the police
1More

Centenary College:  Online Etiquette - 0 views

  • Respect others and their opinions. In online learning students from various backgrounds come together to learn. It is important to respect their feelings and opinions though they may differ from your own.Consider others’ privacy. Ask for permission if you want to forward someone’s email messages to third parties. Keep in mind that all private email mail is considered copyrighted by the original author. Pick the right tone. Since we depend on the written word in online learning, it is especially important to choose the right words to get your meaning across. For example, sarcasm is harder to detect when you read the words rather than hearing them.Avoid inappropriate material. Distribution of pornographic material will result in disciplinary action.Be forgiving. If someone states something that you find offensive, mention this directly to the instructor. Remember that the person contributing to the discussion might be new to this form of communication. What you find offensive may quite possibly have been unintended and can best be cleared up by the instructor.Think before you hit the send button. Think carefully about the content of your message before contributing it. Once sent to the group there is no taking it back. Grammar and spelling errors reflect on you and your audience might not be able to decode misspelled words or poorly constructed sentences.Brevity is best. Be as concise as possible when contributing to a discussion. Your points might me missed if hidden in a flood of text.Stick to the point. Contributions to a discussion should stick to the subject. Don’t waste others' time by going off on irrelevant tangents.Do not type in all caps. Typing in caps is considered shouting or screaming online. Various studies on the topic reflect that it is more difficult and takes longer to read text that is typed in all caps. Frivolous email. Don’t forward jokes, "chain letter's" or unimportant email to other students without their permission. Not only does it fill up their mailboxes but may offend people who do not share the same sense of humor or who are tired of these types of email.
14More

Kids Rules for Online Safety (for pre-teens) | SafeKids.com - 0 views

  •  I will tell my parents right away if I come across any information that makes me feel uncomfortable.
  • 7.   I will not give out my Internet password to anyone (even my best friends) other than my parents.
  • 3.   I will never agree to get together with someone I “meet” online without first checking with my parents. If my parents agree to the meeting, I will be sure that it is in a public place and bring my mother or father along.
  • ...9 more annotations...
  • 4.   I will never send a person my picture or anything else without first checking with my parents.*  
  • 5.   I will not respond to any messages that are mean or in any way make me feel uncomfortable. It is not my fault if I get a message like that. If I do I will tell my parents right away so that they can contact the service provider.
  • 6.   I will talk with my parents so that we can set up rules for going online. We will decide upon the time of day that I can be online, the length of time I can be online and appropriate areas for me to visit. I will not access other areas or break these rules without their permission.
  • 1.   I will not give out personal information such as my address, telephone number, parents’ work address/telephone number, or the name and location of my school without my parents’ permission.*  
  • 8.   I will check with my parents before downloading or installing software or doing anything that could possibly hurt our computer or jeopardize my family’s privacy*
  • 9.   I will be a good online citizen and not do anything that hurts o
  • ther people or
  • is against the law.
  • 10. I will help my parents understand how to have fun and learn things online and teach them things about the Internet, computers and other technology.
  •  
    safety online
  •  
    "Kids Rules for Online Safety " This website shows kids rules that they should follow for online safety. This rules will help pre-teens learn about online safety
2More

FEMA For Kids: Online Safety Rules For Kids - 0 views

  • Online Safety Rules For Kids I will not give out personal information such as my address, telephone number, parent's work address/telephone number, or the name and location of my school without my parents' permission. I will tell my parents right away if I come across any information that makes me feel uncomfortable. I will never agree to get together with someone I "meet" online without first checking with my parents. If my parents agree to the meeting, I will be sure that it is in a public place and bring my mother or father along. I will never send a person my picture or anything else without first checking with my parents. I will not respond to any messages that are mean or in any way makes me feel uncomfortable. It is not my fault if I get a message like that. If I do, I will tell my parents right away so that they can contact the online service. I will talk with my parents so that we can set up rules for going online. We will decide upon the time of the day that I can be online, the length of time I can be online and appropriate areas for me to visit. I will not access other areas or break these rules without their permission.
  •  
    kids safety online
4More

digiteen - Digital Rights and Responsibilities - 0 views

  • Those freedoms extended to everyone in a digital world - electronic responsibility for actions and deeds AUP (inside and outside of school) Use online material ethically (citing sources) Report cyberbullies and threats
  • ocially Rights and Responsibilities has a lot of influence over us, and our daily life. Everything we do in our online lives or even just online we have to think if it is within our rights or whether we have the responsibilty to do something. For many of us we found this so hard to do because our rights and responsibilities online are soo very different to them offline, which is why it is importtant for children to incorporate these ideas into their daily lives and at a young enough age for them to adapt to them quickly.
  • ...1 more annotation...
  • You need to be aware of which sites people can gain access to your profile and without your permission. Some examples are: Facebook, MySpace. Beware of sites where people can change your password just by knowing your user name. An itunes account is a good example of where this is the case. If your not sure, test it out for your self by clicking on "forgotten your password?" and seeing whether the new pass word is accepted. If you become a victim of cyberbullying, make sure you contact people responsible for the site. If you join a forum, make should you read through the rules and regulations for members. This can be especially important if the forum is a special interest forum where you may get asked to leave if you post "off topic" mails. Use the Internet respectfully: don't post embarrassing pictures of your friends onto sites without their permission!
4More

Justin, Demi, Selena, Rihanna - and COPPA | BCP Business Center - 1 views

  • Justin, Demi, Selena, Rihanna - and COPPA By Lesley Fair October 4, 2012 - 1:29pm It's not likely we'll succumb to Bieber Fever.  We're of a generation more susceptible to the Rockin' Pneumonia and the Boogie Woogie Flu.  But a company that ran official fan websites for pop stars may be feeling the effects of an FTC law enforcement action alleging violations of the Children's Online Privacy Protection Act and COPPA Rule. The defendant, Artist Arena, operated authorized sites for Justin Bieber, Demi Lovato, Selena Gomez, and the mononymous recording artist Rihanna.  (It is, too, a word.  Ask Cher or Fabio.)  Visitors to BieberFever.com, DemiLovatoFanClub.net, SelenaGomez.com, or RihannaNow.com could join fan clubs and subscribe to online newsletters.  Fan club members also had access to social networking functions, like creating personal profiles, posting on walls, or "friending" other members.  Of course, to take advantage of those features, people had to provide personal information. The details of the registration process varied depending on the site, so you'll want to read the complaint for the specifics.  But the 25-words-or-less summary is that Artist Arena allegedly collected kids' names, addresses, email addresses, birthdates, gender and other info without properly notifying parents and getting their consent.  According to the complaint, the company violated COPPA by knowingly registering over 25,000 kids under 13 and collected and maintained personal information from almost 75,000 other kids under 13 who started the sign-up process, but didn't finish it. What about Artist Arena's promises that it wouldn't collect children's personal information or activate kids' registrations without parental consent?  The FTC challenged those claims as false. The settlement imposes a $1 million civil penalty, bars future COPPA violations, and requires the company  to delete the information collected illegally. Looking for specifics on COPPA compliance?  Visit the BCP Business Center's Children's Privacy page.  
  •  
    This Justin Beiber fan site has been penalized more than $100,000 for collecting emails of minors under 13 without parental permission. COPPA compliance is more important than ever. I find it ironic that kids under 13 aren't even supposed to be able to have emails in the first place on many websites. "The details of the registration process varied depending on the site, so you'll want to read the complaint for the specifics. But the 25-words-or-less summary is that Artist Arena allegedly collected kids' names, addresses, email addresses, birthdates, gender and other info without properly notifying parents and getting their consent. According to the complaint, the company violated COPPA by knowingly registering over 25,000 kids under 13 and collected and maintained personal information from almost 75,000 other kids under 13 who started the sign-up process, but didn't finish it."
  •  
    This is important and why kids under 13 cannot get on most social media websites.
  •  
    This article is about kids that obtain info for personal websites without properly notifying parents and getting their consent.
1More

Fair Use - Copyright and Fair Use - Library Guides at Polytechnic Institute of NYU - 0 views

  • What is Fair Use?Fair use is a concept embedded in U.S. law that recognizes that certain uses of copyright-protected works do not require permission from the copyright holder. (See Title 17, section 107) What Determines Fair Use?The following four factors are used to determine if a use is fair: The purpose of the use (eg. commercial vs. educational)* The nature of the copyrighted work The amount of the material used (the greater the amount copied, the less likely it is fair use) The effect of use on the potential market for or value of the work * Not all uses in an academic context are automatically considered fair use!  Fair Use in AcademiaThe Fair Use Doctrine is probably the most important exemption to copyright protections for educational settings, allowing many uses of copyrighted works for the purposes of teaching and research. The complexity of fair use and its importance in academia make it imperative that every member of NYU-Poly understands how to make judgements concerning fair use. Review these Common Scenarios to help you determine whether or not fair use is appropriate. Tools to help you Determine Fair Use Fair Use Analysis Tool:  guides users through the process of determining if a use is fair. Developed by The University of Minnesota Libraries. Fair Use Evaluator: helps users collect, organize, and document the information they may need to support a fair use claim, and  provides a time-stamped PDF document for the users’ records. Developed by the American Library Association, Office for Information Technology Policy.  
1More

Copyright Law - Copyright and Fair Use - Library Guides at Polytechnic Institute of NYU - 0 views

  • Copyright Law DefinedCopyright law, as defined in Title 17 of the United States Code, protects "original works of authorship fixed in a tangible medium of expression" for a limited period. Copyright protection includes, for instance, the legal right to publish and sell literary, artistic, or musical work, and copyright protects authors, publishers and producers, and the public.  Copyright applies both to traditional media (books, records, etc.) and to digital media (electronic journals, web sites, etc.). Copyright protects the following eight categories of works: literary works musical works dramatic works pantomimes and choreographic works pictorial, graphic, and sculptural works motion pictures and other audiovisual works sound recordings architectural works Ownership of a copyrighted work includes the right to control the use of that work. Use of such work by others during the term of the copyright requires either permission from the author or reliance on the doctrine of fair use. Failure to do one or the other will expose the user to a claim of copyright infringement for which the law provides remedies including payment of money damages to the copyright owner.
6More

ACLU, 12-Year Old Sue Minnesota School Over Facebook Incident - Technology News - redOrbit - 1 views

  •  
    A 12 year old student at a school in Minnewaska was forced to give up her password and username in order for her school to view comments made about the student. The ACLU filed a suit on behalf of the student against the Minnewaska Area Schools.  
  • ...3 more comments...
  •  
    A girl in Minnesota had her passwords and usernames forcefully taken from her by a school. The school said it was cyberbulling, but many people disagree. A rights group took up the case for the girl and i suing on the 4th amendment search and seizure and the 1st amendment right to free speech.
  •  
    Girl posts something about a hall monitor hating her on Facebook, school demands she gives them her username and password. The students parents were not present. No warrant was issued by the police. The student filed a law suit with the ACLU against the school.
  •  
    This article is about a 12 year old girl (R.S.) that had to give her Facebook username and password to her school because of a hall monitor she didn't like. The school didn't notify her parents, and her parents never said the school to take that action. The ACLU is suing the school under the first amendment law (Unlawful search and seizure). 
  •  
    This article is about a girl who was forced to give her username and password for her Facebook account, to her school. The school didn't have a warrant or permission of any kind to take her information, which violates her constitutional rights. The American Civil Liberties Union is suing the school for this violation.
  •  
    The article "ACLU, 12-Year Old Sue Minnesota School Over Facebook Incident" was about a 12-year old girl. The girl in this article was refered as R.S. Issues starting coming up when R.S. had something on Facebook that said the school's hall monitor hated her. The school forced her to give them her username and password then searched her page. After, a son's mom complained to the school that R.S. and her son were talking about sex online. Once the school demanded to go through her account again, the ACLU charged them for not giving her the freedom of speech and unreasonably searching though her stuff. This was violating the First and Fourth Amendment since the two incidents. In the end R.S. didn't get in trouble but the school did.
4More

Famous Copyright Infringement Cases - 2 views

  • Copyright Infringement means using the original piece without the permission of the copyright holder, as such or in parts (without attributing the part to the owner). According to the US copyright laws, one can face heavy penalties in cases of copyright infringement. The infringement may also lead to a jail term or a penalty followed by a jail term.
  • Princeton University Press v. Michigan Document Services (1996) Michigan Document Services was involved in creating packages of study material for the students of the University. A professor supplied the course material and Michigan Document services, a photocopying organization, took photocopies of the material and converted it into a booklet for sale to students at the University. There was a clause of "Fair use" in this case. The photocopying company could have paid a nominal fee to the University and then used the material. This was available to anyone who wished to use the material. However, the photocopying company paid for only the original and then started making photocopies of the study material. The court considered that it was not "fair use" and penalized the photocopying company. A & M Records vs. Napster (2001) This is one of the most famous cases of copyright infringement related to the music industry. As peer to peer file sharing increased, Napster started a website. This website offered downloads of songs of all genre – new and old. You may know someone who used it. A & M Records brought in a joint copyright infringement case which accused Napster of stealing music and making it available to people worldwide. Before closing the site in 2002, Napster had to settle USD26 million to different recording companies and songwriters. It could have even more if Napster had not apologized and folded the site. Several websites still thrive on offering free music to people who can download it at no cost. As mentioned in our article on "Internet Ethics and Copyright Laws", the music industry faces most copyright infringement cases. The Napster case, though an example of the consequences, still does not act as a deterrent for other music websites that offer free music downloads. We hope these famous copyright infringement cases have clarified what is considered copyright violation to some extent. If you still have any questions, please free to contact us using the comments facility.
  •  
    On this website the author talks about what copyright infringement is and famous cases. Copyright infringement is when a person violates that intellectuals rights. Though once that copyright is sold it no longer belongs to them. This article discusses Feist Publications V. Rural Tele Services CO, Princeton University Press V. Michigan Document Services, A & M Records V. Napster.
  •  
    This article focuses on copyright infringement
1 - 20 of 26 Next ›
Showing 20 items per page