SlideShare uma empresa Scribd logo
1 de 8
E-BEHAVIOUR
CODE BROCHURE
A WORKING DRAFT
Internet access is a human right.Even The Universal Declaration of Human Rights and Convention on
the Rights of the Child can identify and explain universal human rights standards in a new context: the
Internet. To protect our rights on the Internet we must know our human rights. Both documents can
support and expand the capacity of the Internet as a medium for civil social and educational
development and ensure our rights to privacy, security, equality, freedom of speech,
We all have responsibility for realizing human rights within ourpossibilities.

THE UNIVERSAL DECLARATION OF
HUMAN RIGHTS
Article 1.
All human beings are born free and equal in dignity and rights.They are endowed with reason and
conscience and should act towards one another in a spirit of brotherhood.
Article 2.
Everyone is entitled to all the rights and freedoms without distinction of any kind.
Using the Internet must be addressed as part of their entitlement to dignity, to participate in social and
cultural life, and to respect for their human rightshe right to non-discrimination in the enjoyment of all
rights includes:
Article 3.
Everyone has the right to life, liberty and security of person.
Article 12.
No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence,
nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law
against such interference or attacks.
Article 19.
Everyone has the right to freedom of opinion and expression; this right includes freedom to hold
opinions without interference and to seek, receive and impart information and ideas through any media
and regardless of frontiers.
Everyone has the right to seek, receive and impart information and ideas through the Internet.
Article 20.
Everyone has the right to freedom of peaceful assembly and association.
Article 26.
Everyone has the right to education.

Convention on the Rights of the Child
Article 8
States Parties undertake to respect the right of the child to preserve his or her identity,
including nationality, name and family relations as recognized by law without unlawful
interference.
Article 13
The child shall have the right to freedom of expression; this right shall include freedom to
seek, receive and impart information and ideas of all kinds, regardless of frontiers, either
orally, in writing or in print, in the form of art, or through any other media of the child’s
choice.
Article 14
States Parties shall respect the right of the child to freedom of thought, conscience and
religion.
Article 16
No child shall be subjected to arbitrary or unlawful interference with his or her privacy,or
correspondence, nor to unlawful attacks on his or her honour and reputation.
2. The child has the right to the protection of the law against such interference or attacks.
Article 17
States Parties recognize the important function performed by the mass media and shall ensure
that the child has access to information and material from a diversity of national and
international sources, especially those aimed at the promotion of his or her social, spiritual
and moral well-being and physical and mental health.
Article 19
States Parties shall take all appropriate educational measures to protect the child from all
forms of mental violence.
Article 28
States Parties recognize the right of the child to education.
Article 29
States Parties agree that the education of the child shall be directed to the development of
respect for human rights and fundamental freedoms.
Article 36
States Parties shall protect the child against all other forms of exploitation prejudicial to any
aspects of the child’s welfare.
COMPUTER CLASSROOM RULES
IN CLASSROOM:
-Work in the computer classroom is possible only when the computer
classroom is free.
-In the classroom we enter quietly and sit down at your place.
-We don't bring food or drinks into the classroom.
-Only students and teachers and those who are authorized can use
computers in the computer classroom.
-We must work according to the instructions of the teacher and use
only agreed equipment.
- We do not run any software or print any job or use the computer
and the Internet in a way that is not for educational purposes.
-We interfere in the settings of the computer only with permission
of the teacher.
- We may not manipulate the equipment in such a way that might
cause damage such as unplugging or plugging equipment cords, turning
switches on or off to the computer monitors, or printers, or
speakers, or mistreating the equipment in any way.
- If a computer isn't working, we notify the teacher.
- You may not personalize the computers by:
a.

Installing screen savers

b. Changing the desktop background
c. Adding, changing or moving icons on the desktop.
- A student will not cause another student to lose work, time, or
data.
- We maintain silence and refrain from disturbing other users.
- We take all your belongings with you when leaving the computer
room and we always keep the computer room environment clean.
- We turn off the computer accordingly after use.
RULES ON USING THE INTERNET IN THE COMPUTER CLASSROOM:
- We only use links and internet websitesaccording to the
instructions of the teacher.
-It is forbidden to use inappropriate websites.
-We don’t play games unless they are part of the course work.
Watching films and listening to music are not allowed.
- We don't use social networks sites.
-We don't download unknown files.
- We don’t post offending messages on the Internet.
Possible consequences for breaking rules /Penalties for Misconduct in the Computer
Rooms:
- The teacher can suspend the offending student’s computing
facilities privileges during the lesson.
-If a student is caught vandalizing equipment in anyway:
consequences will include paying for repairs, clean up, possible failure
and removal from lesson.
- Failure to adhere to the rules will result in other actions
appropriated under the schools formal discipline policy.
- Cleaning the computer room from top to bottom.
STEPS FOR INTERNET AND
COMPUTER
SAFETY

Safe-

Keep safe by being careful not to give out personal

information – such as your full name, email address, phone
number-to people you are chatting with online.Do not give out
identifying personal information without getting your parents’
permission first.
Don’t use “lazy” passwords, such as 1234. Instead, come up with
a longer password that contains letters and numbers/characters,
preferably one that references something significant only to you.

Meeting-

Meeting someone you have only been in touch

with online can be dangerous. Only do so with your parents’ or
carers’ permission and even then only when they can be present.

Accepting-

accepting emails, messages, or opening files,

pictures or texts from people you don’t know or trust can lead
to problems – they may contain viruses or nasty messages!

Reliable-

Information you find on the internet may not
be true, or someone online may be lying about who they are.Not
everything you read online is grammatically correct.

Tell-

Tell your parent, carer or a trusted adult if someone

or something makes you feel uncomfortable or worried,
or if you or someone you know is being bullied online.

COMPUTERSAFETY
TIPS:
Use firewalland antivirus software-A firewall is a barrier
between something that is potentially dangerous and
something that you want to keep safe.
Update Microsoft Windows - Even with the newest
computer, there are updates to be applied. There have been
significant security holes discovered in all versions of
Windows so it's important to update your computer's
operating system as soon as possible.
Install security patches on other softwares. Vulnerabilities in
software are constantly being discovered and they don't
discriminate by vendor or platform. It's not simply a matter of
updating Windows; at least monthly, check for and apply
updates for all software you use.
Block Spyware - spyware and viruses often go hand-in-hand
but can take many forms. Some 'hijack' your web browser
and redirects you to their website. Others quietly download
and install trojans, keylogger programs, etc. to your computer
so hackers can take control of your computer later. Install and
run an anti-spyware program.
Backup your important data often. Use external USB hard
drives to store all of your "data", documents, photos, music
as well as USB "thumb" drives that you can carry on your
keychain.
Secure your browser.To ensure optimum browsing safety,
the best tip is to disable javascript for all but the most
essential of sites -- such as your banking or regular
ecommerce sites. Not only will you enjoy safer browsing,
you'll be able to eliminate unwanted pop-ups as well.
Don't fall victim to virus hoaxes. Dire-sounding email
spreading fear, uncertainty and doubt about non-existent
threats serve only to spread needless alarm and may even
cause you to delete perfectly legitimate files in response.

RULES OF NETIQUETTE
THE MAIN RULE: Treat others as you would like to be treated.
RESPECT OTHERS' COPYRIGHTS: There are wonderful things online, information for
everyone on just about any topic! However, these things have copyrights and licenses.
DON'T TYPE IN ALL CAPS: It hurts our eyes. It makes people think you are shouting at them.
It's okay to type in caps to accentuate a word or two, but please don't do it all the time everywhere
you go.
DON'T SPAM (a.k.a. junkmail): Don’t send spam messages!Don't contribute to
worthlessinformation on the Internet bysending or responding to masspostingsofchainletters,
rumors, etc.
BE HONEST: Don’t pretend to be someone else.
USE PROPER GRAMMAR & SPELLING.
NO "FLAMING": Flaming is a form of verbal abuse when you intentionally attack or disrespect
somebody for whatever reason. Maybe you didn't agree with something they said, but there's a
nice way to share a different point of view without name calling or attacking someone.
RESEARCH YOUR FACTS/CITE SOURCES: There is so much information online, so it can
be very difficult to distinguish what is true and not true. Before posting something or forwarding
emails make sure it is factual and cite sources if possible to boost your credibility. Not only will
this help keep down on the hoaxes and insanity floating around online, but it can help make you
build a solid reputation online.
USE APPROPRIATE EMOTICONS (EMOTION ICONS) TO HELP CONVEY
MEANING. Use "smileys" or punctuation such as :-) to convey emotions. See website list of
emoticons at http://netlingo.com/smiley.cfm and
http://www.robelle.com/smugbook/smiley.html.

Mais conteúdo relacionado

Mais procurados

Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rulesMazni Salleh
 
Internet Safety Keypoints Handout
Internet Safety Keypoints HandoutInternet Safety Keypoints Handout
Internet Safety Keypoints HandoutOllie Bray
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Digital citizenship ss
Digital citizenship ssDigital citizenship ss
Digital citizenship ssLenva Shearing
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks SlideshareOllie Bray
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...mulingoh
 
Glow Internet Safety Talk
Glow Internet Safety TalkGlow Internet Safety Talk
Glow Internet Safety TalkOllie Bray
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parentssirchriss
 
Mms parent training keynote 2
Mms parent training keynote 2Mms parent training keynote 2
Mms parent training keynote 2MGSD
 
Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethicallyLinda Long
 
Student RUP Agreement explained
Student RUP Agreement explainedStudent RUP Agreement explained
Student RUP Agreement explainedShawn Wyble
 
SLF 2008 - Internet Safety snd Responsible Use
SLF 2008 - Internet Safety snd Responsible UseSLF 2008 - Internet Safety snd Responsible Use
SLF 2008 - Internet Safety snd Responsible UseOllie Bray
 
Eskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ictEskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ictAnwar Jesus Esperida
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationjpl17
 
DIGITAL LITERACY Steps to Becoming a Digital Citizen
DIGITAL LITERACY Steps to Becoming a Digital CitizenDIGITAL LITERACY Steps to Becoming a Digital Citizen
DIGITAL LITERACY Steps to Becoming a Digital CitizenCarla Hayes
 

Mais procurados (20)

Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
 
Internet Safety Keypoints Handout
Internet Safety Keypoints HandoutInternet Safety Keypoints Handout
Internet Safety Keypoints Handout
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Digital citizenship ss
Digital citizenship ssDigital citizenship ss
Digital citizenship ss
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
Legalissues
LegalissuesLegalissues
Legalissues
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Glow Internet Safety Talk
Glow Internet Safety TalkGlow Internet Safety Talk
Glow Internet Safety Talk
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parents
 
Mms parent training keynote 2
Mms parent training keynote 2Mms parent training keynote 2
Mms parent training keynote 2
 
Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethically
 
Student RUP Agreement explained
Student RUP Agreement explainedStudent RUP Agreement explained
Student RUP Agreement explained
 
SLF 2008 - Internet Safety snd Responsible Use
SLF 2008 - Internet Safety snd Responsible UseSLF 2008 - Internet Safety snd Responsible Use
SLF 2008 - Internet Safety snd Responsible Use
 
Y2 l10 esafety
Y2 l10 esafetyY2 l10 esafety
Y2 l10 esafety
 
Eskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ictEskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ict
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
DIGITAL LITERACY Steps to Becoming a Digital Citizen
DIGITAL LITERACY Steps to Becoming a Digital CitizenDIGITAL LITERACY Steps to Becoming a Digital Citizen
DIGITAL LITERACY Steps to Becoming a Digital Citizen
 
Cyber citizenship imen tekaya
Cyber citizenship imen tekayaCyber citizenship imen tekaya
Cyber citizenship imen tekaya
 
Legalissues
LegalissuesLegalissues
Legalissues
 

Semelhante a Rights and Responsibilities Online

ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Digital law
Digital lawDigital law
Digital lawmakylahh
 
Digital law
Digital lawDigital law
Digital lawmakylahh
 
Digital law
Digital lawDigital law
Digital lawCAQUES01
 
Digital law
Digital lawDigital law
Digital lawAlieyn_
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Issues with computers
Issues with computersIssues with computers
Issues with computersayerssaa
 
The 9 elements of digital citizenship
The 9 elements of digital citizenshipThe 9 elements of digital citizenship
The 9 elements of digital citizenshipJimPowers
 
Star Kamal 9 B
Star Kamal 9 BStar Kamal 9 B
Star Kamal 9 Bjboulanger
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 
Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention RAUSHAN KUMAR
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
CP SON CANALS A GUIDE TO STAY SAFE ON THE NET
CP SON CANALS A GUIDE TO STAY SAFE ON THE NETCP SON CANALS A GUIDE TO STAY SAFE ON THE NET
CP SON CANALS A GUIDE TO STAY SAFE ON THE NETcpsoncanals
 
Digital citizenship project
Digital citizenship projectDigital citizenship project
Digital citizenship projectfig2381
 

Semelhante a Rights and Responsibilities Online (20)

ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
 
The 9 elements of digital citizenship
The 9 elements of digital citizenshipThe 9 elements of digital citizenship
The 9 elements of digital citizenship
 
Star Kamal 9 B
Star Kamal 9 BStar Kamal 9 B
Star Kamal 9 B
 
SOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptxSOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptx
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
CP SON CANALS A GUIDE TO STAY SAFE ON THE NET
CP SON CANALS A GUIDE TO STAY SAFE ON THE NETCP SON CANALS A GUIDE TO STAY SAFE ON THE NET
CP SON CANALS A GUIDE TO STAY SAFE ON THE NET
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Digital citizenship project
Digital citizenship projectDigital citizenship project
Digital citizenship project
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
 

Mais de ThinkB4UClick

Sredozemsko za slideshare
Sredozemsko za slideshareSredozemsko za slideshare
Sredozemsko za slideshareThinkB4UClick
 
Načrt dela 2013-14 comenius po mesecih
Načrt dela 2013-14 comenius po mesecihNačrt dela 2013-14 comenius po mesecih
Načrt dela 2013-14 comenius po mesecihThinkB4UClick
 
Načrt dela 2012-13 comenius po mesecih
Načrt dela 2012-13 comenius po mesecihNačrt dela 2012-13 comenius po mesecih
Načrt dela 2012-13 comenius po mesecihThinkB4UClick
 
Končna publikacija / poročilo o rezultatih projekta (fotografije in projektne...
Končna publikacija / poročilo o rezultatih projekta (fotografije in projektne...Končna publikacija / poročilo o rezultatih projekta (fotografije in projektne...
Končna publikacija / poročilo o rezultatih projekta (fotografije in projektne...ThinkB4UClick
 
FINAL PUBLICATION/ REPORT OF PROJECT’S RESULTS (PHOTOS AND PROJECT ACTIVITIES)
FINAL PUBLICATION/ REPORT OF PROJECT’S RESULTS (PHOTOS AND PROJECT ACTIVITIES)FINAL PUBLICATION/ REPORT OF PROJECT’S RESULTS (PHOTOS AND PROJECT ACTIVITIES)
FINAL PUBLICATION/ REPORT OF PROJECT’S RESULTS (PHOTOS AND PROJECT ACTIVITIES)ThinkB4UClick
 
Burdur/Bucak presentation
Burdur/Bucak presentationBurdur/Bucak presentation
Burdur/Bucak presentationThinkB4UClick
 
Turkey presentation country
Turkey presentation countryTurkey presentation country
Turkey presentation countryThinkB4UClick
 
Presentation school turkey
Presentation school turkeyPresentation school turkey
Presentation school turkeyThinkB4UClick
 
International comparison of the state of Internet safety for children and youth
International comparison of the state of Internet safety for children and youthInternational comparison of the state of Internet safety for children and youth
International comparison of the state of Internet safety for children and youthThinkB4UClick
 
CEIP SON CANALS, Palma, Spain
CEIP SON CANALS, Palma, SpainCEIP SON CANALS, Palma, Spain
CEIP SON CANALS, Palma, SpainThinkB4UClick
 
Guideline for preventing cyberbullying
Guideline for preventing cyberbullyingGuideline for preventing cyberbullying
Guideline for preventing cyberbullyingThinkB4UClick
 
Guideline for preventing cyberbullying
Guideline for preventing cyberbullyingGuideline for preventing cyberbullying
Guideline for preventing cyberbullyingThinkB4UClick
 
Guideline for preventing internet addiction
Guideline for preventing internet addictionGuideline for preventing internet addiction
Guideline for preventing internet addictionThinkB4UClick
 
Migrant students in OŠ RODICA
Migrant students in OŠ RODICAMigrant students in OŠ RODICA
Migrant students in OŠ RODICAThinkB4UClick
 
Migrant students in CP SON CANALS
Migrant students in CP SON CANALSMigrant students in CP SON CANALS
Migrant students in CP SON CANALSThinkB4UClick
 
Interviews students results2
Interviews students results2Interviews students results2
Interviews students results2ThinkB4UClick
 
Planned work programe 13 14 drugic
Planned work programe 13 14 drugicPlanned work programe 13 14 drugic
Planned work programe 13 14 drugicThinkB4UClick
 
Planned work programe 12 13 Comenius
Planned work programe 12 13 ComeniusPlanned work programe 12 13 Comenius
Planned work programe 12 13 ComeniusThinkB4UClick
 

Mais de ThinkB4UClick (20)

Sredozemsko za slideshare
Sredozemsko za slideshareSredozemsko za slideshare
Sredozemsko za slideshare
 
Načrt dela 2013-14 comenius po mesecih
Načrt dela 2013-14 comenius po mesecihNačrt dela 2013-14 comenius po mesecih
Načrt dela 2013-14 comenius po mesecih
 
Načrt dela 2012-13 comenius po mesecih
Načrt dela 2012-13 comenius po mesecihNačrt dela 2012-13 comenius po mesecih
Načrt dela 2012-13 comenius po mesecih
 
Končna publikacija / poročilo o rezultatih projekta (fotografije in projektne...
Končna publikacija / poročilo o rezultatih projekta (fotografije in projektne...Končna publikacija / poročilo o rezultatih projekta (fotografije in projektne...
Končna publikacija / poročilo o rezultatih projekta (fotografije in projektne...
 
FINAL PUBLICATION/ REPORT OF PROJECT’S RESULTS (PHOTOS AND PROJECT ACTIVITIES)
FINAL PUBLICATION/ REPORT OF PROJECT’S RESULTS (PHOTOS AND PROJECT ACTIVITIES)FINAL PUBLICATION/ REPORT OF PROJECT’S RESULTS (PHOTOS AND PROJECT ACTIVITIES)
FINAL PUBLICATION/ REPORT OF PROJECT’S RESULTS (PHOTOS AND PROJECT ACTIVITIES)
 
Burdur/Bucak presentation
Burdur/Bucak presentationBurdur/Bucak presentation
Burdur/Bucak presentation
 
Turkey presentation country
Turkey presentation countryTurkey presentation country
Turkey presentation country
 
Presentation school turkey
Presentation school turkeyPresentation school turkey
Presentation school turkey
 
International comparison of the state of Internet safety for children and youth
International comparison of the state of Internet safety for children and youthInternational comparison of the state of Internet safety for children and youth
International comparison of the state of Internet safety for children and youth
 
CEIP SON CANALS, Palma, Spain
CEIP SON CANALS, Palma, SpainCEIP SON CANALS, Palma, Spain
CEIP SON CANALS, Palma, Spain
 
Newsletter2nd
Newsletter2ndNewsletter2nd
Newsletter2nd
 
Guideline for preventing cyberbullying
Guideline for preventing cyberbullyingGuideline for preventing cyberbullying
Guideline for preventing cyberbullying
 
Guideline for preventing cyberbullying
Guideline for preventing cyberbullyingGuideline for preventing cyberbullying
Guideline for preventing cyberbullying
 
Guideline for preventing internet addiction
Guideline for preventing internet addictionGuideline for preventing internet addiction
Guideline for preventing internet addiction
 
Newsletter1st
Newsletter1stNewsletter1st
Newsletter1st
 
Migrant students in OŠ RODICA
Migrant students in OŠ RODICAMigrant students in OŠ RODICA
Migrant students in OŠ RODICA
 
Migrant students in CP SON CANALS
Migrant students in CP SON CANALSMigrant students in CP SON CANALS
Migrant students in CP SON CANALS
 
Interviews students results2
Interviews students results2Interviews students results2
Interviews students results2
 
Planned work programe 13 14 drugic
Planned work programe 13 14 drugicPlanned work programe 13 14 drugic
Planned work programe 13 14 drugic
 
Planned work programe 12 13 Comenius
Planned work programe 12 13 ComeniusPlanned work programe 12 13 Comenius
Planned work programe 12 13 Comenius
 

Último

Geostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.pptGeostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.pptUsmanKaran
 
14042024_First India Newspaper Jaipur.pdf
14042024_First India Newspaper Jaipur.pdf14042024_First India Newspaper Jaipur.pdf
14042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Transforming Andhra Pradesh: TDP's Legacy in Road Connectivity
Transforming Andhra Pradesh: TDP's Legacy in Road ConnectivityTransforming Andhra Pradesh: TDP's Legacy in Road Connectivity
Transforming Andhra Pradesh: TDP's Legacy in Road Connectivitynarsireddynannuri1
 
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...The Lifesciences Magazine
 
12042024_First India Newspaper Jaipur.pdf
12042024_First India Newspaper Jaipur.pdf12042024_First India Newspaper Jaipur.pdf
12042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
lok sabha Elections in india- 2024 .pptx
lok sabha Elections in india- 2024 .pptxlok sabha Elections in india- 2024 .pptx
lok sabha Elections in india- 2024 .pptxdigiyvbmrkt
 
Emerging issues in migration policies.ppt
Emerging issues in migration policies.pptEmerging issues in migration policies.ppt
Emerging issues in migration policies.pptNandinituteja1
 
11042024_First India Newspaper Jaipur.pdf
11042024_First India Newspaper Jaipur.pdf11042024_First India Newspaper Jaipur.pdf
11042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Political-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptxPolitical-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptxSasikiranMarri
 
Foreign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptxForeign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptxunark75
 
16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
13042024_First India Newspaper Jaipur.pdf
13042024_First India Newspaper Jaipur.pdf13042024_First India Newspaper Jaipur.pdf
13042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Power in International Relations (Pol 5)
Power in International Relations (Pol 5)Power in International Relations (Pol 5)
Power in International Relations (Pol 5)ssuser583c35
 
15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdfFIRST INDIA
 

Último (14)

Geostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.pptGeostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.ppt
 
14042024_First India Newspaper Jaipur.pdf
14042024_First India Newspaper Jaipur.pdf14042024_First India Newspaper Jaipur.pdf
14042024_First India Newspaper Jaipur.pdf
 
Transforming Andhra Pradesh: TDP's Legacy in Road Connectivity
Transforming Andhra Pradesh: TDP's Legacy in Road ConnectivityTransforming Andhra Pradesh: TDP's Legacy in Road Connectivity
Transforming Andhra Pradesh: TDP's Legacy in Road Connectivity
 
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
 
12042024_First India Newspaper Jaipur.pdf
12042024_First India Newspaper Jaipur.pdf12042024_First India Newspaper Jaipur.pdf
12042024_First India Newspaper Jaipur.pdf
 
lok sabha Elections in india- 2024 .pptx
lok sabha Elections in india- 2024 .pptxlok sabha Elections in india- 2024 .pptx
lok sabha Elections in india- 2024 .pptx
 
Emerging issues in migration policies.ppt
Emerging issues in migration policies.pptEmerging issues in migration policies.ppt
Emerging issues in migration policies.ppt
 
11042024_First India Newspaper Jaipur.pdf
11042024_First India Newspaper Jaipur.pdf11042024_First India Newspaper Jaipur.pdf
11042024_First India Newspaper Jaipur.pdf
 
Political-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptxPolitical-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptx
 
Foreign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptxForeign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptx
 
16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf
 
13042024_First India Newspaper Jaipur.pdf
13042024_First India Newspaper Jaipur.pdf13042024_First India Newspaper Jaipur.pdf
13042024_First India Newspaper Jaipur.pdf
 
Power in International Relations (Pol 5)
Power in International Relations (Pol 5)Power in International Relations (Pol 5)
Power in International Relations (Pol 5)
 
15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf
 

Rights and Responsibilities Online

  • 1. E-BEHAVIOUR CODE BROCHURE A WORKING DRAFT Internet access is a human right.Even The Universal Declaration of Human Rights and Convention on the Rights of the Child can identify and explain universal human rights standards in a new context: the Internet. To protect our rights on the Internet we must know our human rights. Both documents can support and expand the capacity of the Internet as a medium for civil social and educational development and ensure our rights to privacy, security, equality, freedom of speech, We all have responsibility for realizing human rights within ourpossibilities. THE UNIVERSAL DECLARATION OF HUMAN RIGHTS Article 1. All human beings are born free and equal in dignity and rights.They are endowed with reason and conscience and should act towards one another in a spirit of brotherhood. Article 2. Everyone is entitled to all the rights and freedoms without distinction of any kind. Using the Internet must be addressed as part of their entitlement to dignity, to participate in social and cultural life, and to respect for their human rightshe right to non-discrimination in the enjoyment of all rights includes: Article 3. Everyone has the right to life, liberty and security of person. Article 12. No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks. Article 19. Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers. Everyone has the right to seek, receive and impart information and ideas through the Internet.
  • 2. Article 20. Everyone has the right to freedom of peaceful assembly and association. Article 26. Everyone has the right to education. Convention on the Rights of the Child Article 8 States Parties undertake to respect the right of the child to preserve his or her identity, including nationality, name and family relations as recognized by law without unlawful interference. Article 13 The child shall have the right to freedom of expression; this right shall include freedom to seek, receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in writing or in print, in the form of art, or through any other media of the child’s choice. Article 14 States Parties shall respect the right of the child to freedom of thought, conscience and religion. Article 16 No child shall be subjected to arbitrary or unlawful interference with his or her privacy,or correspondence, nor to unlawful attacks on his or her honour and reputation. 2. The child has the right to the protection of the law against such interference or attacks. Article 17 States Parties recognize the important function performed by the mass media and shall ensure that the child has access to information and material from a diversity of national and international sources, especially those aimed at the promotion of his or her social, spiritual and moral well-being and physical and mental health. Article 19 States Parties shall take all appropriate educational measures to protect the child from all forms of mental violence. Article 28 States Parties recognize the right of the child to education. Article 29 States Parties agree that the education of the child shall be directed to the development of respect for human rights and fundamental freedoms. Article 36 States Parties shall protect the child against all other forms of exploitation prejudicial to any aspects of the child’s welfare.
  • 3. COMPUTER CLASSROOM RULES IN CLASSROOM: -Work in the computer classroom is possible only when the computer classroom is free. -In the classroom we enter quietly and sit down at your place. -We don't bring food or drinks into the classroom. -Only students and teachers and those who are authorized can use computers in the computer classroom. -We must work according to the instructions of the teacher and use only agreed equipment. - We do not run any software or print any job or use the computer and the Internet in a way that is not for educational purposes. -We interfere in the settings of the computer only with permission of the teacher. - We may not manipulate the equipment in such a way that might cause damage such as unplugging or plugging equipment cords, turning switches on or off to the computer monitors, or printers, or speakers, or mistreating the equipment in any way. - If a computer isn't working, we notify the teacher. - You may not personalize the computers by: a. Installing screen savers b. Changing the desktop background c. Adding, changing or moving icons on the desktop.
  • 4. - A student will not cause another student to lose work, time, or data. - We maintain silence and refrain from disturbing other users. - We take all your belongings with you when leaving the computer room and we always keep the computer room environment clean. - We turn off the computer accordingly after use. RULES ON USING THE INTERNET IN THE COMPUTER CLASSROOM: - We only use links and internet websitesaccording to the instructions of the teacher. -It is forbidden to use inappropriate websites. -We don’t play games unless they are part of the course work. Watching films and listening to music are not allowed. - We don't use social networks sites. -We don't download unknown files. - We don’t post offending messages on the Internet. Possible consequences for breaking rules /Penalties for Misconduct in the Computer Rooms: - The teacher can suspend the offending student’s computing facilities privileges during the lesson. -If a student is caught vandalizing equipment in anyway: consequences will include paying for repairs, clean up, possible failure and removal from lesson. - Failure to adhere to the rules will result in other actions appropriated under the schools formal discipline policy. - Cleaning the computer room from top to bottom.
  • 5. STEPS FOR INTERNET AND COMPUTER SAFETY Safe- Keep safe by being careful not to give out personal information – such as your full name, email address, phone number-to people you are chatting with online.Do not give out identifying personal information without getting your parents’ permission first. Don’t use “lazy” passwords, such as 1234. Instead, come up with a longer password that contains letters and numbers/characters, preferably one that references something significant only to you. Meeting- Meeting someone you have only been in touch with online can be dangerous. Only do so with your parents’ or carers’ permission and even then only when they can be present. Accepting- accepting emails, messages, or opening files, pictures or texts from people you don’t know or trust can lead to problems – they may contain viruses or nasty messages! Reliable- Information you find on the internet may not
  • 6. be true, or someone online may be lying about who they are.Not everything you read online is grammatically correct. Tell- Tell your parent, carer or a trusted adult if someone or something makes you feel uncomfortable or worried, or if you or someone you know is being bullied online. COMPUTERSAFETY TIPS: Use firewalland antivirus software-A firewall is a barrier between something that is potentially dangerous and something that you want to keep safe. Update Microsoft Windows - Even with the newest computer, there are updates to be applied. There have been significant security holes discovered in all versions of Windows so it's important to update your computer's operating system as soon as possible. Install security patches on other softwares. Vulnerabilities in software are constantly being discovered and they don't discriminate by vendor or platform. It's not simply a matter of updating Windows; at least monthly, check for and apply updates for all software you use. Block Spyware - spyware and viruses often go hand-in-hand but can take many forms. Some 'hijack' your web browser
  • 7. and redirects you to their website. Others quietly download and install trojans, keylogger programs, etc. to your computer so hackers can take control of your computer later. Install and run an anti-spyware program. Backup your important data often. Use external USB hard drives to store all of your "data", documents, photos, music as well as USB "thumb" drives that you can carry on your keychain. Secure your browser.To ensure optimum browsing safety, the best tip is to disable javascript for all but the most essential of sites -- such as your banking or regular ecommerce sites. Not only will you enjoy safer browsing, you'll be able to eliminate unwanted pop-ups as well. Don't fall victim to virus hoaxes. Dire-sounding email spreading fear, uncertainty and doubt about non-existent threats serve only to spread needless alarm and may even cause you to delete perfectly legitimate files in response. RULES OF NETIQUETTE THE MAIN RULE: Treat others as you would like to be treated. RESPECT OTHERS' COPYRIGHTS: There are wonderful things online, information for everyone on just about any topic! However, these things have copyrights and licenses. DON'T TYPE IN ALL CAPS: It hurts our eyes. It makes people think you are shouting at them. It's okay to type in caps to accentuate a word or two, but please don't do it all the time everywhere you go. DON'T SPAM (a.k.a. junkmail): Don’t send spam messages!Don't contribute to worthlessinformation on the Internet bysending or responding to masspostingsofchainletters, rumors, etc.
  • 8. BE HONEST: Don’t pretend to be someone else. USE PROPER GRAMMAR & SPELLING. NO "FLAMING": Flaming is a form of verbal abuse when you intentionally attack or disrespect somebody for whatever reason. Maybe you didn't agree with something they said, but there's a nice way to share a different point of view without name calling or attacking someone. RESEARCH YOUR FACTS/CITE SOURCES: There is so much information online, so it can be very difficult to distinguish what is true and not true. Before posting something or forwarding emails make sure it is factual and cite sources if possible to boost your credibility. Not only will this help keep down on the hoaxes and insanity floating around online, but it can help make you build a solid reputation online. USE APPROPRIATE EMOTICONS (EMOTION ICONS) TO HELP CONVEY MEANING. Use "smileys" or punctuation such as :-) to convey emotions. See website list of emoticons at http://netlingo.com/smiley.cfm and http://www.robelle.com/smugbook/smiley.html.