{"id":34,"date":"2017-06-20T21:03:37","date_gmt":"2017-06-20T21:03:37","guid":{"rendered":"http:\/\/wordpress.library.illinois.edu\/uni\/?page_id=34"},"modified":"2019-02-12T16:23:54","modified_gmt":"2019-02-12T16:23:54","slug":"netiquette","status":"publish","type":"page","link":"https:\/\/wordpress.library.illinois.edu\/uni\/computerlit\/netiquette\/","title":{"rendered":"Netiquette 101: Being Civilized and Safe Online"},"content":{"rendered":"<h2><strong>The No-Brainer Stranger-Danger Stuff<\/strong><\/h2>\n<ul>\n<li>Never share your password with anyone. Likewise, do not use anyone else\u2019s password. Change your password if you even think it has been compromised. Words or backwards words are not secure passwords. Mix cases, numbers, letters, and symbols.<\/li>\n<li>Don\u2019t unwittingly (or wittingly!) give out so much information about yourself that a stranger (or a \u201cfriend\u201d) can put your day together through your words and links. It\u2019s generally not a good idea to accept friend invitations from people you don\u2019t know in real life.<\/li>\n<li>Don&#8217;t make the mistake of thinking that you know someone after having \u201cmet\u201d him or her online. You know only what he or she chooses to say about themselves.<\/li>\n<li>Even if you have met the person off-line before, as an acquaintance, let a trusted adult know if your online interaction ever seems uncomfortable, or if they are encouraging you to do things that you do not want to do.<\/li>\n<\/ul>\n<h2><strong>21st century life online, or \u201cHow do so many people\/companies know so much about me?\u201d<\/strong><\/h2>\n<ul>\n<li>Take great care in what you reveal about yourself on social network sites like Facebook and in online communication. Use privacy settings wherever possible, but be aware that rules for privacy settings often change. Double-check your privacy settings by looking yourself up without being logged in. Google yourself from time to time, or use a service like\u00a0<a href=\"https:\/\/pipl.com\/\" target=\"_blank\" rel=\"noopener\">pipl.com<\/a>.<\/li>\n<li>Be very careful about what you sign up for and what you respond to online. Keep in mind that if a service you are using is \u201cfree,\u201d then\u00a0<strong>your personal information<\/strong>\u00a0is the product!<\/li>\n<li>Nothing is ever really private online. Take control of your digital footprint and build a positive online presence!<\/li>\n<li>To be more specific: never put in an email message, on a social network site, or in a chat message, anything you would not put on a postcard. Anything you do online can \u201ctravel\u201d to unexpected places. Likewise, treat other people\u2019s communications with respect. Don\u2019t post images, forward messages, or copy messages without knowing it\u2019s truly okay to do so.<\/li>\n<li>Mask your identity for privacy\u2019s sake if you wish, but take care in creating a false persona. Don\u2019t hide behind an anonymous sign-in in order to leave inappropriate comments or posts.\u00a0<strong>It\u2019s never okay to impersonate someone else.<\/strong><\/li>\n<li>Don\u2019t respond to spam, even to request removal from a list, unless you are sure of the source. It only verifies that the sender has reached a legitimate e-mail address. Minimize the proliferation of spam (and promote the cause of privacy!) by not sending messages to long lists of e-mail addresses. Use \u201cBcc\u201d for most of the addresses instead of \u201cTo.\u201d\u00a0 Don\u2019t publish your e-mail address on your web page. Mark bogus \u201cfriend\u201d requests as spam.<\/li>\n<\/ul>\n<h2><strong>A bit about physical safety, or yes, computers\u00a0<em>can<\/em>\u00a0hurt you<\/strong><\/h2>\n<ul>\n<li>Avoid extended use of a laptop resting directly on your lap. The bottom of the laptop can get very hot and therefore cause temporary or permanent injury. Use a barrier\u2014such as a book or devices made specifically for this purpose\u2014when working on your lap. Also, avoid lap-based computing while connected to the power adapter as this will significantly increase the temperature.<\/li>\n<li>Avoid lengthy repetitive tasks (such as typing and using the trackpad). Take frequent breaks and change your physical position (typing while standing, sitting, leaning, etc.) to minimize discomfort.<\/li>\n<\/ul>\n<h2><strong>Communication and getting along<\/strong><\/h2>\n<ul>\n<li>Be expressive in your communication, but not obnoxious. Use smileys (emoticons) like \ud83d\ude42 to indicate tone of voice, but use them sparingly. Same goes for use of exclamation points, all caps, avatars, pulsating backgrounds, and other flourishes.<\/li>\n<li>Try to be prompt when messages are sent to you.<\/li>\n<li>Avoid sarcasm; inflection and tone can get lost with written messages communicated online. What may seem like sarcasm or a joke can get easily lost in translation.<\/li>\n<li>E-mail should have a subject heading which reflects the content of the message.<\/li>\n<li>Be careful about what you send and forgiving in what you receive. Don\u2019t flame others and ignore flames when you receive them. If you get something that makes you angry, it can be a good idea to wait a day before replying.<\/li>\n<li>When forwarding a message that has been forwarded to you, remove the layers of addresses that frustrate the reader.<\/li>\n<li>Be careful when you reply to messages or postings sent to large groups. Sometimes replies are sent back to the entire group. If you have multiple chat windows open, make sure your response is going to the right person!<\/li>\n<li>Don\u2019t send large amounts of unsolicited information to people.<\/li>\n<li>Use headphones in public spaces. Your friends and (especially) teachers will thank you for it.<\/li>\n<li>It\u2019s rude to multitask people. Don\u2019t text when your parents are trying to talk to you.<\/li>\n<li>Don\u2019t annoy system administrators. They usually have your best interests at heart.<\/li>\n<li>Understand and practice copyright compliance. Having a copy of something doesn&#8217;t mean that you have the right to copy or distribute it. Paraphrase words; post less than 30 seconds of a musical selection; do not post others\u2019 images unless you have explicit permission to do so. \u00a0<em>More about this in many classes and semesters to come!<\/em><\/li>\n<\/ul>\n<h2><strong>Having a Life<\/strong><\/h2>\n<ul>\n<li>Take a break from being online every hour. Read a book, eat a snack, go outside, do your homework. Get together with your friends in person.<\/li>\n<li>Be a careful custodian of disk space and bandwidth. If downloading a file is going to give you enough time to knit a sweater, forget it.<\/li>\n<li><strong>Let technology enhance your life, but don\u2019t let it take over your life.<\/strong>\u00a0Don&#8217;t get sucked into social networking or game playing or web surfing when you should be working on your English paper or having dinner with your family. Keep your priorities straight.<\/li>\n<li>Online technologies are often\u00a0<em>not<\/em>\u00a0the best way to communicate sensitive or personal information. Face-to-face communications, handwritten notes or letters, and the phone are as good and often better in many situations.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The No-Brainer Stranger-Danger Stuff Never share your password with anyone. Likewise, do not use anyone else\u2019s password. Change your password if you even think it has been compromised. Words or backwards words are not secure passwords. Mix cases, numbers, letters, and symbols. Don\u2019t unwittingly (or wittingly!) give out so much information about yourself that a [&hellip;]<\/p>\n","protected":false},"author":73,"featured_media":0,"parent":32,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-34","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/wordpress.library.illinois.edu\/uni\/wp-json\/wp\/v2\/pages\/34","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wordpress.library.illinois.edu\/uni\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/wordpress.library.illinois.edu\/uni\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/wordpress.library.illinois.edu\/uni\/wp-json\/wp\/v2\/users\/73"}],"replies":[{"embeddable":true,"href":"https:\/\/wordpress.library.illinois.edu\/uni\/wp-json\/wp\/v2\/comments?post=34"}],"version-history":[{"count":3,"href":"https:\/\/wordpress.library.illinois.edu\/uni\/wp-json\/wp\/v2\/pages\/34\/revisions"}],"predecessor-version":[{"id":525,"href":"https:\/\/wordpress.library.illinois.edu\/uni\/wp-json\/wp\/v2\/pages\/34\/revisions\/525"}],"up":[{"embeddable":true,"href":"https:\/\/wordpress.library.illinois.edu\/uni\/wp-json\/wp\/v2\/pages\/32"}],"wp:attachment":[{"href":"https:\/\/wordpress.library.illinois.edu\/uni\/wp-json\/wp\/v2\/media?parent=34"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}