Online Etiquette Tomas Miller Eileen Dunn. How do businesses monitor employee activities online?  Businesses do this to make sure their employees are.

Slides:



Advertisements
Similar presentations
Peel Multicultural Council Helping People Reach Their Goals Your course for success By Majid Khalaf.
Advertisements

Mandy Peterson March 7, 2007 Customer Service Training MASFAP Spring Conference.
A CV is only a single part of the application process for any job Employers will often use it as a reference in an interview Its your chance to show.
10 Tips for Your First Year on the Job Presented by Clark University Career Services.
Respect for All: Digital Footprint. Lesson Objectives: Students will be able to …  Define the term digital footprint and understand how their actions.
Christina Gilleland Jonathan Carrasco Sam Peterson Thomas McIntyre.
Contents Click the link below to go directly to the slides for that chapter. Chapter 1 ■ Your Personal Strengths Chapter 2 ■ The Roles You Play Chapter.
A professional approach. H OW TO GET A JOB. T HE PROCESS  Four simple steps to get a job. 1. Have a Resume 2. Interviewing skills and proper etiquette.
Updated Job Search Strategies Chapter 6. How can you increase your chances of employment while in college?
By Michael Gabriel Sumastre Mr. Endicott Personal Career Planning Class.
Netiquette Rules.
Evidence. Sending with attachment As you can see I have attached a file which I would then continue to send to the recipient.
Contents Click the link below to go directly to the slides for that chapter. Chapter 1 ■ Your Personal Strengths Chapter 2 ■ The Roles You Play Chapter.
Signing and Encrypting With the Thawte Web of Trust CSU Professional Development Institute January 8, 2009 Steve Lovaas.
SUMMER WORK AND TRAVEL Program Orientation. Welcome Welcome to CENET: Cultural Exchange Network’s Summer Work and Travel Program. I would like to take.
Copyright © 2010 Pearson Education InternationalChapter Building Careers and Writing Résumés.
The laws Organizations are covered by lots of different laws
Professional Courtesies in the Job Search Chapter 9.
FOR EMPLOYEE MONITORING By: Tabitha Seehousen Section: August 11, 2010.
Information Asset Classification
 By: Mallory Mayert & Brooke Atkins.  Introduction Introduction  Why This Topic? Why This Topic?  Harmful Effects Harmful Effects  How to Choose.
6.02 Understand procedures for gaining employment.
Jennifer Grassano Career Services Coordinator Fine Arts
Unit 2: Managing the development of self and others Life Science and Chemical Science Professionals Higher Apprenticeships Unit 2 Managing the development.
COLLEGE NIGHT March 20, What are you looking for in a college?  Academic Programs / Major  Location – rural, suburban, urban  Size – small: ;
© Prentice Hall, 2008 Business Communication Today, 9eChapter Building Careers and Writing Résumés.
© Prentice Hall, 2008 Excellence in Business Communication, 8eChapter Building Careers and Writing Résumés.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Los Angeles Youth At Work Larry Tash Los Angeles Chamber of Commerce UNITE-LA.
Finding A Job. Finding a job IS a FULL Time job!
Copyright © 2010 Pearson Education, Inc. publishing as Prentice HallChapter Building Careers and Writing Résumés.
 Facebook  Twitter  MySpace  Windows LiveSpace.
THE WORLD BANK World Bank Group Multilateral Investment Guarantee Agency Developing a Systematic Approach to Dealing with Investor Inquiries Kathy Khuu.
Finding and Applying for Jobs. Sources of Job leads 1.Networking 2.Professional and Trade Organizations 3.Job/Career Fairs.
Have your say We want to make sure postgraduate students have the best possible experience. To do that we need to know what you think, if we are doing.
Cindy Sierra Gloria Advantages Employers want to be sure that no correspondence is being sent that may have an adverse effect on their company. Monitoring.
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Monitoring Employees on Networks: Unethical or Good Business?
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
How to use ? By Martyna Haliniak. How to log on? In order to log on, you have to type in your username & password in the text boxes, and then click.
R E S U M E S. What is a Resume? It’s a brief history of your accomplishments and experience that you prepare for future potential employers.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
Preparing s Using Etiquette Lesson A4-3.
Preparing s Using Etiquette. Learning Objectives Define . List the parts of an and an header. List rules for etiquette.
NEW MEDIA COMMUNICATION. NETWORKING INFORMATION EXCHANGE COMMUNICATION.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Building Careers and Writing Résumés PITALOKA, SE.ME.
Get the Job You Want Your Résumé: Your First Contact Employers use résumés to choose a short list of applicants to invite to a job interview. What Makes.
 Facebook is a public social network, and employers think they have the right to view the information on Facebook.  One signs the ‘fine print’ allowing.
Digital Citizenship Project Kimberly Robbins. “Advances in computer technology and the Internet have changed the way America works, learns, and communicates.
Online Safety and Privacy Understanding online privacy and how your information is shared.
Choosing Your Career Path Chapter 19. Learning About the World of Work 19:1.
University of California Fall 2016 Application Workshop Overview Overview Application Application.
Have your say We want to make sure postgraduate students have the best possible experience. To do that we need to know what you think, if we are doing.
Teachers must identify the site in order to let the students use it.
A CCEPTABLE U SE P OLICY Adrienne Ochs EDU D EFINITION Set of rules enforced by one who runs a network, website or a large computer system that.
Riverside Primary School Parent Meeting st Century Learners – a few facts: young people aged had the highest rate of internet use at June.
CCR Exam Review. Cover Letter Tip #1 Don’t waste words. Say what you need to say and then end it.
Proper Internet and Social Media Usage Internet Usage While on Premise Board Policy GBEAA (The Internet Acceptable Use Policy): “Employees will.
Social Media: The Do’s and Don’ts for Administrators Presented on August 5, 2014 By Laura L. Holmes of.
NETIQUETTE TUTORIAL GUIDELINES YOU SHOULD FOLLOW ONLINE.
Copyright © 2010 Pearson Education, Inc. publishing as Prentice HallChapter Building Careers and Writing Résumés.
Life Hacks for your professional identity
Birmingham Undergraduate Internship Programme (BUIP)
Unit 4 IT Security.
Data Sheets and Job Applications
Career Pathways Thursday, September 28th.
Resilience for Success
Digital Identity Digital Identity is the concept of adopting an online presence or networked identity in cyberspace by an individual or an organization.
Presentation transcript:

Online Etiquette Tomas Miller Eileen Dunn

How do businesses monitor employee activities online?  Businesses do this to make sure their employees are not doing anything that could potentially harm the company  Technology today makes it easier to find the history of activities  Can check history, social networking sites, monitor call history and voice mail

Why businesses and colleges monitor social networking for applicants  What they look for:  Plagiarism  Vulgarities  Consumption of alcohol  Illegal activities  What they expect to see:  Academic strengths  Extra curricular activities  Scholastic awards and achievements  Information that displays maturity

Why you should use proper grammar in business communication  To make sure wording is clear for reader to understand  They are aware of what needs to be done  To be able to present yourself professionally

Use of in permanent records  is one of the least secure methods of communication, they are easily accessed  Most employers make the employees sign technology monitoring agreements, where they gain the right to monitor any s sent during work time.  The only way to ensure the s stay private is to encrypt them.