Académique Documents
Professionnel Documents
Culture Documents
Mackie Barber
#1: Cyberbullying
Most of the time the bully isnt around their victim while the
bullying is taking place
Some bad sites might still slip through, and some sites that are
perfectly fine might be flagged
Make sure that you arent hurting your chances of making a good
impression by posting things you shouldnt
Even if you have your own passwords, the company can still get into
the records of what you are doing with their computer
A work computer is most likely intended for you to do your work
#7: Phishing
Websites may try to gain access to your social media sites or email
This could put not only you, but also your company at
risk
#8: Streaming
Streaming music and videos constantly can really slow down the
network for everyone
You are paid to work, not watch videos and listen to music
#9: Spyware
Again, only visit reputable sites that you know and trust
#10: Harassment
Stay professional
People cannot hear the tone you put behind the words and may
interpret them differently than intended
Dont bring personal opinions or biases into the workplace
Sources
Best Ways. (n.d.). Best Ways Swimming Pools. Retrieved November 10, 2016, from http://www.bestwayswimmingpools.co.uk/section/16/1/pool-heaters-filter-pumps-cartridges
Chmielewski, D. C. (2014). CES 2014: Internet streaming device maker unveils the Roku TV. Retrieved November 10, 2016, from
http://articles.latimes.com/2014/jan/05/entertainment/la-et-ct-ces-internet-streaming-devicemaker-unveils-the-roku-tv-20140105
Clipart Kid. (n.d.). Retrieved November 10, 2016, from http://www.clipartkid.com/snoopy-joe-cool-cliparts/
CLM Internship Program Blog. (n.d.). Retrieved November 10, 2016, from http://clminternship.org/blog/?tag=seeds-of-success
Copyright Authority. (n.d.). Copyright Symbol. Retrieved November 10, 2016, from http://www.copyrightauthority.com/html-copyright-code.htm
Cyberbully. (2011). Retrieved November 10, 2016, from http://www.imdb.com/title/tt1930315/
Employee Internet Usage - FindLaw. (n.d.). Retrieved November 10, 2016, from
http://smallbusiness.findlaw.com/employment-law-and-human-resources/employee-internet-usage.html
How to remove spyware from an iPhone or iPad. (n.d.). Retrieved November 10, 2016, from https://www.certosoftware.com/how-to-remove-spyware-from-an-iphone-or-ipad
Internet Harassment - SEXUAL HARASSMENT ON THE INTERNET. (n.d.). Retrieved November 10, 2016, from
http://www.unc.edu/courses/2010spring/law/357c/001/internetharassment/internet-harassment.html
January 3, 2014 by CJ Castillo | Tags business cable, business internet. (2014). Top 5 Risks of Employee Internet Usage. Retrieved November 10, 2016, from
http://www.bandwidthplace.com/top-5-risks-of-employee-internet-usage-article/
Phishing Scams. (n.d.). Retrieved November 10, 2016, from http://www.uidaho.edu/infrastructure/its/departments/security/phishing-scams
Sandvick, J. C. (n.d.). Deal With an Online Predator. Retrieved November 10, 2016, from http://www.wikihow.com/Deal-With-an-Online-Predator
WebMD. (n.d.). 4 Dangers of the Internet. Retrieved November 10, 2016, from http://www.webmd.com/parenting/features/4-dangers-internet#1