Page 1
11.1 Introduct Ion In recent years, the world around us has seen a lot
of changes due to use of ‘Digital Technologies’. These
changes have made a dramatic impact on our lives,
making things more convenient, faster, and easier to
handle. In the past, a letter would take days to reach,
and every recipient would get his or her own copy
and respond separately. Today, one can send and
receive emails to more than one person at a time. The
instantaneous nature of electronic communications has
made us more efficient and productive.
From the banking industry to aviation, industrial
production to e-commerce, especially with regard to the
delivery of their goods and services, all are now dependent
on the use of computers and digital technologies.
Applications of digital technologies have redefined and
evolved all spheres of human activities. Today more
and more people are using digital technologies through
smartphones, computers, etc., with the help of high
speed Internet.
Why did the digital technologies become so
widespread? The introduction of personal computers
(PCs) and Internet followed by smartphones has brought
these technologies to the common man.
While we reap the benefits of digital technologies,
these technologies can also be misused. Let’s look at
the impact of these technologies on our society and the
best practices that can ensure a productive and safe
digital environment for us.
11.2 d Ig Ital Footpr Ints Have you ever searched online for any information?
Have you ever purchased an online ticket, or responded
to your friend’s email, or checked the score of a
“I think computer viruses
should count as life. I think it
says something about human
nature that the only form of
life we have created so far
is purely destructive. We’ve
created life in our own image.”
– Stephen Hawking
Chapter 11
Societal Impact
In this chapter
» Introduction
» Digital Footprint
» Digital Society and
Netizen
» Data Protection
» Cyber Crime
» Indian IT Act
» Impact on Health
Ch 11.indd 229 08-Apr-19 12:31:10 PM
2024-25
Page 2
11.1 Introduct Ion In recent years, the world around us has seen a lot
of changes due to use of ‘Digital Technologies’. These
changes have made a dramatic impact on our lives,
making things more convenient, faster, and easier to
handle. In the past, a letter would take days to reach,
and every recipient would get his or her own copy
and respond separately. Today, one can send and
receive emails to more than one person at a time. The
instantaneous nature of electronic communications has
made us more efficient and productive.
From the banking industry to aviation, industrial
production to e-commerce, especially with regard to the
delivery of their goods and services, all are now dependent
on the use of computers and digital technologies.
Applications of digital technologies have redefined and
evolved all spheres of human activities. Today more
and more people are using digital technologies through
smartphones, computers, etc., with the help of high
speed Internet.
Why did the digital technologies become so
widespread? The introduction of personal computers
(PCs) and Internet followed by smartphones has brought
these technologies to the common man.
While we reap the benefits of digital technologies,
these technologies can also be misused. Let’s look at
the impact of these technologies on our society and the
best practices that can ensure a productive and safe
digital environment for us.
11.2 d Ig Ital Footpr Ints Have you ever searched online for any information?
Have you ever purchased an online ticket, or responded
to your friend’s email, or checked the score of a
“I think computer viruses
should count as life. I think it
says something about human
nature that the only form of
life we have created so far
is purely destructive. We’ve
created life in our own image.”
– Stephen Hawking
Chapter 11
Societal Impact
In this chapter
» Introduction
» Digital Footprint
» Digital Society and
Netizen
» Data Protection
» Cyber Crime
» Indian IT Act
» Impact on Health
Ch 11.indd 229 08-Apr-19 12:31:10 PM
2024-25
Computer SCien Ce – Cla SS xi 230
game online? Whenever we surf the Internet using
smartphones, tablets, computers, etc., we leave a trail
of data reflecting the activities performed by us online,
which is our digital footprint.
Our digital footprint can be created and used with
or without our knowledge. It includes websites we visit,
emails we send, and any information we submit online,
etc., along with the computer’s IP address, location, and
other device specific details. Such data could be used
for targeted advertisement or could also be misused or
exploited. Thus, it is good to be aware of the data trail we
might be leaving behind. This awareness should make
us cautious about what we write, upload or download
or even browse online.
There are two kinds of digital footprints we
leave behind. Active digital footprints which
includes data that we intentionally submit online.
This would include emails we write, or responses
or posts we make on different websites or mobile
Apps, etc. The digital data trail we leave online
unintentionally is called passive digital footprints.
This includes the data generated when we visit a
website, use a mobile App, browse Internet, etc.,
as shown in Figure 11.1.
Everyone who is connected to the Internet may
have a digital footprint. With more usage, the trail
grows. On examining the browser settings, we
can find out how it stores our browsing history,
cookies, passwords, auto fills, and many other
types of data.
Besides browser, most of our digital footprints
are stored in servers where the applications are
hosted. We may not have access to remove or
erase that data, neither do we have any control
on how that data will be used. Therefore, once
a data trail is generated, even if we later try to
erase data about our online activities, the digital
footprints still remain. There is no guarantee that
digital footprints will be fully eliminated from the
Internet. Therefore, we need to be more cautious
while being online! All our online activities leave a data
trace on the Internet as well as on the computing device
that we use. This can be used to trace the user, his/her
location, device and other usage details.
Figure 11.1: Exemplar web
applications that result in digital
footprints
Can your digital
footprints be used to
judge your attitude
and work ethics?
Think and Reflect
Ch 11.indd 230 08-Apr-19 12:31:59 PM
2024-25
Page 3
11.1 Introduct Ion In recent years, the world around us has seen a lot
of changes due to use of ‘Digital Technologies’. These
changes have made a dramatic impact on our lives,
making things more convenient, faster, and easier to
handle. In the past, a letter would take days to reach,
and every recipient would get his or her own copy
and respond separately. Today, one can send and
receive emails to more than one person at a time. The
instantaneous nature of electronic communications has
made us more efficient and productive.
From the banking industry to aviation, industrial
production to e-commerce, especially with regard to the
delivery of their goods and services, all are now dependent
on the use of computers and digital technologies.
Applications of digital technologies have redefined and
evolved all spheres of human activities. Today more
and more people are using digital technologies through
smartphones, computers, etc., with the help of high
speed Internet.
Why did the digital technologies become so
widespread? The introduction of personal computers
(PCs) and Internet followed by smartphones has brought
these technologies to the common man.
While we reap the benefits of digital technologies,
these technologies can also be misused. Let’s look at
the impact of these technologies on our society and the
best practices that can ensure a productive and safe
digital environment for us.
11.2 d Ig Ital Footpr Ints Have you ever searched online for any information?
Have you ever purchased an online ticket, or responded
to your friend’s email, or checked the score of a
“I think computer viruses
should count as life. I think it
says something about human
nature that the only form of
life we have created so far
is purely destructive. We’ve
created life in our own image.”
– Stephen Hawking
Chapter 11
Societal Impact
In this chapter
» Introduction
» Digital Footprint
» Digital Society and
Netizen
» Data Protection
» Cyber Crime
» Indian IT Act
» Impact on Health
Ch 11.indd 229 08-Apr-19 12:31:10 PM
2024-25
Computer SCien Ce – Cla SS xi 230
game online? Whenever we surf the Internet using
smartphones, tablets, computers, etc., we leave a trail
of data reflecting the activities performed by us online,
which is our digital footprint.
Our digital footprint can be created and used with
or without our knowledge. It includes websites we visit,
emails we send, and any information we submit online,
etc., along with the computer’s IP address, location, and
other device specific details. Such data could be used
for targeted advertisement or could also be misused or
exploited. Thus, it is good to be aware of the data trail we
might be leaving behind. This awareness should make
us cautious about what we write, upload or download
or even browse online.
There are two kinds of digital footprints we
leave behind. Active digital footprints which
includes data that we intentionally submit online.
This would include emails we write, or responses
or posts we make on different websites or mobile
Apps, etc. The digital data trail we leave online
unintentionally is called passive digital footprints.
This includes the data generated when we visit a
website, use a mobile App, browse Internet, etc.,
as shown in Figure 11.1.
Everyone who is connected to the Internet may
have a digital footprint. With more usage, the trail
grows. On examining the browser settings, we
can find out how it stores our browsing history,
cookies, passwords, auto fills, and many other
types of data.
Besides browser, most of our digital footprints
are stored in servers where the applications are
hosted. We may not have access to remove or
erase that data, neither do we have any control
on how that data will be used. Therefore, once
a data trail is generated, even if we later try to
erase data about our online activities, the digital
footprints still remain. There is no guarantee that
digital footprints will be fully eliminated from the
Internet. Therefore, we need to be more cautious
while being online! All our online activities leave a data
trace on the Internet as well as on the computing device
that we use. This can be used to trace the user, his/her
location, device and other usage details.
Figure 11.1: Exemplar web
applications that result in digital
footprints
Can your digital
footprints be used to
judge your attitude
and work ethics?
Think and Reflect
Ch 11.indd 230 08-Apr-19 12:31:59 PM
2024-25
Societal i mpact 231
11.3 Digital Society an D n etizen As our society is inclined towards using more and
more digital technologies, we end up managing most
of our tasks digitally. In this era of digital society, our
daily activities like communication, social networking,
banking, shopping, entertainment, education,
transportation, etc., are increasingly being driven by
online transactions.
Digital society thus reflects the growing trend of
using digital technologies in all spheres of human
activities. But while online, all of us need to be aware
of how to conduct ourselves, how best to relate with
others and what ethics, morals and values to maintain.
Anyone who uses digital technology along with Internet
is a digital citizen or a netizen. Being a good netizen
means practicing safe, ethical and legal use of digital
technology. A responsible netizen must abide by
net etiquettes, communication etiquettes and social
media etiquettes.
11.3.1 Net Etiquettes
We follow certain etiquettes during our social
interactions. Similarly, we need to exhibit
proper manners and etiquettes while being
online as shown in Figure 11.2. One should
be ethical, respectful and responsible while
surfing the Internet.
(A) Be Ethical
• No copyright violation: we should not
use copyrighted materials without the
permission of the creator or owner. As
an ethical digital citizen, we need to be
careful while streaming audio or video
or downloading images and files from
the Internet. We will learn more about
copyright in Section 11.4.
• Share the expertise: it is good to share information
and knowledge on Internet so that others can
access it. However, prior to sharing information, we
need to be sure that we have sufficient knowledge
on that topic. The information shared should be
true and unambiguous. Also, in order to avoid
Activity 11.1
As a digital citizen, list
various services that
you avail online.
Figure 11.2: Net Etiquettes
Ch 11.indd 231 21-May-19 12:42:48 PM
2024-25
Page 4
11.1 Introduct Ion In recent years, the world around us has seen a lot
of changes due to use of ‘Digital Technologies’. These
changes have made a dramatic impact on our lives,
making things more convenient, faster, and easier to
handle. In the past, a letter would take days to reach,
and every recipient would get his or her own copy
and respond separately. Today, one can send and
receive emails to more than one person at a time. The
instantaneous nature of electronic communications has
made us more efficient and productive.
From the banking industry to aviation, industrial
production to e-commerce, especially with regard to the
delivery of their goods and services, all are now dependent
on the use of computers and digital technologies.
Applications of digital technologies have redefined and
evolved all spheres of human activities. Today more
and more people are using digital technologies through
smartphones, computers, etc., with the help of high
speed Internet.
Why did the digital technologies become so
widespread? The introduction of personal computers
(PCs) and Internet followed by smartphones has brought
these technologies to the common man.
While we reap the benefits of digital technologies,
these technologies can also be misused. Let’s look at
the impact of these technologies on our society and the
best practices that can ensure a productive and safe
digital environment for us.
11.2 d Ig Ital Footpr Ints Have you ever searched online for any information?
Have you ever purchased an online ticket, or responded
to your friend’s email, or checked the score of a
“I think computer viruses
should count as life. I think it
says something about human
nature that the only form of
life we have created so far
is purely destructive. We’ve
created life in our own image.”
– Stephen Hawking
Chapter 11
Societal Impact
In this chapter
» Introduction
» Digital Footprint
» Digital Society and
Netizen
» Data Protection
» Cyber Crime
» Indian IT Act
» Impact on Health
Ch 11.indd 229 08-Apr-19 12:31:10 PM
2024-25
Computer SCien Ce – Cla SS xi 230
game online? Whenever we surf the Internet using
smartphones, tablets, computers, etc., we leave a trail
of data reflecting the activities performed by us online,
which is our digital footprint.
Our digital footprint can be created and used with
or without our knowledge. It includes websites we visit,
emails we send, and any information we submit online,
etc., along with the computer’s IP address, location, and
other device specific details. Such data could be used
for targeted advertisement or could also be misused or
exploited. Thus, it is good to be aware of the data trail we
might be leaving behind. This awareness should make
us cautious about what we write, upload or download
or even browse online.
There are two kinds of digital footprints we
leave behind. Active digital footprints which
includes data that we intentionally submit online.
This would include emails we write, or responses
or posts we make on different websites or mobile
Apps, etc. The digital data trail we leave online
unintentionally is called passive digital footprints.
This includes the data generated when we visit a
website, use a mobile App, browse Internet, etc.,
as shown in Figure 11.1.
Everyone who is connected to the Internet may
have a digital footprint. With more usage, the trail
grows. On examining the browser settings, we
can find out how it stores our browsing history,
cookies, passwords, auto fills, and many other
types of data.
Besides browser, most of our digital footprints
are stored in servers where the applications are
hosted. We may not have access to remove or
erase that data, neither do we have any control
on how that data will be used. Therefore, once
a data trail is generated, even if we later try to
erase data about our online activities, the digital
footprints still remain. There is no guarantee that
digital footprints will be fully eliminated from the
Internet. Therefore, we need to be more cautious
while being online! All our online activities leave a data
trace on the Internet as well as on the computing device
that we use. This can be used to trace the user, his/her
location, device and other usage details.
Figure 11.1: Exemplar web
applications that result in digital
footprints
Can your digital
footprints be used to
judge your attitude
and work ethics?
Think and Reflect
Ch 11.indd 230 08-Apr-19 12:31:59 PM
2024-25
Societal i mpact 231
11.3 Digital Society an D n etizen As our society is inclined towards using more and
more digital technologies, we end up managing most
of our tasks digitally. In this era of digital society, our
daily activities like communication, social networking,
banking, shopping, entertainment, education,
transportation, etc., are increasingly being driven by
online transactions.
Digital society thus reflects the growing trend of
using digital technologies in all spheres of human
activities. But while online, all of us need to be aware
of how to conduct ourselves, how best to relate with
others and what ethics, morals and values to maintain.
Anyone who uses digital technology along with Internet
is a digital citizen or a netizen. Being a good netizen
means practicing safe, ethical and legal use of digital
technology. A responsible netizen must abide by
net etiquettes, communication etiquettes and social
media etiquettes.
11.3.1 Net Etiquettes
We follow certain etiquettes during our social
interactions. Similarly, we need to exhibit
proper manners and etiquettes while being
online as shown in Figure 11.2. One should
be ethical, respectful and responsible while
surfing the Internet.
(A) Be Ethical
• No copyright violation: we should not
use copyrighted materials without the
permission of the creator or owner. As
an ethical digital citizen, we need to be
careful while streaming audio or video
or downloading images and files from
the Internet. We will learn more about
copyright in Section 11.4.
• Share the expertise: it is good to share information
and knowledge on Internet so that others can
access it. However, prior to sharing information, we
need to be sure that we have sufficient knowledge
on that topic. The information shared should be
true and unambiguous. Also, in order to avoid
Activity 11.1
As a digital citizen, list
various services that
you avail online.
Figure 11.2: Net Etiquettes
Ch 11.indd 231 21-May-19 12:42:48 PM
2024-25
Computer SCien Ce – Cla SS xi 232
redundant information, we should verify that the
information is not available already on Internet.
(B) Be Respectful
• Respect privacy: as good digital citizens we
have the right to privacy and the freedom of
personal expression. At the same time, we have
to understand that other digital citizens also
have the same rights and freedoms. Our personal
communication with a digital citizen may include
images, documents, files, etc., that are private
to both. We should respect this privacy and
should not share those images, documents, files,
etc., with any other digital citizen without each
others’ consent.
• Respect diversity: in a group or public forum,
we should respect the diversity of the people
in terms of knowledge, experience, culture and
other aspects.
(C) Be Responsible
• Avoid cyber bullying: any insulting, degrading
or intimidating online behaviour like repeated
posting of rumours, giving threats online,
posting the victim’s personal information, sexual
harassment or comments aimed to publicly
ridicule a victim is termed as cyber bullying.
It implies repeatedly targeting someone with
intentions to hurt or embarrass. Perhaps new or
non-frequent users of the Internet feel that things
done online have no effect in the real world. We
need to realise that bullying online can have very
serious implications on the other person (victim).
Also, remember our actions can be traced back
using our digital footprints.
• Don’t feed the troll: an Internet troll is a person
who deliberately sows discord on the Internet by
starting quarrels or upsetting people, by posting
inflammatory or off topic messages in an online
community, just for amusement. Since trolls thrive
on attention, the best way to discourage trolls is
not to pay any attention to their comments.
11.3.2 Communication Etiquettes
Digital communication includes email, texting, instant
messaging, talking on the cell phone, audio or video
Remember!!
While surfing the Internet,
we should be cautious
about our personal and
confidential data.
v Think before sharing
credentials with others
on an online platform.
v Keep personal
information safe and
protected through
passwords.
Activity 11.2
Find out how to report
about an abusive or
inappropriate post or
about a sender in a
social network?
Ch 11.indd 232 08-Apr-19 12:32:00 PM
2024-25
Page 5
11.1 Introduct Ion In recent years, the world around us has seen a lot
of changes due to use of ‘Digital Technologies’. These
changes have made a dramatic impact on our lives,
making things more convenient, faster, and easier to
handle. In the past, a letter would take days to reach,
and every recipient would get his or her own copy
and respond separately. Today, one can send and
receive emails to more than one person at a time. The
instantaneous nature of electronic communications has
made us more efficient and productive.
From the banking industry to aviation, industrial
production to e-commerce, especially with regard to the
delivery of their goods and services, all are now dependent
on the use of computers and digital technologies.
Applications of digital technologies have redefined and
evolved all spheres of human activities. Today more
and more people are using digital technologies through
smartphones, computers, etc., with the help of high
speed Internet.
Why did the digital technologies become so
widespread? The introduction of personal computers
(PCs) and Internet followed by smartphones has brought
these technologies to the common man.
While we reap the benefits of digital technologies,
these technologies can also be misused. Let’s look at
the impact of these technologies on our society and the
best practices that can ensure a productive and safe
digital environment for us.
11.2 d Ig Ital Footpr Ints Have you ever searched online for any information?
Have you ever purchased an online ticket, or responded
to your friend’s email, or checked the score of a
“I think computer viruses
should count as life. I think it
says something about human
nature that the only form of
life we have created so far
is purely destructive. We’ve
created life in our own image.”
– Stephen Hawking
Chapter 11
Societal Impact
In this chapter
» Introduction
» Digital Footprint
» Digital Society and
Netizen
» Data Protection
» Cyber Crime
» Indian IT Act
» Impact on Health
Ch 11.indd 229 08-Apr-19 12:31:10 PM
2024-25
Computer SCien Ce – Cla SS xi 230
game online? Whenever we surf the Internet using
smartphones, tablets, computers, etc., we leave a trail
of data reflecting the activities performed by us online,
which is our digital footprint.
Our digital footprint can be created and used with
or without our knowledge. It includes websites we visit,
emails we send, and any information we submit online,
etc., along with the computer’s IP address, location, and
other device specific details. Such data could be used
for targeted advertisement or could also be misused or
exploited. Thus, it is good to be aware of the data trail we
might be leaving behind. This awareness should make
us cautious about what we write, upload or download
or even browse online.
There are two kinds of digital footprints we
leave behind. Active digital footprints which
includes data that we intentionally submit online.
This would include emails we write, or responses
or posts we make on different websites or mobile
Apps, etc. The digital data trail we leave online
unintentionally is called passive digital footprints.
This includes the data generated when we visit a
website, use a mobile App, browse Internet, etc.,
as shown in Figure 11.1.
Everyone who is connected to the Internet may
have a digital footprint. With more usage, the trail
grows. On examining the browser settings, we
can find out how it stores our browsing history,
cookies, passwords, auto fills, and many other
types of data.
Besides browser, most of our digital footprints
are stored in servers where the applications are
hosted. We may not have access to remove or
erase that data, neither do we have any control
on how that data will be used. Therefore, once
a data trail is generated, even if we later try to
erase data about our online activities, the digital
footprints still remain. There is no guarantee that
digital footprints will be fully eliminated from the
Internet. Therefore, we need to be more cautious
while being online! All our online activities leave a data
trace on the Internet as well as on the computing device
that we use. This can be used to trace the user, his/her
location, device and other usage details.
Figure 11.1: Exemplar web
applications that result in digital
footprints
Can your digital
footprints be used to
judge your attitude
and work ethics?
Think and Reflect
Ch 11.indd 230 08-Apr-19 12:31:59 PM
2024-25
Societal i mpact 231
11.3 Digital Society an D n etizen As our society is inclined towards using more and
more digital technologies, we end up managing most
of our tasks digitally. In this era of digital society, our
daily activities like communication, social networking,
banking, shopping, entertainment, education,
transportation, etc., are increasingly being driven by
online transactions.
Digital society thus reflects the growing trend of
using digital technologies in all spheres of human
activities. But while online, all of us need to be aware
of how to conduct ourselves, how best to relate with
others and what ethics, morals and values to maintain.
Anyone who uses digital technology along with Internet
is a digital citizen or a netizen. Being a good netizen
means practicing safe, ethical and legal use of digital
technology. A responsible netizen must abide by
net etiquettes, communication etiquettes and social
media etiquettes.
11.3.1 Net Etiquettes
We follow certain etiquettes during our social
interactions. Similarly, we need to exhibit
proper manners and etiquettes while being
online as shown in Figure 11.2. One should
be ethical, respectful and responsible while
surfing the Internet.
(A) Be Ethical
• No copyright violation: we should not
use copyrighted materials without the
permission of the creator or owner. As
an ethical digital citizen, we need to be
careful while streaming audio or video
or downloading images and files from
the Internet. We will learn more about
copyright in Section 11.4.
• Share the expertise: it is good to share information
and knowledge on Internet so that others can
access it. However, prior to sharing information, we
need to be sure that we have sufficient knowledge
on that topic. The information shared should be
true and unambiguous. Also, in order to avoid
Activity 11.1
As a digital citizen, list
various services that
you avail online.
Figure 11.2: Net Etiquettes
Ch 11.indd 231 21-May-19 12:42:48 PM
2024-25
Computer SCien Ce – Cla SS xi 232
redundant information, we should verify that the
information is not available already on Internet.
(B) Be Respectful
• Respect privacy: as good digital citizens we
have the right to privacy and the freedom of
personal expression. At the same time, we have
to understand that other digital citizens also
have the same rights and freedoms. Our personal
communication with a digital citizen may include
images, documents, files, etc., that are private
to both. We should respect this privacy and
should not share those images, documents, files,
etc., with any other digital citizen without each
others’ consent.
• Respect diversity: in a group or public forum,
we should respect the diversity of the people
in terms of knowledge, experience, culture and
other aspects.
(C) Be Responsible
• Avoid cyber bullying: any insulting, degrading
or intimidating online behaviour like repeated
posting of rumours, giving threats online,
posting the victim’s personal information, sexual
harassment or comments aimed to publicly
ridicule a victim is termed as cyber bullying.
It implies repeatedly targeting someone with
intentions to hurt or embarrass. Perhaps new or
non-frequent users of the Internet feel that things
done online have no effect in the real world. We
need to realise that bullying online can have very
serious implications on the other person (victim).
Also, remember our actions can be traced back
using our digital footprints.
• Don’t feed the troll: an Internet troll is a person
who deliberately sows discord on the Internet by
starting quarrels or upsetting people, by posting
inflammatory or off topic messages in an online
community, just for amusement. Since trolls thrive
on attention, the best way to discourage trolls is
not to pay any attention to their comments.
11.3.2 Communication Etiquettes
Digital communication includes email, texting, instant
messaging, talking on the cell phone, audio or video
Remember!!
While surfing the Internet,
we should be cautious
about our personal and
confidential data.
v Think before sharing
credentials with others
on an online platform.
v Keep personal
information safe and
protected through
passwords.
Activity 11.2
Find out how to report
about an abusive or
inappropriate post or
about a sender in a
social network?
Ch 11.indd 232 08-Apr-19 12:32:00 PM
2024-25
Societal i mpact 233
conferencing, posting on forums, social
networking sites, etc. All these are
great ways to connect with people in
order to exchange ideas, share data
and knowledge. Good communication
over email, chat room and other such
forums require a digital citizen to abide
by the communication etiquettes as
shown in Figure 11.3.
(A) Be Precise
• Respect time: we should not waste
precious time in responding to
unnecessary emails or comments
unless they have some relevance for us. Also, we
should not always expect an instant response as
the recipient may have other priorities.
• Respect data limits: For concerns related to data
and bandwidth, very large attachments may be
avoided. Rather send compressed files or link of
the files through cloud shared storage like Google
Drive, Microsoft OneDrive, Yahoo Dropbox, etc.
(B) Be Polite
Whether the communication is synchronous (happening
in real time like chat, audio/video calls) or asynchronous
(like email, forum post or comments), we should be
polite and non-aggressive in our communication. We
should avoid being abusive even if we don’t agree with
others’ point of view.
(C) Be Credible
We should be cautious while making a comment,
replying or writing an email or forum post as such acts
decide our credibility over a period of time. That is how
we decide to follow some particular person’s forum posts
while ignoring posts of other members of the forum. On
various discussion forums, we usually try to go through
the previous comments of a person and judge their
credibility before relying on that person’s comments.
11.3.3 Social Media Etiquettes
In the current digital era, we are familiar with different
kinds social media and we may have an account on
Facebook, Google+, Twitter, Instagram, Pinterest, or
the YouTube channel. Social media are websites or
Avoid Spam!!
On receiving junk email
(called Spam), neither
reply nor open any
attachment in such
email.
No Permanent Deletion!!
We can post or comment
anything on Internet, and
delete it later.
v But remember,
it cannot be
permanently deleted.
It is recorded in our
Digital Footprint.
v This is how many
culprits who spread
hate, bully others or
engage in criminal
activities are traced
and apprehended.
Figure 11.3: Communication etiquettes
Be
Precise
Respect
Time
Respect
Data
Limits
Be
Polite
Be
Credible
Communication Etiquettes
Ch 11.indd 233 08-Apr-19 12:32:00 PM
2024-25
Read More