Lesson 8. Policies, Laws and Guidelines in Nursing Informatics

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

Nursing Informatics • This rule is very important in nursing informatics for

it involves information distributed online.


Lesson 8. Policies, Laws and Guidelines in Nursing
Informatics • It shall protect and secure the exclusive rights of
scientists, inventors, artists and other gifted citizens
to their intellectual property and creations,
Policy, Law and Guidelines particularly when beneficial to the people, for such
LAW period.
• A set of standards, principles, and procedures that o This protects your rights to what you produced
must be followed in society. or created for it has its own renumeration or a
• It is mainly made for implementing justice in the monetary value.
society. • Intellectual property refers to anything created by
o The laws underwent legal procedures. someone, including but not limited to inventions,
• A law is more formal as it is a system of rules and literary works, items created by artists (such as
guidelines that are derived for the welfare and artwork and musical pieces), symbols, designs,
equity in society. images, pictures, and even names that are used for
commercial purposes.
POLICYn • The Intellectual Property Code of the Philippines is
• This outlines what a government is going to do and divided into five [5] parts, by which:
what it can achieve for the society as a whole. 1. The Intellectual Property Office
• This pertains to what a government does not intend 9 A government agency that is in charge for
to do. the collection of intellectual properties
• It also evolves the principles that are needed for and conflicts about it.
achieving the goal. 2. The Law on Patents
• Policies are only documents and not law, but these 9 A branch of the agency that deals with new
policies can lead to new laws. inventions and its manner of creation.
• It is a set of rules that guide an organization or 3. The Law on Trademarks, Service Marks and
government. Trade Names
• This is considered as informal and it complies to the 9 Trademarks pertains on symbols or goods
law. of an enterprise while trade names
pertains on the name of an enterprise
GUIDELINES 9 Service marks pertains to the services
• These are recommendations to users when specific made by an enterprise.
standards do not apply. 4. The Law on Copyright
• Guidelines are designed to streamline certain 9 This pertains to the law regarding illegal
processes according to what the best practices are. distribution of information from books
• Guidelines, by nature, should be open to created without recognizing the creator.
interpretation and do not need to be followed to the 5. Final Provisions
letter. 9 This pertains to “final causes” or those
• This can be deleted and can be changed. people who are only recognize in using the
products and etc.
Laws in Nursing Informatics 9 This pertains to a set of guidelines to
THE DIFFERENT LAWS IN NURSING INFORMATICS follow.
• There are a diverse set of laws towards nursing
OFFICE OF THE INTELLECTUAL PROPERTY IN THEn
informatics, such as:
nPHILIPPINES
o Intellectual Property Code of the Philippines
o Copyright Law • Several categories wherein a creator or innovator
o Data Privacy Act can register their creation:
o Patent
• There are also other laws such as:
o Trademark
o Electronic Commerce Act
o Copyright
o Anti-Wiretapping Law
o An Act Defining Cybercrime

INTELLECTUAL PROPERTY CODE OF THE PHILIPPINES


• This is also known as RA. 8293
PATENT ensuring free flow of information to promote
• The exclusive rights to a product or process, as well innovation and growth.” (Republic Act. No. 10173,
as its improvements—granted that the product or Ch. 1, Sec. 2).
process offers something new and useful. o Every information given to establishments are
• The owner is given enough time to gain ample in kept for privacy.
commercial returns. • It is established as a National Privacy Commission
• An example of these are: that enforces and oversees it and is endowed with
o New and useful machines, products and rulemaking power.
processes (non-biological and microbiological • An act protecting individual personal information in
in nature) information and communications systems in the
9 Drugs and vaccine government and the private sector, creating for this
o Improvements of machines, products and purpose a national privacy commission, and for
processes other purposes.
o Microorganisms. • This protects the lawful processing of personal
• Basic requirements for a creation to be considered information.
patentable
o The creation would have a novel idea, DATA PRIVACY AND LIFECYCLE
inventive, and can be applied in an industrial
setting

TRADEMARKn
• A trademark is a tool used to differentiate services • The data privacy encompasses the rights of
and goods from one another. individuals and obligations of organization with
• Form of a word or a group of words; a sign, logo, or respect to the collection, storage, use, disclosure,
symbol or a combination of those above. retention and disposal of personal data (across the
• The following are its importance: data lifecycle).
o Essential in marketing products or services
o It will help consumers identify brand TWO MOST IMPORTANT PROVISIONS OF RA 10173n
o The owner of the trademark would have 1. Criteria for Lawful Processing of Personal
exclusive rights & it will ensure that no one else Information [Section 12 of Data Privacy Act]
can use the same 9 If an organization is given a confidential
information about a client, then that
COPYRIGHT organization shall not share it to others.
• It refers to the protection given to the owner of an 2. Sensitive Personal Information and Privileged
original work covering literary works, musical Information [Section 13 of Data Privacy Act]
pieces, paintings, and computer programs, among
others. WHAT DOES IT PROTECT?
• Once the owner receives the rights to his work, PERSONAL DATA
unauthorized third parties are prohibited from PERSONAL INFORMATION
selling or distributing the works, especially for trade • Any information whether recorded in a material
purposes. form or not, from which the identity of an individual
is apparent or can be reasonably and directly
ECONOMIC RIGHTS ascertained by the entity holding the information or
• It enables the creator to receive profit gains should when put together with other information would
his works be distributed by third parties. directly and certainly identify an individual.

MORAL RIGHTSn SENSITIVE PERSONAL INFORMATIONn


• It protects the connection between the creator and • About an individual’s race, ethnic origin, marital
his work. status, age, color and religious, philosophical or
political affiliations, health, education, genetic or
DATA PRIVACY ACTn sexual life of a person or to any proceeding for any
• Data Privacy Act of 2012, comprehensive and strict office committed or alleged to have been
privacy legislation “to protect the fundamental committed by each person, the disposal of such
human right of privacy, of communication while
proceedings or the sentence of any court in such o Necessity to protect life and health of a person
proceedings. o Necessity for medical treatment
• Issued by government agencies peculiar to an o Necessity to protect the lawful rights of data
individual which includes, but not limited to, social subjects in court proceedings, legal
security numbers, previous or current health proceedings, or regulation.
records, licenses or its denials, suspension or
revocation and tax returns.
NURSE GUIDELINES TO AVOID DATA BREACH
PRIVILEGED INFORMATION • Never breach a patient’s information (SPI)
• Specifically established by an executive order or an • If you are unsure about disclosing a patient’s
act of Congress to be kept classified. information, seek guidance from the Hospital’s Data
Protection Officer (DPO)
NATIONAL PRIVACY COMMISSION (NPC) • Know by heart your hospital’s Privacy Manual
• It is a body that is mandated to administer and without fail.
implement this law (Data Privacy Act). • Never seek information about a patient for whom
• The functions of the NPC include: you are not providing care.
o rule making • Always maintain your patient’s information
o advisory confidential.
o public education
o compliance and monitoring SCOPE OF THE DATA PRIVACY ACTn
o investigations and complaints • The DPA applies to the processing of all types of
o enforcement personal information and to any natural and
juridical person, in the country and even abroad,
Note. subject to certain qualifications. (Sec. 4, DPA).
• Do not collect if you cannot protect.
RIGHTS OF THE DATA SUBJECT
DATA SHARING AGREEMENT • Right to be informed - IRR, Section 34.a
• Collection of personal data “must be a declared, • Right to object - IRR, Section 34.b
specified, and legitimate purpose” and further • Right to access - IRR, Section 34.c
provides that consent is required prior to the • Right to data portability - IRR, Section 36
collection of all personal data. • Right to correct (rectification) - IRR, Section 34.d
• It requires that when obtaining consent, the data • Right to file a complaint - IRR, Section 34.a.2
subject be informed about the extent and purpose • Right to damages - IRR, Section 34.f
of processing, and it specifically mentions the • Right to erasure or blocking - IRR, Section 34.e
“automated processing of his or her personal data • Transmissibility of Rights - IRR, Section 35
for profiling, or processing for direct marketing, and o This pertains to transfer of bank accounts and
data sharing.” etc.
• Consent is further required for sharing information
with affiliates or even mother companies. CLASSIFICATION OF PERSONALLY IDENTIFIABLEn
nINFORMATION
PROCESSING OF PERSONAL DATA
• It refers to any operation or any set of operations
performed upon personal data including, but not
limited to, the collection, recording, organization,
storage, updating or modification, retrieval,
consultation, use, consolidation, blocking, erasure
or destruction of data.

Note.
• All processing of sensitive and personal
information is prohibited except:
o Consent of the data subject
o Pursuant to law that does not require consent
SENSITIVE PERSONAL INFORMATION (BASED ON IRR)n • Photocopiers re-sold without wiping the hard drives
• Social security number • Password hacked/revealed -
• License or its denials, suspension or revocation • Accidentally sent an email attachment –
• Tax returns Unauthorized Disclosure
• Other personal information issued by government
agencies OTHER VIOLATIONS/DATA PRIVACY ACT PRINCIPLES
• Bank and credit/debit card numbers • No Data Sharing Agreement (DSA)
• Websites visited • No Privacy Notice
• Materials downloaded • No Sub-contracting Agreement
• Any other information reflecting preferences and • No Breach Drill
behaviors of an individual • Profiling of customers of malls – Targeted Marketing
• Grievance information • Unjustifiable collection of personal data of a school
• Discipline information – Principle of Proportionality
• Leave of absence reason
DATA PRIVACY PRINCIPLES IN THE PHILIPPINESn
POTENTIAL PENALTIES LISTED IN THE DATA PRIVACY ACT TRANSPARENCY (THE “CONSENT” REGIME)
• A data subject must be aware of the nature, purpose,
and extent of the processing of his or her personal
data, including the risks and safeguards involved,
the identity of personal information controller, his
or her rights as a data subject, and how these can be
exercised. Any information and communication
relating to the processing of personal data should be
easy to access and understand, using clear and plain
language.
o The data subject must know ther risks and
EXAMPLES OF POTENTIAL BREACHES AND SECURITYn benefits of the agreement to be made.
nINCIDENTS INVOLVING PERSONAL INFORMATIONn
POTENTIAL BREACHES LEGITIMATE PURPOSEn
• Bank – Consent form • The processing of information shall be compatible
• Hospital and School Records – Storage and Disposal with a declared and specified purpose, which must
Policy not be contrary to law, morals, or public policy.
• Student transferred - Without Consent
PROPORTIONALITY
• Clinical record of a student to disclose with her
• The processing of information shall be adequate,
parents - Consent
relevant, suitable, necessary, and not excessive in
• List of top students/passers - Consent
relation to a declared and specified purpose.
• Cedula in Malls – Disposal Policy/Improper Disposal
Personal data shall be processed only if the purpose
• Security issues in buildings – logbook
of the processing could not reasonably be fulfilled
• Use of re-cycled papers – Disposal Policy / Access
by other means.
due to negligence
• Hard drives sold online –Disposal Policy Note.
• Use of CCTV – Privacy Issues • Avoid this mentality:
• Use of USB/CD/Personal laptop – Encryption issue o “Just in case we need it.”
o “This is what we always do.”
ACCESS CONTROL AND SECURITY POLICYn
• Personal Records stolen from home of an employee
- Security
nRECOMMENDATION: HOLDING DATA AND KEEPING IT UP-n
• Viewing of Student Records in Public – Physical
TO-DATEn
Security
• Carry out an information audit at least annually.
• Raffle stubs – Privacy Notice / Storage and Disposal
o Write a letter at the start of each school year
Policy
asking parents and students to check that their
• Universities and Colleges websites with weak
details are correct. This also helps prevent
authentication
emergency risks (e.g. if an old address or phone o Concise, transparent, intelligible and in and
number is on record). easily accessible forms using clear and plain
o Check that ‘live’ files are accurate and up to language.
date.
o Any time you become aware that information PRIVACY NOTICE (SAMPLE INTRODUCTION)n
needs amending, do so immediately • Your personal data and privacy are important to us,
o Any personal data that is out of date or no which is why we at (name of organization) would like
longer needed should be ‘destroyed’. This may our customers/clients/constituents to know
involve shredding documents or deleting through this notice how we handle and protect the
computer files securely so that they cannot be personal information you provide to us.
retrieved.
o Organizations must follow the disposal of CONSENTn
records schedule. This schedule states how • Consent of the data subject means: "any freely
long certain types of personal data can be held given, specific, informed and unambiguous
for until it must be destroyed. Some indication of the data subject's wishes by which he
stipulations are legal obligations while others or she, by a statement or by a clear affirmative
are best practice. action, signifies agreement to the processing of
personal data relating to him or her"
Remember! • The data subject agrees to the collection and
• You are violating the Data Privacy Act if you keep processing of personal information
any data for longer than it is needed. o Freely given
o Specific
PRIVACY NOTICE o Informed indication of will
• It is a front facing document that demonstrates an • Evidenced by written, electronic or recorded means:
organization's commitment to transparency and • signature
fairness when carrying out data processing o opt-in box/clicking an icon
activities. o sending a confirmation email
o The organization will somehow show a head- o oral confirmation(recorded)
ups or notice for consent in order for the client • Opt-in; silence, pre-ticked boxes or inactivity does
to know why a certain data is necessary. not constitute consent
• It is also known as privacy statement. • “Implied, implicit or negative consent is not
recognized under the law. Thus, a company policy
CONTENTS OF PRIVACY NOTICE that merely stipulates that the inputting of
1. Who is the entity in control of the processing (i.e., requested personal information amounts to consent
Personal Information Controller or PIC)? or a waiver by a data subject of his or her data
2. What personal data are being collected or generated privacy rights shall not be considered as valid
3. What is the purpose of the processing? consent, as required under the DPA”. (AdOp No.
4. Who has access to the data? 2017-007)
5. With whom are the data shared, if at all? • It is freely given, specific and informed.
6. How long will the data be retained? o Consent means giving data subjects genuine
9 In addition, it should also feature a statement choice and control over how a PIC uses their
on the rights of data subjects and how these data. This means data subjects must be able to
can be exercised. Then, of course, the contact refuse consent, and must be able to withdraw
information of the PIC should be right there in consent easily at any time.
the mix, too. o It also means consent should be unbundled
from other terms and conditions (including
PRIVACY NOTICE AND INFORMATION giving granular consent options for different
• You must give notice that: types of processing) wherever possible.
o Provides details of the grounds that are used to • In giving consent, it is very much important to take
justify processing in mind to know your risk in giving information
o Highlights that consent may be withdrawn, the o “The determination of the appropriate level of
existence of the data subject rights and the security under this section must take into
right to lodge a complaint with the Supervisory account the nature of the personal information
Authority to be protected, the risks represented by the
processing, the size of the organization and acquisition is likely to give rise to a real risk of
complexity of its operations, current data serious harm to any affected data subject.”
privacy best practices and the cost of security
implementation” [Section 20.C of DPA of 2012] SECTION 30n
• “Concealment of Security Breaches Involving
CONSENT OF DATA SUBJECT Sensitive Personal Information. –– The penalty of
• Express and Specific imprisonment of one (1) year and six (6) months to
• Time-bound five (5) years and a fine of not less than Five hundred
• Documented thousand pesos (Php500,000.00) but not more than
• Specifies the purpose One million pesos (Php1,000,000.00) shall be
• Confirms data sharing imposed on persons who, after having knowledge of
a security breach and of the obligation to notify the
EXAMPLES OF PROCESSING WHICH MAY NOT NEEDn Commission pursuant to Section 20(f), intentionally
CONSENTn or by omission conceals the fact of such security
breach.

TYPES OF BREACH
• According to Section 20(A) of RA 10173, “The
personal information controller must implement
reasonable and appropriate organizational,
physical and technical measures intended for the
protection of personal information against any
accidental or unlawful destruction, alteration and
disclosure, as well as against any other unlawful
processing.

Note. Please check SLIDE 36-37 for visual examples of AVAILABILITY BREACH
consent. • Due to loss, accidental or unlawful destruction of
personal data
DATA SHARING
• It is the disclosure or transfer to a third party of CONFIDENTIALITY BREACHn
personal data under the control or custody of a • Due to the unauthorized disclosure of, or access to,
Personal Information Controller (PIC) personal data

DATA SHARING AGREEMENT INTEGRITY BREACH


• It refers to a contract, joint issuance, or any similar • Due to alteration of personal data
document that contains the terms and conditions of
a data sharing arrangement between two or more UNLAWFUL PROCESSING/VIOLATION OF PRIVACYn
parties. • Unauthorized processing, processing for
unauthorized purposes, violation of privacy rights
Note. Please check SLIDE 41 to see a sample of data sharing
and for SLIDE 42 to see the worst computer passwords to be Note. Please check SLIDE 47-57 to see the Latest Breaches in
created. the Philippines.

SECTIONS REGARDING DATA AGREEMENTn DATA BREACH STATISTICS


SECTION 20.F • As of Breach Level Index, there is a total of 14, 717,
• “The PIC shall promptly notify the Commission and 618, 286 data records lost or stolen since 2013.
affected data subjects when sensitive personal • Only 5% of breaches were “secure breaches” where
information or other information that may, under encryption was used and the stolen data was
the circumstances, be used to enable identity fraud rendered useless.
are reasonably believed to have been acquired by an
unauthorized person, and the PIC or the
Commission believes that that such unauthorized
WHO STORES DATA ABOUT YOU?n
Note.
• “In the future, job interviews will be done by
machines. And they won’t even have to ask you a
single question. They’ll just search your social
media history.” [Dondi Mapa, Former NPC Deputy
Commissioner]

THE E-COMMERCE LAW (RA 8792)


• It is an act providing for the recognition and use of
electronic commercial and non-commercial
WHAT GOOGLES KNOWS? transactions and documents, penalties for unlawful
use thereof and for other purposes
• It is signed into law last June 14, 2000
• This bill made the country a legitimate player in the
global marketplace

SALIENT FEATURES
SECTION 6-13
• It gives legal recognition of electronic data
messages, electronic documents, and electronic
signatures.

SECTION 16n
• Allows the formation of contracts in electronic form.
• Makes banking transactions done through ATM
switching networks absolute once consummated.

SECTION 24
• Parties are given the right to choose the type and
level of security methods that suit their needs.

SECTION 25-26n
• Provides the mandate for the electronic
implementation of transport documents to facilitate
WHAT HAPPENS IN AN INTERNET MINUTE (2019)n carriage of goods (airport, road, rail, inland
waterway, courier, post receipts, transport
documents issued by freight forwarders,
marine/ocean bill of lading, etc.) [section 25 and 26]

SECTION 27
• Mandates the government to have the capability to
do e-commerce within 2 years or before June 19,
2002.

SECTION 28n
• Mandates RPWeb to be implemented (strategy that
intends to connect all government offices to the
Internet and provide universal access to the general
public thru the DOTC [now DICT]
• Made cable, broadcast, and wireless physical
infrastructure within the activity of
telecommunications.
SECTION 29 • To replay the same for any other person or persons;
• Empowers the DTI to supervise the development of or to communicate the contents thereof, either
e-commerce in the country. verbally or in writing, or to furnish transcriptions
thereof, whether complete or partial, to any other
SECTION 30n person.
• Provided guidelines as to when a service provider
can be liable. CYBERCRIME PREVENTION ACT OF 2012 (RA 10175)
• It is an act defining cybercrime, providing for the
SECTION 31-32 prevention, investigation, suppression and the
• Authorities and parties with the legal right can only imposition of penalties therefor and for other
gain access to electronic documents, electronic data purposes
messages, and electronic signatures [confidentiality • It specifically criminalizes computer crime
purposes]. • To address legal issues concerning online
interactions and the Internet in the Philippines.
SECTION 33n • Among the cybercrime offenses: cybersquatting,
• Hacking or cracking (unauthorized access including cybersex, child pornography, identity theft, illegal
the introduction of computer viruses - punishable by access to data and libel.
fine & imprisonment). • Former laws did not provide a legal basis for
• Piracy through the use of telecommunication criminalizing crimes committed on a computer in
networks, such as the Internet, that infringes general.
intellectual property rights is punishable. o For example: Onel de Guzman, the computer
• All existing laws such as the Consumer Act of the programmer charged with purportedly writing
Philippines also applies to e-commerce the ILOVEYOU computer worm, was ultimately
transactions. not prosecuted by Philippine authorities due to
a lack of legal basis
ANTI WIRETAPPING LAW [1965] (RA 4200)n
• It is an act to prohibit and penalize wiretapping and OFFENSESn
other related violations of the privacy of • Illegal access (hacking)
communication, and for other purposes • Data interference
• With mobile technology, the average person can • Device misuse
now record a documentary, or even an explosive • Cybersquatting
exposé, merely using one’s mobile phone, with • Computer-related offenses such as computer fraud
crystal clear picture and sound • Content-related offenses such as cybersex and
• If conversation was intended to be between you and spam, and other offenses.
that person only (or between the two persons to the • It reaffirms existing laws against child pornography
conversation only), and without his or her (or both (offense under RA 9775 - Anti-Child Pornography Act
parties’) express consent, you may be liable for of 2009)
wiretapping. • Libel, an offense under Section 355 of the Revised
Penal Code (RPC), also criminalizing them when
SECTION 1 AND 4 committed using a computer system.
• Unlawful for any person, not being authorized by all • Act includes a "catch-all" clause, making all offenses
the parties to any private communication or spoken currently punishable under the RPC also punishable
word, to tap any wire or cable, or by using any other when committed using a computer
device or arrangement, to secretly overhear,
intercept, or record such communication or spoken RULES OF NETIQUETTE
word by using a device commonly known as a • Netiquette, or network etiquette, is concerned with
dictaphone or dictagraph or detectaphone or the "proper" way to communicate in an online
walkie-talkie or tape recorder. environment.
• Unlawful for any person, be he a participant or not
in the act or acts penalized in the next preceding [RULE 1] REMEMBER THE HUMAN
sentence, to knowingly possess any tape record, • When communicating electronically, whether
wire record, disc record, or any other such record, or through email, instant message, discussion post,
copies thereof, of any communication or spoken text, or some other method, practice the Golden
word.
Rule: “Do unto others as you would have others do [RULE 6] SHARE EXPERT KNOWLEDGE
unto you”. • The Internet offers its users many benefits; one is the
o Remember, your written words are read by real ease in which information can be shared or accessed
people, all deserving of respectful and in fact, this "information sharing" capability is
communication. one of the reasons the Internet was founded.
• Before you press "send" or "submit," ask yourself, o So, in the spirit of the Internet's "founding
"Would I be okay with this if someone else had fathers," share what you know.
written it?" • When you post a question and receive intelligent
answers, share the results with others
[RULE 2] ADHERE TO THE SAME STANDARDS OF BEHAVIORn o Post resources and references about your
nONLINE THAT YOU FOLLOW IN REAL LIFE subject matter.
• While it can be argued that standards of behavior
may be different in the virtual world, they certainly [RULE 7] HELP KEEP FLAME WARS UNDER CONTROL
should not be lower. • "Flaming is what people do when they express a
• You should do your best to act within the laws and strongly held opinion without holding back any
ethical manners of society whenever you inhabit emotion."
"cyberspace." o Flame war is a lengthy exchange of angry or
abusive messages between users of an online
[RULE 3] KNOW WHERE YOU ARE IN CYBERSPACE forum or other discussion area
• "Netiquette varies from domain to domain." (Shea, • When two or three people exchange angry posts
1994) between one another, must be controlled or the
• Depending on where you are in the virtual world, the camaraderie of the group could be compromised.
same written communication can be acceptable in • Don't feed the flames; extinguish them by guiding
one area, where it might be considered the discussion back to a more productive direction.
inappropriate in another.
• What you text to a friend may not be appropriate in [RULE 8] RESPECT OTHER PEOPLE'S PRIVACY
an email to a classmate or colleague. • Depending on what you are reading in the virtual
world, be it an online class discussion forum,
[RULE 4] RESPECT OTHER PEOPLE'S TIME ANDn Facebook page, or an email, you may be exposed to
nBANDWIDTHn some private or personal information that needs to
• Electronic communication takes time: time to read be handled with care.
and time in which to respond. • Just as you expect others to respect your privacy, so
• Most people today lead busy lives, just like you do, should you respect the privacy of others.
and don't have time to read or respond to frivolous
emails or discussion posts. [RULE 9] DON'T ABUSE YOUR POWER
o As a virtual world communicator, it is your • Just like in face-to-face situations, there are people
responsibility to make sure that the time spent in cyberspace who have more "power" than others.
reading your words isn't wasted. • Just remember, knowing more than others do or
• Make your written communication meaningful and having more power than others may have does not
to the point, without extraneous text or superfluous give you the right to take advantage of anyone.
graphics or attachments that may take forever to
download. [RULE 10] BE FORGIVING OF OTHER PEOPLE'S MISTAKES
• Not everyone has the same amount of experience
[RULE 5] MAKE YOURSELF LOOK GOOD ONLINE working in the virtual world.
• One of the best things about the virtual world is the • If it's a minor "offense," you might want to let it slide.
lack of judgment associated with your physical • If you feel compelled to respond to a mistake, do so
appearance, sound of your voice, or the clothes you in a private email
wear
• Keep the following tips in mind:
o Always check for spelling and grammar errors
o Know what you're talking about and state it
clearly
o Be pleasant and polite

You might also like