Quick Links
Skip to main contentSkip to navigation

Kickapoo Nation School



Ajax Loading Image



As more and more individuals have access to the internet or digital learning, we enable new methods of misinterpretations and misconduct. To avoid such actions, it is best to review some of the following rules of "netiquette" (a combination of network and etiquette).


When addressing someone online, it's good to double-check the name of the recipient. For some of us, names are a huge part of our identity, and seeing someone misspell our name can make us laugh, annoyed, or disappointed. Taking the time to review longer or uncommon names will go a long way. Additionally, if you think you know how to spell simple names like "Ashley", please remember to consider the spelling variations:

  • Ashlie
  • Ashlea
  • Ashlee
  • Ashleigh
  • etc...

A great way to double-check is to look for the name in prior messages, social media profiles, or ask someone else to help.

Grammer Matters

While most can forgive simple mistakes like typos, taking the time to review some grammatical errors can make a huge difference. Below are examples of the use of commas, a common grammatical mistake seen in emails, cellular texts, and chat boxes.

  • It's time to eat, grandma.
  • It's time to eat grandma.

So, it's either time to have a nice meal with your grandmother, or it's time to consume grandma for your upcoming meal, which are two extremely different ideas. Hopefully, the reader understands the intent of the author before acting upon reading the message.

If It Is On the Internet, It Is Everywhere.

Everyone has a right to privacy and security, so please don't share your or others' personal information online with anyone. The field of Cyber Security focuses mostly on protecting the individuals' information rather than protecting the computer itself. Information to protect may include:

  • Addresses
  • Names of Family Members
  • Credit Card Information
  • Images
  • Phone Numbers
  • etc...

So revealing your or your friends' information sets everyone up for targeted attacks. It is everyone's responsibility to ensure that we're all free from virtual harassment vulnerabilities. It also doesn't hurt to change your passwords to something more complex than your pet's name and the year you were born.

Don't Spam

No matter how important a message may be or however many times you send it, it may not always receive the respondents' highest priority, so please don't abuse your connection with colleagues, friends, or subordinates. This established connection should be treated with respect and a mutual understanding that, if the message requires an urgent response, just give us a call.

Since computers are powered by electricity, they never get tired. They can stay active for hours and hours while us staff members must take breaks. We are not capable of the same level of attention given as our electronic counterparts. This has led to abusive behavior such as non-stop phone calls and receiving mysterious emails, but we typically refer to it as spam.