It is proper Netiquette to accept that businesses monitor hotspots. Don't think your screen is private in public.
Once you logon to a network you are bound by the terms of service. You are actively participating on a network they provide, regulate, and administer. Often times this comes with a certain level of oversight, which varies by provider
Hotspots generally use software to monitor the activity of patrons. Wireless carriers use software to monitor the activity of users. The type and nature of monitoring depends on the provider and terms of service. Many hotspots provide a disclaimer before access is granted that activities may be viewed by others.
Accept that online activities are monitored in public hotspots because user agreements allow it.
Published: April 24, 2015
Time: 00:01:52 Minutes : Seconds
Category: Science and Technology
Description: This is a podcast of the tenth rule of mobile. It is from the text of an older version of this page.
Mistress and student discuss the principle of society. Mistress teaches the do unto others quote.
A meeting to discuss etiquette. Essential online safety tips and guidelines are shared.
From the newsroom, User Generated Content communication skills.
A news broadcast of conventions for easily movable devices and wireless connections.
Techniques for engagement during the acquisition of knowledge.
Digital Citizens discuss freedom from harm and risk online.
A lesson in business etiquette for electronics at the office.
Email etiquette incuding the inverted pyramid style of writing.
From the news station, digital motion picure tips for capturing and viewing.