INFORMATIONAL

Network Working Group S. Hambridge Request For Comments: 1855 Intel Corp. FYI: 28 October 1995 Category: Informational Netiquette Guidelines Status of This Memo This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document provides a minimum set of guidelines for Network Etiquette (Netiquette) which organizations may take and adapt for their own use. As such, it is deliberately written in a bulleted format to make adaptation easier and to make any particular item easy (or easier) to find. It also functions as a minimum set of guidelines for individuals, both users and administrators. This memo is the product of the Responsible Use of the Network (RUN) Working Group of the IETF. Table of Contents 1.0 Introduction 1 2.0 One-to-One Communication 2 3.0 One-to-Many Communication 7 4.0 Information Services 14 5.0 Selected Bibliography 18 6.0 Security Considerations 21 7.0 Author's Address 21 1.0 Introduction Hambridge Informational [Page 1]

RFC 1855 Netiquette Guidelines October 1995 Hambridge Informational [Page 3]

RFC 1855 Netiquette Guidelines October 1995 Hambridge Informational [Page 4]

RFC 1855 Netiquette Guidelines October 1995 Hambridge Informational [Page 5]

RFC 1855 Netiquette Guidelines October 1995 Hambridge Informational [Page 8]

RFC 1855 Netiquette Guidelines October 1995 3.1.2 Mailing List Guidelines 9,13,15] in the Selected Bibliography. - Send subscribe and unsubscribe messages to the appropriate address. Although some mailing list software is smart enough Hambridge Informational [Page 9]

RFC 1855 Netiquette Guidelines October 1995 Hambridge Informational [Page 10]

RFC 1855 Netiquette Guidelines October 1995 3.1.3 NetNews Guidelines 2,8,22,23] in the Selected Bibliography. - In NetNews parlance, "Posting" refers to posting a new article to a group, or responding to a post someone else has posted. "Cross-Posting" refers to posting a message to more than one group. If you introduce Cross-Posting to a group, or if you direct "Followup-To:" in the header of your posting, warn readers! Readers will usually assume that the message was posted to a specific group and that followups will go to that group. Headers change this behavior. - Read all of a discussion in progress (we call this a thread) before posting replies. Avoid posting "Me Too" messages, where content is limited to agreement with previous posts. Content of a follow-up post should exceed quoted content. - Send mail when an answer to a question is for one person only. Remember that News has global distribution and the whole world probably is NOT interested in a personal response. However, don't hesitate to post when something will be of general interest to the Newsgroup participants. - Check the "Distribution" section of the header, but don't depend on it. Due to the complex method by which News is delivered, Distribution headers are unreliable. But, if you are posting something which will be of interest to a limited number or readers, use a distribution line that attempts to limit the distribution of your article to those people. For example, set the Distribution to be "nj" if you are posting an article that will be of interest only to New Jersey readers. Hambridge Informational [Page 11]

RFC 1855 Netiquette Guidelines October 1995 Hambridge Informational [Page 12]

RFC 1855 Netiquette Guidelines October 1995 Hambridge Informational [Page 15]

RFC 1855 Netiquette Guidelines October 1995 4.1.2 Real Time Interactive Services Guidelines (MUDs MOOs IRC) Hambridge Informational [Page 16]

RFC 1855 Netiquette Guidelines October 1995 5.0 Selected Bibliography 1] Angell, D., and B. Heslop, "The Elements of E-mail Style", New York: Addison-Wesley, 1994. [2] "Answers to Frequently Asked Questions about Usenet" Original author: jerry@eagle.UUCP (Jerry Schwarz) Maintained by: netannounce@deshaw.com (Mark Moraes) Archive-name: usenet-faq/part1 [3] Cerf, V., "Guidelines for Conduct on and Use of Internet", at: <URL://http://www.isoc.org/proceedings/ conduct/cerf-Aug-draft.html> [4] Dern, D., "The Internet Guide for New Users", New York: McGraw-Hill, 1994. [5] "Emily Postnews Answers Your Questions on Netiquette" Original author: brad@looking.on.ca (Brad Templeton) Maintained by: netannounce@deshaw.com (Mark Moraes) Archive-name: emily-postnews/part1 [6] Gaffin, A., "Everybody's Guide to the Internet", Cambridge, Mass., MIT Press, 1994. Hambridge Informational [Page 18]

RFC 1855 Netiquette Guidelines October 1995 7] "Guidelines for Responsible Use of the Internet" from the US house of Representatives gopher, at: <URL:gopher://gopher.house.gov:70/OF-1%3a208%3aInternet %20Etiquette> [8] How to find the right place to post (FAQ) by buglady@bronze.lcs.mit.edu (Aliza R. Panitz) Archive-name: finding-groups/general [9] Hambridge, S., and J. Sedayao, "Horses and Barn Doors: Evolution of Corporate Guidelines for Internet Usage", LISA VII, Usenix, November 1-5, 1993, pp. 9-16. <URL: ftp://ftp.intel.com/pub/papers/horses.ps or horses.ascii> [10] Heslop, B., and D. Angell, "The Instant Internet guide : Hands-on Global Networking", Reading, Mass., Addison-Wesley, 1994. [11] Horwitz, S., "Internet Etiquette Tips", <ftp://ftp.temple.edu/pub/info/help-net/netiquette.infohn> [12] Internet Activities Board, "Ethics and the Internet", RFC 1087, IAB, January 1989. <URL: ftp://ds.internic.net/rfc/rfc1087.txt> [13] Kehoe, B., "Zen and the Art of the Internet: A Beginner's Guide", Netiquette information is spread through the chapters of this work. 3rd ed. Englewood Cliffs, NJ., Prentice-Hall, 1994. [14] Kochmer, J., "Internet Passport: NorthWestNet's Guide to our World Online", 4th ed. Bellevue, Wash., NorthWestNet, Northwest Academic Computing Consortium, 1993. [15] Krol, Ed, "The Whole Internet: User's Guide and Catalog", Sebastopol, CA, O'Reilly & Associates, 1992. [16] Lane, E. and C. Summerhill, "Internet Primer for Information Professionals: a basic guide to Internet networking technology", Westport, CT, Meckler, 1993. [17] LaQuey, T., and J. Ryer, "The Internet Companion", Chapter 3 "Communicating with People", pp 41-74. Reading, MA, Addison-Wesley, 1993. Hambridge Informational [Page 19]

RFC 1855 Netiquette Guidelines October 1995 18] Mandel, T., "Surfing the Wild Internet", SRI International Business Intelligence Program, Scan No. 2109. March, 1993. <URL: gopher://gopher.well.sf.ca.us:70/00/Communications/ surf-wild> [19] Martin, J., "There's Gold in them thar Networks! or Searching for Treasure in all the Wrong Places", FYI 10, RFC 1402, January 1993. <URL: ftp://ds.internic.net/rfc/rfc1402.txt> [20] Pioch, N., "A Short IRC Primer", Text conversion by Owe Rasmussen. Edition 1.1b, February 28, 1993. <URL: http://www.kei.com/irc/IRCprimer1.1.txt> [21] Polly, J., "Surfing the Internet: an Introduction", Version 2.0.3. Revised May 15, 1993. <URL: gopher://nysernet.org:70/00/ftp%20archives/ pub/resources/guides/surfing.2.0.3.txt> <URL: ftp://ftp.nysernet.org/pub/resources/guides/ surfing.2.0.3.txt> [22] "A Primer on How to Work With the Usenet Community" Original author: chuq@apple.com (Chuq Von Rospach) Maintained by: netannounce@deshaw.com (Mark Moraes) Archive-name: usenet-primer/part1 [23] Rinaldi, A., "The Net: User Guidelines and Netiquette", September 3, 1992. <URL: http://www.fau.edu/rinaldi/net/index.htm> [24] "Rules for posting to Usenet" Original author: spaf@cs.purdue.edu (Gene Spafford) Maintained by: netannounce@deshaw.com (Mark Moraes) Archive-name: posting-rules/part1 [25] Shea, V., "Netiquette", San Francisco: Albion Books, 1994?. [26] Strangelove, M., with A. Bosley, "How to Advertise on the Internet", ISSN 1201-0758. [27] Tenant, R., "Internet Basics", ERIC Clearinghouse of Information Resources, EDO-IR-92-7. September, 1992. <URL: gopher://nic.merit.edu:7043/00/introducing. the.internet/internet.basics.eric-digest> <URL: gopher://vega.lib.ncsu.edu:70/00/library/ reference/guides/tennet> Hambridge Informational [Page 20]

RFC 1855 Netiquette Guidelines October 1995 28] Wiggins, R., "The Internet for everyone: a guide for users and providers", New York, McGraw-Hill, 1995. 6.0 Security Considerations 7.0 Author's Address