SlideShare a Scribd company logo
1 of 40
ONLINE SAFETY,
SECURITY, ETHICS
AND ETIQUTTE
LESSON 2
Why Should
YOU CARE??
•The use of online digital tools serves personal
and Social function that can both benefit and
harm you.
www.personalizemedia.com/the-count/
Have you ever wondered…
WHAT YOUR DIGITAL LIFE IS LIKE?
COMPLETE THE SENTENCE:
My media life is like a ___________________
because ____________________.
HINT: Think about your life with or without media
QUESTIONS YOU COULD CONSIDER:
1.Are digital media a big part of your life?
2.What kind of impact do digital media
have on you (a little, some, a lot)?
3.What are your favorite and last favorite
things to do with digital media?
What is ONLINE
SAFETY &
SECURITY?
is the knowledge of maximizing the user's personal safety and security
risks to private information and property associated with using the
internet, and the self-protection from computer crime in general.
GOOD CONDUCT
over the INTERNET
Recognize your Cyber Avatar
? ? ?
• Your online representation, is not another world but
extension of your personality
• An extension of the existing society that you are part of.
Apply Values and Conduct
• Respect, kindness, and courtesy to others.
• Theft, hate speech, gossip, pornography,
and bullying are unacceptable in online
communication.
Laws exist in the Web
• WHY DO LAWS EXIST IN
THE WEB????
• Punishment laid by the government is
not for the sake of punishing, but for
peace and order among the citizens
Be Sensitive
• Participants in world wide web are from different
countries with different cultures and religions.
Be Sensitive
What do you feel when you read a message in CAPS LOCK?
Be Sensitive
THINK
before you
CLICK
Copyrighted
• a form of intellectual property that grants the creator of an
original creative work an exclusive legal right to determine
whether and under what conditions this original work may
be copied and used by others.
• Owned by an individual
Copyrighted
• Seek permission from the author if information
will be used to other websites or to be
disseminate personal information (e.g. names,
addresses, and bank accounts)
Copyrighted
• For educational materials, should follow
academic writing, referencing, and making
citation acknowledgment
• Note all sources used in project. Any material
copied from an outside source, including the
Internet, must be cited.
Copyrighted
• Use quotation marks around sentences or
phrases directly copied from an outside source
and cite its information.
Selecting Words to Communicate
• Use appropriate manner of communication
• Avoid threatening and disrespectful words
• Be polite
Selecting Words to Communicate
THREATS
in using the
INTERNET
SPAM
• Transmission of unsolicited messages from various origins
using electronic messaging systems such as email and chat
messages
• Tool for advertisement
• Known as unsolicited bulk e-mail (UBE)
SPAM
PHISHING
• Defined as a software or program to obtain
personal information
• Targets user password to hack and take
control of user account
MALWARE
• Short term for Malicious Software
• To inflict chaos on a computer’s operation
and processes
• Disguised as enticing web sites
• Spy upon the activity of the computer and
steal information
GOVERNMENT
PROVISIONS
for Online Courtesy
and Etiquette
???????
BULLYING
Republic Act 10627
• Bullying can be invading an individual’s privacy by
using photos and other information to disgrace that
individual
• Protection of individuals from bullying.
Anti-bullying Act of 2013
Republic Act 10175
Cybercrime Prevention Act of 2012
• An Act that protects individual from various unwanted
online and cyber acts that may harm or invade one’s
privacy and integrity
#CYBERSQUATTING
#CYBERSEX
#CHILDPORNOGRAPHY
#IDENTITYTHEFT
#ILLEGALACCESS
Digital Life 101
Digital Life 101
Do you agree with the
statement:
Digital Life 101
“Instead of promoting social
behavior, social media
promotes disengagement,
self-absorption, loneliness,
and sadness”
Digital Life 101
PERFORMANCE 2:
Create or contribute 1 specific
rule for our School Netiquette
http://deped.in/ABMNR
Digital Life 101
PERFORMANCE 2:
There must be no duplication of work
Digital Life 101
PERFORMANCE 2:
Once contributed their own rule, create a poster
in any convenient application that you could use
to spread awareness to the school and the
community.
Digital Life 101
PERFORMANCE 2:
The output must be not smaller than a short
bond paper size and in a format of .png
Digital Life 101
PERFORMANCE 2:
Content – 30%
Creativity/Originality – 25%
Layout and Design – 10%
Punctuality – 10%
Digital Life 101
PERFORMANCE 2:
Filename: P2_Section_LastName_FirstName
Digital Life 101
PERFORMANCE 2:
Submit your output in the link
deped.in/SUBMITETECH

More Related Content

What's hot

Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Private School
 
Online Platforms for ICT Content Development by Ydellwish Cortez
Online Platforms for ICT Content Development by Ydellwish CortezOnline Platforms for ICT Content Development by Ydellwish Cortez
Online Platforms for ICT Content Development by Ydellwish CortezYdellwishCortez
 
8 Opportunities, Challenges, and Power of Media and Information.pptx
8 Opportunities, Challenges, and Power of Media  and Information.pptx8 Opportunities, Challenges, and Power of Media  and Information.pptx
8 Opportunities, Challenges, and Power of Media and Information.pptxMagdaLo1
 
Introduction to Information Communication and Technologies
Introduction to Information Communication and TechnologiesIntroduction to Information Communication and Technologies
Introduction to Information Communication and TechnologiesJuvy Novicio
 
10 ICT as a Platform for Change
10 ICT as a Platform for Change10 ICT as a Platform for Change
10 ICT as a Platform for ChangeTeodoro Llanes II
 
Empowerment Technologies - Easy Steps in Hyperlinking
Empowerment Technologies - Easy Steps in HyperlinkingEmpowerment Technologies - Easy Steps in Hyperlinking
Empowerment Technologies - Easy Steps in HyperlinkingJhon Christian Rey Tolop
 
Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...
Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...
Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...Amber Espiritu
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT TechnologiesMaria Eloisa Blanza
 
Media and Information Literate Individual.pptx
Media and Information Literate Individual.pptxMedia and Information Literate Individual.pptx
Media and Information Literate Individual.pptxMarylieNoran2
 
2 Online Safety, Security, Ethics, and Etiquette
2 Online Safety,  Security, Ethics, and Etiquette2 Online Safety,  Security, Ethics, and Etiquette
2 Online Safety, Security, Ethics, and EtiquetteTeodoro Llanes II
 
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEAlminaVelasco
 
1. introduction to mil (part 1) communication, media, information, and techn...
1. introduction to mil (part 1)  communication, media, information, and techn...1. introduction to mil (part 1)  communication, media, information, and techn...
1. introduction to mil (part 1) communication, media, information, and techn...MelvyEspanol1
 
Managing and sustaining ict projects
Managing and sustaining ict projectsManaging and sustaining ict projects
Managing and sustaining ict projectsAubrey Mae Antonio
 
Empowerment Technologies - Module 1.pptx
Empowerment Technologies - Module 1.pptxEmpowerment Technologies - Module 1.pptx
Empowerment Technologies - Module 1.pptxjoelphillipGranada2
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
The Evolution of Traditional to New Media.pptx
The Evolution of Traditional to New Media.pptxThe Evolution of Traditional to New Media.pptx
The Evolution of Traditional to New Media.pptxMerlouDomael2
 
Information literacy in a media-saturated world
Information literacy in a media-saturated worldInformation literacy in a media-saturated world
Information literacy in a media-saturated worldPam Wilson
 
Empowerment Technologies Lecture 1 (Philippines SHS)
Empowerment Technologies Lecture 1 (Philippines SHS)Empowerment Technologies Lecture 1 (Philippines SHS)
Empowerment Technologies Lecture 1 (Philippines SHS)John Bosco Javellana, MAEd.
 

What's hot (20)

Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1
 
Online Platforms for ICT Content Development by Ydellwish Cortez
Online Platforms for ICT Content Development by Ydellwish CortezOnline Platforms for ICT Content Development by Ydellwish Cortez
Online Platforms for ICT Content Development by Ydellwish Cortez
 
8 Opportunities, Challenges, and Power of Media and Information.pptx
8 Opportunities, Challenges, and Power of Media  and Information.pptx8 Opportunities, Challenges, and Power of Media  and Information.pptx
8 Opportunities, Challenges, and Power of Media and Information.pptx
 
Introduction to Information Communication and Technologies
Introduction to Information Communication and TechnologiesIntroduction to Information Communication and Technologies
Introduction to Information Communication and Technologies
 
ICT as a Platform for Change
ICT as a Platform for ChangeICT as a Platform for Change
ICT as a Platform for Change
 
10 ICT as a Platform for Change
10 ICT as a Platform for Change10 ICT as a Platform for Change
10 ICT as a Platform for Change
 
Empowerment Technologies - Easy Steps in Hyperlinking
Empowerment Technologies - Easy Steps in HyperlinkingEmpowerment Technologies - Easy Steps in Hyperlinking
Empowerment Technologies - Easy Steps in Hyperlinking
 
Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...
Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...
Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT Technologies
 
Media and Information Literate Individual.pptx
Media and Information Literate Individual.pptxMedia and Information Literate Individual.pptx
Media and Information Literate Individual.pptx
 
2 Online Safety, Security, Ethics, and Etiquette
2 Online Safety,  Security, Ethics, and Etiquette2 Online Safety,  Security, Ethics, and Etiquette
2 Online Safety, Security, Ethics, and Etiquette
 
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
 
1. introduction to mil (part 1) communication, media, information, and techn...
1. introduction to mil (part 1)  communication, media, information, and techn...1. introduction to mil (part 1)  communication, media, information, and techn...
1. introduction to mil (part 1) communication, media, information, and techn...
 
Managing and sustaining ict projects
Managing and sustaining ict projectsManaging and sustaining ict projects
Managing and sustaining ict projects
 
Empowerment Technologies - Module 1.pptx
Empowerment Technologies - Module 1.pptxEmpowerment Technologies - Module 1.pptx
Empowerment Technologies - Module 1.pptx
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
9 Interactive Multimedia
9 Interactive Multimedia9 Interactive Multimedia
9 Interactive Multimedia
 
The Evolution of Traditional to New Media.pptx
The Evolution of Traditional to New Media.pptxThe Evolution of Traditional to New Media.pptx
The Evolution of Traditional to New Media.pptx
 
Information literacy in a media-saturated world
Information literacy in a media-saturated worldInformation literacy in a media-saturated world
Information literacy in a media-saturated world
 
Empowerment Technologies Lecture 1 (Philippines SHS)
Empowerment Technologies Lecture 1 (Philippines SHS)Empowerment Technologies Lecture 1 (Philippines SHS)
Empowerment Technologies Lecture 1 (Philippines SHS)
 

Similar to Online safety and ethics lesson teaches protecting privacy

Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop SlidesNathanielCarlson2
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Kirsten Thompson
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
Guideline about responsible use of social networks
Guideline about responsible use of social networksGuideline about responsible use of social networks
Guideline about responsible use of social networksprofesorjulioperez
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxCatherineBagaan
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipjleverett
 
Building a safer presence on the web
Building a safer presence on the webBuilding a safer presence on the web
Building a safer presence on the webjhollatz
 
Digital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptxDigital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptxJCGonzaga1
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship ppKatie Ward
 
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Kimberley Dray
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptxadblue2017
 
BLOGS AND SOCIAL NETWORKING
BLOGS AND SOCIAL NETWORKINGBLOGS AND SOCIAL NETWORKING
BLOGS AND SOCIAL NETWORKINGDinesh Sharma
 
Empowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosEmpowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosPadsromel
 
Shannon Morris PDLM presentation
Shannon Morris PDLM presentationShannon Morris PDLM presentation
Shannon Morris PDLM presentationshannoncmorris
 

Similar to Online safety and ethics lesson teaches protecting privacy (20)

Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Guideline about responsible use of social networks
Guideline about responsible use of social networksGuideline about responsible use of social networks
Guideline about responsible use of social networks
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
 
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Cyber citizenship imen tekaya
Cyber citizenship imen tekayaCyber citizenship imen tekaya
Cyber citizenship imen tekaya
 
New media and privacy
New media and privacyNew media and privacy
New media and privacy
 
Building a safer presence on the web
Building a safer presence on the webBuilding a safer presence on the web
Building a safer presence on the web
 
Digital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptxDigital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptx
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
 
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
BLOGS AND SOCIAL NETWORKING
BLOGS AND SOCIAL NETWORKINGBLOGS AND SOCIAL NETWORKING
BLOGS AND SOCIAL NETWORKING
 
Empowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosEmpowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine Gelos
 
Shannon Morris PDLM presentation
Shannon Morris PDLM presentationShannon Morris PDLM presentation
Shannon Morris PDLM presentation
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Online safety and ethics lesson teaches protecting privacy

Editor's Notes

  1. Example: My media life is like a tree, because each branch is like finding or learning something new. My media life is like a city because on the web I am very busy.
  2. For us to be safe and secured using the Internet, we must consider some Good Conduct over the Internet.
  3. Do not do unto others what you do not want others to do unto you
  4. The picture is an example of scam in your email. What’s the difference of spam and scam?? Spam refers to the unsolicited messages while scam are generally delivered in the form of a spam email (but remember not all spam emails contain scams). Scams are designed to trick you into disclosing information that will lead to defrauding you or stealing your identity.
  5. Malware is a broad term that refers to a variety id malicious programs, Examples of common malware includes viruses, worms, trojan viruses, spyware, adware, and ransomware.
  6. law in the Philippines approved on Sep. 12, 2012. It aims to address the legal issues concerning online interactions and the internet in the Philippines. Among the cybercrime offenses included in the bill are cybersquatting, cybersex, child pornography, identity theft, illegal access to data and libel CYBERSEX - fantasy sex is accomplished by the participants describing their actions and responding to their chat partners in a mostly written form designed to stimulate their own sexual feelings and fantasies Under federal law, child pornography is defined as any visual depiction of sexually explicit conduct involving a minor, Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information, such as Social Security or driver's license numbers, in order to impersonate someone else.