This document discusses online safety, security, ethics and etiquette. It explains why individuals should care about their digital lives and behaviors online. Some key topics covered include understanding one's digital identity, respecting copyright and privacy laws, avoiding spam, phishing and malware, and not engaging in bullying or other harmful behaviors. The document provides examples of Philippine laws regarding cybercrime and outlines expectations for polite and appropriate conduct online. Students are assigned performance tasks related to creating rules for an online school network and designing an awareness poster about digital citizenship.
4. Have you ever wondered…
WHAT YOUR DIGITAL LIFE IS LIKE?
5. COMPLETE THE SENTENCE:
My media life is like a ___________________
because ____________________.
HINT: Think about your life with or without media
6. QUESTIONS YOU COULD CONSIDER:
1.Are digital media a big part of your life?
2.What kind of impact do digital media
have on you (a little, some, a lot)?
3.What are your favorite and last favorite
things to do with digital media?
7. What is ONLINE
SAFETY &
SECURITY?
is the knowledge of maximizing the user's personal safety and security
risks to private information and property associated with using the
internet, and the self-protection from computer crime in general.
9. Recognize your Cyber Avatar
? ? ?
• Your online representation, is not another world but
extension of your personality
• An extension of the existing society that you are part of.
10. Apply Values and Conduct
• Respect, kindness, and courtesy to others.
• Theft, hate speech, gossip, pornography,
and bullying are unacceptable in online
communication.
11. Laws exist in the Web
• WHY DO LAWS EXIST IN
THE WEB????
• Punishment laid by the government is
not for the sake of punishing, but for
peace and order among the citizens
12. Be Sensitive
• Participants in world wide web are from different
countries with different cultures and religions.
15. Copyrighted
• a form of intellectual property that grants the creator of an
original creative work an exclusive legal right to determine
whether and under what conditions this original work may
be copied and used by others.
• Owned by an individual
16. Copyrighted
• Seek permission from the author if information
will be used to other websites or to be
disseminate personal information (e.g. names,
addresses, and bank accounts)
17. Copyrighted
• For educational materials, should follow
academic writing, referencing, and making
citation acknowledgment
• Note all sources used in project. Any material
copied from an outside source, including the
Internet, must be cited.
18. Copyrighted
• Use quotation marks around sentences or
phrases directly copied from an outside source
and cite its information.
19. Selecting Words to Communicate
• Use appropriate manner of communication
• Avoid threatening and disrespectful words
• Be polite
22. SPAM
• Transmission of unsolicited messages from various origins
using electronic messaging systems such as email and chat
messages
• Tool for advertisement
• Known as unsolicited bulk e-mail (UBE)
24. PHISHING
• Defined as a software or program to obtain
personal information
• Targets user password to hack and take
control of user account
25. MALWARE
• Short term for Malicious Software
• To inflict chaos on a computer’s operation
and processes
• Disguised as enticing web sites
• Spy upon the activity of the computer and
steal information
29. Republic Act 10627
• Bullying can be invading an individual’s privacy by
using photos and other information to disgrace that
individual
• Protection of individuals from bullying.
Anti-bullying Act of 2013
30. Republic Act 10175
Cybercrime Prevention Act of 2012
• An Act that protects individual from various unwanted
online and cyber acts that may harm or invade one’s
privacy and integrity
#CYBERSQUATTING
#CYBERSEX
#CHILDPORNOGRAPHY
#IDENTITYTHEFT
#ILLEGALACCESS
36. Digital Life 101
PERFORMANCE 2:
Once contributed their own rule, create a poster
in any convenient application that you could use
to spread awareness to the school and the
community.
37. Digital Life 101
PERFORMANCE 2:
The output must be not smaller than a short
bond paper size and in a format of .png
38. Digital Life 101
PERFORMANCE 2:
Content – 30%
Creativity/Originality – 25%
Layout and Design – 10%
Punctuality – 10%
Example:
My media life is like a tree, because each branch is like finding or learning something new.
My media life is like a city because on the web I am very busy.
For us to be safe and secured using the Internet, we must consider some Good Conduct over the Internet.
Do not do unto others what you do not want others to do unto you
The picture is an example of scam in your email.
What’s the difference of spam and scam??
Spam refers to the unsolicited messages while scam are generally delivered in the form of a spam email (but remember not all spam emails contain scams).
Scams are designed to trick you into disclosing information that will lead to defrauding you or stealing your identity.
Malware is a broad term that refers to a variety id malicious programs,
Examples of common malware includes viruses, worms, trojan viruses, spyware, adware, and ransomware.
law in the Philippines approved on Sep. 12, 2012.
It aims to address the legal issues concerning online interactions and the internet in the Philippines.
Among the cybercrime offenses included in the bill are cybersquatting, cybersex, child pornography, identity theft, illegal access to data and libel
CYBERSEX - fantasy sex is accomplished by the participants describing their actions and responding to their chat partners in a mostly written form designed to stimulate their own sexual feelings and fantasies
Under federal law, child pornography is defined as any visual depiction of sexually explicit conduct involving a minor,
Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information, such as Social Security or driver's license numbers, in order to impersonate someone else.