SlideShare a Scribd company logo
1 of 19
Online Safety &
Security
Hello!
I’m Joseph, Paul, Jerot, JM & Lennard!
We are here because we will report the topic about Online
Safety & Security
2
Introduction
Each individual when accessing the
World Wide Web is concerned with the safety
of his or her terminal or computer and the
information that will be transmitted or
received.
Every organisation relies on the
internet to some degree or another for
communications, transactions, payments and
data access. Unfortunately, however, the
internet has also become a channel of choice
for criminals to commit financial and other
crimes. Your organisation must take
precautions to protect itself.
3
1.
SPAM
Let’s start with the first set of slides
“▫ Refers to the transmission of
unsolicited messages from
various origins using electronic
messaging systems such as e-
mail and chat messengers
▫ A tool for advertisement
▫ Unsolicited bulk e-mail (UBE)
5
Example
6
2.
PHISING
Let’s start with the first set of slides
“▫ Defined as a software or a
program used by an attacker to
obtain personal information
▫ Commonly target user passwords
to hack and take control of a user
account
8
Example
9
3.
PHISING
Let’s start with the first set of slides
“▫ Short term for malicious software
▫ A computer software sent by
attackers to inflict chaos on a
computer’s operation and
processes
11
How to avoid these
threats?
There are provisions & laws that our country
implements to avoid these threats.
12
The Philippine government ensures the welfare
of its people in their ICT experience by enacting
various laws and regulations. There are incidents
of theft, scam, phishing and other activities that
victimize Filipino people.
13
What is Bullying?
Defined as “severe or repeated
use by one or more students of a
written, verbal or electronic
expression, or a physical gesture, or
any combination thereof, directed to
another student that has the effect of
actually causing or placing the latter
in reasonable fear of physical or
emotional harm or damage to his
property.”
Republic
Act 10627
or Anti-
Bullying
Act of
2013
14
This law includes protection of individuals from
bullying through electronic means. Bullying
invades an individual’s privacy by using photos
and other information meant to disgrace that
individual.
15
Republic Act
10175 or
Cybercrime
Prevention
Act of 2012
16
This law protects an individual from
various unwanted online and cyber
acts that may harm or evade one’s
privacy and integrity.
Acquisition of passwords and other vital
information from an individual • Computer
forgery • Libel
17
Cybercime offenses
include, but are not limited
to: • Integrity and
availability of data • Illegal
access of computers
through remote means
without permission •
Interception of one’s
information from a private
conversation or
correspondence •
18
Thanks!
Any questions? Please call 0956-390-
3391, John Paul Fajardo Canoy
Credits
Special thanks to these articles and links
▫ https://www.slideshare.net/ArahLouiseApostol19/online-safety-and-security
▫ https://usa.kaspersky.com/resource-center/preemptive-safety/top-10-internet-safety-rules-and-what-not-to-do-
online
▫ https://www.getsafeonline.org/online-safety-and-security/
19

More Related Content

What's hot

Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security Arah Louise
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research PaperWhitney Bolton
 
Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000PrakharPrasoon
 
Cyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshCyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshHome
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; familyDr.Keshav Sathaye
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sDhurba Mainali
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and natureDr. Arun Verma
 
Computer crime
Computer crimeComputer crime
Computer crimeUc Man
 

What's hot (20)

Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research Paper
 
Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Cyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshCyber Security & Crime In Bangladesh
Cyber Security & Crime In Bangladesh
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Computer crime
Computer crimeComputer crime
Computer crime
 

Similar to ONLINE SAFETY AND SECURITY

Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remediesIJARIIT
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Online safety and security
Online safety and security Online safety and security
Online safety and security korainearena
 
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Ayush Chopra
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxAalbert Albert
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber securitySlamet Ar Rokhim
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptxnivi55
 

Similar to ONLINE SAFETY AND SECURITY (20)

Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Online safety and security
Online safety and security Online safety and security
Online safety and security
 
4. ONLINE SAFETY.pptx
4. ONLINE SAFETY.pptx4. ONLINE SAFETY.pptx
4. ONLINE SAFETY.pptx
 
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
 
E-Tech_Lesson2.pptx
E-Tech_Lesson2.pptxE-Tech_Lesson2.pptx
E-Tech_Lesson2.pptx
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
ICT, the Self, and Society.pdf
ICT, the Self, and Society.pdfICT, the Self, and Society.pdf
ICT, the Self, and Society.pdf
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBERCRIME.pptx
CYBERCRIME.pptxCYBERCRIME.pptx
CYBERCRIME.pptx
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 

ONLINE SAFETY AND SECURITY

  • 2. Hello! I’m Joseph, Paul, Jerot, JM & Lennard! We are here because we will report the topic about Online Safety & Security 2
  • 3. Introduction Each individual when accessing the World Wide Web is concerned with the safety of his or her terminal or computer and the information that will be transmitted or received. Every organisation relies on the internet to some degree or another for communications, transactions, payments and data access. Unfortunately, however, the internet has also become a channel of choice for criminals to commit financial and other crimes. Your organisation must take precautions to protect itself. 3
  • 4. 1. SPAM Let’s start with the first set of slides
  • 5. “▫ Refers to the transmission of unsolicited messages from various origins using electronic messaging systems such as e- mail and chat messengers ▫ A tool for advertisement ▫ Unsolicited bulk e-mail (UBE) 5
  • 7. 2. PHISING Let’s start with the first set of slides
  • 8. “▫ Defined as a software or a program used by an attacker to obtain personal information ▫ Commonly target user passwords to hack and take control of a user account 8
  • 10. 3. PHISING Let’s start with the first set of slides
  • 11. “▫ Short term for malicious software ▫ A computer software sent by attackers to inflict chaos on a computer’s operation and processes 11
  • 12. How to avoid these threats? There are provisions & laws that our country implements to avoid these threats. 12
  • 13. The Philippine government ensures the welfare of its people in their ICT experience by enacting various laws and regulations. There are incidents of theft, scam, phishing and other activities that victimize Filipino people. 13
  • 14. What is Bullying? Defined as “severe or repeated use by one or more students of a written, verbal or electronic expression, or a physical gesture, or any combination thereof, directed to another student that has the effect of actually causing or placing the latter in reasonable fear of physical or emotional harm or damage to his property.” Republic Act 10627 or Anti- Bullying Act of 2013 14
  • 15. This law includes protection of individuals from bullying through electronic means. Bullying invades an individual’s privacy by using photos and other information meant to disgrace that individual. 15
  • 16. Republic Act 10175 or Cybercrime Prevention Act of 2012 16 This law protects an individual from various unwanted online and cyber acts that may harm or evade one’s privacy and integrity.
  • 17. Acquisition of passwords and other vital information from an individual • Computer forgery • Libel 17 Cybercime offenses include, but are not limited to: • Integrity and availability of data • Illegal access of computers through remote means without permission • Interception of one’s information from a private conversation or correspondence •
  • 18. 18 Thanks! Any questions? Please call 0956-390- 3391, John Paul Fajardo Canoy
  • 19. Credits Special thanks to these articles and links ▫ https://www.slideshare.net/ArahLouiseApostol19/online-safety-and-security ▫ https://usa.kaspersky.com/resource-center/preemptive-safety/top-10-internet-safety-rules-and-what-not-to-do- online ▫ https://www.getsafeonline.org/online-safety-and-security/ 19