This document discusses online safety, security, ethics and etiquette. It contains a self-check list for online habits and provides tips for safe social media use. The main threats discussed are identity theft, cyber stalking, cyberbullying and different types of internet threats like malware, spam and phishing. Laws regarding data privacy and cybercrime in the Philippines are also mentioned. Practical tips provided include not oversharing private details, reviewing posts before sharing, only interacting with verified accounts, and being aware of what you post or share online.
1. Self-Check on Online Habits
Online Habits Yes No
I share my password to my friends.
I post my rant/s on my social media.
I talk to strangers on social media.
I visit unsecured websites.
I post about my family’s future vacation.
I post image or video without asking permission from
the owner.
3. Objectives:
1. identify different online risks and threats;
2. value the importance of online safety, security, ethics and
etiquette; and
3. apply online safety, security, ethics, and etiquette
standards and practice in the use of ICTs as it would relate
to their specific professional tracks.
(CS_ICT11/12-ICTPT-Ia-b2)
7. 1) You are not obliged to
share all your info
Data Privacy Act of 2012
(Republic Act No. 10173) -
protects individuals from
unauthorized processing of
personal information that is
(1) private, not publicly
available; and (2)
identifiable, where the
identity of the individual is
apparent either through
direct attribution or when
put together with other
available information.
8. 2. Do not over-share!
•Life story or daily routine
•Names of children or
relatives or pets
•Photos of your
house/room
•Financials
9. Identity Theft
– a crime of stealing personal
information for the purpose of
assuming that person’s name
or identity to make any form
of transactions.
Cyber Stalking
– a criminal practice where
electronic communication is
used to stalk or harass
individual or group.
18. Cyberbullying
– bullying that takes place over
digital devices like cellphones,
computers, and tablets.
Anti-Bullying Act of 2013
– an act requiring all elementary
and secondary schools to adopt
policies to prevent and address
the acts of bullying in their
institutions including
cyberbullying.
23. Internet Threats
1. Malware – stands for malicious
software. A software that is
specifically designed to disrupt,
damage, or gain unauthorized
access to a computer system.
2. Spam – unwanted email mostly
from bots or advertisers. It can be
used to send malware.
3. Phishing – its goal is to acquire
sensitive personal information like
passwords and credit card details.
26. Cyber Crime Prevention
Act of 2012
• officially recorded as Republic Act
No. 10175 is a law in Philippines
approved on September 12, 2012
• It aims to address legal issues
concerning online interactions and
the internet in the Philippines.
• Among the cybercrime offenses
included in the bill are
cybersquatting, cybersex, child
pornography, identity theft, illegal
access to data and libel.
28. Activity 1: Answer the following:
(Max. of 3 sentences)
1. How do you keep yourself safe and secure online?
__________________________________________________________________
___________________________________________________________________
_________________________________________________________________
2. Explain the verse below relating to the use of social media:
“A good reputation and respect are worth much more than
silver and gold.” ~ Proverbs 22:1
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
29. Activity 2:
Poster Making
Directions:
Make an e-poster with a
theme “think before you
click”. You may use any
online or offline application
in designing. If not
available, use a 1 whole
sheet of short bond paper
and coloring materials.
Criteria 5 4 3
Originality There are no
similar elements
on the poster.
There are 1 or 2
similar
elements on
the poster.
There are many
similar
elements on
the poster.
Graphics
Relevance
All graphics are
related to the
theme and
makes it easier
to understand.
Some graphics
are related to
the theme.
Many graphics
are not related
to the topic.
Attractiveness The poster is
exceptionally
attractive, neat,
and clean.
The poster is
acceptably
attractive, but
it has few
erasures.
The poster is
not attractive
and has many
erasures.