SlideShare a Scribd company logo
1 of 71
Empowerment
Technologies
Quarter 1 – Module 2:
Online Safety, Security,
Ethics, and
Etiquette
As our society faces the ‘new normal’, most of our
daily tasks now need the assistance of Information
and Communication Technologies. Thanks to the
internet,
because we can now meet and communicate with
each other online. Paying bills, buying goods, growing
your network of friends and even learning can be
done online.
Life now is almost turning to digital media. According
to (Preston n.d.), digital media is any form of media
that uses electronic devices for distribution. This form
of media can be created, viewed, modified and
distributed via electronic devices.
• And it is very important that you not only know how to use and deal
with these technologies but it is necessary to know the different
threats brought by the internet and be equipped on how to keep your
private information safe and secure online.
• Private information is your sensitive personal information or your
identity such as your online safety or web safety or internet safety. It is
also necessary to apply ethics and etiquette online to avoid problems
in facing digital media.
• username and passwords or bank accounts. Even though the
government has
• already set a policy, the Republic Act 10173 or the Data Privacy
Act of 2012, that
• is to protect the fundamental human right of privacy, of
communication while
• ensuring free flow of information to promote innovation and
growth (Republic Act
• 10173 – Data Privacy Act of 2012 n.d.), it is important to have
the knowledge of
• maximizing your private information in order to keep it safe
and secure is called
Some of the internet threats you need to be aware of:
• Pharming - is a scamming practice in which malicious
code is installed on a personal computer or server,
misdirecting users to fraudulent Web sites without their
knowledge or consent.
• This happened when the code sent in an e-mail
modifies local host files on a personal computer. A
computer with a compromised host file will go to the
fake Web site even if a user types in the correct
Internet address or clicks on an affected bookmark
entry.
Email Scam/Junk Mail/Spam Mail - Usually
unsolicited commercial email sent from an unknown
source with identical message sent to multiple
recipients. Usually not dangerous but can be time
and space consuming. Dangerous ones can carry
viruses and other malicious software or malware.
• Email Spoofing - is the creation of emails with a forged
sender address. The goal of email spoofing is to get
recipients to open, respond and engage with the email
message.
Email spoofing can greatly increase the effectiveness of
phishing and other email-based cyber-attacks by tricking
the recipient into trusting the email and its sender
(Tunggal 2019). It is usually used by spammers to hide
the origin of the spam.
• Cyberstalking – is the same as physical stalking by
giving unwanted obsessive attention to a specific
person like following secret surveillance, persistent
and manipulative calling and texting, and other
means of approaching the victim unexpectedly but
cyber stalkers rely on online technology to do it.
Email, social networks, instant messaging, personal
data available online –everything on the Internet can
be used by cyberstalkers to make inappropriate
contact with their victims.
• Cyberbullying - is bullying that takes place over digital
devices like cell phones, computers, and tablets. It
can occur through SMS, Text, and apps, or online in
social media, forums, or gaming where people can
view, participate in, or share content.
• It includes sending, posting, or sharing negative,
harmful, false, or mean content about someone else
like sharing personal or private information causing
embarrassment or humiliation.
• Some cyberbullying crosses the line into unlawful or
criminal behavior
Online Predation - is the act of engaging an underage
minor into inappropriate sexual relationships through
the internet.
Online predators may attempt to initiate and seduce
minors into relationships through the use of chat rooms
or internet forums.
Online predators may try to lure kids and teens into
sexual conversations or even face-to-face meetings.
Predators will sometimes send obscene material or
request that kids send pictures of themselves.
• Flaming - is the act of saying mean things online,
usually in ALL CAPS, and often in a public forum
with the intention to humiliate.
• Online Ethics and Etiquette In order for you to be
safe and you can protect your private
information while you are working online, you
need to know and apply online ethics and
etiquette.
• Online ethics focuses on the acceptable use of
online resources in an online social environment.
Netiquette is a combination of the words network
and netiquetteand is defined as a set of rules for
acceptable online behaviour
10 Basic Rules of Netiquette
The rules of etiquette are just as important in cyberspace as
they are in the real world (Hartney 2020)
1. Make Real People a Priority - If you are talking personally
and face to face with someone, stop browsing or chatting
with anybody else in your cellphone.
2. Use Respectful Language - Avoid name-calling, cursing,
expressing deliberately offensive opinions. In typing, don't
use caps lock. Text in all caps is generally perceived as yelling
or flaming which cause misunderstanding and trouble.
Please don't forget to say please and thank you as
appropriate.
• 3. Share With Discretion - Avoid sending naked sexy
pictures, drunk pictures, drug use pictures or unedited
home video. If you would have a problem with your
boss, your parents, or your kids seeing it now, or at any
point in the future, don't post it online. Children
should not post private information online. Do not also
share your location or picture where you are currently
at. Keep your personal information private.
• 4. Don't Exclude Others - Don’t let others feel that they
are the one you are talking to in your obscure
comment to your Facebook status, forum or Instagram
story. And if you have an in-joke to share with one
other person, or a small number of people in a larger
online group, send them a private message.
5. Choose Friends Wisely- It is insulting to be
dropped from someone's friend list on a social
media site. So, think about it before sending a friend
request or accepting an invitation.
• If you don't want to be in touch with someone,
don't add them in the first place.
• This must be observed by kids or teens so they will
not be a victim of online predation.
• People sometimes are good in pretending just to
get your attention or use fake accounts.
6. Respect People's Privacy - One example is when you
send email to multiple recipients, don’t send it at once,
you can send it privately individually or use BCC (blind
carbon copy) rather than CC (carbon copy). The same
goes for uploading photos or videos that include other
people because others who are in this photo don’t
want to be viewed by unknown friends.
• This also applies for tagging people on Facebook
because others don’t want to be tagged. Another
example is don't sign up for newsletters and other
communications using someone else's email address.
If you apply this rule, hackers might not have chance
to enter and ruin your digital life.
• 7. Fact Check Before Reposting - If you aren't sure of
the facts that you’re going to repost, email it to
someone who does know or can find out. Or do a
search on Google or snopes.com. Because once
you’ve reposted a fake news or false facts, many can
possibly believe it and spread once again.
• Don't forget also that many viruses are circulated via
chain letters and invitations. So forwarding or
reposting this kind of messages will not bring good
luck but rather bad luck.
• Don’t forget to cite the owner of the post or where it
came from. And before posting, check whether it is
appropriate or inappropriate to others.
• 8. Respond to Emails Promptly
• In doing this, you can easily check whether the
emails you received are spams, unsolicited messages
or crafty stuffs and delete these right away. But if
you send your email to your friends or set it as public,
then you need to respond immediately. But double-
check where it really came because there are people
who are fond of playing or making fake emails just to
get in touch with you.
• 9. Update Online Information
• Don't leave inaccurate information online that will
mislead your friends or your customers if you have
an online business. If you have a business website,
update it regularly. Like your operating hours, if you
are not available for that time, change it right away.
10. Think before Click
Don’t hesitate to think before clicking because you
might click an unknown links or files that are likely to
contain malware which will infect your devices or a
link to hacker’s website. Think before clicking Like in
social media posts because it might be a suicide post
that will end to death because you liked his suicidal
post.
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT

More Related Content

Similar to EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT

Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
BryanSmile
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
jleverett
 
Internet Safety Emmabalison
Internet Safety EmmabalisonInternet Safety Emmabalison
Internet Safety Emmabalison
guest13f93438
 
Digital literacy 2
Digital literacy 2Digital literacy 2
Digital literacy 2
mj_jamal
 

Similar to EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT (20)

Untitled Presentation.pdf
Untitled Presentation.pdfUntitled Presentation.pdf
Untitled Presentation.pdf
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
 
Cyber bullying by National Republican Guard
Cyber bullying by National Republican GuardCyber bullying by National Republican Guard
Cyber bullying by National Republican Guard
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
10 netiquette rules.pptx
10 netiquette rules.pptx10 netiquette rules.pptx
10 netiquette rules.pptx
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
 
Parents must know about cyber bullying 2
Parents must know about cyber bullying  2Parents must know about cyber bullying  2
Parents must know about cyber bullying 2
 
Internet Safety Emmabalison
Internet Safety EmmabalisonInternet Safety Emmabalison
Internet Safety Emmabalison
 
Heads up!
Heads up!Heads up!
Heads up!
 
Digital literacy 2
Digital literacy 2Digital literacy 2
Digital literacy 2
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
empowerment technology Pongyan*Agravante
empowerment technology Pongyan*Agravanteempowerment technology Pongyan*Agravante
empowerment technology Pongyan*Agravante
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Recently uploaded (20)

Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT

  • 1. Empowerment Technologies Quarter 1 – Module 2: Online Safety, Security, Ethics, and Etiquette
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. As our society faces the ‘new normal’, most of our daily tasks now need the assistance of Information and Communication Technologies. Thanks to the internet, because we can now meet and communicate with each other online. Paying bills, buying goods, growing your network of friends and even learning can be done online. Life now is almost turning to digital media. According to (Preston n.d.), digital media is any form of media that uses electronic devices for distribution. This form of media can be created, viewed, modified and distributed via electronic devices.
  • 8. • And it is very important that you not only know how to use and deal with these technologies but it is necessary to know the different threats brought by the internet and be equipped on how to keep your private information safe and secure online. • Private information is your sensitive personal information or your identity such as your online safety or web safety or internet safety. It is also necessary to apply ethics and etiquette online to avoid problems in facing digital media.
  • 9. • username and passwords or bank accounts. Even though the government has • already set a policy, the Republic Act 10173 or the Data Privacy Act of 2012, that • is to protect the fundamental human right of privacy, of communication while • ensuring free flow of information to promote innovation and growth (Republic Act • 10173 – Data Privacy Act of 2012 n.d.), it is important to have the knowledge of • maximizing your private information in order to keep it safe and secure is called
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22. Some of the internet threats you need to be aware of:
  • 23.
  • 24.
  • 25.
  • 26. • Pharming - is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent Web sites without their knowledge or consent. • This happened when the code sent in an e-mail modifies local host files on a personal computer. A computer with a compromised host file will go to the fake Web site even if a user types in the correct Internet address or clicks on an affected bookmark entry.
  • 27.
  • 28. Email Scam/Junk Mail/Spam Mail - Usually unsolicited commercial email sent from an unknown source with identical message sent to multiple recipients. Usually not dangerous but can be time and space consuming. Dangerous ones can carry viruses and other malicious software or malware.
  • 29. • Email Spoofing - is the creation of emails with a forged sender address. The goal of email spoofing is to get recipients to open, respond and engage with the email message. Email spoofing can greatly increase the effectiveness of phishing and other email-based cyber-attacks by tricking the recipient into trusting the email and its sender (Tunggal 2019). It is usually used by spammers to hide the origin of the spam.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43. • Cyberstalking – is the same as physical stalking by giving unwanted obsessive attention to a specific person like following secret surveillance, persistent and manipulative calling and texting, and other means of approaching the victim unexpectedly but cyber stalkers rely on online technology to do it. Email, social networks, instant messaging, personal data available online –everything on the Internet can be used by cyberstalkers to make inappropriate contact with their victims.
  • 44.
  • 45. • Cyberbullying - is bullying that takes place over digital devices like cell phones, computers, and tablets. It can occur through SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share content. • It includes sending, posting, or sharing negative, harmful, false, or mean content about someone else like sharing personal or private information causing embarrassment or humiliation. • Some cyberbullying crosses the line into unlawful or criminal behavior
  • 46.
  • 47. Online Predation - is the act of engaging an underage minor into inappropriate sexual relationships through the internet. Online predators may attempt to initiate and seduce minors into relationships through the use of chat rooms or internet forums. Online predators may try to lure kids and teens into sexual conversations or even face-to-face meetings. Predators will sometimes send obscene material or request that kids send pictures of themselves.
  • 48. • Flaming - is the act of saying mean things online, usually in ALL CAPS, and often in a public forum with the intention to humiliate.
  • 49. • Online Ethics and Etiquette In order for you to be safe and you can protect your private information while you are working online, you need to know and apply online ethics and etiquette. • Online ethics focuses on the acceptable use of online resources in an online social environment. Netiquette is a combination of the words network and netiquetteand is defined as a set of rules for acceptable online behaviour
  • 50. 10 Basic Rules of Netiquette The rules of etiquette are just as important in cyberspace as they are in the real world (Hartney 2020) 1. Make Real People a Priority - If you are talking personally and face to face with someone, stop browsing or chatting with anybody else in your cellphone. 2. Use Respectful Language - Avoid name-calling, cursing, expressing deliberately offensive opinions. In typing, don't use caps lock. Text in all caps is generally perceived as yelling or flaming which cause misunderstanding and trouble. Please don't forget to say please and thank you as appropriate.
  • 51. • 3. Share With Discretion - Avoid sending naked sexy pictures, drunk pictures, drug use pictures or unedited home video. If you would have a problem with your boss, your parents, or your kids seeing it now, or at any point in the future, don't post it online. Children should not post private information online. Do not also share your location or picture where you are currently at. Keep your personal information private. • 4. Don't Exclude Others - Don’t let others feel that they are the one you are talking to in your obscure comment to your Facebook status, forum or Instagram story. And if you have an in-joke to share with one other person, or a small number of people in a larger online group, send them a private message.
  • 52. 5. Choose Friends Wisely- It is insulting to be dropped from someone's friend list on a social media site. So, think about it before sending a friend request or accepting an invitation. • If you don't want to be in touch with someone, don't add them in the first place. • This must be observed by kids or teens so they will not be a victim of online predation. • People sometimes are good in pretending just to get your attention or use fake accounts.
  • 53. 6. Respect People's Privacy - One example is when you send email to multiple recipients, don’t send it at once, you can send it privately individually or use BCC (blind carbon copy) rather than CC (carbon copy). The same goes for uploading photos or videos that include other people because others who are in this photo don’t want to be viewed by unknown friends. • This also applies for tagging people on Facebook because others don’t want to be tagged. Another example is don't sign up for newsletters and other communications using someone else's email address. If you apply this rule, hackers might not have chance to enter and ruin your digital life.
  • 54. • 7. Fact Check Before Reposting - If you aren't sure of the facts that you’re going to repost, email it to someone who does know or can find out. Or do a search on Google or snopes.com. Because once you’ve reposted a fake news or false facts, many can possibly believe it and spread once again. • Don't forget also that many viruses are circulated via chain letters and invitations. So forwarding or reposting this kind of messages will not bring good luck but rather bad luck. • Don’t forget to cite the owner of the post or where it came from. And before posting, check whether it is appropriate or inappropriate to others.
  • 55. • 8. Respond to Emails Promptly • In doing this, you can easily check whether the emails you received are spams, unsolicited messages or crafty stuffs and delete these right away. But if you send your email to your friends or set it as public, then you need to respond immediately. But double- check where it really came because there are people who are fond of playing or making fake emails just to get in touch with you.
  • 56. • 9. Update Online Information • Don't leave inaccurate information online that will mislead your friends or your customers if you have an online business. If you have a business website, update it regularly. Like your operating hours, if you are not available for that time, change it right away.
  • 57. 10. Think before Click Don’t hesitate to think before clicking because you might click an unknown links or files that are likely to contain malware which will infect your devices or a link to hacker’s website. Think before clicking Like in social media posts because it might be a suicide post that will end to death because you liked his suicidal post.

Editor's Notes

  1. As our society faces the ‘new normal’, most of our daily tasks now need the assistance of Information and Communication Technologies. Thanks to the internet, because we can now meet and communicate with each other online. Paying bills, buying goods, growing your network of friends and even learning can be done online. Life now is almost turning to digital media. According to (Preston n.d.), digital media is any form of media that uses electronic devices for distribution. This form of media can be created, viewed, modified and distributed via electronic devices. And it is very important that you not only know how to use and deal with these technologies but it is necessary to know the different threats brought by the internet and be equipped on how to keep your private information safe and secure online. Private information is your sensitive personal information or your identity such as your username and passwords or bank accounts. Even though the government has already set a policy, the Republic Act 10173 or the Data Privacy Act of 2012, that is to protect the fundamental human right of privacy, of communication while ensuring free flow of information to promote innovation and growth (Republic Act 10173 – Data Privacy Act of 2012 n.d.), it is important to have the knowledge of maximizing your private information in order to keep it safe and secure is called online safety or web safety or internet safety. It is also necessary to apply ethics and etiquette online to avoid problems in facing digital media.