Professional Documents
Culture Documents
Technologies
Quarter 1 – Module 2:
Online Safety, Security,
Ethics, and Etiquette
Activity
Below is a questionnaire about how much information you have shared so far. Put
a check ( ) under Shared or Not Shared.
Types of Information Shared Not Shared
1. First name
2. Last name
3. Middle name
4. Current and previous school (s)
5. Your cellphone number
6. The name of your mother and father
4. Current and previous schools Most people who steal identities study their subject. They can use
this information for verification purposes.
5. Your cellphone number Your cellphone number should never be posted over the Internet.
The Internet is a public place.
6. The name of your mother and Risky, yet not as risky as posting their full names, especially your
father mother’s maiden name.
7. The name of your siblings Disclosing this is a huge risk. Strangers may pretend or use their
identity to dupe you.
Online Safety and Security
Type of Information Risks
8. Your address Giving the Internet your number is one thing; giving them your
address is a whole other level. It will be much easier for criminals
to find you.
9. Your home phone number This shared information is more risky than sharing your personal
phone number. Scams usually use this information to deceive
you, one of which is when stranger pretends to know your parents
or pretends to be you.
10. Your birthday Letting people know your birthday is probably a must if you want
to get as many gifts as possible. Nut having it in profile makes
you vulnerable to identity theft.
1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn how the
website handles the information you share.
4. Know the security features of the social networking site you use.
By keeping your profile private, search engines will not be able
to scan your profile
Tips to Stay Safe Online
a. Computer Virus
b. Cyberbullying
c. Cyberstalking
d. Flaming
e. Hacker
f. Online Predation
g. Pharming
h. Phishing
i. Spam
j. Spyware