You are on page 1of 29

Online Ethics and

Etiquette
 Theterm “netiquette” is a coined of network and
etiquette. The term “netizen” refers to a person
who is a member or a part of the online
community.
 The rules of conduct in the web vary from one
community to another. However, there are some
key points to keep in mind to maintain good
conduct over the internet.

 This are the ff. key points


 Recognize that your cyber avatar, or your online
representation, is not another world but an
extension of your personality and an extension of
the existing society that you are part of.
 You should apply the values and conduct learned
since childhood in the online extension of our
society.

 Keep in mind that there are laws existing in our


society and on the web. Remember that are
punishments laid by the government, not for the
sake of punishing, but for peace and order among
the citizens.
 The World Wide Web enables participation of
people from different countries with different
cultures and religions. Keep in mind that there
are differences among the individuals you will
interact with and the individuals who will read
your published contents.
 Everything published on the World Wide Web
should be considered as copyrighted or owned by
another individual. However, this does not mean
that you cannot use these materials for your
personal use.
 In sending correspondence in either e-mail or
chat, be careful in selecting words to
communicate. As much as possible, use the
appropriate manner of communication and avoid
threatening and disrespectful words.
Reflect Upon

“Are there any instances when you misbehaved


online? How do you think should you behave now
that you have learned netiquette and proper
behavior on the World Wide Web?”
Online Safety and Security
 Eachindividual when accessing the World Wide
Web is concerned with the safety of his or her
terminal or computer and the information that
will be transmitted or received. Here are a
number of threats that can be acquired from
connecting to the World Wide Web.
 Spam
 Phishing
 Malware
SPAM
 This refers to the transmission of unsolicited
messages from various origins using electronic
messaging systems such as e-mail and chat
messages. Typically, attackers use spam as a tool
for advertisement. E-mail spam is the most
common forms, which is also known as unsolicited
bulk e-mail (UBE)
PHISHING
 Thisis defined as a software or a program used by
an attacker to obtain personal information.
Attackers commonly target user passwords to
hack and take control of a user account.
MALWARE
 This is the short term for “Malicious Software”,
which is a computer software sent by attackers to
inflict chaos on a computer’s operation and
processes. Most of the time, this program is
disguise as enticing web sites. Malwares are used
to spy upon the activity or the computer steal
information.
Big Check

 There are a number of threats lingering on the


World Wide Web, and users are very prone to be
being infected by these threats. A very effective
way of avoiding these threats is verifying the
authenticity and credibility of the web source.
What Have I Learned so far?

 Wasyour online security ever compromised?


What were the threats that victimized you?
How do you think did you acquire these threats?
Government Provisions for
Online Courtesy and Etiquette
 The Philippines government ensures the welfare
of its people in their ICT experience by enacting
various laws and regulations. When ICT grew in
the country, several security issues arouse and
become a concern for lawmakers.
 There incidents of scam, phishing and other
activities that victimize Filipino people. Laws
that aim to protect the people from these illegal
activities were presented.
Republic Act 10627 or Anti Bullying Act
 Bullying is defined as “severe or repeated use by
one or more students of a written, verbal or
electronic expression, or a physical gesture, or
any combination thereof, directed to another
student that has the effect of actually causing or
placing the latter in reasonable fear of physical or
emotional harm or damage to his property.
Republic Act 10175 or Cybercrime
Prevention Act of 2012
 This law protects an individual from various
unwanted online and cyber acts that may harm or
evade one’s privacy and integrity.

 Cybercrime offenses include, but are not limited


to, integrity and availability of data, illegal access
of computers through remote means without
permission, interception of one’s information
from a private conversation or correspondence ,
acquisition of password and other vital
information from an individual, computer forgery,
and libel.
Reflect Upon
“Have you ever witnessed cyberbullying
on social media? When you can say that
a person is cyberbullied? As a
responsible netizen, what is your role in
helping the person who is being
cyberbullied?”

You might also like