You are on page 1of 29

Self-Check on Online Habits

Online Habits Yes No


I share my password to my friends.
I post my rant/s on my social media.
I talk to strangers on social media.
I visit unsecured websites.
I post about my family’s future vacation.
I post image or video without asking permission from
the owner.
Online Safety, Security, Ethics
and Etiquette
Objectives:
1. identify different online risks and threats;
2. value the importance of online safety, security, ethics and
etiquette; and
3. apply online safety, security, ethics, and etiquette standards
and practice in the use of ICTs as it would relate to their
specific professional tracks.
(CS_ICT11/12-ICTPT-Ia-b2)
What is the
biggest threat
online?
Practical Tips for
Social Media
1) You are not obliged to
share all your info

Data Privacy Act of 2012


(Republic Act No. 10173) -
protects individuals from
unauthorized processing of
personal information that is
(1) private, not publicly
available; and (2)
identifiable, where the
identity of the individual is
apparent either through
direct attribution or when
put together with other
available information.
2. Do not over-share!
• Life story or daily routine
• Names of children or
relatives or pets
• Photos of your
house/room
• Financials
Identity Theft

– a crime of stealing personal


information for the purpose of
assuming that person’s name
or identity to make any form
of transactions.

Cyber Stalking
– a criminal practice where
electronic communication is
used to stalk or harass
individual or group.
3. Talk only to your intended audience
Share only what is needed
When Sharing IDs

1. Ask recipient
what is
needed
2. Block out
unnecessary
info
4) Review,
Review, Review
5) Chat only with Verified Accounts
6) Check with your
”Friends”
Cyberbullying
– bullying that takes place over
digital devices like cellphones,
computers, and tablets.

Anti-Bullying Act of 2013


– an act requiring all elementary
and secondary schools to adopt
policies to prevent and address
the acts of bullying in their
institutions including
cyberbullying.
7) Know what
you’re reading or
sharing
8) Careful with
Quizzes
Internet Threats

1. Malware – stands for malicious


software. A software that is
specifically designed to disrupt,
damage, or gain unauthorized
access to a computer system.
2. Spam – unwanted email mostly
from bots or advertisers. It can be
used to send malware.
3. Phishing – its goal is to acquire
sensitive personal information like
passwords and credit card details.
9) Logout
• Email
• Old SocMed Accounts
• Delete unused apps

10) Deactivate Old Accounts


Cyber Crime Prevention
Act of 2012

• officially recorded as Republic Act


No. 10175 is a law in Philippines
approved on September 12, 2012

• It aims to address legal issues


concerning online interactions and
the internet in the Philippines.

• Among the cybercrime offenses


included in the bill are
cybersquatting, cybersex, child
pornography, identity theft, illegal
access to data and libel.
Stay safe online!
Facebook.com/smartcommunities
Twitter.com/smartnewsroom
Activity 1: Answer the following:
(Max. of 3 sentences)
1. How do you keep yourself safe and secure online?
__________________________________________________________________
___________________________________________________________________
_________________________________________________________________
2. Explain the verse below relating to the use of social media:
“A good reputation and respect are worth much more than
silver and gold.” ~ Proverbs 22:1
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
Activity 2: Criteria
Originality
5 4 3
There are no There are 1 or There are
Poster Making similar 2 similar many similar
elements on elements on elements on
Directions: the poster. the poster. the poster.
Make an poster with a Graphics All graphics Some Many
theme “think before you Relevance are related to graphics are graphics are
click”. You may use any the theme and related to the not related to
online or offline application makes it theme. the topic.
easier to
in designing. If not understand.
available, use a 1 whole Attractivene The poster is The poster is The poster is
sheet of short bond paper ss exceptionally acceptably not attractive
and coloring materials. attractive, attractive, but and has many
neat, and it has few erasures.
clean. erasures.

You might also like