SlideShare a Scribd company logo
Online Safety,
Security, Ethics and
Etiquette
LESSON 2
• Online security, safety, and
ethics
• Internet threats
• Protecting reputations online
• Copyright
• Contextualized online search
and research skills
Rules of Netiquette
At the end of this lesson, the students should be able to:
1. Identify the rules of Netiquette;
2. Recognize the dangers of the Internet;
3. Discuss the tips to avoid copyright infringement
4. Produce a news casting displaying the
researched news and events related to cybercrime.
5. Consider one’s and others safety when sharing
information on the net.
WHAT IS
INTERNET SAFETY?
- it refers to the online
security or safety of people
and their information when
using internet.
WHAT IS
NETIQUETTE?
- is network etiquette, the do’s
and don’ts of online
communication.
TEN RULES OF NETIQUETTE
•Rule No. 1: Remember the human
•Rule No. 2: Adhere to the same
standards online that you follow in real
life.
•Rule no. 3: Know where you are in
cyberspace.
•Rule no. 4: Respect other people’s time
and bandwidth.
•Rule no. 5: Make yourself look good
online.
TEN RULES OF NETIQUETTE
•Rule no. 6: Share expert knowledge
•Rule no. 7: Help keep flame wars under
control
•Rule no. 8: Respect other people’s
privacy.
•Rule no. 9: Don’t abuse your power.
•Rule no. 10: Be forgiving of other
people’s mistake.
Online Safety
and Security
The Internet, truly, is a powerful tool. It can be used
to promote your business, gain new friends, and
stay in touch with the old ones.
It is also a source of entertainment. But like
most things in this world, there is always “another
side of the coin.”
The Internet is one of the most dangerous
places, especially if you do not know what you are
doing.
CYBERCRIME?
•A CRIME COMMITTED OR
ASSISTED THROUGH THE
USE OF INTERNET
lesson-2-rules-of-netiquette.pdf.bshhsjdj
lesson-2-rules-of-netiquette.pdf.bshhsjdj
Tips to stay safe online
•Be mindful of what you share online and
what site you share it to;
•Do not just accept terms and conditions,
read it;
•Check out the privacy policy page of a
website to learn how the website handles
the information you share;
•Know the security features of the social
networking site you use. By keeping your
profile private, search engines will not be
able to scan your profile;
Tips to stay safe online
•Do not share your password with anyone;
•Avoid logging in to public networks/Wi-Fi.
Browsing in “Incognito mode”, a feature of
the browser, will not protect you from
hackers;
•Do not talk to strangers whether online or
face-to-face;
•Never post anything about a future
vacation. It is similar to posting “Rob my
house at this date.”;
Tips to stay safe online
•Add friends you know in real life;
•Avoid visiting untrusted websites;
•Install and update an antivirus software
on your computer. Use only one
antivirus software to avoid conflicts;
•If you have a Wi-Fi at home, make it a
private network by adding a password;
•Avoid downloading anything from
untrusted(e.g. torrents);
Tips to stay safe online
•Buy the software; do not use
pirated ones;
•Do not reply or click links from
suspicious emails.
Internet Threats:
1. Malware – stands for malicious software
2. Spam – unwanted email mostly from bots
or advertisers. It can be used to send
malware.
3. Phishing – Its goal is to acquire sensitive
personal information like passwords and
credit card details. This is done by sending
you an e-mail that will direct the user to visit a
fake website and be asked to update his/her
username, password, credit card or personal
information.
Internet Threats:
1. Malware – stands for malicious software
Types: Virus, Worm, Trojan,
Spyware, Adware
a. Virus – a malicious program designed to
replicate itself and transfer from one
computer to another either through the
Internet and local networks or data storage
like flash drives and CDs
Internet Threats:
b. WORM – a malicious program that
transfers from one computer to another by
any types of means.
Ex. ILOVEYOU Worm - The malware originated in the
Pandacan neighborhood of Manila in the Philippines on May 5, 2000.
c. Trojan – a malicious program that is
disguised as a useful program but once
downloaded or installed, leaves your PC
unprotected and allows hackers to get your
information.
Internet Threats:
d. Spyware – a program that runs in the
background without you knowing it. It has the
ability to monitor what you are currently
doing and typing through keylogging.
Ex. Keylogger – used to record keystrokes done by the
user. This is done to steal their password or any other sensitive
information. The key logger software typically uses log file to store its
recording.
e. Adware – a program designed to send you
advertisements mostly as pop-ups
Internet Threats:
f. Ransomware - or ransom software is
a type of malicious software from crypto
virology that threatens to publish the
victim's data or perpetually
block access to it unless a ransom is
paid.
PROTECTING REPUTATIONS
ONLINE
1. Before your post something on the web, ask
these questions to yourself:
• Would you want your parents or
grandparents to see it?
• Would you want your future boss to see
it?
2. If you feel that a post can affect you or
other’s reputation, ask the one who posted it to
pull it down or report it as inappropriate.
COPYRIGHT INFRINGEMENT
If you create something—an
idea, an invention, a form of
literary work, or a research, you
have the right of how it should be
used by others.
This is called intellectual
property.
COPYRIGHT INFRINGEMENT
Some tips that could help you
avoid copyright infringement:
Understand – copyright protects literary
works, photographs, painting, drawings,
films, music(lyrics), choreography, and
sculptures, but it generally does NOT
protect underlying ideas and facts.
COPYRIGHT INFRINGEMENT
Be responsible – Even if a
material does not say that it is
copyrighted, it is not a valid
defense against copyright. Be
responsible enough to know if
something has a copyright.
COPYRIGHT INFRINGEMENT
Be creative – ask yourself whether
what you are making is something
that came from you or something
made from somebody else’s
creativity. It is important to add
your own creative genius in
everything that will be credited to
you.
COPYRIGHT INFRINGEMENT
Know the law – in Philippines,
copyright only last a
lifetime(author) plus 50 years.
FAIR USE may be use without
consent as long as it is used in
commentaries, criticism,
education.
Think Before You Click
1. Before you post something on the web, ask these questions to
yourself:
Would you want your parents or grandparents to see it?
Would you want your future boss to see it?
Once you post something on the web, you have no control of who sees
your posts.
2. Your friends depend on you to protect their reputation online.
Talk to your friends about this serious responsibility.
3. Set your post to “private.” In this way, search engines will
not be able to scan that post.
4. Avoid using names. Names are easy for search engines to
scan.
5. If you feel that a post can affect you or other’s reputation, ask
the one who posted it to pull it down or report it as
inappropriate.
GROUP ACTIVITY
Cyber News Report
•With your group, research for several news
and events related to cybercrime on the
net.
•Be able to identify the sources of the news.
•Using your cellphone or any video-
recording device, report it as if you are a
newscaster.
•Present in 1-2 minutes recording.
PERFORMANCE TASK
PERFORMANCE TASK
•The class will be divided into 6 groups.
•Each group will have to present an
INFOMERCIAL or CAMPAIGN with the
theme “THINK BEFORE YOU CLICK”
•The video should not be less than 2
minutes.
lesson-2-rules-of-netiquette.pdf.bshhsjdj

More Related Content

PPTX
empowerment technology/ RULES AND NETIQUETE lesson 2.pptx
PPTX
SHS LS6- SAFETY, SECURITY, ETHICS AND ETIQUTTE STANDARDS .pptx
PPTX
Lesson 2 - Rules of Netiquette (Information and Communication Technology)
PPTX
EMTECH Q1, M2 ONLINE SAFETY SECURITY ETHIC AND ETIQUETTE.pptx
PPTX
Empowerment TECHONOLOGY 12- FIRST SEMESTER
PPTX
Rules of Netiquette Empowerment Technologies Lesson
PPTX
L2 rules of netiquette
PPT
L2 Rules of Netiquette.ppt · version 1.ppt
empowerment technology/ RULES AND NETIQUETE lesson 2.pptx
SHS LS6- SAFETY, SECURITY, ETHICS AND ETIQUTTE STANDARDS .pptx
Lesson 2 - Rules of Netiquette (Information and Communication Technology)
EMTECH Q1, M2 ONLINE SAFETY SECURITY ETHIC AND ETIQUETTE.pptx
Empowerment TECHONOLOGY 12- FIRST SEMESTER
Rules of Netiquette Empowerment Technologies Lesson
L2 rules of netiquette
L2 Rules of Netiquette.ppt · version 1.ppt

Similar to lesson-2-rules-of-netiquette.pdf.bshhsjdj (20)

PPT
Empowerment lesson 2.ppt
PPTX
Rules of netiquette-lesson 2.pptx
PPTX
ONLINE SAFETY-online Etiquette ETEC.pptx
PDF
Empowerment Technologies - Module 2
PPTX
2. ONLINE SECURITY, SAFETY AND ETHICS.pptx
PPTX
ONLINE SAFETY empowerment technolog.pptx
PDF
Emp tech las-week-2
PPTX
Online-Safety-Security-and-etiquette.pptx
PPTX
L2 Rules of Netiquette.pptx
PPTX
L2 Rules of Netiquette.pptx
PPTX
L2 rules of netiquette
PPTX
E-Tech L2 Rules of Netiquette.pptx
PPTX
L2 rules of netiquette
PPTX
Online Safety, Security, Ethics, and Etiquette.pptx
PPTX
Online Safety, Security, Ethics, and Etiquette.pptx
PPTX
Lesson-2-Online-Safety-Security-Ethics-And-Etiquette.pptx
PPTX
Online-Safety-Security-Ethics-and-Etiquette.pptx
PPT
L2 Rules of Netiquette in Empowerment technology
PPTX
Netiquette on using internet
PPTX
L2 Rules of Netiqugrrrrrrrrrrrrrrrrrrrrrrrrrrrette.pptx
Empowerment lesson 2.ppt
Rules of netiquette-lesson 2.pptx
ONLINE SAFETY-online Etiquette ETEC.pptx
Empowerment Technologies - Module 2
2. ONLINE SECURITY, SAFETY AND ETHICS.pptx
ONLINE SAFETY empowerment technolog.pptx
Emp tech las-week-2
Online-Safety-Security-and-etiquette.pptx
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptx
L2 rules of netiquette
E-Tech L2 Rules of Netiquette.pptx
L2 rules of netiquette
Online Safety, Security, Ethics, and Etiquette.pptx
Online Safety, Security, Ethics, and Etiquette.pptx
Lesson-2-Online-Safety-Security-Ethics-And-Etiquette.pptx
Online-Safety-Security-Ethics-and-Etiquette.pptx
L2 Rules of Netiquette in Empowerment technology
Netiquette on using internet
L2 Rules of Netiqugrrrrrrrrrrrrrrrrrrrrrrrrrrrette.pptx
Ad

Recently uploaded (20)

PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
Designing Intelligence for the Shop Floor.pdf
PDF
Tally Prime Crack Download New Version 5.1 [2025] (License Key Free
PDF
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
PPTX
Why Generative AI is the Future of Content, Code & Creativity?
PDF
iTop VPN Free 5.6.0.5262 Crack latest version 2025
DOCX
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps
PPTX
Advanced SystemCare Ultimate Crack + Portable (2025)
PDF
Digital Systems & Binary Numbers (comprehensive )
PDF
CCleaner Pro 6.38.11537 Crack Final Latest Version 2025
PDF
medical staffing services at VALiNTRY
PDF
Salesforce Agentforce AI Implementation.pdf
PDF
Download FL Studio Crack Latest version 2025 ?
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
17 Powerful Integrations Your Next-Gen MLM Software Needs
PPTX
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
PDF
Complete Guide to Website Development in Malaysia for SMEs
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PPTX
CHAPTER 2 - PM Management and IT Context
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Designing Intelligence for the Shop Floor.pdf
Tally Prime Crack Download New Version 5.1 [2025] (License Key Free
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
Why Generative AI is the Future of Content, Code & Creativity?
iTop VPN Free 5.6.0.5262 Crack latest version 2025
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps
Advanced SystemCare Ultimate Crack + Portable (2025)
Digital Systems & Binary Numbers (comprehensive )
CCleaner Pro 6.38.11537 Crack Final Latest Version 2025
medical staffing services at VALiNTRY
Salesforce Agentforce AI Implementation.pdf
Download FL Studio Crack Latest version 2025 ?
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
17 Powerful Integrations Your Next-Gen MLM Software Needs
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
Complete Guide to Website Development in Malaysia for SMEs
Wondershare Filmora 15 Crack With Activation Key [2025
Adobe Illustrator 28.6 Crack My Vision of Vector Design
CHAPTER 2 - PM Management and IT Context
Ad

lesson-2-rules-of-netiquette.pdf.bshhsjdj

  • 1. Online Safety, Security, Ethics and Etiquette LESSON 2
  • 2. • Online security, safety, and ethics • Internet threats • Protecting reputations online • Copyright • Contextualized online search and research skills Rules of Netiquette
  • 3. At the end of this lesson, the students should be able to: 1. Identify the rules of Netiquette; 2. Recognize the dangers of the Internet; 3. Discuss the tips to avoid copyright infringement 4. Produce a news casting displaying the researched news and events related to cybercrime. 5. Consider one’s and others safety when sharing information on the net.
  • 4. WHAT IS INTERNET SAFETY? - it refers to the online security or safety of people and their information when using internet.
  • 5. WHAT IS NETIQUETTE? - is network etiquette, the do’s and don’ts of online communication.
  • 6. TEN RULES OF NETIQUETTE •Rule No. 1: Remember the human •Rule No. 2: Adhere to the same standards online that you follow in real life. •Rule no. 3: Know where you are in cyberspace. •Rule no. 4: Respect other people’s time and bandwidth. •Rule no. 5: Make yourself look good online.
  • 7. TEN RULES OF NETIQUETTE •Rule no. 6: Share expert knowledge •Rule no. 7: Help keep flame wars under control •Rule no. 8: Respect other people’s privacy. •Rule no. 9: Don’t abuse your power. •Rule no. 10: Be forgiving of other people’s mistake.
  • 8. Online Safety and Security The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with the old ones. It is also a source of entertainment. But like most things in this world, there is always “another side of the coin.” The Internet is one of the most dangerous places, especially if you do not know what you are doing.
  • 9. CYBERCRIME? •A CRIME COMMITTED OR ASSISTED THROUGH THE USE OF INTERNET
  • 12. Tips to stay safe online •Be mindful of what you share online and what site you share it to; •Do not just accept terms and conditions, read it; •Check out the privacy policy page of a website to learn how the website handles the information you share; •Know the security features of the social networking site you use. By keeping your profile private, search engines will not be able to scan your profile;
  • 13. Tips to stay safe online •Do not share your password with anyone; •Avoid logging in to public networks/Wi-Fi. Browsing in “Incognito mode”, a feature of the browser, will not protect you from hackers; •Do not talk to strangers whether online or face-to-face; •Never post anything about a future vacation. It is similar to posting “Rob my house at this date.”;
  • 14. Tips to stay safe online •Add friends you know in real life; •Avoid visiting untrusted websites; •Install and update an antivirus software on your computer. Use only one antivirus software to avoid conflicts; •If you have a Wi-Fi at home, make it a private network by adding a password; •Avoid downloading anything from untrusted(e.g. torrents);
  • 15. Tips to stay safe online •Buy the software; do not use pirated ones; •Do not reply or click links from suspicious emails.
  • 16. Internet Threats: 1. Malware – stands for malicious software 2. Spam – unwanted email mostly from bots or advertisers. It can be used to send malware. 3. Phishing – Its goal is to acquire sensitive personal information like passwords and credit card details. This is done by sending you an e-mail that will direct the user to visit a fake website and be asked to update his/her username, password, credit card or personal information.
  • 17. Internet Threats: 1. Malware – stands for malicious software Types: Virus, Worm, Trojan, Spyware, Adware a. Virus – a malicious program designed to replicate itself and transfer from one computer to another either through the Internet and local networks or data storage like flash drives and CDs
  • 18. Internet Threats: b. WORM – a malicious program that transfers from one computer to another by any types of means. Ex. ILOVEYOU Worm - The malware originated in the Pandacan neighborhood of Manila in the Philippines on May 5, 2000. c. Trojan – a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.
  • 19. Internet Threats: d. Spyware – a program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing and typing through keylogging. Ex. Keylogger – used to record keystrokes done by the user. This is done to steal their password or any other sensitive information. The key logger software typically uses log file to store its recording. e. Adware – a program designed to send you advertisements mostly as pop-ups
  • 20. Internet Threats: f. Ransomware - or ransom software is a type of malicious software from crypto virology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.
  • 21. PROTECTING REPUTATIONS ONLINE 1. Before your post something on the web, ask these questions to yourself: • Would you want your parents or grandparents to see it? • Would you want your future boss to see it? 2. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it down or report it as inappropriate.
  • 22. COPYRIGHT INFRINGEMENT If you create something—an idea, an invention, a form of literary work, or a research, you have the right of how it should be used by others. This is called intellectual property.
  • 23. COPYRIGHT INFRINGEMENT Some tips that could help you avoid copyright infringement: Understand – copyright protects literary works, photographs, painting, drawings, films, music(lyrics), choreography, and sculptures, but it generally does NOT protect underlying ideas and facts.
  • 24. COPYRIGHT INFRINGEMENT Be responsible – Even if a material does not say that it is copyrighted, it is not a valid defense against copyright. Be responsible enough to know if something has a copyright.
  • 25. COPYRIGHT INFRINGEMENT Be creative – ask yourself whether what you are making is something that came from you or something made from somebody else’s creativity. It is important to add your own creative genius in everything that will be credited to you.
  • 26. COPYRIGHT INFRINGEMENT Know the law – in Philippines, copyright only last a lifetime(author) plus 50 years. FAIR USE may be use without consent as long as it is used in commentaries, criticism, education.
  • 27. Think Before You Click 1. Before you post something on the web, ask these questions to yourself: Would you want your parents or grandparents to see it? Would you want your future boss to see it? Once you post something on the web, you have no control of who sees your posts. 2. Your friends depend on you to protect their reputation online. Talk to your friends about this serious responsibility. 3. Set your post to “private.” In this way, search engines will not be able to scan that post. 4. Avoid using names. Names are easy for search engines to scan. 5. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it down or report it as inappropriate.
  • 29. Cyber News Report •With your group, research for several news and events related to cybercrime on the net. •Be able to identify the sources of the news. •Using your cellphone or any video- recording device, report it as if you are a newscaster. •Present in 1-2 minutes recording.
  • 31. PERFORMANCE TASK •The class will be divided into 6 groups. •Each group will have to present an INFOMERCIAL or CAMPAIGN with the theme “THINK BEFORE YOU CLICK” •The video should not be less than 2 minutes.