SlideShare a Scribd company logo
EMPOWERMENT TECHNOLOGY
With the country‟s biggest network
data offerings for every smartphone
holder, online safety is one of the
concerns most parents want their
children to remember these days. Every
day, flash reports show number of
victims of malicious conduct like
bullying, identity thief, automatic teller
machine fraud, online selling scam,
face or body manipulation to earn
money and the worst is rape of victims
of meet ups.
https://ph.pinterest.com/pin/7198
7294014535665/
Why is it important to stay safe online? Most of
us are „connected‟ via our laptops, mobile
phones, tablets, or personal computer. The
potential for the internet to be a valuable and a
fun resource for entertainment, making friends,
keeping in touch and learning is huge. But if
you use the internet, you could be at risk of
illegal activities or abuse - be it bullying, fraud or
something more serious. Unlike seeing
someone face to face, on the net, people aren't
always what they first seem. In the same way
you learn about safety when you leave the
house, it is important to learn how to stay safe
online.
RISKS
SOME PRECAUTION ON SHARING
PERSONAL INFORMATION ONLINE
First name
There is still a risk in sharing your first name. Chances are, a
hacker already knows plenty of stuff about you even if you
only give out your name. You cannot just walk in a room
and start introducing yourself to everyone. You now know
whom you can come across with.
TYPE OF
INFORMATION
Last name
If sharing your name is a small risk, having both your first
and last is riskier. You will be vulnerable to being searched
for using searched engine, which will include image search.
Matching a name with a face can lead to several
cybercrimes like identity theft.
Middle name
Sharing just your middle name is probably not the risky
most risky of this shared information, but sharing your
entire name would be.
Current and previous
school(s)
Most people who steal identities study their subject. They
can use this information for verification purposes.
Your Cellphone
Number
Your cellphone number should never be posted over the
Internet. The Internet is a public place. It is the same as
posting your name on a billboard.
Who your Mother
and Father are
Risky, yet not as risky as posting their full names, especially
your mother‟s maiden name. In fact, if you have already
encountered many websites that require your mother‟s
maiden name as an answer to a secret question whenever
you lose your password.
Who your siblings are
This is a huge risk, especially if you have younger siblings.
Stranger may pretend or use their identity to dupe you.
Current and previous
school(s)
Most people who steal identities study their subject. They
can use this information for verification purposes.
Your address
Hopefully you answered no to this one. Giving the Internet
your number is one thing, giving your address is a whole
other level. It would be much easier for criminals to find
you.
Your home phone
number
This shared information is riskier than sharing your personal
phone number. Scams usually use this information to
deceive you, one of which is when a stranger pretends to
know your parents or pretends to be you.
Your birthday
Letting people know your birthday is probably a must if
you want to get as many gifts as possible. But having it in
your profile makes you vulnerable to identity theft.
Source: Empowerment Technologies First Edition.(2016).Sampaloc Manila:Rex
Bookstore, Inc
1.) Never give any
personal
information out
about yourself
over the internet.
2.) Do not give any
bank or sensitive
information unless
you are sure that it is
a reputable business
having a secure
service.
3. To make sure that you
are in a secured network,
the website address
should begin with
“https://’ as opposed to
“http://”. Never access your
accounts by following an
email link, instead type
your URL by yourself.
THERE ARE NUMEROUS DELINQUENCIES THAT CAN BE
COMMITTED ON THE INTERNET SUCH AS STALKING, IDENTITY
THEFT, PRIVACY VIOLATIONS, AND HARASSMENT. TO AVOID
THESE ONLINE CRIMES, FOLLOW THE FOLLOWING ONLINE
SAFETY MEASURES:
HERE ARE SOME WAYS YOU CAN CHECK IF A WEBSITE IS
TRUSTWORTHY
Reliable websites Reliable websites
Usually end in .edu or .gov Might end in .com
Don‟t have errors Have errors
Are up to date Are outdated
Use facts Use opinions
Use experts Use unreliable sources
https://www.wikihow.com/Find-if-a-
Website-Is-Legitimate
ONLINE
SECURITY
The standard definition of online
security calls it the mix of rules that are
followed and actions that are taken to
make sure online user data and privacy
aren‟t compromised by cybercriminals.
Online security can be something as
complex as a system that‟s designed to
prevent credit card theft, or something
as simple as you using antivirus
software to protect your device from
malware and viruses.
Here are some tips to help you stay safe when using the internet.
When you are online, treat the Internet a public place and it is up to you to protect yourself.
1. Be mindful of what
you share online and
what site you share it
to.
2. Do not just accept
terms and conditions;
read it.
3. Know the security
features of the social
networking site you
use. By keeping your
profile private, search
engines will not be
able to scan your
profile.
4. Do not share your
password with
anyone.
5. Avoid logging in to
public networks/Wi-Fi.
Browsing in
“incognito (or private)
mode will NOT protect
you from hackers.
Here are some tips to help you stay safe when using the internet.
When you are online, treat the Internet a public place and it is up to you to protect yourself.
6. Do not talk to
strangers whether
online or face-to-face.
7. Never post anything
about a future
vacation. It is similar
to posting, “Rob my
house at this date.”
8. Add friends you
know in real life.
9. Avoid visiting
untrusted websites.
10. Install and update
antivirus software on
your computer. Use
only one antivirus
software to avoid
conflicts.
Here are some tips to help you stay safe when using the internet.
When you are online, treat the Internet a public place and it is up to you to protect yourself.
11. If you have Wi-Fi at
home, make it private
network by adding a
password.
12. Avoid downloading
anything from
untrusted websites.
13. Do not use pirated
software.
14. Do not reply or
click links from
suspicious emails.
15. Make online
purchases from
secured sites
- is a combination of the words
network and etiquette. It is a set of
rules for behaving properly online.
NETIQUETTE
The Core Rules of Netiquette are excerpted from the book Netiquette by Virginia Shea
1: Remember the Human Rule.
2: Adhere to the same standards of behavior online that you follow in real life.
3: Know where you are in cyberspace.
4: Respect other people's time and bandwidth.
5: Make yourself look good online.
The Core Rules of Netiquette are excerpted from the book Netiquette by Virginia Shea
6: Share expert knowledge.
7: Help keep flame wars under control.
8: Respect other people's privacy.
9: Don't abuse your power.
10: Be forgiving of other people's mistakes.
EDFERLYN C. BUENA
ANICA ALEXA ACALAL
REENARD ANDREI CRISOLOGO
ELDAN JOHN ELIVERA

More Related Content

PPTX
Online Safety, Security & Netiquette Report
PPTX
Lesson 2 rules of netiquette
PPTX
EMPOWERMENT TECHNOLOGIES LESSON 2 - NETIQUETTE
PPTX
Lesson 2.2 Online Safety And Security.pptx
PPTX
Rules of netiquette-lesson 2.pptx
PPTX
EMPOWERMENT TECHNOLOGIES LESSON 2
PPTX
Lesson-2-Online-Safety-Security-Ethics-And-Etiquette.pptx
PPTX
Lesson 2 - Rules of Netiquette (Information and Communication Technology)
Online Safety, Security & Netiquette Report
Lesson 2 rules of netiquette
EMPOWERMENT TECHNOLOGIES LESSON 2 - NETIQUETTE
Lesson 2.2 Online Safety And Security.pptx
Rules of netiquette-lesson 2.pptx
EMPOWERMENT TECHNOLOGIES LESSON 2
Lesson-2-Online-Safety-Security-Ethics-And-Etiquette.pptx
Lesson 2 - Rules of Netiquette (Information and Communication Technology)

Similar to Online Safety, Security & Netiquette Report Part Two (20)

PPTX
2-rules-of-netiquette.pptxkjhjohhfytdtydgyfy
PPTX
LESSON 2 - NETIQUETTE.pptx EMPOWERMENT TECHNOLOGY
PPTX
Rules of Netiquette Empowerment Technologies Lesson
PPTX
Rules of Netiquette
PPTX
EMTECH Q1, M2 ONLINE SAFETY SECURITY ETHIC AND ETIQUETTE.pptx
PDF
online safety, security and netiquette.pdf
PPTX
Rules and Netiquetted asdnasdbJDKJSDHASDHASDSA.pptx
PPTX
2. ONLINE SECURITY, SAFETY AND ETHICS.pptx
PPTX
empowerment technology/ RULES AND NETIQUETE lesson 2.pptx
PPTX
Cyber Safety Month summary
PDF
Q3 G11 Empowerment Technologies Module 2.pdf
PPTX
L2 - ONLINE SAFETY, SECURITY, ETHICS, ETIQUETTE.pptx
PPTX
Online-Safety-Security-and-etiquette.pptx
PPTX
lesson 2 online Safety Security eth.pptx
PDF
Emp tech las-week-2
PPTX
Lecture in Empowerment Technologies week 2.pptx
PPT
Internet Safety
PPTX
itEraLesson3. .pptx
PPTX
ONLINE SAFETY empowerment technolog.pptx
PPTX
empowermenttechnologylesson2-210114045455.pptx
2-rules-of-netiquette.pptxkjhjohhfytdtydgyfy
LESSON 2 - NETIQUETTE.pptx EMPOWERMENT TECHNOLOGY
Rules of Netiquette Empowerment Technologies Lesson
Rules of Netiquette
EMTECH Q1, M2 ONLINE SAFETY SECURITY ETHIC AND ETIQUETTE.pptx
online safety, security and netiquette.pdf
Rules and Netiquetted asdnasdbJDKJSDHASDHASDSA.pptx
2. ONLINE SECURITY, SAFETY AND ETHICS.pptx
empowerment technology/ RULES AND NETIQUETE lesson 2.pptx
Cyber Safety Month summary
Q3 G11 Empowerment Technologies Module 2.pdf
L2 - ONLINE SAFETY, SECURITY, ETHICS, ETIQUETTE.pptx
Online-Safety-Security-and-etiquette.pptx
lesson 2 online Safety Security eth.pptx
Emp tech las-week-2
Lecture in Empowerment Technologies week 2.pptx
Internet Safety
itEraLesson3. .pptx
ONLINE SAFETY empowerment technolog.pptx
empowermenttechnologylesson2-210114045455.pptx
Ad

More from JuicySaniatan (8)

PDF
CONTEXTUALIZE ONLINE SEARCH Media and Information-Group 3
PDF
Media and Information Literacy Daily Lesson Log
PPTX
ORGANIZATION AND MANAGEMENT-NATURE-OF-ORGANIZATION.pptx
PDF
The-process-of-recruiting-selecting-and-training-employees.pdf
PPTX
Concept-and-the-nature-of-staffing-v2.pptx
PPTX
Economics-Q3.pptx
PPTX
Applied Economics-Demand.pptx
PPTX
MIL.pptx
CONTEXTUALIZE ONLINE SEARCH Media and Information-Group 3
Media and Information Literacy Daily Lesson Log
ORGANIZATION AND MANAGEMENT-NATURE-OF-ORGANIZATION.pptx
The-process-of-recruiting-selecting-and-training-employees.pdf
Concept-and-the-nature-of-staffing-v2.pptx
Economics-Q3.pptx
Applied Economics-Demand.pptx
MIL.pptx
Ad

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Cloud computing and distributed systems.
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPT
Teaching material agriculture food technology
PDF
Encapsulation theory and applications.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Big Data Technologies - Introduction.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Network Security Unit 5.pdf for BCA BBA.
20250228 LYD VKU AI Blended-Learning.pptx
The AUB Centre for AI in Media Proposal.docx
Advanced methodologies resolving dimensionality complications for autism neur...
Reach Out and Touch Someone: Haptics and Empathic Computing
Cloud computing and distributed systems.
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Understanding_Digital_Forensics_Presentation.pptx
Teaching material agriculture food technology
Encapsulation theory and applications.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Spectral efficient network and resource selection model in 5G networks
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?

Online Safety, Security & Netiquette Report Part Two

  • 2. With the country‟s biggest network data offerings for every smartphone holder, online safety is one of the concerns most parents want their children to remember these days. Every day, flash reports show number of victims of malicious conduct like bullying, identity thief, automatic teller machine fraud, online selling scam, face or body manipulation to earn money and the worst is rape of victims of meet ups.
  • 3. https://ph.pinterest.com/pin/7198 7294014535665/ Why is it important to stay safe online? Most of us are „connected‟ via our laptops, mobile phones, tablets, or personal computer. The potential for the internet to be a valuable and a fun resource for entertainment, making friends, keeping in touch and learning is huge. But if you use the internet, you could be at risk of illegal activities or abuse - be it bullying, fraud or something more serious. Unlike seeing someone face to face, on the net, people aren't always what they first seem. In the same way you learn about safety when you leave the house, it is important to learn how to stay safe online.
  • 4. RISKS SOME PRECAUTION ON SHARING PERSONAL INFORMATION ONLINE First name There is still a risk in sharing your first name. Chances are, a hacker already knows plenty of stuff about you even if you only give out your name. You cannot just walk in a room and start introducing yourself to everyone. You now know whom you can come across with. TYPE OF INFORMATION Last name If sharing your name is a small risk, having both your first and last is riskier. You will be vulnerable to being searched for using searched engine, which will include image search. Matching a name with a face can lead to several cybercrimes like identity theft.
  • 5. Middle name Sharing just your middle name is probably not the risky most risky of this shared information, but sharing your entire name would be. Current and previous school(s) Most people who steal identities study their subject. They can use this information for verification purposes. Your Cellphone Number Your cellphone number should never be posted over the Internet. The Internet is a public place. It is the same as posting your name on a billboard. Who your Mother and Father are Risky, yet not as risky as posting their full names, especially your mother‟s maiden name. In fact, if you have already encountered many websites that require your mother‟s maiden name as an answer to a secret question whenever you lose your password.
  • 6. Who your siblings are This is a huge risk, especially if you have younger siblings. Stranger may pretend or use their identity to dupe you. Current and previous school(s) Most people who steal identities study their subject. They can use this information for verification purposes. Your address Hopefully you answered no to this one. Giving the Internet your number is one thing, giving your address is a whole other level. It would be much easier for criminals to find you. Your home phone number This shared information is riskier than sharing your personal phone number. Scams usually use this information to deceive you, one of which is when a stranger pretends to know your parents or pretends to be you.
  • 7. Your birthday Letting people know your birthday is probably a must if you want to get as many gifts as possible. But having it in your profile makes you vulnerable to identity theft. Source: Empowerment Technologies First Edition.(2016).Sampaloc Manila:Rex Bookstore, Inc
  • 8. 1.) Never give any personal information out about yourself over the internet. 2.) Do not give any bank or sensitive information unless you are sure that it is a reputable business having a secure service. 3. To make sure that you are in a secured network, the website address should begin with “https://’ as opposed to “http://”. Never access your accounts by following an email link, instead type your URL by yourself. THERE ARE NUMEROUS DELINQUENCIES THAT CAN BE COMMITTED ON THE INTERNET SUCH AS STALKING, IDENTITY THEFT, PRIVACY VIOLATIONS, AND HARASSMENT. TO AVOID THESE ONLINE CRIMES, FOLLOW THE FOLLOWING ONLINE SAFETY MEASURES:
  • 9. HERE ARE SOME WAYS YOU CAN CHECK IF A WEBSITE IS TRUSTWORTHY Reliable websites Reliable websites Usually end in .edu or .gov Might end in .com Don‟t have errors Have errors Are up to date Are outdated Use facts Use opinions Use experts Use unreliable sources https://www.wikihow.com/Find-if-a- Website-Is-Legitimate
  • 10. ONLINE SECURITY The standard definition of online security calls it the mix of rules that are followed and actions that are taken to make sure online user data and privacy aren‟t compromised by cybercriminals. Online security can be something as complex as a system that‟s designed to prevent credit card theft, or something as simple as you using antivirus software to protect your device from malware and viruses.
  • 11. Here are some tips to help you stay safe when using the internet. When you are online, treat the Internet a public place and it is up to you to protect yourself. 1. Be mindful of what you share online and what site you share it to. 2. Do not just accept terms and conditions; read it. 3. Know the security features of the social networking site you use. By keeping your profile private, search engines will not be able to scan your profile. 4. Do not share your password with anyone. 5. Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or private) mode will NOT protect you from hackers.
  • 12. Here are some tips to help you stay safe when using the internet. When you are online, treat the Internet a public place and it is up to you to protect yourself. 6. Do not talk to strangers whether online or face-to-face. 7. Never post anything about a future vacation. It is similar to posting, “Rob my house at this date.” 8. Add friends you know in real life. 9. Avoid visiting untrusted websites. 10. Install and update antivirus software on your computer. Use only one antivirus software to avoid conflicts.
  • 13. Here are some tips to help you stay safe when using the internet. When you are online, treat the Internet a public place and it is up to you to protect yourself. 11. If you have Wi-Fi at home, make it private network by adding a password. 12. Avoid downloading anything from untrusted websites. 13. Do not use pirated software. 14. Do not reply or click links from suspicious emails. 15. Make online purchases from secured sites
  • 14. - is a combination of the words network and etiquette. It is a set of rules for behaving properly online. NETIQUETTE
  • 15. The Core Rules of Netiquette are excerpted from the book Netiquette by Virginia Shea 1: Remember the Human Rule. 2: Adhere to the same standards of behavior online that you follow in real life. 3: Know where you are in cyberspace. 4: Respect other people's time and bandwidth. 5: Make yourself look good online.
  • 16. The Core Rules of Netiquette are excerpted from the book Netiquette by Virginia Shea 6: Share expert knowledge. 7: Help keep flame wars under control. 8: Respect other people's privacy. 9: Don't abuse your power. 10: Be forgiving of other people's mistakes.
  • 17. EDFERLYN C. BUENA ANICA ALEXA ACALAL REENARD ANDREI CRISOLOGO ELDAN JOHN ELIVERA