Empowerment Technology - ACTIVITY 3
Empowerment Technology - ACTIVITY 3
Empowerment Technology - ACTIVITY 3
Learning Competencies:
Apply online safety, security, ethics, and etiquette standards
Practice in the use of ICTs as it would relate to their specific professional tracks
Lesson Objectives:
Consider one’s and others’ safety and reputation when using or sharing information using the internet
Determine and avoid the dangers of the Internet
Be responsible in the use of social networking sites
1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn how the website handles the information you
share.
4. Know the security features of the social networking site you use by keeping your profile private, search
engines will not be able to scan your profile.
5. Do not share your password to anyone.
6. Avoid logging in to public Wi-Fi. Browsing in incognito or private mode will not protect you from
hackers.
7. Do not talk to stranger online.
8. Add friends you know in real life.
9. Never post about future vacations. It is similar to posting “rob my house at this date.”
10. Avoid visiting untrusted websites.
11. Buy software; do not use pirated ones.
12. Do not reply or click links from suspicious emails.
13. Install and update your anti-virus.
14. Make you Wi-Fi at home a private network.
Internet Threats
Here are some of the threats you should be aware of when using the Internet:
1. Malware – stands for malicious software.
a. Virus – a malicious software designed to replicate itself and transfer from one computer to another
either from the internet or via local networks or data storage.
b. Worm – a malicious program that transfers from one computer to another by any type of means.
c. Trojan – a malicious program that is disguised as a useful program but once downloaded and
installed, it leaves your computer unprotected to hackers
d. Spyware – a program that runs in the background without your knowing. It has the ability to
monitor what you are currently doing and typing through key logging.
e. Adware – a program designed to send you advertisement, mostly as pop-ups.
2. Spam – unwanted emails mostly from bots or advertisers. It can be used to send malwares.
3. Phishing – Its goal is to acquire sensitive personal information like passwords and credit card details.
This is done by sending you an email that will direct the user to visit a website and be asked to update
his/her username, password, credit card, or personal information.
Here are things you might consider before posting something over the internet:
1. Before you post something in the web, ask this questions to yourself: Would you want your
grandparents and parents to see it? Would you want your future boss to see it? Once you post
something in the web, you have no control of who sees your post.
2. Your friends depends on you to protect their reputation online. Talk to you friends about this serious
responsibility.
3. Set your post to private. In this way, search engines will not be able to scan that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you and other’s reputation, ask the one who posted it to pull it down
or report it as inappropriate.
Copyright Infringement
If you create something – an idea, an invention, a form of literary work or a research, you have the
right as to how it should be used by others. This is called intellectual property. In other words, the copyright
law includes your right over your work, and anyone who uses it without your consent is punishable by law.
Here are some tips that could help you avoid copyright infringement:
1. Understand – This means that you can express something using your own words, but you should give
credits to the source.
2. Be responsible – Even if material does not say that it is not copyrighted, it is not a valid defence against
copyright. Be responsible enough to know if something has a copyright.
3. Be creative – Ask yourself if what you are making is something that came from you or something made
from somebody else’s creativity.
4. Know the law – There are limitations to the copyright laws and there are also provisions for “fair use”
which means that an intellectual property may be use without a consent as long as it is use for
commentaries, criticism, parodies and new reports.
Self – Check:
A. Most of us use the internet every day. Sometimes, we do not pay attention on how much
information we share online. Below is a questionnaire about how much information you have
shared so far. Put a check (✔) under Shared or Not Shared.
1. Do you agree or disagree with the provisions of the copyright law? Defend your answer.
Note: If you wish to read the full context of the copyright law (R.A. No. 8293), please open this link using your
smartphone or computer: https://www.officialgazette.gov.ph/1997/06/06/republic-act-no-8293/
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
2. How would you feel if someone posted something embarrassing about you? What would you do?
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________