2. Empowerment Technologies – Grade 11
Quarter 3 – Module 2: Online Safety, Security, and Netiquette
First Edition, 2020
Republic Act 8293, section 176 states that: No copyright shall subsist in any work
of the Government of the Philippines. However, prior approval of the government agency or
office wherein the work is created shall be necessary for exploitation of such work for profit.
Such agency or office may, among other things, impose as a condition the payment of
royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from
their respective copyright owners. The publisher and authors do not represent nor claim
ownership over them.
Published by the Department of Education
Printed in the Philippines by Davao City Division Learning Resources Management
Development System (LRMDS)
Department of Education – Region XI
Office Address: Davao City Division, Region XI
Elpidio Quirino Ave., Poblacion District, Davao City, 8000 Davao del
Sur
Telefax: (082) 224-3274, (082) 222-1672
E-mail Address: davao.city@deped.gov.ph
Development Team of the Module
Writers: Melanio R. Florino Jr.
Editors:
Reviewers: Divilyn M. Rodriguez
Illustrator:
Layout Artist: Melanio R. Florino, Jr.
Template Developer: Neil Edward D. Diaz
Management Team: Reynaldo M. Guillena
Jinky B. Firman
Marilyn V. Deduyo,
Alma C. Cifra
May Ann M. Jumuad
Aris B. Juanillo
4. ii
Introductory Message
For the facilitator:
As a facilitator, you are expected to orient the learners on how to
use this module. You also need to keep track of the learners' progress
while allowing them to manage their own learning at home.
Furthermore, you are expected to encourage and assist the learners as
they do the tasks included in the module.
For the learner:
As a learner, you must learn to become responsible of your own
learning. Take time to read, understand, and perform the different
activities in the module.
As you go through the different activities of this module be
reminded of the following:
1. Use the module with care. Do not put unnecessary mark/s on
any part of the module. Use a separate sheet of paper in
answering the exercises.
2. Don‟t forget to answer Let Us Try before moving on to the other
activities.
3. Read the instructions carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking
your answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are
done.
If you encounter any difficulty in answering the tasks in this module,
do not hesitate to consult your teacher or facilitator. Always bear in
mind that you are not alone. We hope that through this material, you
will experience meaningful learning and gain deep understanding of
the relevant competencies. You can do it!
5. 1
Let Us Learn!
Privacy, security, and good behavior online are essential words that
you have to follow when you are on the Internet. Do you know your
restrictions when using social media? Do you feel accountable for what you
are posting? Do you think first before you click? Let us find out!
This module was designed and written for you, our learners. It will help
you become aware of the behavior you are going to observe following online
safety, security, and netiquette.
At the end of this module, you will be able to:
apply online safety, security, ethics, and etiquette standards and
practice in the use of ICTs as it would relate to their specific
professional tracks (CS_ICT11/12-ICTPT-IA-B-2).
Let Us Try!
Directions: A. Write TRUE if the statement is correct, FALSE if the
statement is incorrect.
1. Writing an email in all capital letters means that you are smiling at the
other person.
2. It is okay to forward an email that someone has sent you.
3. It is okay to scroll the screen in a chat room.
4. It is okay to give out your address to strangers.
5. A flame is an online chain letter.
B. Write the letter that best describes your answer.
6. The abbreviation “brb” means:
a. Be right back b. Better run, bye! c. Boring, really boring
7. What does the term netiquette mean?
a. Nice etiquette b. Network Etiquette c. Nighttime Etiquette
8. What does “spam” mean?
a. Dripping raw meat juice on the keyboard.
b. Emailing or posting advertisements online to a bunch of people.
c. Emailing a chain letter to a bunch of people.
9. What should you do before posting a message to a chat room?
a. Read the chat room rules or FAQs.
b. Read some of the postings to see what people are chatting about and
whether or not it is interesting to you.
c. Both
10. The “golden rule” of netiquette is:
a. Never flame a friend.
6. 2
b. Remember the human (treat others as you wish to be treated).
c. Never send a chain letter.
Let Us Study
Online Safety, Security, and Netiquette
With the country‟s biggest network data offerings for every
smartphone holder, online safety is one of the concerns most parents want
their children to remember these days. Every day, flash reports show
number of victims of malicious conduct like bullying, identity thief,
automatic teller machine fraud, online selling scam, face or body
manipulation to earn money and the worst is rape of victims of meet ups.
The infographic
at the right explains
why there is a need to
protect Philippine users
from online cyber
predators.
Why is it
important to stay safe
online? Most of us are
„connected‟ via our
laptops, mobile phones,
tablets, or personal
computer. The potential
for the internet to be a
valuable and a fun
resource for
entertainment, making
friends, keeping in
touch and learning is
huge. But if you use
the internet, you could
be at risk of illegal
activities or abuse - be
it bullying, fraud or
something more
serious. Unlike seeing someone face to face, on the net, people aren't always
what they first seem. In the same way you learn about safety when you leave
the house, it is important to learn how to stay safe online.
Photo credits:
https://www.pinterest.ph/pin/71987294014535665/
7. 3
Some precautions on sharing personal information online:
Type of Information Risks
First name
There is still a risk in sharing your first
name. Chances are, a hacker already knows
plenty of stuff about you even if you only
give out your name. You cannot just walk in
a room and start introducing yourself to
everyone. You now know whom you can
come across with.
Last name
If sharing your name is a small risk, having
both your first and last is riskier. You will
be vulnerable to being searched for using
searched engine, which will include image
search. Matching a name with a face can
lead to several cybercrimes like identity
theft.
Middle name
Sharing just your middle name is probably
not the risky most risky of this shared
information, but sharing your entire name
would be.
Current and previous school(s)
Most people who steal identities study their
subject. They can use this information for
verification purposes.
Your Cellphone Number
Your cellphone number should never be
posted over the Internet. The Internet is a
public place. It is the same as posting your
name on a billboard.
Who your Mother and Father are
Risky, yet not as risky as posting their full
names, especially your mother‟s maiden
name. In fact, if you have already
encountered many websites that require
your mother‟s maiden name as an answer to
a secret question whenever you lose your
password.
Who your siblings are This is a huge risk, especially if you have
younger siblings. Stranger may pretend or
use their identity to dupe you.
Your address Hopefully you answered no to this one.
Giving the Internet your number is one
thing, giving your address is a whole other
level. It would be much easier for criminals
to find you.
Your home phone number
This shared information is riskier than
sharing your personal phone number.
Scams usually use this information to
deceive you, one of which is when a stranger
pretends to know your parents or pretends
to be you.
Your birthday
Letting people know your birthday is
probably a must if you want to get as many
gifts as possible. But having it in your profile
makes you vulnerable to identity theft.
Source: Empowerment Technologies First Edition.(2016).Sampaloc Manila:Rex
Bookstore, Inc
8. 4
There are numerous delinquencies that can be committed on the
internet such as stalking, identity theft, privacy violations, and harassment.
To avoid these online crimes, follow the following online safety measures:
1. Never give any personal information out about yourself over the
internet.
2. Do not give any bank or sensitive information unless you are sure
that it is a reputable business having a secure service.
3. To make sure that you are in a secured network, the website
address should begin with “https://’ as opposed to “http://”. Never
access your accounts by following an email link, instead type your
URL by yourself.
Below are some ways to find if the website you are opening is legit.
Here are some ways you can check
if a website is trustworthy
Reliable websites Unreliable websites
Usually end in .edu or .gov Might end in .com
Don‟t have errors Have errors
Are up to date Are outdated
Use facts Use opinions
Use experts Use unreliable sources
Source: https://www.wikihow.com/Find-if-a-Website-Is-Legitimate
Online Security
The standard definition of online security calls it the mix of rules that
are followed and actions that are taken to make sure online user data and
privacy aren‟t compromised by cybercriminals. Online security can be
something as complex as a system that‟s designed to prevent credit card
theft, or something as simple as you using antivirus software to protect your
device from malware and viruses.
When you are online, treat the Internet a public place and it is up to
you to protect yourself.
Here are some tips to help you stay safe when using the internet.
1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Know the security features of the social networking site you use. By
keeping your profile private, search engines will not be able to scan
your profile.
4. Do not share your password with anyone.
5. Avoid logging in to public networks/Wi-Fi. Browsing in “incognito
(or private) mode will NOT protect you from hackers.
6. Do not talk to strangers whether online or face-to-face.
7. Never post anything about a future vacation. It is similar to posting,
“Rob my house at this date.”
9. 5
8. Add friends you know in real life.
9. Avoid visiting untrusted websites.
10. Install and update antivirus software on your computer. Use only
one antivirus software to avoid conflicts.
11. If you have Wi-Fi at home, make it private network by adding a
password.
12. Avoid downloading anything from untrusted websites.
13. Do not use pirated software.
14. Do not reply or click links from suspicious emails.
15. Make online purchases from secured sites
Netiquette is a combination of the words network and etiquette. It is a set
of rules for behaving properly online.
Below are the 10 rules of netiquette:
The Core Rules of Netiquette
The Core Rules of Netiquette are excerpted from the book Netiquette by
Virginia Shea
1: Remember the Human Rule.
2: Adhere to the same standards of behavior online that you follow in real
life.
3: Know where you are in cyberspace.
4: Respect other people's time and bandwidth.
5: Make yourself look good online.
6: Share expert knowledge.
7: Help keep flame wars under control.
8: Respect other people's privacy.
9: Don't abuse your power.
10: Be forgiving of other people's mistakes.
Source: http://www.albion.com/netiquette/corerules.html
Let Us Practice
Directions: Find out if you have understood the lesson. Choose the letter
that best describes your answer.
1. You are all going for a field trip and none would be left in the house. What
should you do?
A. Post pictures when you return home.
B. Post the dates when you will be going online.
C. Post updates of where you are currently checking in hotels or places.
D. Tell no one. Vacations are for getting away.
10. 6
2. Should you have the same password in all your digital transactions?
A. Yes. That is how I remember all my passwords.
B. I have different passwords for all different accounts.
C. I keep it simple. I don‟t have any passwords.
D. I have two similar passwords that I alternately use for all me
accounts.
3. Choose which best describes how you feel about sharing your
password with your boyfriend/ girlfriend?
A. Forget about it.
B. I‟ll share if he/she will.
C. BFFs share everything.
D. I don‟t believe in passwords.
4. Your parents bought you your first cellphone. How will you share your
cellphone number?
A. Do not share your cellphone number to anyone.
B. Post your cellphone number in your social media account.
C. Share your cellphone number only to your family.
D. Post your cellphone number in your group chat.
5. Your social media friends list should only be composed of ______________.
A. your favorite brands
B. family and friends
C. anyone who sends you a friend request
D. foreigners
Let Us Practice More
Directions: Measure your understanding by answering the following
questions. Choose the letter that best describes your answer.
1. Which of the following is not an advantage in using social media network?
a. crime against children b. worldwide connectivity
c. real time information sharing d. sharing political beliefs
2. Below are disadvantages of using social media network, except-
a. time waster b. risk of fraud
c. identity theft d. increase new circle of friends
3. Personal details when revealed in the Internet is -
a. an advantage. b. a disadvantage.
4. What should you do in case on cyberbullying?
a. Respond to the bully and fight back if necessary.
b. Block the cyberbully from the contact list and talk to a trusted
adult.
c. Wait in silence until things get better.
11. 7
5. Someone is behaving inappropriately on one of the sites you‟re using. You
should-
a. Report to the moderator of the site.
b. Shut down your pc.
c. Tell the person to shut up.
Let Us Remember
When you are online or using the Internet, keep in mind that the
whole world is looking at you. People or netizens as what we call those
persons present online, are there to react or participate positively or
negatively. Some of these netizens behave the way you treat them.
Your words or moving animation are enough for them to cause
actions. While many believe the law “do not do unto others what you
do not like them do unto you”, it is safe to follow what is “safe” and
proper manner even if you are not facing these netizens in real time.
Like begets like and it would be nice to stand up after doing stuff
online without harming others.
Let Us Assess
Directions: Apply what you have learned about online safety,
security, and netiquette. Choose the letter that best describes your
answer.
1. Which of the following is NOT a way of evaluating information found
online?
a. Looking at the brand name….is it a trusted brand?
b. Making sure the source is a governmental agency.
c. Checking the website‟s internal information.
d. Comparing the information with the same information from an
established media company or with original source of material.
2. What is your habit when it comes to newspaper and current events
online?
a. I pay attention to news when there is a juicy story that grabs my
interest.
b. I avoid mainstream/dominant news media.
c. I try to read news everyday relying on media I trust and respect.
d. I should pay more attention to the news but I do not have time.
Give your best answer (1 point each)
4. Why is netiquette useful?
5. When is it okay to email a chain letter?
6. What should you do if someone sends you a “hate message”?
12. 8
7. What should you do if an online friend asks to meet you after school?
8. Why is punctuation so important on the Internet?
Let Us Enhance
Poster making. Your parents want you to make a poster about
online safety, security, and netiquette since you have knowledge on
this. Your parents want that this poster would remind your younger siblings
on what to do when they are using the Internet. Use an A4 size paper for
your poster. Below is the rubric in making the poster.
Source: eworkshop.on.ca/poster-rubric
Let Us Reflect
In this module you have learned how to use the internet safely,
security, and netiquette. May you always remember what you have
learned about this topic hence, these learnings will keep you safe and
protected in using the Internet.
13. 9
Answer key to Activities
Let
us
Try
1.
False
2.
True
3.
False
4.
False
5.
False
6.
A
7.
B
8.
B
9.
C
10.B
Let
us
practice
1.
D
2.
B
3.
A
4.
C
5.
B
Let
us
practice
more
1.
a
2.
d
3.
b
4.
b
5.
a
Let
us
Assess
Possible
answers
1.
Why
is
Netiquette
useful
(it
can
help
you
treat
others
with
respect
and
protect
you
from
online
predators)
2.
When
is
it
okay
to
email
a
chain
letter?
(Never-
chain
letters,
hoaxes,
and
virus
warnings
should
not
be
forwarded)
3.
What
should
you
do
if
someone
sends
you
a
flame?
(Stay
calm.
Ignore
the
message,
or
write
back
asking
the
person
to
explain
what
they
really
meant)
4.
What
should
you
do
if
an
online
friend
asks
you
to
meet
them
after
school?
(Tell
your
parents
or
teacher
immediately.
Your
“
friend”
may
not
be
a
friend
at
all
and
could
be
someone
who
wants
to
hurt
you)
5.
Why
is
punctuation
so
important
on
the
Internet?
(Punctuation
is
important
because
the
other
person
can‟
t
see
you
and
it‟
s
the
only
tool
you
have
of
expressing
your
feelings
or
thoughts).
15. 11
For inquiries or feedback, please write or call:
Department of Education – Region XI Davao City Division
Elpidio Quirino Avenue, Davao City, Davao del Sur, Philippines
Telephone: (082) 224 0100 / 228 3970
Email Address: info@deped-davaocity.ph /
lrmds.davaocity@deped.gov.ph