CRT LEARNING MODULE
Course Code e-Tech
Course Title Empowerment Technology
No. of Hours 80 Hours
Module Title Online safety, Security, Ethics, and Etiquette
Empowerment Document No. 001-2020
Technology Developed by:
Issued by:
Online Safety, Security, Eligio D. Castillo Jr.
Ethics, and Etiquette Page 15
CRT
College for Research & Technology of Cabanatuan
HOW TO USE THIS DIGITIZED LEARNING MODULE
Welcome to the module in Empowerment Technology. This module contains
training materials and activities for you to complete this module.
Distance students will be graded on their participation based on posts after
each class to the course blog. Generally, writing a paragraph that either poses some
questions, makes a comment on the lecture or class discussion, or otherwise
demonstrates that you have thought about the material discussed is sufficient
You are required to go through a series of learning activities in order to complete
each learning outcome of the module. Each of the learning outcomes is provided with
Modules. Follow these activities on your own and answer the self-check at the end of
each learning outcome.
Talk to your online facilitator and agree on how you will both organize the Training
of this unit. Read each through the module carefully. It is divided into sections, which
cover all the skills and knowledge you need to successfully complete this module.
Work through all the information and complete the activities in each section.
Read Modules and complete self-check. Suggested references are included to
supplement the materials provided in this module.
Most probably your facilitator will be your supervisor or manager. Your online
facilitator will support and correct you.
Your online facilitator will tell you about the important things you need consider
when you are completing activities and it is important that you listen and take
notes.
You will be given plenty of opportunity to ask questions and practice on the job.
Make sure you practice new skills during regular work shifts. This way you will
improve both your speed and memory and also your confidence.
Talk to more experienced workmates and ask for their guidance.
Kindly the self-check questions at the LMS (EDMODO) to test your own progress.
When you are ready, ask your online facilitator to watch you online via Zoom or
Google Meet to perform the activities outlined in this module.
Ask your online facilitator work through the activities: ask for written feedback
on your progress. Your online facilitator keeps feedback/pre-assessment reports
for this reason. When you have successfully completed each element, ask the
facilitator to mark on the reports that you are ready for assessment.
Empowerment Document No. 001-2020
Technology Developed by:
Issued by:
Online Safety, Security, Eligio D. Castillo Jr.
Ethics, and Etiquette Page 16
CRT
When you have completed this module, and feel confident that you have
sufficient practice, your online facilitator will arrange an appointment with
registered assessor’s to assess you. The results of your assessment will be
recorded in your competency Achievement Record.
Empowerment Document No. 001-2020
Technology Developed by:
Issued by:
Online Safety, Security, Eligio D. Castillo Jr.
Ethics, and Etiquette Page 17
CRT
Empowerment Technology
Contents of this Learning Module
No. Module Title Topic Code
2 Online safety, So what is Module 2.1
‘Online
Security, Safety’?
Ethics, and What are the
Etiquette risks? Module 2.2
The basic
steps to online Module 2.3
safety and
security
Module 2.4
Ethics
Empowerment Document No. 001-2020
Technology Developed by:
Issued by:
Online Safety, Security, Eligio D. Castillo Jr.
Ethics, and Etiquette Page 18
CRT
MODULE CONTENT
MODULE TITLE : Online safety, Security, Ethics, and
Etiquette
MODULE DESCRIPTOR:
Information and communication technologies as a tool for curating, contextualizing,
collaborating, and creating content and experiences for learning in the professional tracks.
Number of Hours:
4
LEARNING OUTCOMES:
At the end of this module you MUST be able to:
1. You will be able to compose an insightful reflection on the basic steps
online safety and Security
2. Explain the proper Ethics and Etiquette
Empowerment Document No. 001-2020
Technology Developed by:
Issued by:
Online Safety, Security, Eligio D. Castillo Jr.
Ethics, and Etiquette Page 19
CRT
MODULE 2
Online safety, Security, Ethics, and Etiquette
Learning Objective: After reading this MODULE, you should be
able to:
1. Identify the Basic Steps online safety and Security
2. Discuss the ethics and Etiquette
2.1 So what is ‘Online Safety’?
In simple terms, online safety refers to the act of staying safe online. It is also
commonly known as internet safety, e-safety and cyber safety. It encompasses all
technological devices which have access to the internet from PCs and laptops to
smartphones and tablets.
Being safe online means individuals are protecting themselves and others from
online harms and risks which may jeopardise their personal information, lead to unsafe
communications or even effect their mental health and wellbeing. Operating within an
online space is something most of us simply do subconsciously, but have you ever
stopped to consider the potential dangers which exist on the web, especially for our
children?
The recent Ofcom ‘Children and Parents: media use and attitudes report 2019’
report released last week found that children are more engaged online than they’ve
ever been. Ownership of smart devices is increasing and the range of c ontent they are
viewing is expanding. In an ever-changing world, ensuring pupils’ safety online has
never been more important. It’s an all-encompassing duty and something every teacher
must be vigilant of.
2.2 What are the risks?
It goes without saying that the internet can be an unforgiving place. Aside from
the more obvious risks such as online bullying, grooming or device addiction, the way
children are engaging with the online world means that we have to take stock of their
mental health and wellbeing, the type of content they are viewing and what they are
posting online.
This includes the heightened concern around fake news and what impact social
media influencers may be having on our children’s behaviour. It also includes the
ongoing debate as to whether online gaming and certain features of online gaming,
such as loot boxes and skins, are categorized as gambling and are encouraging
gambling habits in children.
Empowerment Document No. 001-2020
Technology Developed by:
Issued by:
Online Safety, Security, Eligio D. Castillo Jr.
Ethics, and Etiquette Page 20
CRT
The number of varying social media applications continues to grow too.
Previously, if you educated yourself on the mechanics of Facebook, Snapchat and
Instagram, you’d pretty much be covered.
However, we’re now in an age where a multitude of ‘apps’ exist, and they’re
more complex than ever before. Whilst the above remain popular, how many of us have
heard of TikTok, YOLO, FaceApp or LIKEE. All of these are all free to download and
available at the touch of a button. Such are the range of risks we now need to be aware
of and the different platforms that children can access, it’s not easy to keep up to date.
2.3 The basic steps to online safety and security
Since our physical world has become so integrated with our technology, it’s not
as easy as to protect it back when all we had to worry about was our computers and
laptops. However, in this day and age, that is not the case. The threat landscape has
evolved just as our technology has. The more devices that are out there equal more
things for cybercriminals to attack.
Personal cybersecurity is a now a multi-pronged approach. It’s not as simple as
installing antivirus on a computer anymore. A good foundation to personal cybersecurity
is knowledge. Since threats don’t come solely in digital forms anymore, it’s a good idea
to educate yourself about all of the threats out there.
Social Engineering
Social engineering is the act of tricking someone into divulging information or
taking action, usually through technology. The idea behind social engineering is to take
advantage of a potential victim’s natural tendencies and emotional reactions.
To access a computer network, the typical hacker might look for a software
vulnerability. A social engineer, though, could pose as a technical support person to
trick an employee into divulging their login credentials. The fraudster is hoping to
appeal to the employee’s desire to help a colleague and, perhaps, act first and think
later.
Phishing
Phishing emails are a good example of how social engineering can take place
online. These emails can appear to come from a legitimate company, or possibly even
Empowerment Document No. 001-2020
Technology Developed by:
Issued by:
Online Safety, Security, Eligio D. Castillo Jr.
Ethics, and Etiquette Page 21
CRT
someone you know. The objective of these emails is to seem like a familiar or known
source, therefore relying on a person’s instinct to trust them. The more familiar a
sender seems, the more likely someone is likely to turn over seemingly harmless
personal information. Phishers have been known to use real company logos, and will
also use a fake email address that looks very similar to the company’s actual address.
Malware
Often interchanged with the word virus; they are essentially the same things. A
virus is actually a type of malware. There are many different types of malware that do
many different types of things. There are also different ways you can get malware on
your device- yep; it’s not just on computers anymore.
Passwords
Passwords are the key to your entire digital life. One of the most important steps
you can take is to ensure your digital security is to use strong, and secure passwords
for each website you use. It’s extremely important not to reuse the same password
across multiple websites- by doing so, you’re essentially creating a digital master key.
If a service offers it, you should set up Two-Factor Authentication (2FA)
whenever possible. This method adds another layer of security to any account you may
be logging into. What makes this more secure is the fact that it is something that you
have to provide in addition the usual username and password information. The third
“thing” is usually one of the following:
Something you know – a pin number, password or pattern.
Something you have – an ATM or credit card, mobile phone or security token
such as a key fob or USB token.
Something you are – Biometric authentication such as a voiceprint or fingerprint.
Empowerment Document No. 001-2020
Technology Developed by:
Issued by:
Online Safety, Security, Eligio D. Castillo Jr.
Ethics, and Etiquette Page 22
CRT
Software Updates
To most, these may seem like an annoyance, however they are vital to you
device’s cyber “health.” Not all software is created perfectly, so vulnerabilities in the
software do pop up from time to time. Attackers use these vulnerabilities as a way to
infect your computer with malware. This is where software updates come in. These
updates push out what is called a “patch,” which is just as it sounds, a fix for the
vulnerability, and one more way to ensure malware isn’t snuck onto your device.
Data Back-up
In the event that something happens and you do contract malware, or even if
you have a physical accident with your device, backing up your data will save your
(digital) life. Physical devices are always replicable; however, digital data is
irreplaceable. Always back up your device on a regular basis, and be sure to unplug
your backup device when not in use.
2.4 Ethics
It is a moral principles that govern a person's behavior or the conducting of an
activity. Ethics is a system of moral principles. They affect how people make decisions
and lead their lives. Ethics is concerned with what is good for individuals and society
and is also described as moral philosophy.
Etiquette
It is a proper requirement for social behavior. It is the customary code of polite
behavior in society or among members of a particular profession or group.
Net- derived from the from the word internet.
Netiquette
Term used to describe proper etiquette and rules for online behavior on the
internet. -the word netiquette is formed from the words etiquette and net. Netiquette is
a combination of the words network and etiquette and is defined as a set of rules for
acceptable online behavior. Similarly, online ethics focuses on the acceptable use of
online resources in an online social environment.
Empowerment Document No. 001-2020
Technology Developed by:
Issued by:
Online Safety, Security, Eligio D. Castillo Jr.
Ethics, and Etiquette Page 23
CRT
Netizen
It refers to the person who is a member or a part of the online community. An
Internet user who is trying to contribute to the Internet's use and growth. As a
powerful communications medium, the Internet seems to offer great possibilities for
social change. It also creates a new culture and its own special issues, such as who
shall have access to it. The implication is that the Internet's users, who use and know
most about it, have a responsibility to ensure that is used constructively while also
fostering free speech and open access.
Both phrases are frequently interchanged and are often combined with the
concept of a ’netizen’ which itself is a contraction of the words internet and citizen and
refers to both a person who uses the internet to participate in society, and an individual
who has accepted the responsibility of using the internet in productive and socially
responsible ways.
Some key points to keep in mind to maintain good conduct over the Internet:
Recognize that your cyber avatar, or your online representation , is not another
world but an extension of your personality and an extension of the existing society that
you are part of.
Keep in mind that there are laws existing in our society and on the Web
You should apply the values and conduct learned since childhood in the online
extension of our society.
keep in mind that there are differences among the individuals you will interact
with and the individuals who will read your published contents.
Everything published on the World Wide Web should be considered as
copyrighted or owned by another individual.
Think before you send
Follow the conventions of writing when sending formal emails.
Don’t send messages that could be misinterpreted as threatening or hurtful.
Respect others right to privacy
Empowerment Document No. 001-2020
Technology Developed by:
Issued by:
Online Safety, Security, Eligio D. Castillo Jr.
Ethics, and Etiquette Page 24
CRT
Self-Check
Answer the following question.
As a Student explain the importance of Netiquette?
_________________________________________________
_____________________________________________________
_____________________________________________________
_____________________________________________________
___________________________________________________
As a student is it necessary for you to study the online safety and
security? “Yes or no” Explain why?
_________________________________________________
_____________________________________________________
_____________________________________________________
_____________________________________________________
___________________________________________________
Empowerment Document No. 001-2020
Technology Developed by:
Issued by:
Online Safety, Security, Eligio D. Castillo Jr.
Ethics, and Etiquette Page 25
CRT