LESSON 5- IT
LESSON 5- IT
✓Confusing terms or phrases that could be misunderstood RULE 3: Know where you are in cyberspace
✓Errors of omission, such as missing content or recipients "Netiquette varies from domain to domain." (Shea,
1994)
✓Errors in accuracy of information Depending on where you are in the virtual world, the
same written communication can be acceptable in
one area, where it might be considered
EXERCISE GOOD JUDGEMENT WHEN SHARING inappropriate in another.
INFORMATION WITH OTHERS What you text to a friend may not be appropriate in
an email to a classmate or colleague.
ONLINE – E-mail and chat messages that you send or
receive are considered private and should not be RULE 4: Respect other people's time and bandwidth
forwarded or copied to others without gaining the
Electronic communication takes time: time to read
consent of all involved participants.
and time in which to respond.
It is a good practice to always ask a post’s author for
Most people today lead busy lives, just like you do,
permission before sharing a post with other parties.
and don't have time to read or respond to frivolous
emails or discussion posts.
As a virtual world communicator, it is your
responsibility to make sure that the time spent CYBERCRIMES
reading your words isn't wasted.
WHAT IS CYBER?
RULE 7: Help keep flame wars under control COMMON FORMS OF CYBERCRIMES
Not everyone has the same amount of experience Unauthorized access of or interference with
working in the virtual world. And not everyone computer systems, servers, or other information and
knows the rules of netiquette. communication system.
At some point, you will see a stupid question, read Unauthorized access to corrupt, alter, steal, or
an unnecessarily long response, or encounter destroy electronic data using computers or other
misspelled words; when this happens, practice information and communication systems without the
kindness and forgiveness as you would hope computer or system owner’s knowledge and consent
someone would do if you had committed the same The introduction of computer viruses resulting in the
offense. corruption, alteration, theft, or loss of such data
Illegal Access Penalty of 6-12 years of imprisonment or prison
mayor.
HACKING
Illegal Interception
Data Interference
System Interference
Misuse of Devices
Infection of IT Systems with Malware – if the act is
committed against critical infrastructure of the
Philippines the, penalty is between 12-20 years
reclusion temporal
Six years up to twelve years of imprisonment also
known as prison mayor.
ELECTRONIC THEFT
Illegal Downloading
Obtaining files that you do not have the right to use
from the internet.
Digital Piracy
Practice of illegally copying and selling digital music,
video, computer software, etc.
Copyright Infringement
Penalty of Php 50,000 – 500, 000 and or prison
mayor
CYBERBULLYINGG
CYBERSEX
CHILD PORNOGRAPHY
CYBER DEFAMATION