Before giving apps the permission to access information in your smartphone, be mindful of likely consequences when your personal data is collected and used.
“.. bashing is not a violation of constitutional right to free speech. in fact it is a celebration of it” – Antonio Contreras
Internet freedom w/o the right framework (a Cyber Wellness program) can lead to either abusive behavior or a recipient of cyber abuse – @ASKSonnie
Most of us protect the hardware and exterior of our mobile device, but do not exert enough effort to protect the OS and contents of unit. Think mobile device safety first, too.
Per RA 10627, bullying includes social bullying and gender-based bullying. Cyberbullying includes texting, email, IMs/Chats, the internet, social media & online games
Any severe or repeated use by one or more students of a written, verbal, electronic expression, physical act or any combination, directed at another student.
Schools and companies, should have a bullying and social web policy, and a restoration program. This will address the administrative discipline of the perpetrator and counselling of the victim.
When being cyber bullied, there are practical ways to respond. But when the situation calls for it, don’t hesitate to get professional, legal and police assistance.
Likely targets of Identity theft are high profile individuals like entertainers, political activists, successful people, corporate brands and philanthropic organizations. Here’s what you can do if you fall victim to it.