How To Lose A Privacy Violation Case
We cannot afford protection to persons if they themselves did nothing to place the matter within the confines of their private zone- SC Justice Presbitero J. Velasco Jr.
We cannot afford protection to persons if they themselves did nothing to place the matter within the confines of their private zone- SC Justice Presbitero J. Velasco Jr.
Social Engineering (SE) is one of the favorite schemes of cyber criminals to con people. It is the art of human manipulation. If employees are not given proper training about SE , companies will fall to cybercrime. Likewise, if parents are unaware, they and the kids will be victims of negative experience, if not cybercrime.
Due to popular demand and for reference purposes, the following are the videos we used on Bullying and Cyber Abuse Prevention at the recently concluded 19th STI National Youth Convention
Per RA 10627, bullying includes social bullying and gender-based bullying. Cyberbullying includes texting, email, IMs/Chats, the internet, social media & online games
Workplace harassment has many forms. While the ILO C190 treaty is yet to be ratified. There are existing laws that we can use to deal with discrimination and bullying.
Any severe or repeated use by one or more students of a written, verbal, electronic expression, physical act or any combination, directed at another student.
Schools and companies, should have a bullying and social web policy, and a restoration program. This will address the administrative discipline of the perpetrator and counselling of the victim.
As technology evolves, so are the different ways to bully another person. These are the different forms of cyber bullying in the Philippines
We conducted an informal survey to get a grasp of the Philippine bullying situation. Here’s the cyberbullying statistics for your reference
Making our voices heard on issues deemed important to us is a guaranteed right. But this should not lead to cyber lynching or cyber mob.
Cyberbaiting is a form of cyber bullying (cyber harassment for adults), however it is being done by students against their teacher.
Cyberbullying as indicated in the IRR of RA 10627, includes texting, email, instant messaging, chatting, internet, social media and online games
Bullying and Cyberbullying incidents have seen significant increase, thanks to the reporting requirements of the anti-bullying law of 2013.
Cyberbaiting is a behavior where students taunt their teachers to the point of outburst, capture the teachers’ reactions, then share on social media
A continuously updated cyberbullying guide: laws, cases, forms, and practical steps in the Philippines (2012–2025).
When being cyber bullied, there are practical ways to respond. But when the situation calls for it, don’t hesitate to get professional, legal and police assistance.
Likely targets of Identity theft are high profile individuals like entertainers, political activists, successful people, corporate brands and philanthropic organizations. Here’s what you can do if you fall victim to it.