There are many ups and downs in life. I know it's a cliche, but this phrase sums up my entire existence. My life is sometimes fun, happy, and almost enviable, and other times it is boring, sad, uninspiring, and downright disgusting. I am not perfect, and I have never tried to be, but one thing is certain: I AM WHO I AM.

Danica Mae Ong is my name. My parents' fifth child is me. We are a family of eight, and I have always felt responsible for my family. I adore my parents and siblings, and the affection is mutual.

My father is a businessman, as well as my mom. My family is solid, and we are firm in our beliefs and ideas. My parents are not wealthy, but we earn a living. My parents are concerned about my needs and the needs of my siblings. They can be strict when necessary, but they have never did strike us with their hands. They may not be wealthy, but they have big hearts.

I, myself, always looking for new ways to improve my skills and learn new things. I exchange ideas with my friends, and we learn interesting things about one another.

I am also determined to make the world a better place. I know I'm no superhero, and I don't have any concrete plans right now, but I'm on a journey of self-discovery. When people compliment on what I am doing, I feel happy. I consider myself to be a motivator, so I talked to people to inspire them when they are feeling down or don't know what else to do. I know I'm on the right track, and I'll be close to where I want to be soon.

Ꮺ copyright laws

Ꮺ What is Copyright Law?
➥ Copyright, a form of intellectual property law, protects original works of authorship including literary, dramatic, musical, and artistic works, such as poetry, novels, movies, songs, computer software, and architecture.
➥ It does not protect facts, ideas, systems, or methods of operation, although it may protect the way these things are expressed.
➥ Copyright laws grant exclusive rights to the creator of an original piece of work.
━━━━ Usually these rights are extended for a limited time.

Ꮺ What are the Rights Granted by Copyright Law?
➥ Technically, it is "the right to copy"your work.
➥ But also gives the copyright holder the right:
━━━━ ‌To be credited for the work.
━━━━ ‌To determine who may adapt the work to other forms.
‌━━━━ To decide who may perform the work.
‌━━━━ To decide who may financially benefit from it.

Ꮺ How Long Does a Copyright Last?
➥ For works created after January 1, 1978, copyright protection lasts for the life of the author plus an additional 70 years.
➥ For an anonymous work, a pseudonymous work, or a work made for hire, the copyright endures for a term of 95 years from the year of its first publication or a term of 120 years from the year of its creation, whichever expires first.

Ꮺ Copyright Infringement
➥ If you use a copyrighted work without authorization, the owner may be entitled to bring an infringement action against you.
➥ Anyone found to have infringed a copyrighted work may be liable for statutory damages up to $30,000 for each work infringed and, if willful infringement is proven by the copyright owner, that amount may be increased up to $150,000 for each work infringed.
━━━━ ‌In addition, an infringer of a work may also be liable for the attorney's fees incurred by the copyright owner to enforce his or her rights.

ᏪFair-Use Doctrine
➥Under the fair use doctrine of the U.S. copyright statute, it is permissible to use limited portions of a work.
➥The reproduction of a particular work may be considered fair if it is used for:
━━━━ criticism
━━━━ comment
━━━━ news reporting
━━━━ teaching
━━━━ scholarship
━━━━ research

Ꮺ Determining Fair Use
➥ To determine fair use, consider the following:
‌━━━━ The purpose and character of the use, including whether such use is of commercial nature or is for nonprofit educational purposes.
‌━━━━ The nature of the copyrighted work.
‌━━━━ The amount and substantiality of the portion used in relation to the copyrighted work as a whole
‌━━━━ The effect of the use upon the potential market for, or value of, the copyrighted work

Ꮺ Public Domain
➥ Photos that are in the public domain are not protected by copyright laws and can be used without permission or the payment of fees.
➥ Images enter the public domain:
‌━━━━ After the copyright has expired,
‌━━━━ If the image is a work of the U.S. government,
‌━━━━ Or the copyright holder fails to satisfy copyright formalities.

Ꮺ How do I Copyright my Work?
➥ Your work is under copyright protection the moment it is created and fixed in a tangible form that it is perceptible either directly or with the aid of a machine or device.
➥ Registration with the US Copyright Office is voluntary.
‌━━━━ However, you will have to register if you wish to bring a lawsuit for infringement of a U.S. work.
‌━━━━ To register a work, submit a completed application form, a nonrefundable filing fee, and a nonreturnable copy or copies of the work to be registered.

Click here for the Reference

Ꮺ anti-bullying act of 2013

Ꮺ What is Bullying?
➥ Bullying is the use of force, threat, or coercion to abuse, intimidate, or aggressively dominate others. The behavior is often repeated and habitual. One essential prerequisite is the perception, by the bully or by others, of an imbalance of social or physical power, which distinguishes bullying from conflict. Behaviors used to assert such domination can include verbal harassment orthreat, physical assault or coercion, and such acts may be directed repeatedly towards particular targets.

➥ Physical bullying - includes hitting, kicking, tripping, pinching and pushing or damaging property.
➥ Verbal bullying - includes name calling, insults, teasing, intimidation, homophobic or racist remarks, or verbal abuse.
➥ Social/Covert bullying - This sort of bullying is often harder to recognize and can be carried out behind the bullied person's back. It is designed to harm someone's social reputation and/or cause humiliation.
‌━━━━ Covert bullying includes:
✓ lying and spreading rumours
✓ negative facial or physical gestures, menacing or contemptuous looks
✓ playing nasty jokes to embarrass and humiliate
✓ mimicking unkindly
✓ encouraging others to socially exclude someone
✓ damaging someone's social reputation or social acceptance.
➥ Cyber Bullying - is a type of bullying that takes place using electronic technology. Electronic technology includes devices and equipment such as cell phones, computers, and tablets as well as communication tools including social media sites, text messages, chat, and websites.

✓ Want to get noticed
✓ They like having power over there peers
✓ They have problems at home
✓ Think it's cool and funny
✓ Aggressive personality
✓ Lack of adult supervision
✓ Revenge
✓ Take their feelings out on others

✓ Low self-confidence
✓ Depression
✓ Suicidal thoughts and suicide attempts
✓ Abnormal fears and worries
✓ Sleep disorders
✓ Nervous habits
✓ Frequent crying
✓ Bed-wetting
✓ Poor appetite or digestive problems
✓ School problems
✓ Rage


‌━━━━ SECTION 1. Short Title – this act shall be known as the “Anti-Bullying Act of 2013.”
‌━━━━ SECTION 2. Acts of Bullying – for purposes of this act, “bullying” shall refer to any severe or repeated use of a written, verbal, physical act and etc.
‌━━━━ SECTION 3. Adoption of Anti Bullying Policies - All elementary and secondary schools are hereby directed to adopt policies to address the existence of bullying in their respective institutions. Such policies shall be regularly updated and, at a minimum, shall include
‌━━━━ SECTION 4. Mechanisms to Address Bullying. – The school principal or any person who holds a comparable role shall be responsible for the implementation and oversight of policies intended to address bullying. If it is determined that bullying or retaliation has occurred, the school principal or the designated school officer or person shall: (a) Notify the law enforcement agency if the school principal or designee believes that criminal charges under the Revised Penal Code may be pursued against the perpetrator; (b) Take appropriate disciplinary administrative action; (c) Notify the parents or guardians of the perpetrator; and (d) Notify the parents or guardians of the victim regarding the action taken to prevent any further acts of bullying or retaliation.
‌━━━━ SECTION 5. Reporting Requirement. – All schools shall inform their respective schools division superintendents in writing about the anti-bullying policies formulated within six (6) months from the effectivity of this Act. Such notification shall likewise be an administrative requirement prior to the operation of new schools.
‌━━━━ SECTION 6. Sanction for Noncompliance. – In the rules and regulations to be implemented pursuant to this Act, the Secretary of the DepED shall prescribe the appropriate administrative sanctions on school administrators who shall fail to comply with the requirements under this Act. In addition there to, erring private schools shall likewise suffer the penalty of suspension of their permits to operate.
‌━━━━ SECTION 7. Implementing Rules and Regulations – Within ninety (90) days from the effectivity of this Act, the DepED shall promulgate the necessary rules and regulations to implement the provisions of this Act.
‌━━━━ SECTION 8. Separability Clause. – If, for any reason, any provision of this Act is declared to be unconstitutional or invalid, the other sections or provisions.
‌━━━━ SECTION 9. Repealing Clause. – All laws, decrees, orders, rules and regulations or parts thereof which are inconsistent with or contrary to the provisions of this Act are hereby repealed, amended or modified accordingly.
‌━━━━ SECTION 10. Effectivity. – This Act shall take effect fifteen (15) days after its publication in at least two (2) national newspapers of general.

Click here for the Reference

Ꮺ Republic Act No. 10175

Ꮺ Cybercrime
➥ A term used to broadly describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks. It is also used to include traditional crimes in which computers or networks are used to enable the illicit activity.

Ꮺ Crime Punishable Acts
➥ Hacking or Illegal Access
‌━━━━ a crime, which entails cracking systems and gaining unauthorized access to the data stored in them.
➥ System Interference
‌━━━━ Illegal inputting, transmitting, damaging, deleting, deteriorating, altering, or suppressing computer data or program, electronic document, or electronic data message.
➥ Misuse of Devices
‌━━━━ The use, production, sale, procurement, importation, distribution, or otherwise making available, without right.
➥ Cyber- squatting
‌━━━━ The act of registering a famous Domain Name and then selling it for a fortune.
➥ Computer-Related Forgery
‌━━━━ The crime of falsely making or copying a document in order to deceive people.
➥ Computer-Related Fraud
‌━━━━ The crime of using dishonest methods to take something valuable from another person through internet or computer.
➥ Computer-Related Identity Thef
‌━━━━ The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another.
➥ Cybersex
‌━━━━ The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of computer system.
➥ Child Pornography
➥ Unsolicited Commercial Communications ‌━━━━ Illegal transmission of commercial electronic communication with the use of computer system which seek to advertise, sell, or offer for sale products and services.
➥ Libel
‌━━━━ The act of publishing a false statement that causes people to have a bad opinion of someone.

Ꮺ Tips to Avoid Cybercrime
➥ Always change your password in any social media networking site
➥ Do not share important files publicly
➥ Check carefully emails sent to you that ask for validation
➥ Do not simply click links that are suspicious to you
➥ Always clear CACHE after you make any online transaction

Click here for the Reference