Asabya·Academy
← All sessions
L1 · KNOWSession 03instruction

Who Are You Online?

Digital Identity, Privacy, Reputation & Responding to Harmful Content

Here is something most people your age do not think about: your digital footprint is already being built. Every post, every comment, every account you create adds to a digital record that universities, employers, and even people you have never met can access. Today we talk about how to protect yourself, manage your identity online, and behave in ways that you will not regret.

Digital Citizenship75 minutesASABYA-IC3-L1-SWB-v1.0
2.1.12.1.22.1.32.2.12.2.22.3.12.3.22.3.32.3.4
Session 3 — Who Are You Online? — Knowledge Check
10 questions · pass at 70%
Begin knowledge check →

Personally Identifiable Information (PII)

PII is any information that can be used to identify you specifically. The list is longer than most people think: full name, national ID number, passport number, home address, phone number, email address, date of birth, location data, photos of your face, your school name combined with your name, and financial account details.

The rule: share PII only when absolutely necessary, only with sources you trust, and always ask — "What is this being used for, and who will see it?"

Warning zone: apps that ask for your location, camera, microphone, and contacts at the same time are asking for a lot. Ask yourself — does a flashlight app really need your contacts?

TRY IT NOW · PII AUDIT

Look at your most-used app right now. Go to Settings → App Permissions. Write down every permission it has. Does it need all of them? Which ones would you remove?

Digital Permanence — The Internet Does Not Forget

This is one of the most important things you will learn today. When something is posted online, it can become permanent — even after you delete it.

Why: screenshots can be taken instantly. Search engines cache (save) copies of pages. The Wayback Machine archives websites. Servers keep logs. Other people's devices may have copies.

Real impact: in 2023, multiple university applicants in the Gulf region had admission offers withdrawn after offensive posts from years earlier were found during background checks. Employers, universities, and scholarship committees routinely search applicants online. Your digital past is part of your real future.

TRY IT NOW · PERMANENCE TEST

Think of something you posted two years ago on any platform. Would you be comfortable with a university admissions officer, your parents, and your future employer all seeing it? If not — that is the point of this lesson.

Legal and Ethical Digital Behaviour

Legal means complying with the law. In Oman, the Cybercrime Law (Royal Decree 12/2011) makes the following illegal: sharing someone's personal data without consent; cyberbullying and harassment; impersonating someone online; spreading false information that harms others; and accessing accounts or systems without permission.

Ethical means doing the right thing, even when it is technically legal — not sharing embarrassing photos of someone even if they are not technically private; not spreading rumours, even if true; respecting others' work and credit.

Bottom line: just because you can do something online does not mean you should.

TRY IT NOW · LEGAL OR ILLEGAL

Read these scenarios and decide — legal, illegal, or just unethical?

  1. Sharing a screenshot of someone's private message in a group chat.
  2. Using someone's photo as your profile picture without asking.
  3. Telling everyone at school something embarrassing you found on someone's old profile.
  4. Accessing a classmate's account because they left it open on a school computer.

Responding to Negative Digital Communication

Online negativity is everywhere — comments, DMs, posts. How you respond matters.

The non-response strategy: engaging with someone trying to provoke you online almost always makes it worse. The most powerful response is often silence. Report → Block → Move on.

If it is cyberbullying: document it (a screenshot with a timestamp). Report it to the platform. Tell a trusted adult. In Oman, cyberbullying is a punishable offence under the Cybercrime Law.

Assessing information online — before you share anything, apply the SIFT method:

  • Stop — don't just click and share.
  • Investigate the source — who wrote this?
  • Find better coverage — does another credible source say the same?
  • Trace the claim — where did this actually originate?

TRY IT NOW · YOUR RESPONSE PLAN

What would you do if someone posted something hurtful about you online? Write your personal three-step response plan — not what you should do, but what you would actually do, and whether those are the same thing.

Session Activity — The Digital Citizenship Pledge

  1. List three pieces of PII you will never share publicly.
  2. Describe one thing you have seen online that was a digital citizenship violation (no names needed).
  3. Write your personal rule for responding to negative online content.
  4. Name one thing you will check before sharing a news article or post.

Key Vocabulary

TermWhat it means (in plain English)
PII (Personally Identifiable Information)Any data that can identify you specifically — name, ID number, address, phone, photos, location, etc.
Digital FootprintThe trail of data you leave behind through your online activity — posts, searches, accounts, messages.
Digital PermanenceThe concept that content posted online may remain accessible indefinitely, even after deletion.
Cybercrime LawOman's Royal Decree 12/2011 — legislation that makes certain online behaviours illegal, including harassment, data sharing without consent, and impersonation.
Non-Response StrategyChoosing not to engage with online negativity — reporting and blocking instead of replying.
SIFT MethodA fact-checking process: Stop, Investigate the source, Find better coverage, Trace the claim to its origin.
Social EngineeringManipulating people psychologically to give up personal information or access — does not require hacking.

Check Your Understanding

Five practice questions in the Certiport IC3 GS6 exam format. Choose the correct answer, then check the key below.

#Question and options
1Which of the following is an example of PII? · A) Your favourite colour · B) Your national ID number · C) Your preferred music genre · D) Your school's mascot
2Why is digital permanence important to understand? · A) It means your files are always backed up · B) Content you post may remain accessible even after deletion · C) It means your passwords cannot be changed · D) It ensures your data is always private
3Under Oman's Cybercrime Law, which of the following is ILLEGAL? · A) Posting your own opinion on social media · B) Sharing someone else's personal data without their consent · C) Using a VPN to access websites · D) Creating more than one social media account
4What does the 'S' in the SIFT method stand for? · A) Share · B) Search · C) Stop · D) Scroll
5What is the recommended response to cyberbullying? · A) Reply with an equally strong message · B) Ignore it and pretend it did not happen · C) Document it, report it to the platform, and tell a trusted adult · D) Delete your account immediately

Answer key: 1-B · 2-B · 3-B · 4-C · 5-C

Real Talk

Digital citizenship is not just about avoiding trouble. It is a skill that employers actively look for. Companies hiring for customer-facing roles, social media management, PR, HR, or any client communication role want people who understand professional online behaviour. Demonstrating that you know how to manage your digital identity — and can protect both your own information and others' — is a genuine competitive advantage in the job market.