QUARTER 1 WEEK 2
TLE 8 (ICT)
EXPLAIN THE KEY CONCEPTS OF DIGITAL CITIZENSHIP,
DIGITAL FOOTPRINTS, DIGITAL IDENTITY, AND ICT-
RELATED LEGAL BASES, INCLUDING THEIR SIGNIFICANCE
AND IMPACT ON EVERYDAY DIGITAL INTERACTIONS
DAY 1
REVIEW
KAHOOT
TITLE: BE KIND ONLINE
LINK: HTTPS://WWW.YOUTUBE.COM/WATCH?V=KWX5Q2I6SNM&AB_CHANNEL=BULLIESOUT
UNLOCKING CONTENT VOCABULARY
click on each term to see
definitions and examples.
Link: https://padlet.com/rbfabro/digital-citizenship-and-online-safety-z417ts5vez4quzpu/slideshow/wish/3021778399
Elements of Digital Citizenship
Scenarios Where Digital Citizenship is Crucial
A.Social Media Interactions
Scenario: A student shares a post on social media that could
be interpreted as offensive or controversial. This leads to a
heated discussion in the comments section.
●Questions: What do you think makes someone a good
digital citizen in the context of social media interactions?
Can you share an experience where practicing good digital
citizenship on social media was important?
A.Online Gaming
Scenario: During an online gaming session, a player
encounters another player who is using abusive language
and harassing others.
●Questions: What do you think makes someone a good
digital citizen in the context of online gaming? Can you
share an experience where digital citizenship was
important while playing online games?
A.Email Communication
Scenario: A student receives an email from an unknown
sender with a suspicious link. The student needs to decide
whether to open the link or report the email.
●Questions: What do you think makes someone a good digital
citizen when it comes to email communication? Can you
share an experience where being a responsible digital citizen
in email communication was crucial?
A.Online Learning Platforms
Scenario: In an online class discussion forum, a student
posts a comment that is respectful and constructive, even
though they disagree with the original post.
●Questions: What do you think makes someone a good
digital citizen in the context of online learning platforms?
Can you share an experience where digital citizenship was
important in an online learning environment?
A.Content Creation and Sharing
Scenario: A student creates a video and shares it online,
ensuring that all content used is original or properly credited
to avoid plagiarism.
●Questions: What do you think makes someone a good digital
citizen when creating and sharing content online? Can you
share an experience where practicing good digital citizenship
in content creation was important?
Digital citizenship refers to the responsible
use of technology by anyone who uses
computers, the Internet, and digital devices to
engage with society on any level. It
encompasses a wide range of behaviors and
skills that are necessary for effective and
ethical participation in digital environments.
According to Ribble (2017), there are nine elements
of Digital Citizenship. These elements include:
1.Digital Access
2.Digital Commerce
3.Digital Communication
4.Digital Literacy
5.Digital Etiquette
6.Digital Law
7.Digital Rights and Responsibilities
8.Digital Health and Wellness
9.Digital Security (Self-protection)
https://padlet.com/rbfabro/understanding-digital-ci
tizenship-2q5nfdogssse4kyx/slideshow/wish/302179
2613
Scenario: Cyberbullying Incident
Scenario Description
●A student, Alex, posts a picture of their new project on
a school-related social media group. Another student,
Sam, starts posting negative comments about Alex's
project, calling it "stupid" and "a waste of time." Other
students join in, and the comments escalate to
personal attacks on Alex’s appearance and abilities.
Alex feels hurt and embarrassed and doesn't know how
to respond.
Identify Ignored Digital Citizenship Elements
1.Digital Etiquette - Sam and the other students ignored
the norms of respectful and kind communication online.
2.Digital Rights and Responsibilities - The bullies ignored
Alex's right to a safe and respectful online environment.
3.Digital Security - The situation could escalate to a point
where Alex's personal information might be at risk if the
bullying continues.
Analyze the Situation
1.How did Alex feel? Discuss the emotional impact of
cyberbullying on Alex.
2.Why did Sam and the other students behave this way?
Explore the reasons behind cyberbullying behavior.
3.What role did the bystanders play? Discuss the impact of
bystanders either joining in or staying silent.
How Could the Situation Have Been Handled Better?
1.Digital Etiquette - Sam and the other students should
have respected Alex's post and provided constructive
feedback if necessary.
2.Digital Rights and Responsibilities- Students should
recognize their responsibility to create a positive online
environment and report inappropriate behavior.
Intervention- The teacher should intervene early to stop the
bullying and provide support to Alex
Discuss the Importance of Digital Etiquette and Security
1.Digital Etiquette - Emphasize the importance of treating
others with respect online, just as one would in person.
Discuss the long-term impact of negative online behavior.
2.Digital Security - Highlight the need to protect personal
information and the potential risks of sharing too much
online. Discuss how bullying can sometimes lead to more
serious security issues.
Learning Activity Sheet No. 1:
Understanding Digital Citizenship
Through Creative Presentations
DAY 2
DIGITAL FOOTPRINTS AND IDENTITY
https://www.calameo.com/rea
d/005391603a9350eb6ebb8
1.What do you think makes up your digital
footprint?
2.Can you think of a time when someone's
online actions affected their real life?
What is a Digital Footprint?
A digital footprint is the trail of data that
individuals leave behind when they use the
internet. This includes all the information
that is shared, both intentionally and
unintentionally, through various online
activities such as social media interactions,
website visits, emails, and online shopping.
Digital footprints can be categorized into two types:
1.Active Digital Footprints - These are the data trails you
leave intentionally, such as posts on social media, blog
entries, or any other content you actively upload or share
online.
2. Passive Digital Footprints - These are the data trails you
leave unintentionally, such as cookies that track your
browsing habits, IP addresses, and other metadata collected
by websites and online services.
Importance of Digital Footprints
● Privacy and Security - The data you leave behind can be used to build
a profile about you, which can be exploited for malicious purposes such
as identity theft or targeted cyber-attacks (Solove, 2007).
● Reputation Management - Your digital footprint can affect your reputation.
Employers, colleges, and other entities often search for online information
about candidates, and inappropriate content can have negative consequences
(Berkelaar, 2014).
●Personalization - Companies use digital footprints to personalize
user experiences, such as recommending products or content
based on browsing history (Turow, 2011).
Managing Your Digital Footprint
Managing your digital footprint involves being mindful of the
information you share online and taking steps to protect your
privacy.
Privacy Settings - Regularly review and adjust the privacy
settings on your social media accounts and other online
services to control who can see your information
●Search Yourself - Periodically search for your own name
on search engines to see what information is publicly
accessible.
●Think Before You Post - Consider the long-term impact
of the content you share online. Once something is
posted, it can be difficult to remove it completely.
Use Secure Connections - Ensure that you are using
secure (HTTPS) connections when browsing the internet to
protect your data from being intercepted
Digital Identity
Digital identity refers to the online persona
that is created through your digital footprints. It
encompasses all the information available about you
online, including social media profiles, online
transactions, and any other digital interactions. Your
digital identity can influence how others perceive you
and can have real-world implications.
Components of Digital Identity
●Personal Information - This includes your name, date of
birth, address, and other identifying details.
Professional Information - This includes your employment
history, professional skills, and educational background, often
found on platforms like LinkedIn
●Social Information - This includes your social media activity,
such as posts, likes, comments, and the networks you are part
of.
●Behavioral Information - This includes your browsing
habits, purchase history, and other online behaviors that
can be tracked and analyzed.
Risks Associated with Digital Identity
●Identity Theft - Cybercriminals can use your personal
information to steal your identity and commit fraud (Newman
& McNally, 2005).
●Data Exploitation - Companies can exploit your digital
identity for targeted advertising and other commercial
purposes without your explicit consent (Acquisti & Gross,
2006).
Reputation Damage - Negative information or inappropriate
content associated with your digital identity can harm your
personal and professional reputation
Protecting Your Digital Identity
●Strong Passwords - Use strong, unique passwords for
different online accounts and change them regularly.
●Two-Factor Authentication - Enable two-factor
authentication (2FA) for an added layer of security.
Be Skeptical of Phishing - Be cautious of emails,
messages, or websites that ask for personal information
●Regular Monitoring - Keep an eye on your online
accounts for any suspicious activity.
Relevance and Impact of Key
Philippine Digital Laws
1. Republic Act No. 10844 - Department of Information and
Communications Technology Act of 2015
Relevance in Everyday Digital Activities
· This law created the Department of Information and Communications
Technology (DICT), which is responsible for planning, developing, and
promoting the national ICT development agenda.
· It ensures that there is adequate infrastructure to support digital
activities, including internet access, cybersecurity measures, and ICT
services.
· The DICT is tasked with promoting digital literacy and ensuring that
ICT services are accessible to all Filipinos, thus bridging the digital
divide.
Protection and Regulation
· The DICT is responsible for implementing cybersecurity policies
and programs to protect users from cyber threats.
· It works in conjunction with other agencies to ensure the
protection of personal data and compliance with data privacy laws.
· The DICT sets standards for ICT services and infrastructure to
ensure reliability and security.
Case Study
Free Wi-Fi in Public Places- The DICT has implemented
the Free Wi-Fi for All program, providing free internet
access in public places such as parks, libraries, and
transportation hubs. This initiative promotes digital
inclusion and empowers citizens to participate in the digital
economy.
2. Republic Act No. 10627 - Anti-Bullying Act of 2013
Relevance in Everyday Digital Activities
· This law addresses bullying in all its forms, including
cyberbullying, which is prevalent in digital spaces such
as social media, messaging apps, and online forums.
· It mandates schools to implement policies that prevent
and address bullying, including cyberbullying, to create a
safe and supportive environment for students.
Protection and Regulation
· Schools are required to establish clear reporting mechanisms for
bullying incidents, ensuring that victims can report incidents
safely.
· Schools must provide intervention programs to support both
victims and perpetrators of bullying, promoting behavioral
change and conflict resolution.
· The law encourages parental involvement in addressing
bullying, fostering a collaborative approach to protecting students.
Case Study
Cyberbullying Incident in Schools- A high school student
reported being bullied on social media by classmates. The
school, following the Anti-Bullying Act, conducted an
investigation, provided counseling to the victim, and
implemented disciplinary actions against the perpetrators. This
intervention helped restore a safe learning environment and
highlighted the importance of addressing cyberbullying
proactively.
3. Republic Act No. 10173 - Data Privacy Act of 2012
Relevance in Everyday Digital Activities
· This law protects personal data collected by both
public and private entities, ensuring that individuals'
privacy is respected in digital transactions and
activities.
· It mandates organizations to obtain consent from
individuals before collecting, processing, or sharing
their personal data and to be transparent about how
the data will be used.
Protection and Regulation
· Individuals have the right to access, correct, and delete their
personal data, as well as to object to its processing.
· Organizations are required to notify affected individuals and
the National Privacy Commission (NPC) in the event of a data
breach.
· The law imposes penalties on organizations that fail to
comply with data privacy requirements, ensuring
accountability.
Case Study
Data Breach Incident- A major telecommunications company
experienced a data breach that exposed the personal information of
millions of customers. The NPC conducted an investigation and
required the company to implement corrective measures, including
enhancing their cybersecurity protocols and compensating affected
customers. This case underscores the importance of robust data
protection measures and the role of the Data Privacy Act in
safeguarding personal information.
4. Republic Act No. 8293 - Intellectual Property Code of the
Philippines
Relevance in Everyday Digital Activities
· This law protects intellectual property rights, including
copyrights, trademarks, and patents, in digital content such as
software, music, videos, and written works.
· It ensures that creators are compensated for their work and
that their rights are respected in digital platforms and online
transactions.
Protection and Regulation
· The law includes provisions to combat digital piracy,
ensuring that unauthorized copying and distribution of
protected content are penalized.
· It provides guidelines for licensing agreements and fair
use, balancing the rights of creators with the public's access
to information and content.
· The Intellectual Property Office of the Philippines
(IPOPHL) is responsible for enforcing IP laws and
addressing violations through legal and administrative
actions.
Case Study
Online Piracy Crackdown- IPOPHL launched a campaign
against websites that distribute pirated content, resulting
in the shutdown of several illegal streaming sites. This
action protected the rights of content creators and
highlighted the importance of respecting intellectual
property in the digital age.
TLE 8 EAGLE  Q1 WEEK 2.pOWERPOINT PRESENTATION LESSON
TLE 8 EAGLE  Q1 WEEK 2.pOWERPOINT PRESENTATION LESSON
TLE 8 EAGLE  Q1 WEEK 2.pOWERPOINT PRESENTATION LESSON
TLE 8 EAGLE  Q1 WEEK 2.pOWERPOINT PRESENTATION LESSON
Your text here
TLE 8 EAGLE  Q1 WEEK 2.pOWERPOINT PRESENTATION LESSON
TLE 8 EAGLE  Q1 WEEK 2.pOWERPOINT PRESENTATION LESSON
TLE 8 EAGLE  Q1 WEEK 2.pOWERPOINT PRESENTATION LESSON

More Related Content

PPTX
grade 8 week 2 ict.pptx. matatag grade 7
PPTX
Technology and LIvelihood Education ICT- Computer
PPTX
TLE WEEK 2lessonpara sa mga estufyante nga diba
PPTX
Day 2 Week2.pptxxxxxxxxxxxxxxxxxxxxxxxxx
PPTX
powerpoint presentation on ict matatag G3
PPTX
3.-Ethical-and-Social-Issues-In-ICT.pptx
PPTX
7 - DIGITAL FOOTPRINTS AND IDENTITY.pptx
PPTX
DIGITAL FOOTPRINT-WPS Office.pptx
grade 8 week 2 ict.pptx. matatag grade 7
Technology and LIvelihood Education ICT- Computer
TLE WEEK 2lessonpara sa mga estufyante nga diba
Day 2 Week2.pptxxxxxxxxxxxxxxxxxxxxxxxxx
powerpoint presentation on ict matatag G3
3.-Ethical-and-Social-Issues-In-ICT.pptx
7 - DIGITAL FOOTPRINTS AND IDENTITY.pptx
DIGITAL FOOTPRINT-WPS Office.pptx

Similar to TLE 8 EAGLE Q1 WEEK 2.pOWERPOINT PRESENTATION LESSON (20)

PPTX
Digital citizenship @ your school
PPTX
Digital citizenship.pptx
PDF
How to Teach Digital Citizenship to Students A Comprehensive Guide for Teache...
PPTX
PPT W3 - D1.pptxnslndlslsmebdlsmsnrblwsnbdlw
PPTX
Your digital identity - are you feeling lucky?
PPTX
Power point report about information technology
PPTX
Power PointT REPORT Information Technology ERA.pptx
PPTX
Digital citizenship presentation
PPTX
Untitbjjjkkkkjkkkiiooiiioookokjjled.pptx
PPT
Digital Citizenship
PDF
Digital Literacy Skills in the 21st Century
DOCX
Reviewer make it private because it's nee
PPTX
[r]evolution Digital Literacy Workshop Slides
PPTX
Shannon Morris PDLM presentation
PPTX
Principles of Digital Literacy.pptx
PPTX
G-12 UNIT -1.pptx information system and thier application
PPTX
Q1_TLE_8_Week_2asfsdgsgsdgdsgfasdgwrgrgqrweg
PPT
DigitalCitizenshipPresentation
PDF
Security in social network araceli&arlethe
PPTX
Biz miz io2 content for module 3
Digital citizenship @ your school
Digital citizenship.pptx
How to Teach Digital Citizenship to Students A Comprehensive Guide for Teache...
PPT W3 - D1.pptxnslndlslsmebdlsmsnrblwsnbdlw
Your digital identity - are you feeling lucky?
Power point report about information technology
Power PointT REPORT Information Technology ERA.pptx
Digital citizenship presentation
Untitbjjjkkkkjkkkiiooiiioookokjjled.pptx
Digital Citizenship
Digital Literacy Skills in the 21st Century
Reviewer make it private because it's nee
[r]evolution Digital Literacy Workshop Slides
Shannon Morris PDLM presentation
Principles of Digital Literacy.pptx
G-12 UNIT -1.pptx information system and thier application
Q1_TLE_8_Week_2asfsdgsgsdgdsgfasdgwrgrgqrweg
DigitalCitizenshipPresentation
Security in social network araceli&arlethe
Biz miz io2 content for module 3
Ad

More from ailynaraiza (6)

PPTX
TLE 7 DOVE Q1 WEEK 2.pPWERPOINT PRESENTATION 002
PPTX
SCIENCE 7 FIRST QUARTER WEEK 1 CCTO TO THE REAL OWNER
PPTX
SCIENCE 5 Q1 WEEK3.pptx GRADE 5 DIAMONDDIAMOND
PPTX
TLE 8 EAGLE q1 week 3.pOWERPOINT LESSON
PPTX
TLE 8 EAGLE Q1WEEK 2.pptx PIS VIDEO EDITING
PPTX
SCIENCE 5 Q1 WEEK3.POWERPOINT LESSON FDF
TLE 7 DOVE Q1 WEEK 2.pPWERPOINT PRESENTATION 002
SCIENCE 7 FIRST QUARTER WEEK 1 CCTO TO THE REAL OWNER
SCIENCE 5 Q1 WEEK3.pptx GRADE 5 DIAMONDDIAMOND
TLE 8 EAGLE q1 week 3.pOWERPOINT LESSON
TLE 8 EAGLE Q1WEEK 2.pptx PIS VIDEO EDITING
SCIENCE 5 Q1 WEEK3.POWERPOINT LESSON FDF
Ad

Recently uploaded (20)

PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Trump Administration's workforce development strategy
PDF
IGGE1 Understanding the Self1234567891011
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
Empowerment Technology for Senior High School Guide
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PPTX
20th Century Theater, Methods, History.pptx
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PDF
My India Quiz Book_20210205121199924.pdf
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
FORM 1 BIOLOGY MIND MAPS and their schemes
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
AI-driven educational solutions for real-life interventions in the Philippine...
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Trump Administration's workforce development strategy
IGGE1 Understanding the Self1234567891011
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Empowerment Technology for Senior High School Guide
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Cambridge-Practice-Tests-for-IELTS-12.docx
Share_Module_2_Power_conflict_and_negotiation.pptx
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
20th Century Theater, Methods, History.pptx
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
My India Quiz Book_20210205121199924.pdf
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf

TLE 8 EAGLE Q1 WEEK 2.pOWERPOINT PRESENTATION LESSON

  • 1. QUARTER 1 WEEK 2 TLE 8 (ICT)
  • 2. EXPLAIN THE KEY CONCEPTS OF DIGITAL CITIZENSHIP, DIGITAL FOOTPRINTS, DIGITAL IDENTITY, AND ICT- RELATED LEGAL BASES, INCLUDING THEIR SIGNIFICANCE AND IMPACT ON EVERYDAY DIGITAL INTERACTIONS
  • 5. TITLE: BE KIND ONLINE LINK: HTTPS://WWW.YOUTUBE.COM/WATCH?V=KWX5Q2I6SNM&AB_CHANNEL=BULLIESOUT
  • 6. UNLOCKING CONTENT VOCABULARY click on each term to see definitions and examples. Link: https://padlet.com/rbfabro/digital-citizenship-and-online-safety-z417ts5vez4quzpu/slideshow/wish/3021778399
  • 7. Elements of Digital Citizenship Scenarios Where Digital Citizenship is Crucial A.Social Media Interactions Scenario: A student shares a post on social media that could be interpreted as offensive or controversial. This leads to a heated discussion in the comments section. ●Questions: What do you think makes someone a good digital citizen in the context of social media interactions? Can you share an experience where practicing good digital citizenship on social media was important?
  • 8. A.Online Gaming Scenario: During an online gaming session, a player encounters another player who is using abusive language and harassing others. ●Questions: What do you think makes someone a good digital citizen in the context of online gaming? Can you share an experience where digital citizenship was important while playing online games?
  • 9. A.Email Communication Scenario: A student receives an email from an unknown sender with a suspicious link. The student needs to decide whether to open the link or report the email. ●Questions: What do you think makes someone a good digital citizen when it comes to email communication? Can you share an experience where being a responsible digital citizen in email communication was crucial?
  • 10. A.Online Learning Platforms Scenario: In an online class discussion forum, a student posts a comment that is respectful and constructive, even though they disagree with the original post. ●Questions: What do you think makes someone a good digital citizen in the context of online learning platforms? Can you share an experience where digital citizenship was important in an online learning environment?
  • 11. A.Content Creation and Sharing Scenario: A student creates a video and shares it online, ensuring that all content used is original or properly credited to avoid plagiarism. ●Questions: What do you think makes someone a good digital citizen when creating and sharing content online? Can you share an experience where practicing good digital citizenship in content creation was important?
  • 12. Digital citizenship refers to the responsible use of technology by anyone who uses computers, the Internet, and digital devices to engage with society on any level. It encompasses a wide range of behaviors and skills that are necessary for effective and ethical participation in digital environments.
  • 13. According to Ribble (2017), there are nine elements of Digital Citizenship. These elements include: 1.Digital Access 2.Digital Commerce 3.Digital Communication 4.Digital Literacy 5.Digital Etiquette 6.Digital Law 7.Digital Rights and Responsibilities 8.Digital Health and Wellness 9.Digital Security (Self-protection)
  • 15. Scenario: Cyberbullying Incident Scenario Description ●A student, Alex, posts a picture of their new project on a school-related social media group. Another student, Sam, starts posting negative comments about Alex's project, calling it "stupid" and "a waste of time." Other students join in, and the comments escalate to personal attacks on Alex’s appearance and abilities. Alex feels hurt and embarrassed and doesn't know how to respond.
  • 16. Identify Ignored Digital Citizenship Elements 1.Digital Etiquette - Sam and the other students ignored the norms of respectful and kind communication online. 2.Digital Rights and Responsibilities - The bullies ignored Alex's right to a safe and respectful online environment. 3.Digital Security - The situation could escalate to a point where Alex's personal information might be at risk if the bullying continues.
  • 17. Analyze the Situation 1.How did Alex feel? Discuss the emotional impact of cyberbullying on Alex. 2.Why did Sam and the other students behave this way? Explore the reasons behind cyberbullying behavior. 3.What role did the bystanders play? Discuss the impact of bystanders either joining in or staying silent.
  • 18. How Could the Situation Have Been Handled Better? 1.Digital Etiquette - Sam and the other students should have respected Alex's post and provided constructive feedback if necessary. 2.Digital Rights and Responsibilities- Students should recognize their responsibility to create a positive online environment and report inappropriate behavior. Intervention- The teacher should intervene early to stop the bullying and provide support to Alex
  • 19. Discuss the Importance of Digital Etiquette and Security 1.Digital Etiquette - Emphasize the importance of treating others with respect online, just as one would in person. Discuss the long-term impact of negative online behavior. 2.Digital Security - Highlight the need to protect personal information and the potential risks of sharing too much online. Discuss how bullying can sometimes lead to more serious security issues.
  • 20. Learning Activity Sheet No. 1: Understanding Digital Citizenship Through Creative Presentations
  • 21. DAY 2
  • 24. 1.What do you think makes up your digital footprint? 2.Can you think of a time when someone's online actions affected their real life?
  • 25. What is a Digital Footprint? A digital footprint is the trail of data that individuals leave behind when they use the internet. This includes all the information that is shared, both intentionally and unintentionally, through various online activities such as social media interactions, website visits, emails, and online shopping.
  • 26. Digital footprints can be categorized into two types: 1.Active Digital Footprints - These are the data trails you leave intentionally, such as posts on social media, blog entries, or any other content you actively upload or share online. 2. Passive Digital Footprints - These are the data trails you leave unintentionally, such as cookies that track your browsing habits, IP addresses, and other metadata collected by websites and online services.
  • 27. Importance of Digital Footprints ● Privacy and Security - The data you leave behind can be used to build a profile about you, which can be exploited for malicious purposes such as identity theft or targeted cyber-attacks (Solove, 2007). ● Reputation Management - Your digital footprint can affect your reputation. Employers, colleges, and other entities often search for online information about candidates, and inappropriate content can have negative consequences (Berkelaar, 2014). ●Personalization - Companies use digital footprints to personalize user experiences, such as recommending products or content based on browsing history (Turow, 2011).
  • 28. Managing Your Digital Footprint Managing your digital footprint involves being mindful of the information you share online and taking steps to protect your privacy. Privacy Settings - Regularly review and adjust the privacy settings on your social media accounts and other online services to control who can see your information ●Search Yourself - Periodically search for your own name on search engines to see what information is publicly accessible.
  • 29. ●Think Before You Post - Consider the long-term impact of the content you share online. Once something is posted, it can be difficult to remove it completely. Use Secure Connections - Ensure that you are using secure (HTTPS) connections when browsing the internet to protect your data from being intercepted
  • 30. Digital Identity Digital identity refers to the online persona that is created through your digital footprints. It encompasses all the information available about you online, including social media profiles, online transactions, and any other digital interactions. Your digital identity can influence how others perceive you and can have real-world implications.
  • 31. Components of Digital Identity ●Personal Information - This includes your name, date of birth, address, and other identifying details. Professional Information - This includes your employment history, professional skills, and educational background, often found on platforms like LinkedIn ●Social Information - This includes your social media activity, such as posts, likes, comments, and the networks you are part of. ●Behavioral Information - This includes your browsing habits, purchase history, and other online behaviors that can be tracked and analyzed.
  • 32. Risks Associated with Digital Identity ●Identity Theft - Cybercriminals can use your personal information to steal your identity and commit fraud (Newman & McNally, 2005). ●Data Exploitation - Companies can exploit your digital identity for targeted advertising and other commercial purposes without your explicit consent (Acquisti & Gross, 2006). Reputation Damage - Negative information or inappropriate content associated with your digital identity can harm your personal and professional reputation
  • 33. Protecting Your Digital Identity ●Strong Passwords - Use strong, unique passwords for different online accounts and change them regularly. ●Two-Factor Authentication - Enable two-factor authentication (2FA) for an added layer of security. Be Skeptical of Phishing - Be cautious of emails, messages, or websites that ask for personal information ●Regular Monitoring - Keep an eye on your online accounts for any suspicious activity.
  • 34. Relevance and Impact of Key Philippine Digital Laws
  • 35. 1. Republic Act No. 10844 - Department of Information and Communications Technology Act of 2015 Relevance in Everyday Digital Activities · This law created the Department of Information and Communications Technology (DICT), which is responsible for planning, developing, and promoting the national ICT development agenda. · It ensures that there is adequate infrastructure to support digital activities, including internet access, cybersecurity measures, and ICT services. · The DICT is tasked with promoting digital literacy and ensuring that ICT services are accessible to all Filipinos, thus bridging the digital divide.
  • 36. Protection and Regulation · The DICT is responsible for implementing cybersecurity policies and programs to protect users from cyber threats. · It works in conjunction with other agencies to ensure the protection of personal data and compliance with data privacy laws. · The DICT sets standards for ICT services and infrastructure to ensure reliability and security.
  • 37. Case Study Free Wi-Fi in Public Places- The DICT has implemented the Free Wi-Fi for All program, providing free internet access in public places such as parks, libraries, and transportation hubs. This initiative promotes digital inclusion and empowers citizens to participate in the digital economy.
  • 38. 2. Republic Act No. 10627 - Anti-Bullying Act of 2013 Relevance in Everyday Digital Activities · This law addresses bullying in all its forms, including cyberbullying, which is prevalent in digital spaces such as social media, messaging apps, and online forums. · It mandates schools to implement policies that prevent and address bullying, including cyberbullying, to create a safe and supportive environment for students.
  • 39. Protection and Regulation · Schools are required to establish clear reporting mechanisms for bullying incidents, ensuring that victims can report incidents safely. · Schools must provide intervention programs to support both victims and perpetrators of bullying, promoting behavioral change and conflict resolution. · The law encourages parental involvement in addressing bullying, fostering a collaborative approach to protecting students.
  • 40. Case Study Cyberbullying Incident in Schools- A high school student reported being bullied on social media by classmates. The school, following the Anti-Bullying Act, conducted an investigation, provided counseling to the victim, and implemented disciplinary actions against the perpetrators. This intervention helped restore a safe learning environment and highlighted the importance of addressing cyberbullying proactively.
  • 41. 3. Republic Act No. 10173 - Data Privacy Act of 2012 Relevance in Everyday Digital Activities · This law protects personal data collected by both public and private entities, ensuring that individuals' privacy is respected in digital transactions and activities. · It mandates organizations to obtain consent from individuals before collecting, processing, or sharing their personal data and to be transparent about how the data will be used.
  • 42. Protection and Regulation · Individuals have the right to access, correct, and delete their personal data, as well as to object to its processing. · Organizations are required to notify affected individuals and the National Privacy Commission (NPC) in the event of a data breach. · The law imposes penalties on organizations that fail to comply with data privacy requirements, ensuring accountability.
  • 43. Case Study Data Breach Incident- A major telecommunications company experienced a data breach that exposed the personal information of millions of customers. The NPC conducted an investigation and required the company to implement corrective measures, including enhancing their cybersecurity protocols and compensating affected customers. This case underscores the importance of robust data protection measures and the role of the Data Privacy Act in safeguarding personal information.
  • 44. 4. Republic Act No. 8293 - Intellectual Property Code of the Philippines Relevance in Everyday Digital Activities · This law protects intellectual property rights, including copyrights, trademarks, and patents, in digital content such as software, music, videos, and written works. · It ensures that creators are compensated for their work and that their rights are respected in digital platforms and online transactions.
  • 45. Protection and Regulation · The law includes provisions to combat digital piracy, ensuring that unauthorized copying and distribution of protected content are penalized. · It provides guidelines for licensing agreements and fair use, balancing the rights of creators with the public's access to information and content. · The Intellectual Property Office of the Philippines (IPOPHL) is responsible for enforcing IP laws and addressing violations through legal and administrative actions.
  • 46. Case Study Online Piracy Crackdown- IPOPHL launched a campaign against websites that distribute pirated content, resulting in the shutdown of several illegal streaming sites. This action protected the rights of content creators and highlighted the importance of respecting intellectual property in the digital age.