Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

Part 6: Social, Ethical and Legal Responsibilities in the Use of Technology Tools and Resources

Learning Outcomes:

At the end of the unit, the pre-service teacher (PST) can:

a. show, give examples, observe, and demonstrate social, ethical, and legal responsibility in the use of
technology tools and resources;

b. identify examples of compliance of Intellectual Property Rights (IPR) in the educational setting; c.
enumerate digital safety policies, guidelines, and procedures that ensure child online safety and prevent
cyberbullying;

d. discuss safety rules in obtaining resource materials from local area network-based and the internet; e.
describe the community of learners as netizens who share and utilize digital materials; and

f. practice standard netiquette to share and utilize digital materials as a positive use of technology.

A. Digital Citizenship vs. Global Citizenship

Technology has become an integral part of our lives. It has created a great impact that whether we like it
or not, we have become prone to safety issues. Our privacy can be intruded; our social relationships can
be affected. But it is not just enough that we keep ourselves safe, we should also possess the skills on how
we can act responsibly so as not to pose harm to others. Thus, this Module will walk you through this
issue.

Digital Citizenship vs. Global Citizenship

Since we are considered citizens of the community we live in, then as users of the internet we can also call
ourselves as citizens of the digital world where we live, learn, and work in an interconnected manner.
Digital citizenship is an idea that all persons using the internet have civic rights and responsibilities. It
centers around safe, savvy and ethical use of technology.

Study the infographic from www.iste.org/explore/articleDetail?articleid=192

How do you describe a good citizen? How do you describe a good digital citizen?
Is there much difference between the two?
A global citizen sees the world as a community in which all people live and
prosper together. He/she understands that his/her actions contribute to the
values of the entire planet and he/she is concerned on how he/she participates
in and contributes to the entire world. A digital citizen, on the other hand,
adheres to guidelines that govern the ethical and responsible use of technology
and acts responsibly in all relationships and interactions in the digital world.
When we mix these two together, it's the perfect recipe for the Global Digital
Citizen, A global digital citizen is a responsible, ethical citizen leveraging
technology to foster community on a global scale through connection and
compassion. The Global Digital Citizen understands that we can govern
technology for the benefit of both ourselves and others. It is a citizen that views
the
world as an interconnected community. Additionally, the digital citizen realizes
that we simultaneously share technological and human experiences regardless
of culture, status, or political/ religious beliefs (Watanabe-Crockett, 2017).
Five Tenets of Global Digital Citizenship

We define the best assets of the Global Digital Citizen using 5 tenets: Personal Responsibility, Global
Citizenship, Altruistic Service, Environmental Stewardship, and Digital Citizenship (Ribble, 2017). These five
tenets are the essence of what it means to be a great Global Digital Citizen.

Personal responsibility

Personal responsibility includes demonstrating how we manage ourselves in matters such as personal
finance, ethical and moral boundaries, personal health and wellness, and relationships of every kind, both
online or offline. For the student, this kind of responsibility means taking ownership of his/her learning.
Developing a sense of accountability for lifelong learning in our students prepares them for the workplace.
These are places where they must often think and act independently and take initiatives on their own.
Encouraging this in the classroom as early as possible can help students develop high- level critical thinking
and problem solving abilities to assist them in every aspect of their lives.

Global citizenship

The Global Digital Citizen understands that technology has dissolved boundaries between all the world's
people. We now communicate, collaborate, and celebrate across all levels of society. We are now all global
citizens. Our students must realize, among other things, that we aren't isolated from each other anymore.
A deep understanding of this new global interconnectedness can encourage them to be aware of the
issues, traditions, values, and cultures of other citizens. This leads to cultivating understanding,
acceptance, compassion, and humility.

Digital citizenship

Digital citizenship covers appropriate and exemplary behavior in our online environments. It's about
working towards making our transparent digital world safe for ourselves and others. Just like personal
responsibility, this involves moving accountability for appropriate behavior to our students. We teach them
how to govern their behavior, act in just and moral ways, and lead by good example in all online
associations. In doing so, they foster independence within themselves and hopefully light the way for
others to do the same.

Altruistic service

Altruism is defined as "having a selfless concern for the well-being of others." The Global Digital Citizens
acknowledge that they share this world with many different people. These ideals apply to the people we
know, but also to those we don't know. These include embracing the opportunity to exercise charity and
goodwill for the benefit of others. The practice of altruistic service provides opportunities for our students
to create meaningful connections to the real world. It gives them the chance to reach out to others and
do things that can make a person's experiences better or easier in everyday life. This produces a sense of
community and well-being for all.

Environmental stewardship

This practice is all about common-sense values and an appreciation for the beauty and majesty that
surround us every day. This facet of Global Digital Citizenship encourages exploring how we can

practice the conscientious use of Earth's resources. Environmental stewardship encourages every student
to take a positive stand on personal, local, regional, national, and international actions regarding the
preservation of what is essentially our "environmental community." This facet of Global Digital Citizenship
reinforces the idea that we have one world that we all live on. It's vital that we respect it and take steps to
ensure its beauty and longevity for all future generations (Watanabe- Crockett, 2017).

Why Do We Need to be Global Digital Citizens?

Here's an idea from Watanabe-Crockett (2017). Personally, we face the daily possibility of online fraud,
identity theft, and online bullying. We place our entire lives and their contents in the digital stratosphere
willingly, and often without considering the consequences. The dangers of this are real. What is needed is
people who will advocate and demonstrate the kind of self-governance that will keep us sate from harm
both online and offline. Globally, even as technologically intertwined as we are, there is also a level of
disconnection in our lives. We are more connected than ever and yet often less tuned into others than
ever. Global Digital Citizens see the need that all diversity has to be recognized, honored, and cherished
for present and future generations. They also see the need for harmony and connection in a world
transforming as rapidly as ours. Digitally, our Internet is unchecked and growing wild, which is a good thing.
Online information is expanding at a staggering rate. Online perils do exist, and the Global Digital Citizen
sets an example to others on how to navigate them safely and securely. A good helping of common sense
goes a long way in this regard. Altruistically we have more means to help others. Thanks to technology.
Crowdfunding and crowdsourcing help us give back to local and global communities. Social media can
become a support network for those of us who are in physical, mental, and emotional need. The Global
Digital Citizen can lead the way.

Environmentally we continue to face growing threats such as climate change, resource depletion,
industrial pollution, digital pollution, and more. Global Digital Citizens seek to combat the biggest
challenges to our environmental health. They foster solutions that work to the benefit of the entire planet.

Elements of Digital Citizenship

Digital citizenship is now a component of digital citizenship, and is in fact one of the facets of Global Digital
Citizenship. Under digital citizenship, there are nine elements: digital access, digital commerce, digital
communication, digital literacy, digital etiquette, digital law, digital rights and responsibilities, digital health
and Wellness, and digital securities.

Digital access

Equal digital rights and electronic access is the starting point of digital citizenship. Digital access is
supposed to be available to all in the same manner that education is made sure by the Philippine
government to be available to all citizens. Currently, on this matter, the Republic Act 10929 was signed on
July 25, 2016 requiring all public places in the country to have free internet access. Public places in this act
covers national and local government offices, public basic education institutions, state universities and
colleges and TESDA technology institutions, public parks and barangay reading centers, public airports and
seaports, and public transport terminals. Despite this law, however, many are still deprived of internet
access and therefore deprived of some resources. To become productive citizens, we need to provide and
expand access to technology and we need to be committed that no one is denied digital access.

Digital commerce

Technology users need to understand that a large share of market is being done electronically. Nowadays
people shop through different websites and even do online transactions for banking. Many other onlime
transactions are occurring including the illegal downloading, pornography, and others thus a safe and
secure online shopping and other commercial transactions have to be done. With this, an e-commerce act
or RA 8972 was signed in July 2000. This Act aims to facilitate domestic and international dealings,
transactions, arrangements, agreements, contracts and exchanges and storage of information through the
utilization of electronic, optical and similar medium, mode, instrumentality and technology to recognize
the authenticity and reliability of electronic documents related to such activities and to promote the
universal use of electronic transaction in the government and general public.

Digital communication

It is another element of Digital Citizenship that we seem to be embracing wholeheartedly. Digital


communication is the electronic exchange of communication which includes emailing, texting, instant
messaging, utilizing cell phones, etc, As digital communication continues to grow, it is important that we
do not forget how to communicate face to face. We have to utilize digital channels of communication to
enhance our ability to communicate, but do not allow it to replace our ability to communicate.

Digital literacy

As digital citizens, it is our responsibility to develop and continually enhance our technological knowledge.
We should support and encourage the acquisition of technological knowledge by others. We should model
the positive and proactive use of technology for good causes, personal and professional growth and
education.

Digital Etiquette

This refers to the electronic standards of conduct or procedure. This is often seen as one of the most
pressing problems when dealing with Digital Citizenship. Imagine a teenager who spreads hate speech
about a classmate online. Or one who browses Facebook while attending Mass. Browsing social media
sites have become so addictive that young people tend to lose distinction between what is appropriate
and what is not. It begins with rules. It is not enough however to create rules and policies, everyone must
be taught to become responsible digital citizens.

Digital Law

Digital law refers to the electronic responsibility for actions and deeds. The digital world is so huge that
there should be order, discipline, and ethical use. Plagiarism, copyright infringement, hacking of
information, identity theft are crimes that are commonly violated by online users. As digital citizens, we
must be aware of these illegal behaviors so that we can avoid them and report those who illegally. engage
in them.

Digital Rights and Responsibilities

"For every right, there is a corresponding duty and for every privilege, there IS a corresponding
responsibility." The privileges of digital access come along with responsibility. Just as the
Philippine constitution protects us with rights of being Filipino citizens such as the right to privacy, we also
have the responsibility to be cautious in our online activities such as posting our photos and videos online.

Digital Health and Wellness

Our physical and psychological well-being in a digital technology world should be a priority. Many illnesses
have become associated with technology use such as carpal tunnel syndrome, eyestrain and childhood
obesity as an effect of children's prolonged sitting in front of the computer screen. Technology has also
posed an inherent danger of addiction and threat from online predators. Thus, children and adults alike
must learn how to protect themselves as digital citizens through education and training.

Digital Security
How to keep oneself secure in any community is a major concern. If we keep our homes safe with gates
and locks, we also need to protect the information that we provide online with privacy setting and strong
passwords. We also need to have virus protection and backups of our data. As responsible digital citizens,
we must know how to keep our data, our money, and our identity from all hazards in the digital world.

Digital citizenship is very similar to our citizenship in our immediate community. There are social, ethical
and legal issues involved in our day to day dealings with people and the surroundings. It is not just about
recognizing and dealing with online hazards. It is about building safe places and communities,
understanding how to manage personal information, and about being savvy using our online presence to
grow and shape our world in a safe, creative way, inspiring others to do the same (Blackboard, 2018). As a
global digital citizen, we need to be conscientious and compassionate; we should strive to establish a sense
of global community in all our online and offline relationships, duties and endeavors (Global Digital Citizen
Foundation).

B. Internet and Education

Internet, the most useful technology of modern times which helps us not only in our daily lives but also in
professional lives. For educational purposes, it is widely used to gather information and to do research or
add to the knowledge of various subjects.

Internet plays a very vital role in education. It is no doubt that in this modern era everyone prefers Google
for their queries, problems or doubts. Popular search engines like Google, Yahoo, etc. are the topmost
choice of people as they offer an easy and instant reach to the vast amount of information in just a few
seconds. It contains a wealth of knowledge that can be searched at any time. The internet has introduced
improvements in technology. communication, and online entertainment.

Today, it has become more important as well as a powerful tool in the world which is preferred by
everyone. Everybody needs internet for some or other purposes. Students need internet to search for
information related to exams, curriculum, results, etc. You can also follow these steps for students to
achieve success in student life.

Importance of internet in education to the students' means that it makes easier for them to research
things, and relearn the content taught in the school. People use it according to their needs and interests.

There are many benefits of the internet in the field of education. Some of these are:

1. Cost Effective and Affordable Education

One of the largest barriers to education is high cost. The Internet improves the quality of education, which
is one of the pillars of sustainable development of a nation. It provides education through Videos (like
youtube tutorial videos) and web tutorials which is affordable to everyone and cost-effective.

2. Student-Teacher and Peer Interaction

The internet has allowed students to be in constant touch with their teachers or with other fellow
classmates with the help of social media, messaging apps and chat forums. Parents can interact as well as
communicate with teachers and school authorities about their kid's performance in the school. Interaction
with the like minded people on forums can help students to explore new ideas and enrich their knowledge.

3. Effective Teaching and Learning Tool

The Internet has become a major tool for effective teaching as well as a learning tool. Teachers can use it
as a teaching tool by posting their teaching materials (notes and videos) on school website or forum. The
learning process becomes interesting and diverse with the use of tutorial videos and notes. Teachers can
teach with the use of animation, powerpoint slides, and images to capture the students' attention.

4. Easy Access to Quality Education

Students can easily access quality education materials like tutorial videos on youtube for free or pay fees
online for more quality study materials. Teachers can also make use of the internet by proving the students
with extra study material and resources such as interactive lessons, educational quiz as well as tutorials.
Teachers can record their lectures and provide it to the students for revisions which is better than reading
from notes.

5. Interaction with Digital Media

Regular use of digital media is one of the most basic parts of our lives. Digital bulletin boards save paper,
allow displaying of videos and audios to attract the attention of students. Nowadays, there are many paid
sites which provide education resources which are rich in quality and easily understandable to masses.

6. Keeping you updated with Latest Information

Information is the biggest advantage which the internet is offering. There is a huge amount of information
available for every subject. It keeps us up to date with the latest information regarding the subjects in
which we are interested.

7. Learning with Multimedia

It helps the students with the learning process as it helps to simplify the knowledge. Also, it helps to
visualize what is being taught by the teachers in school. If you want to prepare for final exams, you can
access Video Tutorials and other resources online through the Internet.

8. Bridging Communication Gaps

Classroom Internet use can also help teachers say goodbye to communication mishaps such as lost
assignment sheets and misplaced memos home to parents. Internet communication can make the
distribution of information easier, as well as increase class community and motivation. For example, having
a class blog or website can open up dialogue between teachers and students outside of school rather than
confining their interactions to the classroom. Students can download course materials and readings, chat
with other students, and share their work, while parents can receive reminders about upcoming due dates
and events.

The Internet is a boon to the people, which is used all over the world. Hence, it should be used for good
purposes. It has had a great impact on imparting education to the children. If this is used in appropriate
ways that meet children's development level, they can benefit and learn from the Internet.

C. Intellectual Property Rights Applicable to the Educational Setting: Copyright and Related Rights Copy-
right Law

Intellectual property includes literary or artistic works, inventions, business methods, industrial processes,
logos, and product designs. Nearly every activity engaged in by students, staff, and faculty in schools
involves the production or use of intellectual property; examples include lesson plans, student
assignments, speeches and lectures, videos, books, school Web sites, publications, reports, concerts, and
plays. Most items used in education are legally protected intellectual property, often owned by someone
other than the user. All members of school communities are permitted to use protected intellectual
property, but they must engage in "fair use" or get advance permission of the owners. Users must be
careful not to use intellectual property unlawfully, or they risk having to pay damages, fines, and/or court
costs. Items in the public domain, however, may be used without cost to the user or consent of the

owner.

Legal issues affecting intellectual property in education involve both creation and use of intellectual works.
Intellectual property law balances the rights of individuals to make, own, distribute, and profit from their
creations and the rights of the public to make use of knowledge and inventions. Illustrations of the law of
intellectual property in education include copyright and patent protection for the products of teaching
and scholarship, copyright and patent infringement for improper use of protected works, and trademark
licensing and protection of names, logos, symbols, and pictures used to identify schools.

By far, the most applicable category of intellectual property law in schools is copyright. Copyrights are
intangible rights granted through the federal Copyright Act to an author or creator of an original artistic or
literary work that can be fixed in a tangible means of expression such as hard copies, electronic files,
videos, or audio recordings. Copyright law protects literary, musical, dramatic, choreographic, pictorial,
sculptural, and architectural works as well as motion pictures and sound recordings. Each copyrightable
work has several "copyrights"-the exclusive rights to make copies of the work, distribute the work, prepare
derivative works, and perform or display the work publicly.

With some important exceptions, two of which are highlighted here, teachers and students may not use
the copyrighted works of others without permission of the copyright holders. The first exception, fair use,
is the most important and most often cited. The fair use of a copyrighted work, "for purposes such as
criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship,
or research, is not an infringement of copyright." If the use is fair, then the user need not obtain advance
consent from the copyright holder. Determining whether the use is fair requires the application of four
factors: purpose and character of the use, nature of the copyrighted work, amount and substantiality of
the portion used about the work as a whole, and effect of the use upon the potential market for or value
of the work. The second exception is also fairly common in schools; it is not an infringement for teachers
and students to perform or display copyrighted work in the course of face-to-face or online/distance
education teaching activities. For electronic display or performance, the school must comply with several
additional requirements.

D. Digital Safety Rules

With more users accessing the Internet through mobile devices, a lot of risks are changing and growing
quickly. Even though apps loom larger in most people's daily online interactions than traditional websites
do, that does not mean that the basic Internet safety rules have changed. Hackers are still on the lookout
for personal information they can use to access your credit card and bank information.

Unsafe surfing can also lead to other threats-from embarrassing personal comments or images that, once
online, are nearly impossible to erase, to getting mixed up with people you'd rather have had nothing to
do with.

Here are the Top 10 Internet safety rules to follow to help you avoid getting into trouble online (and
offline).

1. Keep Personal Information Professional and Limited

Potential employers or customers don't need to know your personal relationship status or your home
address. They do need to know about your expertise and professional background, and how to get in touch
with you. You wouldn't hand purely personal information out to strangers individually-don't hand it out to
millions of people online.
2. Keep Your Privacy Settings On

Marketers love to know all about you, and so do hackers. Both can learn a lot from your browsing and
social media usage. But you can take charge of your information. As noted by Lifehacker, both web
browsers and mobile operating systems have settings available to protect your privacy online. Major
websites like Facebook also have privacy-enhancing settings available. These settings are sometimes
(deliberately) hard to find because companies want your personal information for its marketing value.
Make sure you have enabled these privacy safeguards, and keep them enabled.

3. Practice Safe Browsing

You wouldn't choose to walk through a dangerous neighborhood-don't visit dangerous neighborhoods
online. Cybercriminals use lurid content as bait. They know people are sometimes tempted by dubious
content and may let their guard down when searching for it. The Internet's demimonde is filled with hard-
to-see pitfalls, where one careless click could expose personal data or infect your device with malware. By
resisting the urge, you don't even give the hackers a chance.

4. Make Sure Your Internet Connection is Secure.

Use a Secure VPN Connection when you go online in a public place, for example by using a public Wi-Fi
connection, PCMag notes you have no direct control over its security. Corporate cybersecurity experts
worry about "endpoints"-the places where a private network connects to the outside world. Your
vulnerable endpoint is your local Internet connection. Make sure your device is secure, and when in doubt,
wait for a better time (i.e., until you're able to connect to a secure Wi-Fi network) before providing
information such as your bank account number.

To further improve your Internet browsing safety, use secure VPN connection (virtual private network).
VPN enables you to have a secure connection between your device and an Internet server that no one can
monitor or access the data that you're exchanging.

5. Be Careful What You Download

A top goal of cybercriminals is to trick you into downloading malware-programs or apps that carry malware
or try to steal information. This malware can be disguised as an app: anything from a popular game to
something that checks traffic or the weather. As PCWorld advises, don't download apps that look
suspicious or come from a site you don't trust.

6. Choose Strong Passwords

Passwords are one of the biggest weak spots in the whole Internet security structure. but there's currently
no way around them. And the problem with passwords is that people tend to choose easy ones to
remember (such as "password" and "123456"), which are also easy for cyber thieves to guess. Select strong
passwords that are harder for cybercriminals to demystify. Password manager software can help you to
manage multiple passwords so that you don't forget them. A strong password is one that is unique and
complex-at least 15 characters long. mixing letters, numbers and special characters.

7. Make Online Purchases from Secure Sites

Any time you make a purchase online, you need to provide credit card or bank account information-just
what cybercriminals are most eager to get their hands on. Only supply this information to sites that provide
secure, encrypted connections. As Boston University notes, you can identify secure sites by looking for an
address that starts with https: (the S stands for secure) rather than simply http: They may also be marked
by a padlock icon next to the address bar.
8. Be Careful What You Post

The Internet does not have a delete key, as that young candidate in New Hampshire found out. Any
comment or image you post online may stay online forever because removing the original (say, from
Twitter) does not remove any copies that other people made. There is no way for you to "take back" a
remark you wish you hadn't made, or get rid of that embarrassing selfie you took at a party. Don't put
anything online that you wouldn't want your mom or a prospective employer to see.

9. Be Careful Who You Meet Online

People you meet online are not always who they claim to be. Indeed, they may not even be real. As
InfoWorld reports, fake social media profiles are a popular way for hackers to cozy up to unwary Web users
and pick their cyber pockets. Be as cautious and sensible in your online social life as you are in your in-
person social life.

10. Keep Your Antivirus Program Up to Date

Internet security software cannot protect against every threat, but it will detect and remove most
malware-though you should make sure it's to date. Be sure to stay current with your operating system's
updates and updates to applications you use. They provide a vital layer of security.

E. Cyberbullying

Cyberbullying is bullying that takes place over digital devices like cell phones, computers, and tablets.
Cyberbullying can occur through SMS, Text, and apps, or online in social media, forums, or gaming where
people can view, participate in, or share content. Cyberbullying includes sending, posting, or sharing
negative, harmful, false, or mean content about someone else. It can include sharing personal or private
information about someone else causing embarrassment or humiliation. Some cyberbullying crosses the
line into unlawful or criminal behavior.

The most common places where cyberbullying occurs are:

1. Social Media, such as Facebook, Instagram, Snapchat, and Twitter

2. SMS (Short Message Service) also known as Text Message sent through devices

3. Instant Message (via devices, email provider services, apps, and social media messaging features)

4. Email

With the prevalence of social media and digital forums, comments, photos, posts, and content shared by
individuals can often be viewed by strangers as well as acquaintances. The content an individual share
online - both their personal content as well as any negative, mean, or hurtful content-creates a kind of
permanent public record of their views, activities, and behavior. This public record can be thought of as an
online reputation, which may be accessible to schools, employers, colleges, clubs, and others who may be
researching an individual now or in the future. Cyberbullying can harm the online reputations of everyone
involved - not just the person being bullied, but those doing the bullying or participating in it. Cyberbullying
has unique concerns in that it can be:

Persistent - Digital devices offer an ability to immediately and continuously communicate 24 hours a day,
so it can be difficult for children experiencing cyberbullying to find relief.

Permanent - Most information communicated electronically is permanent and public, if not reported and
removed. A negative online reputation, including for those who bully, can impact college admissions,
employment, and other areas of life.
Hard to Notice - Because teachers and parents may not overhear or see cyberbullying taking place, it is
harder to recognize.

According to the consolidated report of Department of Education (Dep Ed), bullying cases on elementary
and high school of both private and public schools on 2014 rose by 21% or a total of 6,363 cases, compare
with the 5,236 on 2013.

Schools, however, to mitigate the effects and reduce the incidence of bullying, should comply with the
implementing Rules and Regulations of the Anti-bullying law of 2013 to address the root causes of bullying.
And the important ones, aside from the reporting requirements, are as follows:

1. Schools to have prevention program that is comprehensive, multi-faceted, and shall


involve all education stakeholders and personnel. This may contain:
a. Positive school climate/environment
b. Periodic assessment and monitoring of bullying behaviors
c. Periodic review of manual of conduct for both students and personnel, in relation to bullying
d. Activities on the issue for students, personnel and service providers
e. Personnel development
f. Coordination with LGUs and other stakeholders
g. Classroom initiatives
h. Activities involving parents
2. Schools to have intervention programs to ensure continuity of policies. These may include:
a. Activities
b. Corrective and preventive, rather than punitive, measures

3. Students have a duty to intervene to protect the victim, unless the same jeopardizes their
safety/security

4. The Child Protection Committee (CPC) established by DepEd Order 40 shall also be the Anti-Bullying
Committee

5. Composition of Committee:
a. School Head/Admin-Chair
b. Guidance Counselor/Teacher-Vice Chair
c. Rep of teachers designated by faculty
d. Rep of parents as designated by PTA
e. Rep of students, except in kinder, as designated by student council-optional for private schools
f. Rep from the community as designated by Punong Barangay, preferably from the Barangay
Council for the Protection of Children (BCPC)

6. Jurisdiction for complaints of bullying and other acts under the IRR: exclusive: DepEd or private school
and not subject to barangay settlement

7. Procedures must include:


a. Immediate responses who has personal knowledge must immediately call the attention of ANY
school personnel
b. School personnel once notified is expected to intervene:
• Stop the bullying immediately
• Remove students from harm and provide medical attention if needed
• Bring the bully to the Guidance Office or designated personnel
8. Anonymous reporting to be entertained

9. Person reporting to be afforded protection


10. Fact-finding and documentation:

Designated school official to:


• Interview parties involved separately
• Assess threat level, devise intervention strategies
• Inform parents of both parties of the steps to be taken
• Make recommendations to CPC

11. CPC to determine the intervention programs for the parties involved.

12. Schools may refer parties to trained professionals outside the school

13. Disciplinary measures must be according to nature, the gravity of the bullying, and attendant
circumstances

14. Due process must be observed

15. Community service may be a form of punishment if the same is in the rules and regulations of the
school

16. CPC supervises the intervention programs

17. On due process:

• Student and his parents to be informed IN WRITING of the complaint


• Students to be allowed to answer with the assistance of parents/guardians
• Decision of the school head shall be IN WRITING, stating the basis thereof
• The school head's decision may be appealed to the Division Office of DepEd

18. False accusations of bullying are also to be sanctioned

19. Bullying incidents are confidential and breach thereof by school personnel is likewise sanctioned

F. Netizens in Cyberspace

As defined by Merriam-Webster dictionary, NETIZEN is an active participant in the online community of


the Internet.

When we plug into the internet or cellular networks, we instantly become full-fledged members of a
worldwide community. We will have instant access to every other person who is also wandering around
in that world. Immediate access, physical distance, and the perceived anonymity of the cyber world may
cause humans no end of trouble.

To be a good cyber citizen, we need to know what that means. Citizenship is the rights, privileges, and
duties conferred on a member of society. It most often includes both protections (e.g., the Bill of Rights)
and duties (e.g., obeying the law, and contributing to the community). Cyber citizenship is the rights,
privileges, and responsibilities required of internet and cellular network users.

A. Cyber Rights

Cyber citizenship is based on the general concept of citizenship but differs in a couple of ways. First, there
are no real "rights" you have as a cyber citizen other than the legal protections you already have as an
actual citizen. Moreover, some of those are not available due to the global nature of the cyber world.
Nevertheless, every citizen of the cyber world should have the right to respect, privacy and their own
opinion. We have the right to privacy.

While the cyber world does not have a bill of constitutionally protected rights, we should still be required
to respect certain unalienable rights:

• Life: Right for fair and reasonable treatment online. In the cyber world, the right to life is primarily
about being treated in a civil and respectful manner. This means interacting with people in a
considerate, tolerant and appropriate way. This right also includes freedom from threats to life or
person-hood.
• Liberty: Right to basic freedoms. Respect for online freedom should be similar to those enshrined
by our constitution, especially the Bill of Rights. We should respect and expect privacy, safety and
equal treatment regardless of sex, religion or sexual orientation. We should also honor other's
property.
• Pursuit of Happiness: Right to explore personal interests without undue interference.

B. Cyber Privileges

It is a privilege to have access to the internet. It is a privilege to have the technology that allows us access
to the internet and cellular networks.

C. Cyber Responsibilities

It is a privilege to have access to the internet. It is a privilege to have the technology that allows us access
to the internet and cellular networks.

Responsibility is really at the heart of cyber citizenship. To be responsible, we need to be informed about
the cyber world. We also need to know about how to remain safe and protect ourselves online. Another
area of responsibility is to obey the law and we are responsible for being considerate and well-mannered
citizens.

Cyber citizenship is probably more accurately characterized as civil behavior. There are certain ways
civilized human beings should behave toward others.

D. Laws

The most important area of respect we should demonstrate as a cyber citizen is for the law. There are
several legal issues related to online activity. The first is intellectual property rights. This includes the
written word, ideas, and products like music. If you download music without paying for it, you have
violated the property rights of the artist.

E. Cyber Stalking

Another area that has legal protections is cyber harassment and bullying or cyberstalking. Threatening,
harassing, or intimidating someone through electronic means violates that person's right to be free from
harassment.

Pornography also is regulated by law. For the most part that means ensuring that it is not child
pornography. Most other forms of pornography occupy a grey area that is in part protected as free speech
and in part, whether it violates community standards of decency. This pretty much means it is unregulated.
A more recent aspect of pornography is what has been called revenge porn. For people over 18, a slimy
former partner or, as likely, someone who has hacked your kid's account, may provide nude images to sites
that solicit this kind of material. It can be done without the consent of the person in the images.
Making creating a false website under another person's name and otherwise using their personally
identifying information is both a state crime.

G. Cyber Crimes

So, here is a summary of things that are against the law:

• Copyright infringement
• Plagiarism
• Downloading songs you didn't purchase
• Profiting from others' creative efforts or products
• Bullying and harassment
• Child pornography (including sexting)
• Internet stalking
• Identity theft

H. Cyber Identity

There are a range of ways we can be identified and recognized online. It starts with the online names we
use for various accounts as well as our online addresses (e.g., email, texting number, social media
accounts, etc.). Then, there are the more traditional forms of identity such as name, hometown, school
they attend, home address, or phone number. We may also be identified by their date of birth and social
security number. Each computer or device that accesses the internet or cellular network has a unique IP
address that can be used to identify that device (and potentially the user of that device). Finally, we can
also establish a cyber identity through credit and debit card numbers used to make online purchases.

I. Cyber Foot-printing

Every time we go online or transmit anything over a cellular network, we leave a trace of that activity. This
is known as a cyber footprint. There are generally two kinds of cyber footprints. The first is an intentional
footprint; things they have knowingly posted or entered online. Consider this something like putting your
shoe prints in wet cement that dries into a permanent trail. Intentional footprints include things like:

• Photos
• Videos (e.g. Youtube, Vimeo, Vine, Skype, Facetime)
• Texting
• Social media accounts (e.g., Facebook, Twitter, Snapchat, Chatroulette, blogs like Tumblr)
• Comments posted on other sites
• Emails
• Tagged photos on other user accounts
• Apps (e.g., Pinterest, Snapchat, Instagram, Zoom, Tiktok)
• Purchases and other transactions

Then, there are unintentional footprints we leave in cyberspace. Unintentional footprints include such
things as cookies, search engine metrics, and social media tracking.

J. Cyber Property

Anything that is posted online automatically becomes the copyright-protected product of the creator. This
includes music, photos, videos and written material.
Example:

The creator of these products doesn't have to formally register them with the US Office of Copyrights or
with the United States Patent and Trademarks Office. Use of these products, particularly for monetary
gain, requires permission of the copyright owner.

K. Relational Aggression

The internet and cellular networks can be used to express frustration, anger, and cruelty to other people.
The most common form of relational aggression is represented by insensitive comments, crude and
awkward remarks, or attempts at playful humor. The inability to read the nonverbal social cues when
making or receiving playfully insulting or sarcastic remarks can result in misunderstandings about the real
intent of the remarks or the reactions of the recipient.

Cyber communication can also be used to intentionally bully, intimidate, harass, or threaten other people.
Through speaking directly online to another person or by using social networks to speak about another
person, the internet provides another forum for the age-old attempts to be mean and cruel to another
person. It is also a means through which someone can act to harm another person by sending malicious
programs to damage their hardware or software. It is possible to steal content from someone's computer
that can be used to try to embarrass or humiliate them. And, most disturbingly, it is possible to use
technology to create false images and information that is then attributed to the target of the aggression.

L. Netiquette

Netiquette is short for "Internet etiquette." Just like etiquette is a code of polite behavior in society,
netiquette is a code of good behavior on the Internet. This includes several aspects of the Internet, such
as email, social media, online chat, web forums, website comments, multiplayer gaming, and other types
of online communication.

While there is no official list of netiquette rules or guidelines, the general idea is to respect others online.
Below are ten examples of rules to follow for good netiquette:

1. Avoid posting inflammatory or offensive comments online (a.k.a flaming).

2. Respect others' privacy by not sharing personal information, photos, or videos that another person may
not want published online.

3. Never spam others by sending large amounts of unsolicited email.

4. Show good sportsmanship when playing online games, whether you win or lose.

5. Don't troll people in web forums or website comments by repeatedly nagging or annoying them.

6. Stick to the topic when posting in online forums or when commenting on photos or videos, such as
YouTube or Facebook comments.

7. Don't swear or use offensive language.

8. Avoid replying to negative comments with more negative comments. Instead, break the cycle with a
positive post.

9. If someone asks a question and you know the answer, offer to help.

10. Thank others who help you online.


The Internet provides a sense of anonymity since you often do not see or hear the people with whom you
are communicating online. But that is not an excuse for having poor manners or posting incendiary
comments. While some users may feel like they can hide behind their keyboard or smartphone when
posting online, the fact is they are still the ones publishing the content. Remember - if you post offensive
remarks online and the veil of anonymity is lifted, you will have to answer for the comments you made.

In summary, good netiquette benefits both you and others on the Internet. Posting a positive comment
rather than a negative one just might make someone's day.

M. Educational Sites and Portals

Educational websites can include websites that have games, videos or topic related resources that act as
tools to enhance learning and supplement classroom teaching. These websites help make the process of
learning entertaining and attractive to the student, especially in today's age.

While there are many advantages of such websites, we also need to be aware of the negatives. Students
need to be guided properly. Without proper guidance, students may find resources and content that are
not reliable or do not align with the direction of the teaching in class. Some websites are huge and offer a
massive variety of games and resources. Students may be easily distracted on such websites and end up
spending time on activities that are either below their level or do not complement or add to the classroom
teaching. Unrestricted access and freedom on the internet can be dangerous, especially for younger
students.

Here are some examples of educational websites:

1. EdX: edx.org...

2. Academic Earth: academicearth.org....

3. Internet Archive: archive.org....

4. Big Think: bigthink.com....

5. Coursera: courser.org....

6. Brightstorm: brightstorm.com....

7. CosmoLearning: cosmolearning.com....

8. Futures Channel: thefutureschannel.com.

You might also like