0% found this document useful (0 votes)
31 views15 pages

Group9 Lesson Paln - Educ204

The document discusses social, ethical, and legal responsibilities in using technology tools and resources. It defines digital citizenship and outlines nine themes of digital citizenship including digital access, commerce, communication, literacy, etiquette, health and welfare, law, rights and responsibilities, and security and privacy. The document also discusses intellectual property rights that apply in educational settings under Philippine law.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views15 pages

Group9 Lesson Paln - Educ204

The document discusses social, ethical, and legal responsibilities in using technology tools and resources. It defines digital citizenship and outlines nine themes of digital citizenship including digital access, commerce, communication, literacy, etiquette, health and welfare, law, rights and responsibilities, and security and privacy. The document also discusses intellectual property rights that apply in educational settings under Philippine law.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Republic of the Philippines

Tarlac State University


College of Teacher Education
Lucinda Campus, Tarlac City
Tel. no (045) 4930182; Fax No. (045)982-0110

Lesson Plan in Educ 204: Technology for Teaching and Learning

SOCIAL, ETHICAL AND LEGAL


RESPONSIBILITIES IN THE USE
OF TECHNOLOGY TOOLS AND
RESOURCES
Prepared by:
Furio, Jerome P.
Benito, Carl Jeo T.
Lulu, Chinee N.
Lopez, Sherly V.
BSED-Sciences 2A

Submitted to:
Jeith Ruelson Parazo
Instructor

February 2023
I. Objectives
a. Describe the learning community as citizens who share and use digital materials.
b. Practice standard netiquette in sharing and utilizing shared materials among learning
communities.
c. Identify examples of Intellectual Property Right in educational setting; and
d. Show, give examples, and observe social, ethical, and legal responsibility in the use of
technology tools and resources.
II. Introduction
The internet is the most useful technological advancement of our time, assisting us both
personally and professionally. It is frequently used in education to collect data, conduct research,
and increase knowledge in a variety of fields. The internet is extremely useful for education.
Without a doubt, everyone in the modern era prefers Google for answers to their questions,
problems, or uncertainties. People frequently use popular search engines such as Google, Yahoo,
and others because they offer quick and simple access to a wealth of information. It contains a
wealth of information that can be accessed at any time.
Today, it is a powerful tool in the world, and it is preferred by everyone. Everyone requires
the internet for one reason or another. Students require the internet to search for information about
exams, curriculum, and results, among other things.
Our lives have become increasingly reliant on technology. Regardless of how we feel about
it, it has had a significant impact. We are more prone to safety problems now. Our personal space
may be invaded. Our social interactions may be impacted. However, keeping oneself safe is not
enough; we also need to know how to act responsibly so as not to hurt other people.

III. Content

Preparatory Activity
Jumbled Letters
MECHANICS: The presenter will flash different words in scrambled form and the students will
unscramble the letters to form the correct word.
1. PIHTCYGOR – COPYRIGHT
2. IPNOBTRLSEIIISSE – RESPONSIBILITIES
3. EBCYR LGLBINUY – CYBER BULLYING
4. ETQTETUNIE – NETIQUETTE
5. ATDGLII PHSIIICZTNE -DIGITAL CITIZENSHIP
Digital Citizenship defined as engaging in
appropriate and responsible behavior when using
technology. It encompasses digital literacy, ethics,
etiquette, online safety, norms, rights, culture and more.
Digital Citizenship is a concept which helps us
understand what all technology users should know to use
technology appropriately and responsibly. A digital
citizen is one who knows what is right and wrong,
exhibits intelligent technology behavior, and makes
good choices when using technology.

NINE THEMES OF DIGITAL CITIZENSHIP


1. Digital Access
Even though we live in a digital age, not
everyone has access to technology. As educators, we
must be aware of the digital divide. Not every student
has the means to purchase a computer, a smartphone, or
Internet access. As a result, educators must provide
appropriate alternatives for each student's needs.

2. Digital Commerce
Digital commerce emphasizes the importance
of addressing security concerns associated with using
money in the virtual world. Technology is also used in
the teaching to educate students on the various career
paths available to them in the future. Understanding
how e-commerce works is essential for consumers and
potential entrepreneurs alike.
3. Digital Communication and Collaboration
Online communication has become so common
that students forget they are doing so in a virtual space,
where miscommunication happens often. The Internet
has given a voice to anyone who needs it. In turn, this
requires empathy and appropriate reactions from its
users.

4. Digital Literacy/Digital Fluency


This includes the ability to distinguish
between real and fake content, which can have a
negative impact on your students' lives. They must
learn which content is beneficial to them and which
they should avoid living a balanced life.

5. Digital etiquette
Influences student’s online behavior so that they respond
positively to online content. In this way, their online attitude
reflects their offline attitude and vice versa.

6. Digital Health and Welfare


Our physical and psychological wellbeing in a
digital technology world should be a priority. Many
illnesses have become associated with technology
use such as carpal tunnel syndrome, eyestrain and
childhood obesity as an effect of children's prolonged
sitting in front of the computer screen. Technology has also
posed an inherent danger of addiction and threat from
online predators. Thus, children and adults alike must learn
how to protect themselves as digital citizens through
education and training.
7. Digital Law
It addresses the legal rights and constraints that
govern technology use. To prevent any type of online
crime, no matter how serious, students must first
understand the law and how it applies to them specifically.

8. Digital Rights and Responsibility


The online world has its own set of rules, and
each user has certain rights and responsibilities. The
Internet can also be used for malicious purposes, and
anyone needs to be protected from cyberbullying, for
instance. Schools should address this issue in the
classroom, hold students accountable for their actions,
and report any inappropriate behavior in the virtual
environment.

9. Digital security and Privacy


security is important in the online world.
Students should be aware of potential malware
attacks when using devices at school or at home.
Teachers should explain how to avoid them and
protect their students' devices as much as possible.

SOCIAL, ETHICAL AND LEGAL RESPONSIBILITIES IN THE USE OF


TECHNOLOGY TOOLS AND RESOURCES BY TEACHERS
How to Address Technology Related Ethical Issues?

TECH SMART

Take care of technology equipment


Explore appropriate and safe sites for learning and research
Copyright law, Fair Use Act and Creative Commons matter
Help prevent cyberbullying

Self-image is important.
Make use of netiquette
Always give credit to original source
Remember to be effective, thoughtful and ethical digital creators
Think

Intellectual Property Rights Applicable to the Educational Setting


Related Rights
 Republic Act No. 8293 “Intellectual Property Code of the Philippines”
 An act prescribing the intellectual property code and establishing the intellectual property
office, providing for its powers and functions, and for other purposes
Parts of the law:
The Intellectual Property Code of the Philippines is divided into five [5] parts, to wit:
PART I - The Intellectual Property Office
PART II - The Law on Patents
PART III - The Law on Trademarks, Service Marks and Trade Names
PART IV - The Law on Copyright
PART V - Final Provisions

Intellectual Property
Intellectual property or IP refers to a creation of the mind. This means everything the
human mind is capable of making—including literary and artistic works, inventions, designs,
music, dances, and plays—are all IPs. IP is thus a valuable concept that involves every aspect of
the University’s roles: teaching, research, and extension work.
An IP right or IPR is the legal right of a creator or innovator to be recognized and to benefit
from their work, and is obtained through registration of the IP at the IP Office. Depending on the
type of IP involved, the IPR may come in the form of copyright, patent, utility model, industrial
design, trademark, layout-design of integrated circuits, geographical indication, or trade secret.
Registering IP and knowing one’s rights is important in order for an IP owner to share their ideas
to the public while protecting their own interests.
 Patents are exclusive rights granted for an invention, which could be a new product,
process, or a technical solution to a problem. Once an inventor is granted a patent, they
have the exclusive right to make, use, and sell the innovation for 20 years after the
application filing date. There are three types of patents you can file for: utility patent,
design patent, plant patent
 Copyrights pertain to the rights a creator has for creative work. Some of the types of
creative works covered by copyright are books, music, art, films, computer programs,
databases, ads, and technical drawings. While it may be wise to register a copyright,
creative works are automatically protected as soon as they are “fixed in a tangible
medium.”
Copyright is the form of IP most commonly created and/or used in the Department and
schools. Examples of material protected by IP or copyright that school staff might
encounter include: curriculum material, text books and other teaching resources, software
and apps, films, videos and podcasts.
Dual Roles of Multimedia & Web Developers
o Copyright User: You have the responsibility to ensure that you have rights to use
all copyrighted works you incorporate into your own materials.
o Copyright Owner: You should ensure proper protection of your own rights in the
original works you create.
Copyright Protection?
The Copyright Act provides a bundle of rights that protect the owner’s expression
of original ideas created and fixed in a tangible medium. The Act does NOT protect the
facts contained within the work or the ideas themselves. Copyright Infringement consists
in infringing any right secured or protected under the code. It may also consist in aiding or
abetting such infringement.
What Are the Owner’s Rights?
Copyright protects the owner’s exclusive rights to . . .
o reproduce
o prepare derivative works
o distribute/sell
o display
o perform
o license
. . . an original or derivative work created and fixed in a tangible medium of expression.
What Can Be Copyrighted?
o literary works
o musical works
o dramatic works, including any accompanying music
o pantomimes and choreographic works
o pictorial, graphic, and sculptural works
o motion pictures and other audiovisual works
o sound recordings
o architectural works
o . . . including web pages and multimedia works and their incorporated materials,
such as lecture notes, course materials, outlines, papers, assignments, practice problems,
forms, etc.
Who Owns the Copyright?
A copyright owner is usually any author who contributes original expression to a
work.
Under current University policy, ownership of copyrighted works created by
university employees depends on the nature of the work and the category of employment.
 Trademarks are distinctive marks which communicate an individual or business’s
offerings. Drawings, symbols, phrases, numbers and words can be trademarked. It can be
protected by registration. Registration gives the owner the exclusive right to use the mark
and to prevent others from using the same r similar marks.
 Industrial design is the ornamental or esthetic aspect of an article. The design my consist
of three-dimensional features, such as the shape or the surface of n article, or of two-
dimensional features, such as patterns, lines, and colors.
 Geographical indications and appellations of origin are signs used on goods that have a
specific geographical origin and possess qualities, a reputation or characteristics that are
essentially attributable to that place of origin. Most commonly, a geographical indication
includes the name of the place of origin of the goods.
 Trade secrets are IP rights on confidential information which may be sold or licensed. The
unauthorized acquisition, use or disclosure of such secret information in a manner contrary
to honest commercial practices by others is regarded as an unfair practice and a violation
of the trade secret protection.

IP Principles
Schools must manage and use IP, including copyright, in line with the following principles.
1. The Department makes its IP available with the fewest possible restrictions.
2. The Department owns the IP created by its employees in the course of their work.
3. The Department appropriately manages IP belonging to others.
4. IP is managed in Departmental procurement, contracts, and shared funding agreements.
5. The Department does not ordinarily commercialize its IP.
6. Departmental employees must not commercialize Departmental IP for their own purposes.
7. IP should be identified and recorded appropriately.

DIGITAL SAFETY RULES


Millions of individuals have become victims of cybercrime as more people access the
internet through the use of different devices. With increasing reliance on technology, it is crucial
to enhance our online security measures. But what are the security precautions do you take to
protect yourself from possible cybercrime? Well, similar to how you lock your door to secure your
house, use a bike lock to prevent theft of your bicycle, and store valuables in a safe, we have some
digital rules to help keep you safe online.

1. Keep passwords secure and private


Use strong and unique passwords, and don't share them with anyone. A
passwords with at least 12 characters that include letters, numbers, and
symbols are the most secure. Don’t use password that are too much relate
to you because people who really know you might guess it easily. You can
phrases that are easy to remember like “Stayingsafeonline123”.

2. Be cautious of online scams:


Watch out for suspicious emails, messages, or phone calls, and don't click on
links or download attachments from unknown sources. The most common
online scam was the “phishing”. Email phishing scams typically include
enticing offers for gift cards or other free items. These types of scams are
evolving as scammers try to come up with new ways to take advantage of
people. Stay vigilant, don’t click on suspicious links.

3. Limit personal information online


Don't share sensitive information such as your full name, address, phone
number, or financial information online. The world does not need to know
everything about you. Also never enter your financial information on a
website that isn’t secure.

4. Use privacy settings


Adjust the privacy settings on your social media accounts to limit who can see
your posts and personal information. A hacker can learn about you by just
browsing on your social media account. However, major websites or platform
like Facebook also have privacy-enhancing settings available. Make sure you
have enabled privacy safeguards and keep them enabled to protect your privacy
online.
5. Be mindful of what you post
Think before you post, and avoid posting anything that could be harmful or
offensive to others because the Internet does not always have a delete key.
Any comment or image you post online may stay online forever. It basically
means that, there is no way for you to "take back" a remark you wish you
hadn't made. With that, don't put anything online that you wouldn't want your
mom or a prospective employer to see.

6. Be respectful online
Treat others with respect and avoid engaging in cyberbullying or hate
speech. By being a jerk to others in online, you become part of the
problem. You’re better than that – do not stoop to that level. Instead,
aim higher and be an example to others.

7. Keep software and devices updated


Regularly update your devices and software to fix security vulnerabilities. Internet
security software cannot protect against every threat, but it will detect and remove
most malware. So it is important that you make sure that they are up to date, because
these software provide a vital layer of security. You can set up an automatic updates
on your devices you never miss one.

8. Use secure connections


Use encrypted connections or virtual private networks (VPNs) when
accessing the internet in public places. VPN enables you to have a
secure connection between your device and an Internet server that no
one can monitor or access the data that you’re exchanging.

9. Be careful who you meet online


People you meet online are not always who they claim to be. Indeed, they may not
even be real. Fake social media profiles are a popular way for hackers to cozy up
to unwary Web users and pick their cyber pockets. Be as cautious and sensible in
your online social life as you are in your in-person social life.

10. Educate yourself


Stay informed about the latest digital safety tips and issues to better
protect yourself and your information. The internet is a powerful,
useful tool, but in the same way that you shouldn’t drive without
buckling your seat belt or ride a bike without a helmet, you shouldn’t
venture online without taking some basic precautions.
CYBER BULLYING
is bullying that takes place over digital devices like cell phones, computers, and tablets.

The most common places where cyber bullying occurs are:


- Social Media, such as Facebook, Instagram, and Tik Tok
- Text messaging and messaging apps on mobile or tablet devices
- Instant messaging, direct messaging, and online chatting over the internet
- Online gaming communities

What to do when cyber bullying happens?


1. Notice- Recognize if there has been a change in mood or behavior and explore what the
cause might be. Try to determine if these changes happen around a child’s use of their digital
devices.
2. Talk- Ask questions to learn what is happening, how it started, and who is involved.
3. Document- Keep a record of what is happening and where. Take screenshots of harmful
posts or content if possible.
4. Report –Most social media platforms and schools have clear policies and reporting
processes. If a classmate is cyberbullying, report it the school.
5. Support- Peers, mentors, and trusted adults can sometimes intervene publicly to
positively influence a situation where negative or hurtful content posts about a child.

TIPS FOR KID, TEENS, AND YOUNG ADULTS


- Know that it’s not your fault.
- Don’t respond or retaliate.
- Save the evidence.
- Tell the person to stop.
- Reach out for help.
- Use available tech tools.
- Protect your accounts.
- If someone you know is being bullied take action.

CYBER RIGHTS
Respect the following:
Life- Right for fair and reasonable treatment online
Liberty- Right to basic freedom
Pursuit of happiness- Rights to explore personal interests without undue interference

COMMON CYBER CRIMES


- Copyright infringement
- Plagiarism
- Downloading songs you didn’t purchase
- Profiting from others creative efforts or products
- Bullying and harassment
- Child pornography
- Internet stalking
- Identity theft

NETIQUETTE
RULE 1: REMEMBER THE HUMAN
Before you press "send" or "submit," ask yourself, "Would I be okay with this if someone else
had written it?"
RULE 2: ADHERE TO THE SAME STANDARDS OF THE BEHAVIOUR ONLINE
THAT YOU FOLLOW IN REAL LIFE
You should do your best to act within the laws and ethical manners of society whenever you
inhabit "cyberspace."
RULE 3: KNOW WHERE YOU ARE IN CYBERSPACE
Depending on where you are in the virtual world, the same written communication can be
acceptable in one area, where it might be considered inappropriate in another.
RULE 4: RESPECT OTHER PEOPLE’S TIME AND BANDWIDTH
Electronic communication takes time: time to read and time in which to respond.
RULE 5: MAKE YOURSELF LOOK GOOD ONLINE
- Always check for spelling and grammar errors
- Know what you're talking about and state it clearly.
- Be pleasant and polite.
RULE 6: SHARE EXPERT KNOWLEDGE
The Internet offers its users many benefits; one is the ease in which information can be shared or
accessed and in fact, this "information sharing" capability is one of the reasons the Internet was
founded.
RULE 7: HELP KEEP FLAME WARS UNDER CONTROL
What is meant by "flaming" and "flame wars?" "Flaming is what people do when they express a
strongly held opinion without holding back any emotion." (Shea, 1994).
RULE 8: RESPECT OTHER PEOPLES PRIVACY
Depending on what you are reading in the virtual world, be it an online class discussion forum,
Facebook page, or an email, you may be exposed to some private or personal information that
needs to be handled with care.
RULE 9: DON’T ABUSE YOUR POWER
- Just like in face-to-face situations, there are people in cyberspace who have more
"power" than others.
- They have more expertise in technology, or they have years of experience in a particular
skill or subject matter.
- Think of Rule 1: Remember the human.
RULE 10: BE FORGIVING OF OTHER PEOPLE’S MISTAKES
- Not everyone has the same amount of experience working in the virtual world.
- And not everyone knows the rules of netiquette.

Conclusion
The world today, we can’t live without technology, in classroom or doing assignments, we
use the internet to study, and we rely in Google to answer our assignments or activities. In everyday
lives we use internet and social media to communicate with our love ones and as well as gathering
information like news. But we must remember the netiquettes in using technology, we must respect
each other virtually just like we respect them personally. Enjoying the internet has limitless
possibilities, but there are many guidelines in place that will keep you safe. Respecting and abiding
by these guidelines will ensure you avoid danger and remain sensitive to your peers.

Evaluation
1. To recognize if there has been a change in mood or behavior and explore what the cause
might be. Try to determine if these changes happen around a child’s use of their digital
devices.
a. Document
b. Notice
c. Support
d. Report
2. Refers to a creation of the mind. This means everything the human mind is capable of
making—including literary and artistic works, inventions, designs, music, dances, and
plays.
a. Indigenous Peoples
b. Cyber Bullying
c. Intellectual Property
d. Netiquette
3. Most social media platforms and schools have clear policies and reporting processes.
a. Talk
b. Support
c. Report
d. Notice
4. This includes the ability to distinguish between real and fake content, which can have a
negative impact on your students' lives.
a. Digital Literacy
b. Technology Literacy
c. Cyber Literacy
d. Digital etiquette
5. ___________ emphasizes the importance of addressing security concerns associated with
using money in the virtual world. Technology is also used in the teaching to educate
students on the various career paths available to them in the future. Understanding how e-
commerce works is essential for consumers and potential entrepreneurs alike.
a. TECH SMART
b. Digital Literacy
c. Digital Citizenship
d. Digital Commerce
6-10. Give at least 5 common cyber crimes.
Citations
Technological Learning 1- Module 7 Lessons. (2020). Studocu; Studocu.
https://www.studocu.com/ph/document/pangasinan-state-university/bachelor-of-elementary-
education/technological-learning-1-module-7-lessons/21816441?origin=home-recent-3
Affairs (ASPA), A. S. for P. (2019, September 24). Tips for Teachers. StopBullying.gov.
https://www.stopbullying.gov/cyberbullying/tips-for-teachers
Alliance, N. C. (2022, May 26). Online Safety Basics. National Cybersecurity Alliance. Retrieved
from https://staysafeonline.org/resources/online-safety-basics/
Kaspersky. (2019). Top 10 Internet Safety Rules & What Not to Do Online. Kaspersky; Kaspersky.
Retrieved from https://usa.kaspersky.com/resource-center/preemptive-safety/top-10-internet-
safety-rules-and-what-not-to-do-online
Preventing Cyberbullying - Top Ten Tips for Parents. (2018, June 1). Cyberbullying Research
Center. Retrieved from https://cyberbullying.org/preventing-cyberbullying-top-ten-tips-for-teens
Admin, 20MM. (2020, July 30). Intellectual Property Education Rights for Students. Michelson
IP. https://michelsonip.com/three-things-student-innovators-should-know-about-ip/
Copyright Law in the Educational Setting | Office of Legal Affairs | UNC Charlotte. (n.d.).
Legal.charlotte.edu. https://legal.charlotte.edu/legal-topics/copyright-law-links-and-
resources/copyright-law-educational-setting
Intellectual Property - University of the Philippines Diliman. (2021, November 25). University of
the Philippines Diliman. https://upd.edu.ph/research/intellectual-property/
INTELLECTUAL PROPERTY CODE OF THE PHILIPPINES - AN OVERVIEW. (n.d.).
Chanrobles.com. Retrieved February 8, 2023, from https://chanrobles.com/legal7code.htm#.Y-
Od-nZBzIW
Polytechnic University of the Philippines. (2014, February 23). Intellectual property right.
Slideshare. https://www.slideshare.net/acaciakulitcanary/intellectual-property-right-31535689

You might also like