Module 7 Social Ethical and Legal Responsibilities
Module 7 Social Ethical and Legal Responsibilities
BARROGA
MODULE 7
Social, Ethical and Legal Responsibilities
in the Use of Technology Tools and
Resources
At the end of this module 7, make a photo essay on Globally Effective and Globally Competent
Digital Teacher.
ENGAGEMENT
This is the first phase of your module you engage yourself with activity that clarifies about social,
ethical use of technology tools and resources. So, I want you to focus so that you can accomplish the
given learning activity below.
Write your prior knowledge about Social, Ethical and Legal Responsibilities in
the Use of Technology Tools and Resources.
EXPLORE
As Internet User
As Filipino Citizen
Look at your answers. Did you have similar answers in both figures? If yes, write them in the center
of the Venn diagram. Explain your answer.
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
EXPLAIN
In this phase of your module you are going to clarify and filter the Information that you have
gathered in your learning activities about social, ethical use of technology tools and resources.
Smile and relax! And enjoy reading the content of this module.
Since we are considered citizens of the community we live in, then as users of the internet we
can also call ourselves as citizens of the digital world where we live learn, and work in an
interconnected manner. Digital citizenship is an idea that all persons using the internet have civic
rights and responsibilities. It centers around safe, savvy/ know how and ethical use of technology.
9. Proactively promotes their own physical and 9. Proactively limits health risks of technology, from
mental health. physical to psychological
A digital citizen is a person using information technology in
Source: https://elearninginfographics.com/citizenship-digital-age-infographic/
order to engage in society, politics, and government.
As defined by Karen Mossberger, one of the authors of
PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1 Digital Citizenship: The Internet, Society, and Participation,
digital citizens are "those who use the internet regularly
and effectively." Wikipedia
DR. JEAN RACHEL A. BARROGA
Summing up, a global citizen sees the world as a community in which all people live and
prosper together. He/she understands that his/her actions contribute to the values of the entire planet
and he/she is concerned on how he/she participates in and contributes to the entire world. A digital
citizen, on the other hand, adheres to guidelines that govern the ethical and responsible use of
technology and acts responsibly in all relationships and interactions in the digital world.
When we mix these two together, it's the perfect recipe for the Global Digital Citizen. A
global digital citizen is a responsible, ethical citizen leveraging technology to foster community on a
global scale through connection and compassion. The Global Digital Citizen understands that we can
govern technology for the benefit of both ourselves and others. It is a citizen that views the world as
an interconnected community. Additionally, the digital citizen realizes that we simultaneously share
technological and human experiences regardless of culture, status, or political religious beliefs
(Watanabe-Crockett, 2017).
Technology users need to be aware of and support electronic access for all to create a
foundation for Digital Citizenship.
Digital exclusion of any kind does not enhance the growth of users in an electronic
society.
All people should have fair access to technology no matter who they are.
Places or organizations with limited connectivity need to be addressed as well.
To become productive citizens, we need to be committed to equal digital access.
Scenario
Scenario
The students in a fifth-grade science class have been given the task of watching a 20-
minute Discovery Education streaming movie for homework. They have one week in
which they are to watch the on-line movie and take the on-line quiz.
Inappropriate Appropriate
The students have been told that they will The teacher gives the assignment that all
receive a “zero” if they do not watch the students are to view the movie and take
movie and take the quiz at home, even the quiz. For students who do not have the
though some students do not have Internet appropriate Internet connections at home,
he offers the opportunity for them to come
access, and some students who do have
to his classroom 30 minutes before school
Internet access, have a dial-up connection. starts, or come to his classroom after
school, or take home a CD with the movie
and a printed quiz so they may complete
the assignment.
What could make a Difference
Technology users need to understand that a large share of market economy is being done
electronically.
Legitimate and legal exchanges are occurring, but the buyer or seller need to be aware of the
issues associated with it.
The mainstream availability of Internet purchases of toys, clothing, cars, food, etc. has
become commonplace to many users.
At the same time, an equal amount of illegal/immoral goods and services are surfacing such as
pornography and gambling. Users need to learn about how to be effective consumers in a new
digital economy.
Scenario
Melissa, who recently celebrated her 15 th birthday, received an $1000 check from her
rich grandmother. She deposited the check in her bank account for which she has a debit
card. Melissa’s home internet connection is temporarily down, so she rides with her older
sister to the local public library to use the computer there. While on the eBay site, she sees
that they have just what she wants – a brand new Wii for only $10.00!
Inappropriate Appropriate
Excitedly, Melissa takes her debit card Melissa realizes that a new Wii could
and bids on the item. She has watched her not possibly sell for $10.00. She looks
father do this before and knows just what at other Wii’s that are listed on eBay
to do. She wants to make sure she is the and sees that the winning bids have
highest bidder so she quickly enters her averaged around $275. She really wants
debit card information and selects $300 as the Wii but is uncomfortable putting her
her maximum bid. She doesn’t log off as debit card information online to
she leaves the library computer. purchase something for which she is
unsure of the final price. She logs off
the library computer and goes home.
Melissa would do well to go to a store that sells retail Nintendo products such as the Wii. She
will know the exact price of the new product she is purchasing plus she will have a receipt in
order to return it if it does not work properly. Her parents and teachers would do well to advise
her to be careful where she uses her debit card as that card is the “key” to her checking
account funds.
One of the significant changes within the digital revolution is a person’s ability to
communicate with other people.
In the 19th century, forms of communication were limited.
In the 21st century, communication options have exploded to offer a wide variety of choices
(e.g., e-mail, cellular phones, instant messaging).
The expanding digital communication options have changed everything because people are
able to keep in constant communication with anyone else.
Now everyone has the opportunity to communicate and collaborate with anyone from
anywhere and anytime.
Unfortunately, many users have not been taught how to make appropriate decisions when
faced with so many different digital communication options.
Scenario
Parents of students in Ms. Parker’s sixth grade class were terrified earlier in the school year
when they learned there was an armed intruder at the middle school. Since that incident,
almost all of the students in the sixth grade, at the direction of their parents, now bring cell
phones to school in order to be able to contact parents in case of any future emergency.
Inappropriate Appropriate
The students are delighted to finally have Mrs. Parker discusses with the students the
their own cell phones. They set their cell phone issue. While she understands their
“interesting” ring tones on loud rather than parents’ wishes that they have a phone, she
setting the phone to vibrate or turning it off. reminds them that they are only to be used
Whenever possible, they take the phones out for emergency purposes and that they will be
and use them to text messages to their confiscated if they are out of backpacks or if
classmates in and out of Mrs. Parker’s class. the ring tone is audible. She also tells them
They also take unflattering photos of Mrs. that her principal has requested that all
Parker behind her back and send them to teachers follow the same rules with their own
classmates as well. cell phones.
All of these students actually have a mini-computer in their possession. Imagine how things would
change if Mrs. Parker started using the cell phones as classroom technology tools. Students could
text their grammar sentences to her. Students could use the video options to record each other
rehearsing speeches and then review the videos to critique themselves. Students could use the
calculator functions during the math period. Students could make photo documentation of science
experiments.
4. Digital Literacy: Process of teaching and learning about technology and the use of technology.
The capability to use digital technology and knowing when and how to use it
While schools have made great progress in the area of technology infusion, much remains to be
done.
A renewed focus must be made on what technologies must be taught as well as how it should be
used. New technologies are finding their way into the work place that are not being used in schools
(e.g., videoconferencing, online sharing spaces such as wikis).
This process requires sophisticated searching and processing skills (i.e., information literacy).
Learners must be taught how to learn in a digital society.
As new technologies emerge, learners need to learn how to use that technology quickly and
appropriately.
Digital Citizenship involves educating people in a new way— these individuals need a high degree
of information literacy skills.
Scenario
The students in Ms. Rubin’s class have been assigned to do a report on an endangered species.
Ellen does a Google search for endangered species and comes across an article on the “Pacific
Northwest Tree Octopus.” She has never heard of this animal and is excited to learn about it.
Based on this one website, she chooses her research topic
Inappropriate Appropriate
Ellen takes notes about the Pacific Ms. Rubin would do well to instruct her
Northwest Tree Octopus from this one students as to the fact that everything on the
website. She does not look for any other Internet is not true. Students should learn to
sources to confirm the information that consult various sources to determine the
she has found. She is so excited about this
validity of information they obtain on the
endangered animal, that she starts her
own campaign to educate others about Internet. Students could use a checklist with
this animal and to raise funds to save the things to look for to prove the authenticity
Pacific Northwest Tree Octopus. of a site’s information
Before beginning a research unit, the teacher should actually lead a lesson where students are
sent to bogus web sites and asked to report back on their findings. This would then lead to the
discussion as to how one knows whether or not a digital source is reliable. The Pacific
Northwest Tree Octopus, Save the Mountain Walrus, Geno Choice, and The Sellafield Zoo can
help students develop their critical thinking abilities to discriminate between real and bogus on-
5.
line Digital Etiquette : Electornic Standards of Conduct or Procedure
information.
Many people feel uncomfortable talking to others about their digital etiquette.
Often rules and regulations are created or the technology is simply banned to stop
inappropriate use.
It is not enough to create rules and policy; we must teach everyone to become responsible
digital citizens in this new society.
Scenario
A disgruntled/ resentful parent whose child did not qualify for the gifted program sends an
e-mail to the gifted teacher with questions as to the ineligibility decision. After several e-
mails back and forth between the teacher and the parent, the parent expresses her anger
about the fact that, despite her protestations, her very bright child is not eligible by sending a
final e-mail to the teacher. This final e-mail has many words in all caps and ends with
“WTF.”
Inappropriate Appropriate
After the teacher finds out what the initials When the second round of e-mails started,
“WTF” stand for, she responds immediately the teacher called the parent. The teacher
with an angry e-mail. Her e-mail also has calmly listened to the parent and tried to
many words in all caps and ends with “don’t respond to her questions without emotion.
send me any more e-mails or I will have you When the parent continued, after the
charged with harassment.” phone call, to send angry e-mails, the
teacher notified the principal and asked
her to speak with the parent about this
situation
The discussion about digital etiquette needs to occur at faculty meetings or in staff development
trainings. Teachers cannot control what a parent sends in an e-mail, but they can control how
they should respond. A few things to keep in mind are: 1) never respond in haste, 2) never put
anything in writing that you wouldn’t say face to face, and 3) remember that anything that is
put in an e-mail can be retrieved at a later date.
6. Digital Law : Electronic responsibility for actions and deeds
Users need to understand that stealing or causing damage to other people’s work, identity, or
property online is a crime.
There are certain rules of society that users need to be aware in a ethical society. These laws
apply to anyone who works or plays online.
Hacking into others information, downloading illegal music, plagiarizing, creating destructive
worms, viruses or creating Trojan Horses, sending spam, or stealing anyone’s identify or
property is unethical.
Scenario
Mr. Gilbert, a 5th grade teacher, is compiling a collection of student photos and converting
them to a movie using Animoto on-line software. Although the Animoto site offers non-
copyrighted music, the teacher wants the background music for the movie to be something
the students will recognize. The students will not recognize any of the songs this site offers.
Inappropriate Appropriate
Mr. Gilbert’s son has a Chris Brown C.D. Animoto is a free website for compiling
He decides to borrow it and download the photos into a movie format. Mr. Gilbert is
song, “With You”, as the background lucky that he knows about this site. There is
music for the movie. He knows this song a disclaimer on the website that advises the
is very popular with the students, and users to choose either the copyright-free
knows they will enjoy the movie so much music on their site or any other music for
more if they can sing along with the which they have secured written permission
background music. He finishes creating to use. Mr. Gilbert heeds that advice and
his movie and then uploads the movie he uses music on the Animoto site.
has made to his teacher website.
Perhaps there are students who play an instrument and have composed original music or can play
music that is in the public domain as the background music for the movie. It is important that
teachers understand that copyright rules apply to them, even if they are doing things for
7. Digital Rights
educational andThere
purposes. Responsibilities : those
is a misconception freedoms
among extended
many to everyone
educators in acan
that they digital world.
do anything
with digital media as long as it is for educational purposes.
The privileges and freedoms extended to all digital technology users and the behavioral
expectations that come with them
Just as in the American Constitution where there is a Bill of Rights, there is a basic set of rights
extended to every digital citizen.
Digital citizens have the right to privacy, free speech, etc.
Basic digital rights must be addressed, discussed, and understood in the digital world. With these
rights also come responsibilities as well.
Users must help define how the technology is to be used in an appropriate manner. In a digital
society these two areas must work together for everyone to be productive.
Scenario
Mrs. Walker is a fourth grade teacher who is introducing a new unit on the American
Revolution to her students. She creates a beautiful PowerPoint presentation in which she has
photos of famous people and places from that time period. She obtained these photos by doing
a Google image search.
Inappropriate Appropriate
Students will do the things their teachers model. If a teacher expects that her
students will cite sources, it is imperative that she do the same thing with any and
all media (print, digital, audio) that she uses in her classroom. Teachers need to
be educated about search engines and how to locate images that are intended for
educational use.
8. Digital Health and Wellness: Physical and psychological well- being in a digital world.
The privileges and freedoms extended to all digital technology users and the behavioral
expectations that come with them
Eye safety, repetitive stress syndrome, and sound ergonomic practices are issues that need to
be addressed in a new technological world.
Beyond the physical issues are those of the psychological issues that are becoming more
prevalent such as Internet addiction.
Scenario
The four computers in Mrs. Anderson’s room are placed on four different tables in an
“Inspired Classroom” arrangement. She teaches students in the first grade. She doesn’t
have desks, but rather tables and adult-sized chairs in her classroom.
Inappropriate Appropriate
The young students are anxious to work on The tables in the classroom have been
the computers. If they sit in the chairs, they lowered so that the students can look at the
have to strain their neck to look up to the computer screen without neck strain.
computer screen. Some of the students have Remote keyboards enable the students to
taken to actually sitting or kneeling on top of put the keyboards in their lap while they
the table when they work on the computer. are typing.
They do this so they can both see the screen
and work on the keyboard and use the mouse
more comfortably.
The precautions that all technology users must take to guarantee their personal safety and
the security of their network
In any society, there are individuals who steal, deface, or disrupt other people.
The same is true for the digital community. It is not enough to trust other members in the
community for our own safety.
In our own homes, we put locks on our doors and fire alarms in our houses to provide some
level of protection. The same must be true for the digital security. We need to have virus
protection, backups of data, and surge control of our equipment.
As responsible citizens, we must protect our information from outside forces that might cause
disruption or harm.
Scenario
Ms. Perlman gets an e-mail message from someone she does not know. She opens the e-mail
message which has an attachment with it. The attachment is entitled “dancing pigs.” She has
had a stressful day and feels that she could use a good laugh. The attachment “dancing pigs”
might be funny.
Inappropriate Appropriate
Ms. Perlman opens the e-mail. When she Ms. Perlman opens the e-mail and realizes
does, her computer starts doing crazy things that she does not know the sender. She
and within a period of five minutes, the remembers that she has been advised to not
computer has crashed. Ms. Perlman open e-mail attachments from a stranger.
immediately runs to the school technology Even though the attachment title sounds
coordinator to tell her that something is wrong interesting, she deletes the message without
with her computer. opening the attachment. She continues
checking e-mail.
Teachers need to be reminded often of digital security issues, including something as simple as
opening attachments from unknown sources. Educators must be reminded that, although there are
many virus detection devices and firewalls on school computers, they must still use common sense
and good judgment.
https://globaldigitalcitizen.org/21st-century-fluencies/global-digital-citizenship?__hstc=71880012
As a future global digital teacher these tenets holds very crucial roles in the modern innovative
classroom. They include things like:
PERSONAL RESPONSIBILITY
In order for a teacher to practice personal responsibility one must move around the classroom
directing and facilitating learning. In doing so, they are modelling ethical practice. They’re shaping
the moral and ethical mindsets of students by what they do and what they don’t do. Our learners’
time in school is formative and developmental. They are discovering and learning about
themselves by asking questions, making choices, and breaking mental and physical boundaries.
Students are exploring, taking risks and experimenting.
GLOBAL CITIZENSHIP
The role of the global digital teacher is to bring understanding and harmony into such
situations. Such strategies include those that work to resolve conflict, mediate disputes, and show
understanding. Over time, this responsibility shifts to the students. They learn, through their
teachers, to be tolerant of difference while standing up for their own beliefs. They respect their rights
and the rights of others to feel safe to be who they are. They celebrate the colors of culture, and the
interconnectedness of everyone. But it’s the global digital teacher who leads the way in this.
DIGITAL CITIZENSHIP
Technology is at the forefront of many aspects of teaching and learning. It’s refreshing to
see more and more teachers getting on board with its applications. The potential for positive use,
though, is still matched by the potential for misuse. Our learners often emulate those they admire,
and that includes teachers.
“Kids today are more aware and concerned about the world
and about others than ever. “
If teachers don’t cite sources or respect copyright and intellectual property, we oppose
the example we want to set for students. It works the same way if we act inappropriately in any online
environments—it’s like giving our students a green light to do the exact same thing.
Alongside parents, we are the guides young digital learners have for an exciting and perilous
online world. If we’re going to enforce guidelines for ethical behavior, we must do first by example.
ALTRUISTIC SERVICE
Many educators believe that teaching compassion and service are the key to higher student
engagement. But the hectic nature of the educational field can make compassion and altruism a
challenge sometimes. In the article Nothing is More Important Than Teaching Compassion, Vinciane
Rycroft wrote:
“With the ups and downs of every day circumstances, it is not easy to stay inspired and be true to
our initial motivation as educators. It is tempting to look for professional satisfaction in outside
praise, instead of tapping into the genuine well-being that comes from being fully present to those
around us and to ourselves.”
The global digital teacher must indeed remain present. This is true not only of the needs of
students, but to the needs of the school and the community. Thanks to technology, our connections
and communications have linked to us to a world in need. So the innovative classroom becomes the
perfect learning environment for fostering altruistic thoughts and actions. It begins with caring for
each other, and then expands outward.
It’s comforting to know that connection has brought awareness. Kids today are more aware
and concerned about the world and about others than ever. The charitable nature of our digital kids
comes through in school projects like the ones in our own case studies.
ENVIRONMENTAL STEWARDSHIP
We stress in this tenet that we only have “one world to live in.” How we regard its welfare is
congruent with what kind of surroundings we want for ourselves and our students. That’s why the
global digital teacher demonstrates a healthy respect for the personal, communal, and global
environments they and their students are part of.
The educational initiatives being taken for environmental awareness are many. Here are some
examples of the work being done in regards to Environmental Stewardship:
Green Teacher
a non-profit organization helping educators promote environmental awareness among young
people aged 6-19.
SEEDS Schools
allows participants to track and report their projects online and to learn what others are doing
for environmental projects.
Study the case below and analyze the side of both parties
The case involved two minor students from a certain school whose photos were posted on
Facebook. The photos, which were uploaded by one of their friends, showed the students drinking
and smoking in a bar, and wearing just undergarments on a street. The photos were shown by one
of the Facebook friends of the girls to the school officials prompting them to ban the students from
marching in their graduation rites. According to the school, the students violated the school code of
conduct.
The parents of the students in defense filed a petition for the issuance of a writ of habeas
data and asked the court to order the school to surrender and deposit all soft and printed copies of
the photographs, and to declare they have been illegally obtained in violation of the children's right
to privacy.
Discussion:
1. After weighing all the information, with whom will you side to the parents or to the school? Why?
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
2. What are your reasons for siding with the parents? the school?
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
The court dismissed the parent's petition and ruled that, "The school did not violate the
________________________________________________________________________________
minors' privacy rights. According to the court, the school cannot be faulted for being "steadfast
in its duty of teaching its students to be responsible in their dealings and activities in cyberspace,
________________________________________________________________________________
particularly in [social networks], when it enforced the disciplinary actions specified in the
________________________________________________________________________________
Student Handbook, absent a showing that, in the process, it violated the students' rights."
________________________________________________________________________________
The decision of the court stated that the students cannot invoke the protection attached to
________________________________________________________________________________
the right to informational privacy because the photos were seen by other student of the school,
________________________________________________________________________________
who in turn showed them to the computer teacher who reported the incident to the school
________________________________________________________________________________
authorities. In the language of the court. "The photos, having been uploaded on Facebook
without restrictions as to who may view them, lost their privacy in some way." The court further
________________________________________________________________________________
added in its ruling that setting their post privacy to Friends Only' is not an assurance that it can
Check if your arguments are in consonance with the decision of the Supreme Court. Read the
no longer be viewed by another user who is not Facebook friends with the source of the content.
Supreme Court's
The decision readdecision on the next
that, "Without page.
proof that they placed the photographs subject of this case
within the ambit of their protected zone of privacy, they cannot now insist that they have an
expectation of privacy with respect to the photographs in question.
The decision of the court puts the burden of ensuring safeguarding privacy online users
and expects them to exercise due diligence in their online dealings and activities. According to
the court, not discounting the role of schools and parents in disciplining and educating their
children to be good digital citizens, self-regulation is the "best means of avoiding privacy rights
violations." It further issued a ruling saying that nothing is ever private on Facebook, even those
tagged as private never really escape public viewing, including unintended audiences.
The Philippines, being considered as social media capital of the world, has a need to stress
social media education and etiquette among online users. The interview conducted with parents and
teachers of high school students in the above example underscored the need to use social media
responsibly. All agreed for the inclusion of social media etiquette in the education curriculum either
as a separate subject or integrated in good manners and right conduct, Social media can attain many
things in terms of social good (Brutas, 2015). How can social media be used to affect positive
change?
In the previous lesson, we have understood our roles and responsibilities as global digital
citizens. Our membership in the virtual community requires that we behave appropriately and act
responsibly.
While working online we all create a digital tattoo and we leave digital footprints. We have to
remember that our digital world is permanent, and with each post, we leave a digital footprint. By
doing self-reflecting before we self-reveal, we are able to consider how what we share online can
impact ourselves and others (www.commonsensemedia.org).
Scrutinizing the term again, a netizen, according to the Merriam-Webster Dictionary (26
April 2018) is an active participant in the online community of the internet. The medical dictionary
refers to it as an internet citizen who uses networked resources, which connotes civic responsibility
and participation. Thus, netizenship means citizenship in the internet or in the virtual world.
Netiquette
Rules of Netiquette
Rule # 2: Adhere to the same standards online that you follow in real life.
You need to behave the same way online that you do in real life.
You need to remember that you can get caught doing things you should not be doing online
just like you can in real life.
You are still talking to a real person with feelings even though you can’t see them.
As responsible netizens, we are all expected to support a healthy interaction on the internet. A
netiquette, or the rules of socially accepted behavior online have to be observed in writing an email,
in texting, and other communications on the web.
2. Respect others
Respect begets respect.
Treat everyone with respect even if you have not seen him/her in person.
Be judicious about what you say on your own and other's pages
1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn how the website handles the
information you share.
4. Know the security features of the social networking site you use. By keeping your
profile private, search engines will not be able to scan your profile.
5. Do not share your password with anyone.
6. Avoid logging in to public, networks/Wi-Fi. Browsing in “incognito (or private) mode”,
a feature of the browser, will not protect you from hackers.
7. Do not talk to strangers whether online or face-to-face.
PED 8 TECHNOLOGY FOR TEACHING AND LEARNING 1
8. Never post anything about a future vacation. It is similar to posting, “Rob my house at
this date”.
9. Add friends you know in real life.
DR. JEAN RACHEL A. BARROGA
Source: https://www.slideshare.net/Leelet1121/rules-of-netiquette-100105414
Intellectual Property
Refers to creations of the mind such as inventions; literary and artistic works; designs; and
symbols, names and images used in commerce. An intellectual property right is a right held by a
person or by a company to have exclusive rights over these. ( World Intellectual Property
Organization (WIPO)
Internationally, these intellectual properties are protected by the World Intellectual Property
Organization to which the Philippines is one of the 191 member states.
In our country, we have the Intellectual Property Office of the Philippines (IPOPHIL) which
administers and implements state policies in relation to intellectual property.
This office was created through Republic Act 8293. This act defines intellectual property to
include copyright and related rights; trademarks and service marks; geographic indications;
industrial designs; patents; layout designs (topographies) of integrated circuits; and protection of
undisclosed information. In the education setting, copyright and related rights are the ones
applicable.
Copyright
Copyright refers to the legal right given to the owner of the original work or intellectual
property.
These "works" are original intellectual creations in the literary and artistic domain protected
from the moment of their creation.
Not protected are ideas, procedure, system, method of operation, discovery, concept or mere
data
No copyright for government works (but prior approval from the gov’t agency is required
for the exploitation of such work for profit)
Copyright Ownership
Copyright Duration
Life time plus 50 years after death
literary works and unpublished works
works of joint authorship (from death of last surviving author)
50 years from the date of publication/making
anonymous/pseudonymous works
photographic and audiovisual works sound recordings and performances
PENALTIES
First Offense: imprisonment of 1 to 3 years and fine of P 50,000 to P 150,000
Second Offense: imprisonment of 3 to 6 years and fine of P 150,000 to P 300,000
Third Offense: imprisonment of 6 to 9 years and fine of P500,000 to P1.5 M
What the Law may allow under certain conditions?
Recitation or performance of a work
Quoting from a published work
Reproducing and communicating to the public any literary, scientific or artistic work
Inclusion of a work in a publication
Recording of a work by an educational institution
Use of government-controlled works
Public display of original or copy of a work
Use of any work for legal purposes
for preservation
For security (as in back-up copy for computer programs)
Fair use for purposes of scholarship, research and private study, criticism and review, news
reporting, classroom teaching and similar purposes (provided it is not for an entire book or a
substantial part of it)
Single copy (not an entire book, or database, or computer program) for teaching / research
Multiple copies
provided copy is brief, and for one course
provided such copy is not repeated by the same faculty for the same material from term to term
provided such copying is done at the instance of the individual faculty and not by a higher
authority.
provided only the actual photocopying cost is charged to the student.
How can Libraries/Archives avoid copyright liability
Post a warning sign on every location of unsupervised copying machines re copyright
restrictions
Include in published rules that the library reserves the right to refuse to accept a copying
request
Remind users that copying the books lent out may exceed fair use privileges in violation of
copyright.
NEW DEVELOPMENTS
Proposed bill to provide for the protection of Community Intellectual Rights of Indigenous
Peoples HB 3182 amending Copyright Law
Amendments proposed by HB 3182 to respond to intellectual piracy
Recommends more stringent penalties for rights-violators, particularly in the Internet,
and immediate judicial relief and alternate legal options for victims
Amendments proposed by HB 3182 to respond to intellectual piracy
Provides similar rights accorded to authors to
Performers
Phonogram producers
broadcasters
by acknowledging their right to control or be compensated for the various ways in
which their works are used or enjoyed by others.
Amendments proposed by HB 3182 to respond to intellectual piracy rights-holders may
useTEACHING
PED 8 TECHNOLOGY FOR technology to protect
AND LEARNING 1 their own rights and to license their own works online
Impact of Amendments under HB 3182 Extends copyright protection to 70 years after
death Extension up to 95 years for anonymous or pseudonymous works, and audiovisual
DR. JEAN RACHEL A. BARROGA
Copyright infringement
It is the use of works without permission where the copyright holder has the exclusive right to
reproduce, distribute, display or perform the protected work, or to make derivative works.
Proper citations should be used when including them in our output.
Guidelines on Online Use of Copyrighted materials (Smalding, Lowther and Russel 2012):
1. Contrary to popular opinion, all material on the internet is copyrighted unless stated otherwise. It
is copyrighted even if it does not display the copyright symbol.
2. An email is an original work, fixed in a tangible medium of expression. that is covered by
copyright. Hence it is recommended that you should not forward any email without
permission, in consideration of both copyright and Privacy Act.
3. Downloading an article from a newspaper's website, making copies, and distributing them to
your students prior to a class discussion on the topic is permissible following the current
photocopying guidelines which permits making multiple copies for classroom use.
The exception would be individually bylined, copyrighted articles, or articles from a source
specifically designed for the educational market where such articles cannot be copied
legally for class distribution (adapted from Becker, 2003).
4. You cannot post students' essays, poems, or other works on the school website unless you have
permission of the students and their parents or guardians.
5. Educators should treat copyrighted materials from the internet the same way they do to print
formats. The best guideline is to always obtain permission. When in doubt, ask!
6. Copying so many words or ideas from a source that it makes up the majority of your work,
whether you give credit or not (see our section on "fair use" rules)
For images, videos and music, the following are counted as plagiarism :
1. Copying media (especially images) from other websites to paste them into your own papers or
websites.
2. Making a video using footage from others' videos or using copyrighted music as part of the
soundtrack.
3. Performing another person's copyrighted music (i.e., playing a cover).
4. Composing a piece of music that borrows heavily from another composition.
Plagiarism
refers to copying the work of another and claiming it as one's ideas or without proper attribution.
Copyright Infringement
It is copying one's work without obtaining permission.
Copyright infringement is a violation of the right of the copyright holder while plagiarism is a
violation of the right of the author. We have to note that not all authors are copyright holders; there
are cases when the publisher owns the copyright. In addition, copyright infringement is a legal
violation while plagiarism is an ethical violation.
In conclusion
Administrators and teachers are responsible for implementing and enforcing acceptable use
forms for all students using the internet in schools.
Teachers are responsible for using technology in a manner that supports the curriculum.
Teachers must directly teach students to use the Internet in an appropriate manner.
ELABORATE
Congratulations! You are done reading the content of this module. I want you to elaborate on the
given learning task below.
What does it mean to be a digital citizen? How can you observe social, ethical and legal
responsibilities in the use of technology tools and resources?
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
Your interaction with others online shows your identity. Your online social identity is your "digital tattoo".
A digital tattoo refers to the record of your actions and communications online and its permanence, like a
physical tattoo.
Looking back at how you engage in activities online, what kind of digital citizen were you?
Reflect on this and draw your tattoo inside the box. Explain your illustration.
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________-
_________________________________________________________________________________
EVALUATE
This is the culminating part of your module. You are going to connect what you have learned
in this module in your personal life by answer the given task.
Photo Essay
VIDEO PRESENTATATION:
ADVOCACY CAMPAIGN
RESOURCES
A. BOOKS
Bilbao, p., et al. (2019). Technology and Learning 1. Quezon City. Phil: Lorimar Publishing, Inc.
Corpuz, Brenda B., Ph.D. and Lucido, Paz I. Ph. D. (2008) Educational Technology 1. Lorimar
Publishing, Inc., Quezon City, Metro Manila, Philippines
Corpuz, Brenda B., Ph.D. and Lucido, Paz I. Ph. D. (2015) Educational Technology 1, Third
Edition. Lorimar Publishing, Inc., Quezon City, Metro Manila, Philippines
Tabbada, Epifania V., Ed. D. and Buendia, Maria Mercedes, MA. Ed. (2015) Educational
Technology 1. Adriana Publishing Co., Inc. Quezon City, Metro Manila, Philippines.
B. Online
Ribble, M., & Bailey, G. (2007) Digital Citizenship in School. Washington, D.C.: International
Society for Technology in Education. Prepared by Kati Searcy, October 2008 for ITED 8100, Valdost
C. Picture Attributes
https://discuss.goformative.com/t/scoring-no-response/4441/2
https://nearpod.com/how-nearpod-works
https://www.google.com/search?
q=nearpod&sxsrf=ALeKk02ueFW_EKoVMcfeo5EY_UlUYZl2Mg:1623043063517&source=lnms&tbm=isch&
sa=X&ved=2ahUKEwiE4IXK4oT
https://blogs.umass.edu/onlinetools/community-centered-tools/todays-meet/
https://www.google.com/search?
q=Rezzly+icon&sxsrf=ALeKk03cE6BmA8C_oit87o1cdnbPQudcyw:1623045438804&source=lnms&tbm=isc
h&sa=X&ved=2ahUKEwig6dW264TxAhUmUPUHHbs
https://www.google.com/search?
q=graphic+design+tools&sxsrf=ALeKk02c8aPtVm2725UI1McjSwkdXdItrg:1623047621184&source=lnms&
tbm=isch&sa=X
https://www.google.com/search?
q=what+is+podcast&sxsrf=ALeKk00oF1jwVGPWC4fHbq1NTi3KWbdi1w:1623048951717&source=lnms&t
bm=isch&sa
https://www.google.com/search?q=powerpoint
%20presentation&tbm=isch&hl=en&sa=X&ved=0CCEQtI8BKAJqFwoTCNCIs9v6hPECFQAAAAAd