0% found this document useful (0 votes)
70 views14 pages

Ict 9 Quarter 1 - Module 1

This module focuses on responsible digital content creation, digital rights, cybersecurity, media literacy, and ethical online behavior. Learners will develop skills to evaluate online information, recognize cyber threats, and understand the Data Privacy Act of the Philippines. By the end of the module, students will be equipped to navigate digital spaces safely and responsibly.

Uploaded by

Jen Labao
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views14 pages

Ict 9 Quarter 1 - Module 1

This module focuses on responsible digital content creation, digital rights, cybersecurity, media literacy, and ethical online behavior. Learners will develop skills to evaluate online information, recognize cyber threats, and understand the Data Privacy Act of the Philippines. By the end of the module, students will be equipped to navigate digital spaces safely and responsibly.

Uploaded by

Jen Labao
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

QUARTER 1- MODULE 1

Responsible digital content creation and sharing • Understanding digital rights,


licenses, and fair use • Cybersecurity: phishing, ransomware, personal data
protection • Advanced media literacy and detecting bias or misinformation •
Digital citizenship and ethical online behavior • Data Privacy Act of the
Philippines
MODULE COMPOSITION OVERVIEW

This section outlines the particular skills and competencies you are
expected to develop in this module. It specifies the learning
outcomes and practical skills you will gain, providing a clear picture
What I Need to Know of the knowledge and expertise you should acquire.

This section includes an activity to evaluate your current


understanding of the lesson’s topic, helping to identify what you
already know before beginning the module.
What I Know
This quick exercise offers a valuable opportunity to reinforce your
understanding by linking the concepts from this lesson with what
you already know. Don't miss this chance to strengthen your
What’s In learning and stay on the right track.

This section introduces the new lesson using various engaging


formats. These different methods aim to capture your interest and
create a meaningful context for the upcoming topic.
What’s New
This section provides a clear overview of the lesson, helping you
discover and understand new concepts and skills. It lays the
groundwork for deeper learning and aids your progress as you
What is It explore the topic.

This section offers activities for independent practice to strengthen


your understanding and mastery of the topic. You can check your
answers using the Answer Key at the end of the module.
What’s More

This section includes questions and incomplete sentences or


paragraphs that need to be completed, aimed at helping students
process and reinforce the concepts learned in the lesson.
What I Have Learned

This section offers an activity designed to help you apply your


knowledge and skills to real-world or practical situations.
What I Can Do
This task evaluates your mastery of the learning competency by
testing your understanding and ability to apply the concepts and
skills from the lesson.
Assessment

This section includes an additional activity to deepen your


understanding or improve your skills related to the lesson. It also
helps with better retention of the concepts learned.
Additional Activities

What I Need to Know

This module will guide you through the essential principles of digital empowerment and the
ethical use of technology. In today's interconnected world, understanding how to navigate digital
spaces responsibly is crucial for your safety, well-being, and future success. You will learn not only
how to leverage technology for positive outcomes but also how to protect yourself from potential
online risks.
By the end of the lesson, the learner will be able to:
• Evaluate online information critically to determine its reliability and identify potential biases
or misinformation.
• Recognize common cyber threats such as phishing and ransomware, and understand
personal data protection.
• Explain the ethical responsibilities of a digital citizen and demonstrate responsible online
conduct.

What I Know

INSTRUCTIONS: This pre-assessment is designed to check your current knowledge about digital
empowerment and the ethical use of technology. Read each item carefully and choose the best
answer by writing the letter of your choice in the space provided before each number.

___ 1. Which of the following best describes ethical digital behavior?


A. Sharing all personal information online freely.
B. Posting opinions without considering the feelings of others.
C. Using technology responsibly and showing respect in online interactions.
D. Downloading copyrighted material without permission.
___ 2. What is the primary purpose of the Data Privacy Act of the Philippines?
A. To encourage people to share more personal data online.
B. To regulate social media content.
C. To protect individuals' personal information in the government and private sectors.
D. To promote online advertising.
___ 3. What is "phishing" in the context of cybersecurity?
A. A technique used to create strong passwords.
B. A type of software that speeds up the internet connection.
C. An attempt to trick users into revealing personal information through deceptive messages.
D. A method for backing up digital files.
___ 4. Why is media literacy critical when evaluating online information?
A. It helps you find entertainment easily.
B. It enables you to assess sources and identify misinformation critically.
C. It allows you to create viral content.
D. It teaches you how to use social media platforms.
___ 5. You found an interesting image online and want to use it for your school project. What should
you consider before using it?
A. If it looks good with your presentation.
B. The file size of the image.
C. The copyright status, and if you need permission to use it.
D. How many times has it been shared online

What’s In

Welcome to a journey into the digital world! Think about how much you use the internet every
day – for school, for entertainment, or connecting with friends and family. This lesson will help you
understand that just like in the real world, there are rules and responsibilities to follow when you are
online. We will explore how to be smart, safe, and respectful digital citizens. Let’s review some basic
internet safety tips you might already know, as they form the foundation for ethical online behavior.

Answer the following questions briefly.


1. What is one everyday online activity you do every day?
2. Why is it important to keep your personal information private online?
3. Have you ever encountered something online that seemed too good to be true? What did you
do?
What’s New

Activity: Digital Dilemmas: Choose Your Path!


INSTRUCTIONS: Read each short scenario below. For each scenario, discuss with a partner or
reflect individually on the best course of action to demonstrate responsible digital behavior. Be
ready to share your choices and explain your reasoning.
Scenario 1: The Viral Rumor.
You see a post on social media from a classmate spreading a hurtful rumor about another student.
The post is gaining a lot of shares and comments.
• What should you do?
A. Share the post to show your friends.
B. Ignore it, it's none of your business.
C. Report the post to the platform and inform a trusted adult or teacher.
D. Comment on the post, agreeing with the rumor.
Scenario 2: The "Free Game" Offer.
You receive an email from an unknown sender promising a free premium game if you click on a
link and enter your game account username and password.
• What should you do?
A. Click the link immediately to get the free game.
B. Reply to the email asking for more details.
C. Delete the email and mark it as spam, as it might be a phishing attempt.
D. Ask a friend if they also received the email.
Scenario 3: Project Research and Images
You are creating a presentation for a school project and find a perfect image online. You download
it and paste it into your presentation.
• What should you do before submitting?
A. Nothing, the image is on the internet, so it's free to use.
B. Check if the image has any copyright restrictions and cite the source if necessary.
C. Add a filter to the image so it looks different.
D. Crop out any watermarks on the image.
Scenario 4: Private Message Request
An online acquaintance asks for your home address and phone number so they can send you a
"gift."
• What should you do?
A. Give them the information, as they seem friendly.
B. Tell them you will give it to them if they send the gift first.
C. Decline their request and do not share personal identifiable information with online
acquaintances.
D. Ask your parents if it’s okay to share your information.
Scenario 5: Fact-Checking News
You read an alarming news article on social media about a new health crisis. It encourages you
to share it immediately.
• What should you do?
A. Share it immediately to warn everyone.
B. Check if the information is from a credible news source or official health organization
before sharing.
C. Assume it's true because it's widely shared.
D. Discuss it with your friends to see if they believe it.

What is It

1. Responsible Digital Content Creation and Sharing


In the digital age, everyone has the power to create and share content—be it text, images,
videos, or audio. This comes with a responsibility to ensure what you create and share is
truthful, respectful, and appropriate.
• Truthful: Always verify information before sharing. Spreading false information
(misinformation or disinformation) can have serious consequences, leading to panic,
confusion, or even harm. For example, sharing an unverified "news" report about a natural
disaster can cause unnecessary alarm.
• Respectful: Your content should not be discriminatory, offensive, or promote hate speech.
Consider how your words or images might affect others. For instance, creating a meme that
mocks someone's physical appearance is disrespectful and harmful.
• Appropriate: Content should be suitable for a general audience and adhere to the
community guidelines of platforms. Avoid explicit, violent, or illegal content. Sharing videos
of dangerous stunts is inappropriate and could encourage others to endanger themselves.
Example:
Responsible: A student creates a short video promoting proper waste segregation in school.
They use facts from the local environmental office and respectful language to encourage
participation.
Irresponsible: A user posts edited photos of a public figure with false captions to spread
rumors, knowing it's untrue and damaging to the person's reputation.
2. Understanding Digital Rights, Licenses, and Fair Use
Just as there are rights in the physical world, there are rights in the digital world, too,
especially concerning intellectual property.
a. Digital Rights: These protect the creators of digital content. When someone creates a song,
an article, a photograph, or a video, they usually own the copyright to it. This means they
have the exclusive right to reproduce, distribute, perform, display, or license their work.
b. Licenses: Creators often grant licenses to others, permitting them to use their work under
certain conditions. For example, a Creative Commons license allows others to use a job for
free, but might require attribution (giving credit to the original creator) or prohibit commercial
use.
c. Fair Use: This is a legal doctrine that allows limited use of copyrighted material without
permission from the copyright holder for purposes such as criticism, comment, news
reporting, teaching, scholarship, or research. However, it's often complex and context-
dependent. For instance, using a short clip from a movie for a film review in a school project
might fall under fair use, but using the entire film for public viewing without permission would
not.
Example:
If you're making a school presentation and want to use an image, instead of just grabbing
any image from Google, you should look for pictures with "Creative Commons" licenses or
use stock photo sites that offer royalty-free images. If you use a copyrighted image, you must
ask for permission or ensure your use falls under fair use, and always credit the source.
3. Cybersecurity: Phishing, Ransomware, Personal Data Protection. Cybersecurity refers to
the practices and technologies designed to protect networks, devices, and data from
unauthorized access, damage, or theft. Understanding common threats is key to protecting
yourself.
a. Phishing: This is a deceptive attempt to trick you into revealing sensitive information (like
usernames, passwords, credit card details) by disguising itself as a trustworthy entity in an
electronic communication, such as an email or text message.
Example:
You receive an email that looks exactly like it's from your bank, asking you to "verify your
account" by clicking a link and entering your login details. However, the link leads to a fake
website designed to steal your information.
b. Ransomware: This is a type of malicious software that blocks access to your computer
system or data until a sum of money (ransom) is paid.
Example:
You accidentally click on a suspicious link, and suddenly, all your files are encrypted,
displaying a message demanding payment in cryptocurrency to unlock them.
c. Personal Data Protection: This involves safeguarding your personally identifiable
information (PII) such as your full name, address, phone number, email, date of birth, and
financial details. This includes using strong, unique passwords, enabling two-factor
authentication, and being cautious about what information you share online.
4. Advanced Media Literacy and Detecting Bias or Misinformation: Media literacy is the
ability to access, analyze, evaluate, create, and act using all forms of communication. In the
digital age, advanced media literacy means being able to assess the vast amount of
information you encounter online critically.
a. Detecting Bias: Understand that every source might have a particular viewpoint or agenda.
Example: A news article about a political issue published by a highly partisan website might
present only one side of the story, demonstrating bias.
b. Detecting Misinformation/Disinformation:
• Misinformation: False information spread, regardless of intent to mislead.
• Disinformation: Deliberately false or misleading information spread to deceive people.
How to detect them:
• Check the source: Is it a reputable news organization, a recognized expert, or a
suspicious website?
• Look for corroboration: Do multiple credible sources report the information?
• Examine the evidence: Are there facts, data, and direct quotes, or just opinions
and sensational claims?
• Consider the date: Is the information current or outdated?
• Be wary of emotional appeals: Misinformation often tries to provoke strong
emotions (fear, anger) to bypass critical thinking.
• Reverse image search: If an image seems suspicious, use tools like Google
Images to see its original context.
Example:
You see a post claiming that a new "miracle cure" for a disease has been discovered,
complete with testimonials. A media-literate individual would research the source (is it a
medical professional or a dubious online seller?), check for scientific studies supporting the
claim, and look for warnings from reputable health organizations before believing or sharing
it.
5. Digital Citizenship and Ethical Online Behavior: Digital citizenship refers to the
responsible, ethical, and safe use of technology. It’s about being a good citizen in the digital
world, just as you are in your community.
a. Ethical Online Behavior:
▪ Respect others: Treat people online as you would in person. Avoid cyberbullying,
hate speech, and harassment.
▪ Protect your privacy and others': Be careful about what personal information you
share about yourself and avoid sharing others' private information without their
consent.
▪ Think before you post: Once something is online, it's hard to take back. Consider
the long-term effects of your posts.
▪ Report inappropriate content: If you see something harmful or illegal, report it to
the platform administrators.
▪ Be honest: Don't impersonate others or spread lies.
Example:
A responsible digital citizen mutes or blocks online bullies instead of engaging in flame wars
and avoids posting friends' photos without their explicit consent.
6. Data Privacy Act of the Philippines (Republic Act No. 10173): The Data Privacy Act of
2012 is a law that protects the fundamental human right to privacy of communication while
ensuring the free flow of information to promote innovation and growth. It applies to all processing
of personal data and sensitive personal information.
a. Key Principles:
▪ Transparency: Individuals must be informed of data collection and its use.
▪ Legitimate Purpose: Data must be collected for a clear, valid, and lawful reason.
▪ Proportionality: Only necessary data should be collected and processed.
b. Your Rights as a Data Subject:
▪ Right to Be Informed: You have the right to know if your data will be, is being, or
has been processed.
▪ Right to Access: You can request access to your data held by a company or
organization.
▪ Right to Object: You can object to the processing of your data.
▪ Right to Erasure or Blocking: You have the right to request the suspension,
withdrawal, or removal of your data.
▪ Right to Damages: You can be indemnified for damages sustained due to
inaccurate, incomplete, outdated, false, unlawfully obtained, or unauthorized use
of personal data.
▪ Right to File a Complaint: You can file a complaint with the National Privacy
Commission (NPC) if your data privacy rights are violated.
Example:
When you sign up for a new online service or app, they often ask for permission to access
your contacts, location, or photos. Under the Data Privacy Act, they must clearly explain
why they need this information and how they will use it. You have the right to refuse to
share specific data if you disagree with their terms, or you can request that your data be
deleted later.

What’s More

Activity: Responsible Sharing Checklist!


INSTRUCTION: Read the scenario. Put a check (✓) if it's responsible, and an (X) if it's irresponsible.
1. ____ Sharing a news article that you quickly checked on another website to make sure it was
true.
2. ____ Creating a funny picture of your friend without their permission and posting it online.
3. ____ Clicking on a link in an email that promises free money if you enter your password.
4. ____ Looking for pictures with "Creative Commons" licenses for your school report.
5. ____ Posting a comment online that helps a classmate with their homework.

What I Have Learned

INSTRUCTION: Let's review the most important things you've learned! Complete the sentences
using the words from the box.

Respectful phishing truthful privacy copyright

A. Complete the Sentence. Finish each sentence in a way that shows your understanding of the
topic.
1. When you share content online, it should be _________ and _________.
2. ___________ is when someone tries to trick you into giving away your passwords.
3. The creator of a song or photo usually owns the _________ to their work.
4. The Data Privacy Act helps protect your personal _________ online.
5. It's important to be _________ to others online and avoid cyberbullying.
B. Safety First!
Match the online danger in Column A with the correct way to stay safe in Column B. Draw a
line to connect them.

Column A (Online Danger) Column B (How to Stay Safe)

1. Someone tries to trick you into giving a. Use strong, different passwords for
passwords. each account.
2. Your files get locked by harmful b. Always check the source and look
software. for other news.
3. A website asks for too much personal c. Don't click strange links; tell an
information. adult about suspicious emails.
4. You read a fake news story online. d. Be careful what info you share; ask
5. You use an easy password for
an adult.
everything.
e. Turn off your computer and get help
from an adult.

What I Can Do

Activity: My Safe Online Rules!


INSTRUCTION: Imagine you are creating a poster for your classmates about being safe and
responsible online. Write one rule you would include for each topic.
1. For Sharing Online (Truthful, Respectful, Appropriate):
a. My rule:
___________________________________________________________________
2. For Using Others' Work (Digital Rights, Licenses, Fair Use):
a. My rule:
b. ___________________________________________________________________
3. For Online Safety (Cybersecurity):
a. My rule:
___________________________________________________________________
4. For Being Smart About News (Media Literacy):
a. My rule:
___________________________________________________________________
5. For Being Kind Online (Ethical Online Behavior):
a. My rule:
___________________________________________________________________
6. For Protecting My Info (Data Privacy Act):
a. My rule:
___________________________________________________________________
Assessment

INSTRUCTION: Choose the best answer for each question. Circle the letter of your choice.
1. Which of these is a responsible way to share content online?
A. Posting something without checking if it's true.
B. Sharing a mean photo of someone for fun.
C. Posting a video that promotes safe practices at school.
D. Sharing a dangerous stunt video.
2. What does "copyright" protect?
A. Protect your computer from viruses.
B. The rights of the person who created digital content.
C. Your online gaming score.
D. How fast is your internet?
3. What is "phishing"?
A. Fishing for real fish online.
B. When someone tries to trick you into revealing personal information.
C. A type of online game.
D. Posting a lot of pictures online.
4. You see a news story that sounds too good to be true. What should you do?
A. Share it immediately with everyone.
B. Believe it because it's online.
C. Check if other trusted news sources are reporting the same thing.
D. Ignore it completely.
5. Which of these is an example of ethical online behavior?
A. Spreading rumors about a classmate.
B. Using strong, polite words when disagreeing with someone online.
C. Sharing someone's private photos without their permission.
D. Cyberbullying.
6. According to the Data Privacy Act, what right do you have to your personal information?
A. The right to share it with anyone.
B. The right to know if your data is being collected and used.
C. The right to make up fake information.
D. The right to never use the internet.
7. What is an example of "misinformation"?
A. A true news report about a local event.
B. An old photo mistakenly shared as current news.
C. A story made up to intentionally deceive people.
D. A school announcement about class schedules.
8. Why is it important to "think before you post" online?
A. Because it saves internet data.
B. Once something is online, it's hard to remove it.
C. To get more likes and shares.
D. To make your parents proud.
9. What should you do if you receive an email asking for your bank password?
A. Reply with your password right away.
B. Click the link and enter your details.
C. Forward it to all your friends.
D. Delete it and tell a trusted adult.
10. If you use a picture from the internet for a school project, what should you try to do?
A. Only use pictures of famous people.
B. Check for licenses like “Creative Commons” and credit the source.
C. Make sure the picture is very colorful.
D. copy any picture you like without checking.

Additional Activities

INSTRUCTIONS: Look for real-life examples of each concept from news articles, social media posts, or
websites. For each, describe if it shows responsible or irresponsible digital citizenship,
and explain why. If possible, print or draw a picture for each.
1. Responsible Digital Content Creation/Sharing: (e.g., A school's official post about an
event.)
o Description:
o Why it's responsible:
2. Digital Rights/Licenses in Action: (e.g., A photo shared with "Photo by [Photographer's
Name] / Creative Commons.")
o Description:
o Why it's important:
3. Cybersecurity Example (Phishing/Personal Data Protection): (e.g., A news report about
a data breach, or advice on strong passwords.)
o Description:
o Why it's relevant to safety:
4. Media Literacy (Detecting Bias/Misinformation): (e.g., A news story that clearly favors one
side, or a viral "fact" that was proven false.)
o Description:
o Why it show bias/misinformation?
5. Ethical Online Behavior: (e.g., an online discussion where people are respectful, or an
example of cyberbullying being addressed.)
o Description:
o Why it's ethical/unethical:

You might also like