TLE Grade 8 Quarter 1: experience where digital citizenship was
Lesson 2 (Week 2) important in an online learning environment?
E. Content Creation and Sharing
Scenario: A student creates a video and shares it
online, ensuring that all content used is original or
Elements of Digital Citizenship properly credited to avoid plagiarism.
Questions: What do you think makes someone a
Scenarios Where Digital Citizenship is Crucial good digital citizen when creating and sharing
A. Social Media Interactions content online? Can you share an experience
Scenario: A student shares a post on social media that where practicing good digital citizenship in
could be interpreted as offensive or controversial. This content creation was important?
leads to a heated discussion in the comments section. Digital citizenship refers to the responsible use of
Questions: What do you think makes someone a technology by anyone who uses computers, the
good digital citizen in the context of social Internet, and digital devices to engage with society on
media interactions? Can you share an any level. It encompasses a wide range of behaviors and
experience where practicing good digital skills that are necessary for effective and ethical
citizenship on social media was important? participation in digital environments.
B. Online Gaming According to Ribble (2017), there are nine elements of
Scenario: During an online gaming session, a player Digital Citizenship include:
encounters another player who is using abusive 1. Digital Access
language and harassing others. 2. Digital Commerce
Questions: What do you think makes someone a 3. Digital Communication
good digital citizen in the context of online 4. Digital Literacy
gaming? Can you share an experience where 5. Digital Etiquette
digital citizenship was important while playing 6. Digital Law
online games? 7. Digital Rights and Responsibilities
C. Email Communication 8. Digital Health and Wellness
Scenario: A student receives an email from an 9. Digital Security (Self-protection)
unknown sender with a suspicious link. The student
needs to decide whether to open the link or report Scenario: Cyberbullying Incident
the email. A student, Alex, posts a picture of their new
Questions: What do you think makes someone a project on a school-related social media group.
good digital citizen when it comes to email Another student, Sam, starts posting negative
communication? Can you share an experience comments about Alex's project, calling it
where being a responsible digital citizen in "stupid" and "a waste of time." Other students
email communication was crucial? join in, and the comments escalate to personal
D. Online Learning Platforms attacks on Alex’s appearance and abilities. Alex
Scenario: In an online class discussion forum, a feels hurt and embarrassed and doesn't know
student posts a comment that is respectful and how to respond.
constructive, even though they disagree with the Identify Ignored Digital Citizenship Elements
original post. 1. Digital Etiquette - Sam and the other students
Questions: What do you think makes someone a ignored the norms of respectful and kind
good digital citizen in the context of online communication online.
learning platforms? Can you share an
2. Digital Rights and Responsibilities - The bullies blog entries, or any other content you actively upload or
ignored Alex's right to a safe and respectful online share online.
environment. 2. Passive Digital Footprints - These are the data trails
3. Digital Security - The situation could escalate to a you leave unintentionally, such as cookies that track
point where Alex's personal information might be at risk your browsing habits, IP addresses, and other metadata
if the bullying continues. collected by websites and online services.
Analyze the Situation Importance of Digital Footprints
1. How did Alex feel? Discuss the emotional impact of Privacy and Security - The data you leave
cyberbullying on Alex. behind can be used to build a profile about you,
2. Why did Sam and the other students behave this which can be exploited for malicious purposes
way? Explore the reasons behind cyberbullying such as identity theft or targeted cyber-attacks
behavior. (Solove, 2007).
3. What role did the bystanders play? Discuss the Reputation Management - Your digital
impact of bystanders either joining in or staying silent. footprint can affect your reputation. Employers,
How Could the Situation Have Been Handled Better? colleges, and other entities often search for
1. Digital Etiquette - Sam and the other students should online information about candidates, and
have respected Alex's post and provided constructive inappropriate content can have negative
feedback if necessary. consequences (Berkelaar, 2014).
2. Digital Rights and Responsibilities - Students should Personalization - Companies use digital
recognize their responsibility to create a positive online footprints to personalize user experiences, such
environment and report inappropriate behavior. as recommending products or content based on
3. Intervention - The teacher should intervene early to browsing history (Turow, 2011).
stop the bullying and provide support to Alex. Managing Your Digital Footprint
Discuss the Importance of Digital Etiquette and Managing your digital footprint involves being mindful
Security of the information you share online and taking steps to
1. Digital Etiquette - Emphasize the importance of protect your privacy.
treating others with respect online, just as one would in Privacy Settings - Regularly review and adjust
person. Discuss the long-term impact of negative online the privacy settings on your social media
behavior. accounts and other online services to control
2. Digital Security - Highlight the need to protect who can see your information.
personal information and the potential risks of sharing Search Yourself - Periodically search for your
too much online. Discuss how bullying can sometimes own name on search engines to see what
lead to more serious security issues. information is publicly accessible.
Digital Footprints and Identity Think Before You Post - Consider the long-term
What is a Digital Footprint? impact of the content you share online. Once
A digital footprint is the trail of data that individuals something is posted, it can be difficult to
leave behind when they use the internet. This includes remove it completely.
all the information that is shared, both intentionally and Use Secure Connections - Ensure that you are
unintentionally, through various online activities such as using secure (HTTPS) connections when
social media interactions, website visits, emails, and browsing the internet to protect your data from
online shopping. Digital footprints can be categorized being intercepted.
into two types: Digital Identity
1. Active Digital Footprints - These are the data trails Digital identity refers to the online persona that is
you leave intentionally, such as posts on social media, created through your digital footprints. It encompasses
all the information available about you online, including
social media profiles, online transactions, and any other Sarah, a high school student, posts a photo on
digital interactions. Your digital identity can influence her Instagram account during a weekend party
how others perceive you and can have real-world with friends. In the background of the photo,
implications. there are some students drinking from red cups,
Components of Digital Identity which are commonly associated with alcoholic
Personal Information - This includes your name, beverages, although the cups actually contain
date of birth, address, and other identifying soda. Sarah captions the photo, "Crazy night
details. with the best people! #PartyHard."
Professional Information - This includes your Analysis Using Digital Footprints and Identity Concepts
employment history, professional skills, and 1. Digital Etiquette
educational background, often found on Ignored Element - Sarah did not consider
platforms like LinkedIn. the potential implications of the photo and
Social Information - This includes your social the caption. Digital etiquette involves
media activity, such as posts, likes, comments, thinking about how your posts might be
and the networks you are part of. perceived by others and the possible
Behavioral Information - This includes your consequences.
browsing habits, purchase history, and other Improvement - Sarah should have reviewed
online behaviors that can be tracked and the photo more carefully and chosen a
analyzed. Risks Associated with Digital Identity caption that accurately reflected the
Identity Theft - Cybercriminals can use your situation. She could have avoided using a
personal information to steal your identity and hashtag that implied reckless behavior.
commit fraud (Newman & McNally, 2005). 2. Digital Rights and Responsibilities
Reputation Damage - Negative information or Ignored Element - While Sarah had the
inappropriate content associated with your right to post the photo, she also had the
digital identity can harm your personal and responsibility to ensure that her post
professional reputation. did not mislead or harm others.
Data Exploitation - Companies can exploit your Improvement- Sarah should have been
digital identity for targeted advertising and more mindful of her responsibilities as a
other commercial purposes without your digital citizen, considering how her post
explicit consent (Acquisti & Gross, 2006). might be interpreted by different
Protecting Your Digital Identity audiences.
Strong Passwords - Use strong, unique 3. Digital Security
passwords for different online accounts and Ignored Element - Sarah did not
change them regularly. consider the privacy settings of her
Two-Factor Authentication - Enable two-factor Instagram account. The photo was
authentication (2FA) for an added layer of publicly accessible, allowing anyone to
security. view and share it.
Be skeptical of Phishing - Be cautious of emails, Improvement - Sarah could have used
messages, or websites that ask for personal privacy settings to limit the visibility of
information. her post to close friends only, reducing
Regular Monitoring - Keep an eye on your the risk of misunderstandings and wider
online accounts for any suspicious activity. spread.
Scenario: The Misunderstood Photo
4. Reputation Management
Ignored Element - Sarah did not think Analyzing the Scenario Using Republic Act No. 10627
about how the photo might affect her (Anti-Bullying Act of 2013)
reputation and the reputation of her Step 1: Identifying the Cyberbullying
friends. Cyberbullying Characteristics:
Improvement - Before posting, Sarah Hurtful Messages: Maria receives insulting
should have considered the long-term messages about her appearance and false
impact of the photo on her digital rumors about her personal life.
footprint and reputation. Anonymous Accounts: The messages come
How the Situation Could Have Been Handled Better from unidentified sources, making it difficult for
a) Think Before Posting - Sarah should have Maria to confront the bullies.
taken a moment to review the photo and Fake Profile: Someone creates a fake profile
the caption, considering how they might be using Maria's name and photos, posting
perceived by others. She could have chosen inappropriate content to damage her
a different photo that did not include the reputation.
red cups or used a caption that clearly Step 2: Understanding Maria's Protections Under the
indicated they were having a fun, Law
responsible time. Protections Outlined in Republic Act No. 10627
b) Use Privacy Settings - Sarah could have Definition of Bullying: The law defines bullying
adjusted her privacy settings to ensure that to include any severe or repeated use of
only her close friends could see the post. written, verbal, or electronic expression that
This would have limited the spread and causes physical or emotional harm, fear, or
potential for misunderstandings. damage to a person's reputation.
c) Clear Communication - If Sarah realized the School Responsibility: Schools are required to
misunderstanding early, she could have adopt policies to address bullying and
posted a follow-up clarification, explaining cyberbullying. These policies must include
that the cups contained soda and not procedures for reporting, investigating, and
alcohol. responding to bullying incidents.
d) Seek Support - When the situation Reporting Mechanisms: The law mandates that
escalated, Sarah could have sought support schools provide clear mechanisms for students
from a trusted teacher or counselor to help to report bullying incidents safely and
address the rumors and misunderstandings. confidentially.
Support and Intervention: Schools must offer
ICT-related Legal Bases support and intervention programs for both
Scenario: Cyberbullying Incident victims and perpetrators of bullying to promote
Maria, a high school student, starts receiving behavioral change and conflict resolution.
hurtful messages on her social media accounts. Step 3: Maria's Responsibilities and Steps to Take
The messages come from anonymous accounts Responsibilities and Actions Maria Should Take
and include insults about her appearance and Report the Incident: Maria should report the
false rumors about her personal life. The cyberbullying to a trusted teacher, school
situation escalates when someone creates a counselor, or administrator. She can provide
fake profile using her name and photos, posting screenshots or other evidence of the hurtful
inappropriate content that further tarnishes her messages and fake profile.
reputation. Maria feels distressed and helpless, Document the Bullying: Maria should keep a
unsure of how to stop the harassment. record of all bullying incidents, including dates,
times, and descriptions of the messages and 1. Republic Act No. 10173 (Data Privacy Act of 2012) is
actions taken by the bullies. designed to protect personal data in information and
Seek Support: Maria should seek emotional communications systems both in the government and
support from friends, family, or a school the private sector. Which of the following is NOT a right
counselor to help cope with the stress and provided by this act?
emotional impact of the cyberbullying. A. Right to be informed
Avoid Retaliation: Maria should avoid B. Right to data portability
responding to the bullies or retaliating, as this C. Right to erasure or blocking
could escalate the situation. D. Right to freedom of speech
Step 4: School's Role and Responsibilities 2. The Cybercrime Prevention Act (Republic Act No.
School's Responsibilities Under Republic Act No. 10627: 10175) includes a controversial provision about online
Investigate the Report: The school must libel. Which statement best reflects the implication of
promptly investigate Maria's report of this provision?
cyberbullying, ensuring that the investigation is A. It decriminalizes libel when committed
thorough and confidential. online.
Take Disciplinary Action: If the investigation B. It imposes a higher penalty for libel
confirms the cyberbullying, the school should committed online than written libel.
take appropriate disciplinary action against the C. It only applies to libel against individuals, not
perpetrators, in accordance with their anti- groups.
bullying policy. D. It equates online libel with spoken
Provide Support: The school should offer defamation.
counseling and support services to Maria to 3. Under the Electronic Commerce Act (Republic Act No.
help her recover from the emotional impact of 8792), electronic documents have legal recognition.
the bullying. Which scenario would challenge the admissibility of an
Educate the Community: The school should electronic document in court?
conduct awareness programs to educate A. The document was sent through a secured
students, teachers, and parents about the email service.
dangers of cyberbullying and the importance of B. The document lacks a digital signature.
respectful online behavior. C. The document was notarized electronically.
D. The document was printed and presented in
paper form.
Learners’ Takeaways 4. The Intellectual Property Code (Republic Act No.
Write a summary of what they learned about ICT- 8293) protects the rights of creators over their
related legal bases. creations. Which of the following is NOT protected
1) What are the key points of each law?" and under this act?
2) How do these laws protect and regulate digital A. Literary works
behavior? B. Mathematical formulas
C. Musical compositions
D. Artistic illustrations
5. Republic Act No. 10844, which created the
Formative Assessment: Department of Information and Communications
This quiz is designed to test students’ understanding of Technology (DICT), aims to ensure the provision of
the laws and their ability to apply this knowledge to strategic, reliable, and cost-efficient ICT infrastructure.
various scenarios.
What is a potential consequence of this act for A. Reduction in the need for physical
educational institutions? government offices
A. Mandatory use of DICT-approved software in B. Increased taxes to fund the ICT initiatives
schools C. Mandatory ICT training for all citizens
B. Increased access to online learning platforms D. Decreased transparency in government
C. Restriction on the use of foreign ICT transactions
resources 10. The Access to Information and Communications
D. Decreased autonomy in ICT-related decision- Technology Act aims to bridge the digital divide. Which
making of the following actions would best support this goal?
6. The Magna Carta for Philippine Internet Freedom A. Prohibiting the use of social media in schools
(Senate Bill No. 3327) proposes several provisions. B. Providing tax incentives for ICT investments
Which of the following is NOT included in the bill? in rural areas
A. Protection of internet users from censorship C. Limiting internet access to government-
B. Ensuring network neutrality approved sites
C. Regulation of content creation on the D. Requiring all citizens to own a computer
internet
D. Promotion of internet rights and governance
7. The Free Internet Access in Public Places Act
(Republic Act No. 10929) provides free internet access
in public places. How might this law affect students’
online behavior?
A. It may increase instances of cyberbullying
due to wider internet access.
B. It could lead to a decrease in the use of
internet cafes.
C. It might improve research capabilities with
increased access to information.
D. It could reduce the digital divide among
students from different socioeconomic
backgrounds.
8. The Child Online Safety Act aims to protect children
from harmful online content. Which of the following
strategies is NOT typically included in such legislation?
A. Implementing age verification systems
B. Mandating ‘safe search’ filters on school
computers
C. Banning the use of smartphones by minors
D. Educating children about responsible online
behavior
9. The E-Government Act (Republic Act No. 10844)
promotes the use of ICT in government services. Which
of the following is a likely benefit for citizens?