You are on page 1of 86

Cybersafe Trainers’ training

FOR TEACHERS
May 29, 2019

#BeCyberSafe
RESPONSE STRATEGY

How do we make the


internet a SAFE space
for children?
RESPONSE STRATEGY

HOW??
P.E.I.
P.E.I.
in Practice…
POLICIES AND PRACTICES

• Integrating Anti Bullying Policies


and Online Safety Policies in our
school child protection policies
• Create a Localized Code of Conduct
• Adoption of Anti-Bullying Policies
Prevention Programs
DepEd Order 40, s.2012
Section 6
All public and private schools shall adopt bullying
prevention programs. These programs shall be
applicable to all students regardless of level of
risk or vulnerability to bullying. Said programs
shall also be comprehensive, multi-faceted and
shall involve all education stakeholders and
personnel. The programs may contain among
others:
School-wide initiatives

Classroom-level initiatives

Involving parents in
prevention activities
INFRASTRUCTURE & TECHNOLOGY

Maximizing online
reporting
and take down tools
EDUCATION AND TRAINING

Teach children about


Online Safety and
Resiliency
Cybersafe
Education
Whatever we do
Online to Offline
online,
Consequences
also has offline
consequences.
The Concept of Strangers
Strangers are people we do
not know. This is the same
both offline and online.
The way we interact with
strangers offline should be
the same online.
Private Information
Private
How wouldInformation are
this affect
Think about us,
you or things
your about
loved ones
which should
if others not be
get to access
consequences.
shared with anyone.
this information?
If it involves the private
body parts, (e.g. someone
asks you to show your
private body parts, or
shows his/hers to you), then
it is definitely a red flag!
Recognizing Online Red Flags

If you feel uncomfortable because of


something you saw/heard/read online,
or because of an online interaction,
then consider this as a potential red flag.
HOW DO WE RESPOND?
If you do encounter
an online red flag,
stop the online
interaction, and tell a
trusted adult about
the experience.
Increased online protective
behaviour of children such
as increased digital privacy,
and recognition of abusive
behavior online
Online Safety
NOT only about
isbehavioral change
technology.
It is about. . .
There was an expressed
need from participants
during the National
DepEd Child Protection
Trainings for Online Safety
Lesson Plans
an initiative of DepEd
through the Office of the
Undersecretary for Legal
Affairs and Stairway
Foundation
Cybersafe
Lesson Model
www.cybersafe.asia
an evidence based initiative that
responds to the need to provide
localized child protection
education to students in the
context of the online world
Grades 5-6
Grades 5-6

http://www.cybersafe.asia/wp-
content/uploads/2016/05/Cybersafe_
Manual_1_final_LOWRES.pdf
Grades 5-6
Junior High
Junior High

http://www.cybersafe.asia/wp-
content/uploads/2016/05/CyberSafe_
Manual_2_final_LOWRES.pdf
Junior High
Grades 1-4
Use the experiential learning method

Takes into account


children’s
developmental stages
and how it affects their
online behavior
Use the experiential learning method
Creates an active dialogue
between teachers and
students to discuss issues
which they might not have
any opportunity to discuss
in their other spheres of life
HOW DO WE RESPOND?

Experimental
Learning Method
RISKS HARM
 Potential Danger  Is already dangerous
 Can be Mitigated  Is abusive to children
 Is not always harmful  There are no justification
Children’s Rights and ICT
Internet access is now deemed
as a right of children towards
access to information(child
participation) and as a vehicle
for self expression
Cybersafe Trainers’ training
MATERIALS

#BeCyberSafe
AWARENESS – “Project Unfriend”
Supplementary
CyberSafe
Materials
CYBERSAFE MATERIALS

IMMAP - - - Dalir-eskwela

Stairway CyberSafe E-Learning

Facebook
Digital Literacy Library
EDUCATION – Dalir-Eskwela
EDUCATION – Dalir-Eskwela
EDUCATION – Dalir-Eskwela
EDUCATION – Dalir-Eskwela
To Continue EDUCATION at Home

https://www.cybersafe.asia/dalir-eskwela
STAIRWAY FOUNDATION MATERIALS
FACEBOOK DIGITAL LITERACY MODULES
Handling COP Concerns

#BeCyberSafe
How to respond to
a child online
protection concern?
a. Immediate Responses
1. The victim or anyone who witnesses or has personal
knowledge of a bullying incident or retaliation shall
immediately call the attention of any school personnel.
2. The school personnel who was notified of a bullying
incident or retaliation shall intervene, by:
i. Stopping the bullying or retaliation immediately;
ii. Separating the students involved;
iii. Removing the victim or, in appropriate cases, the
bully or offending student, from the site;
v. Ensuring the victim’s safety, by:
– Determining and addressing the victim’s immediate safety needs; and
– Ensuring medical attention, if needed, and securing a medical
certificate, in cases of physical injury.
– Bringing the bully to the Guidance Office or the designated school
personnel.
Protective and Remedial Measures
violations of the prohibited acts
by school personnel
(criminal and civil case)
Do. 40, Series of 2012
SCREENSHOT
• Always do it via the school desktop or laptop
• Use the snipping tool
• Include the URL (www.______)
• Make sure the screenshot process is documented (written)
and is only stored for reporting purposes to the authorities.
• The save location should be password protected
• After reporting, copies of the screenshots should be securely
deleted.
• You can use a secure file deletion program.
0921-884-5567
TRAFFICKING HOTLINE:

1343
Interventions which are
non-punitive in nature and are inline
with the Juvenile Justice Welfare Act
REMEMBER the DepEd case management protocols!

(DepEd CPP – Adult to Child, Child Abuse)


DO no.40, s. 2012
(Anti-Bullying IRR-Child to Child)
DO no.55, s.2013
(Children at Risk – Child to Adult, Child to Child CICL)
DO no.18, s.2015
• We are directed by the DepEd Child Protection Policy or
DO 40, s. 2012 to build the capacities of school personnel,
students, and parents to understand cyber issues that
affect children.
• This is also furthered by the DepEd Anti-Bullying Policy or
DO 55, s. 2013 by reinforcing the need for school-wide and
classroom-level initiatives to prevent cyberbullying, among
other child online protection concerns.
Child protection trainings, such as
Cybersafety, can be charged to GAD
per DM 110, s. 2018.
Include the trainings and orientations in your
School Annual Investment Plan and
WFP/School Operating Budget
POST-TEST
1. Ang Internet ay LAGING masamang impluwensya sa mga bata
2. Kahit hindi totoong bata ang nasa material ito ay child
pornography pa rin
3. Kapag kusang naghubad sa harap ng webcam ang isang bata, ay
hindi maituturing na victim
4. Ang CONTENT risk ay ang mga SARALING ASAL NG MGA BATA
ONLINE
5. Ang CONTACT risk ay ang PAGHUHUBAD ng mga BATA sa HARAP
ng WEBCAM
6. Ang CONDUCT risk ay ang mga ONLINE PREDATORS
POST-TEST
7. Ang OSAEC ay ang financial na pambibiktima sa mga bata sa
pamamagitan ng Internet
8. Ang experiential learning method ay ang DIRETSO na pagbibigay
ng information sa mga bata
9. Ang pag share online ng mga video ng bata na na-Bully ay tulong
sa mga biktima para makamit ang mga hustisya
10. Ang CyberSafety ay ang pagtuturo sa mga bata kung papaano
maging digital experts sa pag-gamit ng technology.
ROLL-OUT

Re-Echo Implementation of
the Lessons

Monitoring and Mentoring/


Evaluation Technical Support
ONLINE EVALUATION

hhtps.//tinyurl.com/espteacherstraining2019

You might also like