You are on page 1of 52

MEDIA AND INFORMATION

LITERACY(MIL)
Legal, Ethical, and Societal Issues
in Media and Information
Digital Citizenship, Netiquette, Digital Footprints
and Digital Issues in the Philippines
WHAT IS DIGITAL CITIZENSHIP?
is the norms of appropriate,
responsible technology use.
(http://www.digitalcitizenship.net/)

Digital a holistic and positive approach to


Citizenship helping children learn how to be
safe and secure, as well as smart
and effective participants in a
digital world
(http://mcc.gse.harvard.edu/files/gse-
mcc/files/social_media_resource_list_0_0.pd
f)
KEY PRINCIPLES WITH ELEMENTS OF DIGITAL
CITIZENSHIP
Respect Educate Protect
Yourself/
Yourself/ Connect with
Yourself/
Respect Others Others Protect Others
Digital Digital Rights
Digital
Access and
Literacy Responsibility
Digital Digital Digital
Etiquette Communicati Safety
on (Security)
Digital Digital Health
Digital Law Commerce and Welfare
DIGITAL ACCESS
1. Digital Access:
full electronic participation in society
Technology users need to be aware that not
everyone has the same opportunities when it
comes to technology. Working toward equal
digital rights and supporting electronic access is
the starting point of Digital Citizenship.
HOW CAN YOU TAP INTO
YOUR COMMUNITY TO
NARROW THE DIGITAL
DIVIDE?
DIGITAL ETIQUETTE
Digital Etiquette:
electronic standards of conduct or
procedure
It is not enough to create rules and policy,
we must teach everyone to become
responsible digital citizens in this new
society.
TINKER V. DES MOINES

https://www.aclu.org/other/tinker-v-des-moines-landmark-supreme-court-ruling-behalf-
student-expression
The authority of educational
institutions over the conduct of
students must be recognized, it
cannot go so far as to be violative
of constitutional safeguards.
While the highest regard must be afforded the
exercise of the rights to free speech, this should
not be taken to mean that school authorities are
virtually powerless to discipline students. The
“conduct by the student, in class or out of it,
which for any reason—whether it stems from
time, place, or type of behavior—materially
disrupts classwork or involves substantial
disorder or invasion of the rights of others is, of
course, not immunized by the constitutional
guarantee of freedom of speech.
VIVARES
V. ST. THERESA’S COLLEGE
Julia and Julienne, both minors, were graduating
high school students at St. Theresa’s College (STC),
Cebu City. Sometime in January 2012, while
changing into their swimsuits for a beach party they
were about to attend, Julia and Julienne, along with
several others, took digital pictures of themselves
clad only in their undergarments. These pictures
were then uploaded by Angela on her Facebook
profile.
VIVARES
V. ST. THERESA’S COLLEGE
At STC, Mylene Escudero, a computer teacher
at STC’s high school department, learned from
her students that some seniors at STC posted
pictures online, depicting themselves from the
waist up, dressed only in brassieres.  Escudero
then asked her students if they knew who the
girls in the photos are. In turn, they readily
identified Julia and Julienne, among others.
VIVARES
V. ST. THERESA’S COLLEGE
Using STC’s computers, Escudero’s students
logged in to their respective personal Facebook
accounts and showed her photos of the identified
students, which include: (a) Julia and Julienne
drinking hard liquor and smoking cigarettes inside
a bar; and (b) Julia and Julienne along the streets
of Cebu wearing articles of clothing that show
virtually the entirety of their black brassieres.
VIVARES V. ST. THERESA’S
COLLEGE
Also, Escudero’s students claimed that
there were times when access to or the
availability of the identified students’
photos was not confined to the girls’
Facebook friends, but were, in fact,
viewable by any Facebook user.
Investigation ensued. Then Julia, Julienne
and other students involved were barred
VIVARES
V. ST. THERESA’S COLLEGE
Petitioners, who are the respective
parents of the minors, filed a Petition for
the Issuance of a Writ of Habeas Data
NATURE OF WRIT OF
It
HABEAS DATA
is a remedy available to any person
whose right to privacy in life, liberty or
security is violated or threatened by an
unlawful act or omission of a public official
or employee, or of a private individual or
entity engaged in the gathering, collecting
or storing of data or information regarding
the person, family, home and
correspondence of the aggrieved party
Whether or not there was indeed an
actual or threatened violation of the
right to privacy in the life, liberty, or
security of the minors involved in
this case, is there a right to
informational privacy in online
social network activities of its
users?
NO PRIVACY INVASION BY
STC
Petitioners failed to prove the existence of an actual or
threatened violation of the minors’ right to privacy, one
of the preconditions for the issuance of the writ of
habeas data.
The photos, having been uploaded on Facebook without
restrictions as to who may view them, lost their privacy
in some way.
STC gathered the photographs through legal means and
for a legal purpose, that is, the implementation of the
school’s policies and rules on discipline
The school may impose disciplinary action
against students (and even teachers) if,
after due process and investigation, it can
be shown that the conduct or posts in the
cyberspace:
1) disrupts activity in the school or
substantially interferes with school policies;
2) impinges on other people’s rights;
3) violates the school’s code of discipline;
4) damages the school’s reputation; and
HOW CAN YOU SOLVE OR PREVENT
CYBERBULLYING?

TEACH CONSEQUENCES
TEACH EMPATHY
TEACHING IDENTITY STRENGTH
DIGITAL LAW
Digital Law:
electronic responsibility for actions and
deeds
Digital law deals with the ethics of
technology within a society. Unethical use
manifests itself in form of theft and/or
crime. Ethical use manifests itself in the
form of abiding by the laws of society.
Users need to understand that stealing or
causing damage to other people’s work,
identity, or property online is a crime.
There are certain rules of society that
users need to be aware in a ethical
society. These laws apply to anyone who
works or plays online. Hacking into others
information, downloading illegal music,
DIGITAL LITERACY
Digital Literacy:
process of teaching and learning about
technology and the use of technology
A renewed focus must be made on what
technologies must be taught as well as
how it should be used. New technologies
are finding their way into the work place
that are not being used in schools
In addition, workers in many different
occupations need immediate information
(just-in-time information). This process
requires sophisticated searching and
processing skills (i.e., information
literacy). Learners must be taught how to
learn in a digital society. In other words,
learners must be taught to learn anything,
DIGITAL COMMUNICATION
Digital Communication:
electronic exchange of information
In the 21st century, communication options have
exploded to offer a wide variety of choices (e.g.,
e-mail, cellular phones, instant messaging). The
expanding digital communication options have
changed everything because people are able to
keep in constant communication with anyone
else. Unfortunately, many users have not been
DIGITAL COMMERCE
Digital Commerce:
electronic buying and selling of goods
Technology users need to understand that
a large share of market economy is being
done electronically. Legitimate and legal
exchanges are occurring, but the buyer or
seller needs to be aware of the issues
associated with it. Users need to learn
DIGITAL RIGHTS AND
RESPONSIBILITY
Digital Rights & Responsibilities:
those freedoms extended to everyone in
a digital world
There is a basic set of rights extended to every
digital citizen. Digital citizens have the right to
privacy, free speech, etc. Basic digital rights
must be addressed, discussed, and understood in
the digital world. With these rights also come
responsibilities as well. Users must help define
DIGITAL SAFETY (SECURITY)
Digital Security:
electronic precautions to guarantee
safety
It is not enough to trust other members in
the community for our own safety. We
need to have virus protection, backups of
data, and surge control of our equipment.
As responsible citizens, we must protect
DIGITAL HEALTH AND WELFARE

Digital Health & Wellness:


physical and psychological well-being in a
digital technology world
Eye safety, repetitive stress syndrome, and
sound ergonomic practices are issues that need
to be addressed in a new technological world.
Beyond the physical issues are those of the
psychological issues that are becoming more
prevalent such as Internet addiction.
Users need to be taught that there are
inherent dangers of technology. Digital
Citizenship includes a culture where
technology users are taught how to
protect themselves through education and
training.
WHAT IS NETIQUETTE?

set of rules for behaving


properly online
( The Core Rules of Netiquette by Virginia Shea )

Netiquette respecting other users’ views


and displaying common
courtesy when posting your
views to online discussion
groups
(http://www.bbc.co.uk/webwise/guides/about-
netiquette)
THE CORE RULES OF
NETIQUETTE
THE CORE RULES OF NETIQUETTE. SHEA, V. (1994).
CORE RULES OF NETIQUETTE. NETIQUETTE (ONLINE
ED., PP. 32-45). SAN FRANCISCO: ALBION BOOKS.

http://www.albion.com/netiquette/introduction.html
http://learning.colostate.edu/guides/guide.cfm?guideid=4
RULE 1: REMEMBER THE HUMAN
RULE 2: ADHERE TO THE SAME STANDARDS OF
BEHAVIOR ONLINE THAT YOU FOLLOW IN REAL LIFE
RULE 3: KNOW WHERE YOU ARE IN
CYBERSPACE
RULE 4: RESPECT OTHER PEOPLE'S TIME
AND BANDWIDTH
RULE 5: MAKE YOURSELF LOOK GOOD
ONLINE
RULE 6: SHARE EXPERT KNOWLEDGE
RULE 7: HELP KEEP FLAME WARS UNDER
CONTROL
RULE 7: HELP KEEP FLAME WARS UNDER
CONTROL
RULE 8: RESPECT OTHER PEOPLE'S PRIVACY
RULE 9: DON'T ABUSE YOUR POWER
RULE 10: BE FORGIVING OF OTHER
PEOPLE'S MISTAKES
PICTURE ANALYSIS

A digital footprint is a trail of data you create


while using the Internet.
WHAT IS DIGITAL FOOTPRINTS?
FORMATIVE ASSESSMENT:
RECITATION
1. What is your digital footprint?
2. What do you want your digital
footprint to say about you?
3. Is a positive digital reputation
important? Why?
GMA NETWORK CAMPAIGN AGAINST
CYBERBULLYING

Heart Over Hate


.(2016) GMA Network. YouTube. Retrieved October
9, 2016, from
https://www.youtube.com/watch?v=4Y-Zhai6s4g
https://www.youtube.com/watch?v=9lSX0tjgiSE
FORMATIVE ASSESSMENT:
RECITATION
1. What digital issues were presented
in the given news?
2. Why do internet addiction and
cyberbullying an alarming digital
issues at present?
3. How can you help in preventing
internet addiction and
cyberbullying in our school?
REFERENCES
• Media and Information Literacy Curriculum
Guide by DepEd
• Media and Information Literacy by Boots C.
Liquigan, Diwa Learning Systems Inc.
• http://
mcc.gse.harvard.edu/files/gse-mcc/files/soc
ial_media_resource_list_0_0.pdf
• http://www.digitalcitizenship.net/
REFERENCES
• https://www.commonsensemedia.org/educato
rs/digital-citizenship
• http://
www.edutopia.org/blogs/tag/digital-citize
nship
• http://
www.albion.com/netiquette/introduction.h
tml
• http://
REFERENCES
• http://connectedconsulting.com/resources/twenty-f
irst-century-skills/digital-citizenship/
• http://
www.bbc.co.uk/webwise/guides/about-netiquett
e
• http://
learning.colostate.edu/guides/guide.cfm?guidei
d=4
• http://
www.bcps.org/offices/lis/models/slamdunks/digit
alfootprint_ms/InCtrl_EssentialQuestions.pdf
PHOTO CREDITS
• http://
internetconduct.blogspot.com/2012/12/netiquette-rule-1-re
member-human.html
• http://www.memecenter.com/fun/186887/golden-rule
• http://www.physio-pedia.com/Where_to_Start%3F
• http://time.com/4457110/internet-trolls/
• https
://www.diygenius.com/10-free-online-courses-in-social-media
-and-inbound-marketing
/
• http://
internetconduct.blogspot.com/2012/12/netiquette-rule-4-resp
PHOTO CREDITS
• http
://www.communication-relation.com/pages/au-service-de-l-en
treprise/transmission-de-competences/formation-de-formateu
r
/
• http://
www.buzzle.com/articles/what-is-a-flame-war-and-how-to-avoi
d-it.html
• http://knowyourmeme.com/photos/488476-flaming
• http://lerablog.org/internet/the-importance-of-internet-priva
cy-and-how-to-protect-your-privacy-with-a-vpn-service
/
• http://screenrant.com/most-powerful-marvel-comics-villains/

You might also like