SlideShare a Scribd company logo
Lesson 2
NETIZENSHIP AND NETIQUETTE
IN ONLINE COMMUNITIES
REPORTER; CHRISTIAN JAY GAMBOA
L
E
S
S
O
N
O
U
T
C
O
M
E
S
DIFINED NETIZENSHIP AND
NETIQUETTE
FORMULATED A SET OF NETIQUETTE
GUIDELINES
CREATED A CAMPAIGN VIDEO TO
PROMOTE NETIQUETTE
 NETIZENSHIP – A person who is a frequent or
habitual user of the internet.
 NETIQUETTE - The correct or acceptable way of
communicating on the internet.
STUDY THE CASE
 The case involved two minor students from a certain school
whose photos were posted on Facebook. The photos , which were
uploaded by one of their friends showed the students drinking and
smoking in a bar, and wearing just undergarments on a street. The
photos were shown by one of the Facebook friends of the girls to
the school officials prompting them to ban the students from
marching in their graduation rites. According to the school, the
student violates the school code of conduct.
 The parents of the students in defense filed a petition for the
issuance of writ of habeas data and asked the court to order the
school to surrender and deposit all soft and printed copies of the
photographs, and to declare they have been illegally obtained in
violation of the children's right to privacy.
Discussion
1. After weighing all the information, with whom will
you side- to the parents or to the school?
2. What are your reasons for siding with the parents?
The school?
3. Simulate the court hearing with the judge.
 The court dismissed the parents petition and ruled that.” the school did not violates the minors
privacy rights.” According to the court , the school cannot be faulted for being “steadfast in its duty
of teaching its students to be responsible in their dealings and activities in cyberspace, particularly
in social network, when it enforce the disciplinary actions specified in the students handbook,
absent a showing that in the process, it violated the students rights”
 The decision of the court stated that the student cannot invoke the protection attached to the
rights to information privacy because the photos were seen by other students of the school, who in
turn showed them to the computer teacher who reported the incident to the school authorities. In
the language of the court. The photos having been uploaded on facebook without restrictions as
to who may view them, lost their privacy in some ways. The court further added in its ruling that
setting their post privacy to friends only is not assurance that it can no longer be viewed by
another user who is not facebook friends with the source of content. The decision read that,
without proof that they placed the photographs subject of this case within the ambit of their
protected zone of privacy, they cannot now insist that they have an expectation of privacy with
respect to the photographs in question.
 The decision of the court puts the burden of ensuring
safeguarding privacy online users and expects them to exercise
due diligence in their online dealings and activities. According to
the court, not discounting the role of school and parents in
disciplining and educating their children to be good digital citizens
self regulations the best means of avoiding privacy rights
violations , it further issued a ruling saying that nothing is ever
private on Facebook, even those tagged as private never really
escape public viewing, including unintended audiences.
 The Philippines being considered as social media capital of the
world, has a need to stress social media education and etiquette
among online users.
 the above example underscored the need to used social media
responsibly.
In the previous lesson, we have understood our roles and
responsibilities as global digital citizens. Our membership in the
virtual community requires that we behave appropriately and act
responsibly.
 While working online we all create digital tattoo and we leave
digital footprints.
 Scrutinizing the term again a netizen, according to the
Merriam Webster dictionary {26 April 2018} is an active
participant in the online community of the internet.
As a responsible netizen, we are all expected to support a
healthy interaction on the internet. A netiquette, or socially
accepted behavior online have to be observed in writing an
email.in texting , and other communications on web.
Below are netiquette guidelines:
1. Protect your reputation
2. Respect others
3. Express yourself clearly and use emoticons
4. Remember the intellectual property
5. Check spelling, grammar and punctuation
6. Pause before you post
7. Do not share you personal information
8. Think about who or what you are representing
Each of us has a significant contribution to the kind of community we have in
the virtual world.
Lesson 3
INTELLECTUAL PROPERTY
RIGHTS ON THE
DEVELOPMENT AND USE OF
DIGITAL MATERIALS
Cited consequences when copyright laws were violated
Defined the copyright laws
Identified examples of intellectual property Right in educational
setting
LESSON OUTCOMES
Plagiarism.org Report that…
A survey of over 63,700 US undergraduate and 9,250 graduate
students over the course of three years (2003-2005) conducted by Donald
McCabe, Rutgers University revealed the following:
1. 36% of undergraduates admit to “paraphrasing/copying few sentences
from internet source without footnoting it”
2. 24% of graduate student self report doing the same
3. 38% admit to “paraphrasing/copying few sentences from written
source without footnoting it”
4. 25% of graduate student self report doing the same
5. 14% of student admit to :fabricating/falsifying a bibliography”
6. 7% of graduate student self report doing so
7. 7% self report copying material “almost word for word from a written
source without citation.
8. 4% of graduate student self report doing the same
9. 7% self report “turning in work done by another”
10. 3% of graduate student self report doing the same
11. 3% report “obtaining paper from term paper mill”
12. 2% of graduate student report doing so
The Josephson institute Center for Youth Ethics Surveyed 43,000 high school student
in public and private school found that:
1. One out of three high school students admitted that they used internet to
plagiarize an assignment.
What do the survey data imply?
Intellectual Property Right
 Intellectual property is important in fostering innovation. Without protection of
ideas, individual will not be able to enjoy the full benefit of their invention and
they would not be compensated for their creation.
 Intellectual property, according to World Intellectual Property Organization
(WIPO), refers to creations of the mind such us invention; literary and artistic
works design and symbols, names and image used in commerce,
 An intellectual property rights is a right held by a person or by a company to
have exclusive rights over these.
 Internationally, these intellectual properties are protected by the world
intellectual property organization to which the Philippines is one of the 191
member states.
 In our country , we have the intellectual property office of the
Philippines.(IPOPHIL)
 Which administer and implements state policies in relation to intellectual property.
 This office was created through Republic Act 8293. this act defines intellectual property
to include copyrights and related rights; trademarks and service marks; geographic
indication; industrial design; patents; layout design. In educational setting, copyright
and related right are the ones applicable.
COPY RIGHT
Copy right refers to the legal right given to the owner of the original work or intellectual
property.
This works are original intellectual creation in the literary and artistic domain protected
from the moment of their creation which include the following:
1. Books, pamphlets, articles, and other writings
2. Periodicals and news papers
3. Lectures, sermons, addresses, dissertation prepared for oral delivery
4. Letters
5. Dramatic or dramatico-musical compositions; choreographic works or entertainment
in dumb show
6. Musical composition with or without words.
7. Works of drawing], painting, architecture, sculpture, engraving, lithography
or other work of art; models or designs for work of art.
8. Original ornamental design or models for articles of manufacture, whether or nit
registrable as an industrial design for works.
9. Illustration, maps, plans, topography, architecture or science.
10. Drawings or works 0f a scientific or technical character
11. Photographic works including works produce by a process analogues to
photography, lantern slide, etc..
 The internet is very rich source of these materials and we should be
careful in using them this works are protected by the sole act of their
creation, irrespective of their form or mode of creation as well as of
their content, quality and purpose.
 Now that copy and paste are very accessible command in our
computer toolbars, we should try not to violate the copyright law
otherwise we could be accused of copyright infringement.
 Copyright infringement is the used of works without permission
where the copyrights holder has the exclusive right to reproduce,
distribute, display or perform the protected work, or to make
derivative work, proper citations should be used when including them
in our output.
Below are the guidelines on online use of copyrighted materials by
Smaldino, Lowther and Russel (2012)
1. Contrary to popular opinion, all material on the internet is copyrighted unless
stated otherwise. It is copyrighted even if it does not display the copyright
symbol.
2. An email is an original work, fixed an a tangible medium of expression, that is
covered by copyright.
3. Downloading an article from news papers website, making copies, and
distributing them to you student prior to a class discussion on the topic is
permissible following the current photocopying guidelines which permits
making multiple copies for classroom use.
4. You cannot post student essay, poems, or other works on the school website
unless you have permission of the students and parents or guardian,
5. Educator should treat copyrighted materials from the internet the same
way they do to print formats.
In research
copyrights is punish by the law. Using the available resource materials or
interviewing a knowledgeable person such lawyers, research for the penalties
on violations of the copyright law.
Copyright infringement vs. Plagiarism
Another violation on intellectual property is plagiarism and copyright
infringement are related ideas, these two are different plagiarism, according
to plagiarism.org is an act of fraud it involves both stealing someone else
work and lying about it.
 In other words, plagiarism refers to copying the work of
another and claiming it as ones ideas or without proper
attribution while copyright infringement is copying ones work
without obtaining permission, in this sense, copyright
infringement is violation of the rights of the copyright holder
while plagiarism is violation of the right of the author.
THANK YOU AND GODBLESS

More Related Content

What's hot

AL-120-TECH_FOR_TEACHING_AND _LEARNING 2.docx
AL-120-TECH_FOR_TEACHING_AND _LEARNING 2.docxAL-120-TECH_FOR_TEACHING_AND _LEARNING 2.docx
AL-120-TECH_FOR_TEACHING_AND _LEARNING 2.docx
KRISTELLELOUCOMBATER1
 
SAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULES
SAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULESSAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULES
SAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULES
NethBataller1
 
LEV VYGOTSKY SOCIO-CULTURAL THEORY OF DEVELOPMENT
LEV VYGOTSKY SOCIO-CULTURAL THEORY OF DEVELOPMENTLEV VYGOTSKY SOCIO-CULTURAL THEORY OF DEVELOPMENT
LEV VYGOTSKY SOCIO-CULTURAL THEORY OF DEVELOPMENT
Leizel Despi
 

What's hot (20)

Cyber / digital literacy.pptx
Cyber / digital literacy.pptxCyber / digital literacy.pptx
Cyber / digital literacy.pptx
 
The Role of Technology in Curriculum Delivery
The Role of Technology in Curriculum DeliveryThe Role of Technology in Curriculum Delivery
The Role of Technology in Curriculum Delivery
 
Values education personhood development lecture 2
Values education  personhood development lecture 2Values education  personhood development lecture 2
Values education personhood development lecture 2
 
Legal bases of philippine educational system
Legal bases of philippine educational systemLegal bases of philippine educational system
Legal bases of philippine educational system
 
AL-120-TECH_FOR_TEACHING_AND _LEARNING 2.docx
AL-120-TECH_FOR_TEACHING_AND _LEARNING 2.docxAL-120-TECH_FOR_TEACHING_AND _LEARNING 2.docx
AL-120-TECH_FOR_TEACHING_AND _LEARNING 2.docx
 
Components of S&I Ed..pptx
Components of S&I Ed..pptxComponents of S&I Ed..pptx
Components of S&I Ed..pptx
 
SAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULES
SAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULESSAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULES
SAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULES
 
LEV VYGOTSKY SOCIO-CULTURAL THEORY OF DEVELOPMENT
LEV VYGOTSKY SOCIO-CULTURAL THEORY OF DEVELOPMENTLEV VYGOTSKY SOCIO-CULTURAL THEORY OF DEVELOPMENT
LEV VYGOTSKY SOCIO-CULTURAL THEORY OF DEVELOPMENT
 
Lesson 2 An Overview: Educational Technology 2
Lesson 2 An Overview: Educational Technology 2Lesson 2 An Overview: Educational Technology 2
Lesson 2 An Overview: Educational Technology 2
 
Digital literacy skills in the 21st century
Digital literacy skills in the 21st centuryDigital literacy skills in the 21st century
Digital literacy skills in the 21st century
 
ETHICS_REPORTING.pdf
ETHICS_REPORTING.pdfETHICS_REPORTING.pdf
ETHICS_REPORTING.pdf
 
Santrock and Havighurst's Developmental Stages
Santrock and Havighurst's Developmental StagesSantrock and Havighurst's Developmental Stages
Santrock and Havighurst's Developmental Stages
 
Digital Citizenship vs Global Citizenship
Digital Citizenship vs Global CitizenshipDigital Citizenship vs Global Citizenship
Digital Citizenship vs Global Citizenship
 
REGULAR AND SPED Compared
REGULAR AND SPED ComparedREGULAR AND SPED Compared
REGULAR AND SPED Compared
 
Collection of teaching guidelines wl exceptionalities
Collection of teaching guidelines wl exceptionalitiesCollection of teaching guidelines wl exceptionalities
Collection of teaching guidelines wl exceptionalities
 
Addressing diversity
Addressing diversityAddressing diversity
Addressing diversity
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpoint
 
Educational philosophies.matrix form
Educational philosophies.matrix formEducational philosophies.matrix form
Educational philosophies.matrix form
 
Module 1 - The Teaching Profession.pdf
Module 1 - The Teaching Profession.pdfModule 1 - The Teaching Profession.pdf
Module 1 - The Teaching Profession.pdf
 
Ict policies and issues
Ict policies and issuesIct policies and issues
Ict policies and issues
 

Similar to case study.pptx

Digital citizenship ss
Digital citizenship ssDigital citizenship ss
Digital citizenship ss
Lenva Shearing
 
Copyright policy critique
Copyright policy critiqueCopyright policy critique
Copyright policy critique
Laurie Roberts
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
Mazni Salleh
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 version
Johan Koren
 
Naughty or nice 2003 version
Naughty or nice 2003 versionNaughty or nice 2003 version
Naughty or nice 2003 version
Johan Koren
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
Johan Koren
 
Fernando 1Sheehan FernandoProfessor MorrisonEnglish 1001.docx
Fernando 1Sheehan FernandoProfessor MorrisonEnglish 1001.docxFernando 1Sheehan FernandoProfessor MorrisonEnglish 1001.docx
Fernando 1Sheehan FernandoProfessor MorrisonEnglish 1001.docx
ssuser454af01
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
lahill16
 
Copyright presentation
Copyright presentationCopyright presentation
Copyright presentation
YvetteBarron01
 

Similar to case study.pptx (20)

MIL MODULE 03.pptx
MIL MODULE 03.pptxMIL MODULE 03.pptx
MIL MODULE 03.pptx
 
Lesson 3 ethical issues
Lesson 3   ethical issuesLesson 3   ethical issues
Lesson 3 ethical issues
 
Digital footprints
Digital footprintsDigital footprints
Digital footprints
 
Cruz s professional ethics powerpoint
Cruz s professional ethics powerpointCruz s professional ethics powerpoint
Cruz s professional ethics powerpoint
 
Digital citizenship ss
Digital citizenship ssDigital citizenship ss
Digital citizenship ss
 
Copyright policy critique
Copyright policy critiqueCopyright policy critique
Copyright policy critique
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 version
 
Copyright Clarity at NESA in Amman, Part III
Copyright Clarity at NESA in Amman, Part IIICopyright Clarity at NESA in Amman, Part III
Copyright Clarity at NESA in Amman, Part III
 
Social media (sanju)
Social media (sanju)Social media (sanju)
Social media (sanju)
 
Naughty or nice 2003 version
Naughty or nice 2003 versionNaughty or nice 2003 version
Naughty or nice 2003 version
 
Cruz s professional ethics student lesson powerpoint
Cruz s professional ethics student lesson powerpointCruz s professional ethics student lesson powerpoint
Cruz s professional ethics student lesson powerpoint
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
LSC530 Kids, Authorship, Copyright and Fair Use
LSC530 Kids, Authorship, Copyright and Fair UseLSC530 Kids, Authorship, Copyright and Fair Use
LSC530 Kids, Authorship, Copyright and Fair Use
 
Casanova juanitap.~edtc6340.65copyrightrevision4
Casanova juanitap.~edtc6340.65copyrightrevision4Casanova juanitap.~edtc6340.65copyrightrevision4
Casanova juanitap.~edtc6340.65copyrightrevision4
 
Student Privacy Rights: In and Out of the Classroom
Student Privacy Rights: In and Out of the ClassroomStudent Privacy Rights: In and Out of the Classroom
Student Privacy Rights: In and Out of the Classroom
 
Fernando 1Sheehan FernandoProfessor MorrisonEnglish 1001.docx
Fernando 1Sheehan FernandoProfessor MorrisonEnglish 1001.docxFernando 1Sheehan FernandoProfessor MorrisonEnglish 1001.docx
Fernando 1Sheehan FernandoProfessor MorrisonEnglish 1001.docx
 
First Quater week 7.docx
First Quater week 7.docxFirst Quater week 7.docx
First Quater week 7.docx
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
Copyright presentation
Copyright presentationCopyright presentation
Copyright presentation
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 

case study.pptx

  • 1. Lesson 2 NETIZENSHIP AND NETIQUETTE IN ONLINE COMMUNITIES REPORTER; CHRISTIAN JAY GAMBOA
  • 2. L E S S O N O U T C O M E S DIFINED NETIZENSHIP AND NETIQUETTE FORMULATED A SET OF NETIQUETTE GUIDELINES CREATED A CAMPAIGN VIDEO TO PROMOTE NETIQUETTE
  • 3.  NETIZENSHIP – A person who is a frequent or habitual user of the internet.  NETIQUETTE - The correct or acceptable way of communicating on the internet.
  • 4. STUDY THE CASE  The case involved two minor students from a certain school whose photos were posted on Facebook. The photos , which were uploaded by one of their friends showed the students drinking and smoking in a bar, and wearing just undergarments on a street. The photos were shown by one of the Facebook friends of the girls to the school officials prompting them to ban the students from marching in their graduation rites. According to the school, the student violates the school code of conduct.  The parents of the students in defense filed a petition for the issuance of writ of habeas data and asked the court to order the school to surrender and deposit all soft and printed copies of the photographs, and to declare they have been illegally obtained in violation of the children's right to privacy.
  • 5. Discussion 1. After weighing all the information, with whom will you side- to the parents or to the school? 2. What are your reasons for siding with the parents? The school? 3. Simulate the court hearing with the judge.
  • 6.  The court dismissed the parents petition and ruled that.” the school did not violates the minors privacy rights.” According to the court , the school cannot be faulted for being “steadfast in its duty of teaching its students to be responsible in their dealings and activities in cyberspace, particularly in social network, when it enforce the disciplinary actions specified in the students handbook, absent a showing that in the process, it violated the students rights”  The decision of the court stated that the student cannot invoke the protection attached to the rights to information privacy because the photos were seen by other students of the school, who in turn showed them to the computer teacher who reported the incident to the school authorities. In the language of the court. The photos having been uploaded on facebook without restrictions as to who may view them, lost their privacy in some ways. The court further added in its ruling that setting their post privacy to friends only is not assurance that it can no longer be viewed by another user who is not facebook friends with the source of content. The decision read that, without proof that they placed the photographs subject of this case within the ambit of their protected zone of privacy, they cannot now insist that they have an expectation of privacy with respect to the photographs in question.
  • 7.  The decision of the court puts the burden of ensuring safeguarding privacy online users and expects them to exercise due diligence in their online dealings and activities. According to the court, not discounting the role of school and parents in disciplining and educating their children to be good digital citizens self regulations the best means of avoiding privacy rights violations , it further issued a ruling saying that nothing is ever private on Facebook, even those tagged as private never really escape public viewing, including unintended audiences.
  • 8.  The Philippines being considered as social media capital of the world, has a need to stress social media education and etiquette among online users.  the above example underscored the need to used social media responsibly. In the previous lesson, we have understood our roles and responsibilities as global digital citizens. Our membership in the virtual community requires that we behave appropriately and act responsibly.
  • 9.  While working online we all create digital tattoo and we leave digital footprints.  Scrutinizing the term again a netizen, according to the Merriam Webster dictionary {26 April 2018} is an active participant in the online community of the internet. As a responsible netizen, we are all expected to support a healthy interaction on the internet. A netiquette, or socially accepted behavior online have to be observed in writing an email.in texting , and other communications on web.
  • 10. Below are netiquette guidelines: 1. Protect your reputation 2. Respect others 3. Express yourself clearly and use emoticons 4. Remember the intellectual property 5. Check spelling, grammar and punctuation 6. Pause before you post 7. Do not share you personal information 8. Think about who or what you are representing Each of us has a significant contribution to the kind of community we have in the virtual world.
  • 11. Lesson 3 INTELLECTUAL PROPERTY RIGHTS ON THE DEVELOPMENT AND USE OF DIGITAL MATERIALS
  • 12. Cited consequences when copyright laws were violated Defined the copyright laws Identified examples of intellectual property Right in educational setting LESSON OUTCOMES
  • 13. Plagiarism.org Report that… A survey of over 63,700 US undergraduate and 9,250 graduate students over the course of three years (2003-2005) conducted by Donald McCabe, Rutgers University revealed the following: 1. 36% of undergraduates admit to “paraphrasing/copying few sentences from internet source without footnoting it” 2. 24% of graduate student self report doing the same 3. 38% admit to “paraphrasing/copying few sentences from written source without footnoting it” 4. 25% of graduate student self report doing the same 5. 14% of student admit to :fabricating/falsifying a bibliography” 6. 7% of graduate student self report doing so 7. 7% self report copying material “almost word for word from a written source without citation.
  • 14. 8. 4% of graduate student self report doing the same 9. 7% self report “turning in work done by another” 10. 3% of graduate student self report doing the same 11. 3% report “obtaining paper from term paper mill” 12. 2% of graduate student report doing so The Josephson institute Center for Youth Ethics Surveyed 43,000 high school student in public and private school found that: 1. One out of three high school students admitted that they used internet to plagiarize an assignment. What do the survey data imply?
  • 15. Intellectual Property Right  Intellectual property is important in fostering innovation. Without protection of ideas, individual will not be able to enjoy the full benefit of their invention and they would not be compensated for their creation.  Intellectual property, according to World Intellectual Property Organization (WIPO), refers to creations of the mind such us invention; literary and artistic works design and symbols, names and image used in commerce,  An intellectual property rights is a right held by a person or by a company to have exclusive rights over these.  Internationally, these intellectual properties are protected by the world intellectual property organization to which the Philippines is one of the 191 member states.  In our country , we have the intellectual property office of the Philippines.(IPOPHIL)
  • 16.  Which administer and implements state policies in relation to intellectual property.  This office was created through Republic Act 8293. this act defines intellectual property to include copyrights and related rights; trademarks and service marks; geographic indication; industrial design; patents; layout design. In educational setting, copyright and related right are the ones applicable. COPY RIGHT Copy right refers to the legal right given to the owner of the original work or intellectual property. This works are original intellectual creation in the literary and artistic domain protected from the moment of their creation which include the following: 1. Books, pamphlets, articles, and other writings 2. Periodicals and news papers 3. Lectures, sermons, addresses, dissertation prepared for oral delivery 4. Letters 5. Dramatic or dramatico-musical compositions; choreographic works or entertainment in dumb show
  • 17. 6. Musical composition with or without words. 7. Works of drawing], painting, architecture, sculpture, engraving, lithography or other work of art; models or designs for work of art. 8. Original ornamental design or models for articles of manufacture, whether or nit registrable as an industrial design for works. 9. Illustration, maps, plans, topography, architecture or science. 10. Drawings or works 0f a scientific or technical character 11. Photographic works including works produce by a process analogues to photography, lantern slide, etc..
  • 18.  The internet is very rich source of these materials and we should be careful in using them this works are protected by the sole act of their creation, irrespective of their form or mode of creation as well as of their content, quality and purpose.  Now that copy and paste are very accessible command in our computer toolbars, we should try not to violate the copyright law otherwise we could be accused of copyright infringement.  Copyright infringement is the used of works without permission where the copyrights holder has the exclusive right to reproduce, distribute, display or perform the protected work, or to make derivative work, proper citations should be used when including them in our output.
  • 19. Below are the guidelines on online use of copyrighted materials by Smaldino, Lowther and Russel (2012) 1. Contrary to popular opinion, all material on the internet is copyrighted unless stated otherwise. It is copyrighted even if it does not display the copyright symbol. 2. An email is an original work, fixed an a tangible medium of expression, that is covered by copyright. 3. Downloading an article from news papers website, making copies, and distributing them to you student prior to a class discussion on the topic is permissible following the current photocopying guidelines which permits making multiple copies for classroom use. 4. You cannot post student essay, poems, or other works on the school website unless you have permission of the students and parents or guardian,
  • 20. 5. Educator should treat copyrighted materials from the internet the same way they do to print formats. In research copyrights is punish by the law. Using the available resource materials or interviewing a knowledgeable person such lawyers, research for the penalties on violations of the copyright law. Copyright infringement vs. Plagiarism Another violation on intellectual property is plagiarism and copyright infringement are related ideas, these two are different plagiarism, according to plagiarism.org is an act of fraud it involves both stealing someone else work and lying about it.
  • 21.  In other words, plagiarism refers to copying the work of another and claiming it as ones ideas or without proper attribution while copyright infringement is copying ones work without obtaining permission, in this sense, copyright infringement is violation of the rights of the copyright holder while plagiarism is violation of the right of the author.
  • 22. THANK YOU AND GODBLESS