0% found this document useful (0 votes)
11 views4 pages

WW-Digital-Safety-Rules-TTL-1

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 4

Eastern Samar State University

College of Education
Borongan City

COURSE HANDOUT

TECHNOLOGY FOR
TEACHING AND
LEARNING 1

Submitted by:

Magpili, Angelica D.
Alcantara, Ivy Jin P.
________________________
(BSEd, 3A)

Submitted to:

___LINA MAE C. CUAREZ___


Instructor

First Semester
School Year 2024-2025

Unit 1
Introduction to Technology for Teaching and Learning

OBJECTIVES
At the end of the discussion, the BSEd 3A are expected to attain the
following with at least 85% proficiency level:
a) define what is digital safety rules
b) explain the five digital safety rules and;
c) give examples on how to practice the digital safety rules.

INTRODUCTION
What is Digital Safety Rules?
➢ Digital safety, frequently referred to as internet safety, online safety,
or cyber safety encompasses many things. At the core of digital
safety is protecting ourselves, our families and others as we connect
through digital devices.
➢ Digital safety rules are guidelines designed to help individuals,
especially children and young people, use digital technologies
safely and responsibly.

Digital Safety Rules:


Rule 1: Research before you register
- Joining any online community, find out if the host site offers settings
that will allow you to control who can view your profile, because
different sites offer different levels of protection

Rule 2: Discriminate
- encourages users to develop a discerning eye when navigating the
internet, specifically focusing on identifying legitimate websites
from those that might be illegitimate or potentially harmful.
- Stick to online activity that doesn’t require your full name or contact
information. Always be skeptical of a site that asks for your E-mail,
credit card number, or home address. Hackers can only access the
information provided over the web.

Why is this rule important?


• Protects personal information
• Reduce risk of identity theft and etc.
• Maintains control over online presence
• Avoid malware infections

Rule 3: Think before Typing


- Every type that you enter may be used against you. You should be
aware and conscious on what you are going to do through digital
platforms. Staying lowkey is a good thing to do when using the
internet. Don’t share a lot of information and keep your privacy on
check.

Rule 4: Require ID
- Some sites might require for your ID for verification purposes, be
sure to remember rule number one when you come up at this point.
Only use your ID if the site is verified and legit. Do some
background speculation and trust your guts after gaining
information.

Rule 5: Trust your guts


- If you encounter a situation that feels uncomfortable or wrong,
there’s a good chance that something’s up. Any time you feel
threatened by a person or situation on the web, don’t hesitate to
report it to your parents, the police, or the site administrators.

ACTIVITY #1 (Digital Safety Charades)


Direction: The students will be divided into four groups. One person from
each team will draw a card and act out the digital safety rule without
speaking. Their team members will guess the rule. Award points for each
correctly guessed rule.
CHARADES:
Rule 1: Research before you register
Rule 2: Discriminate
Rule 3: Think before typing
Rule 4: Require ID
Rule 5: Trust your gut

ACTIVITY #2 (Digital Safety Roleplaying)


Direction: Divide the class into 4 groups. Each group receives a scenario
and assigns roles to different students. They then act out the scenario,
applying digital safety rules to navigate the situation. After each role-
playing session, discuss the scenario, the digital safety rules that were
applied, and any other relevant points.

EVALUATION (5 points each)


Answer the following.
A. Give the five Digital Safety Rules.
B. Make an essay about the importance of practicing Digital Safety
Rules.

REFERENCES
https://www.scribd.com/presentation/440255366/Digital-Safety-Rules
https://youtu.be/wT1UkDmu1PM?si=0aXsx6ibl3SI3xRm

You might also like