Day 3: Integrity Online — Responsible Digital Citizenship
Your online choices travel fast and last long. Today you will practice acting with integrity in digital spaces: checking sources, giving credit, protecting privacy, and communicating with respect. We will connect key ideas—digital footprint, consent, misinformation, and plagiarism—to daily actions like posting, sharing, and creating media. You will analyze short cases, test a fact-check flow, and draft clear guidelines for your own accounts. By the end, you will be ready to make posts you can be proud of tomorrow.
By the end of the lesson, you will be able to:
- Apply a 4-step fact-check flow to verify a post and justify your decision to share or stop in 3–4 sentences.
- Differentiate plagiarism, remix, and fair credit by labeling at least five examples correctly and writing proper attributions.
- Design a 5-line personal posting policy that protects privacy, honors consent, and prevents harm.
- Digital Footprint — the lasting record of actions, posts, and data online.
- Consent — permission to share someone’s image, words, or information.
- Misinformation — false or misleading content shared without careful verification.
- Plagiarism — using others’ words/media as your own without credit.
- Attribution — giving proper credit (creator, title, source, date if available).
- Privacy — control over who sees personal data and how it is used.
- Two-Factor Authentication (2FA) — extra login step to secure accounts.
Warm-up: Answer briefly, then check each hidden key.
- Name one post you’re proud of and why.
- What is one risk of oversharing?
- How can credit improve trust online?
Show Answer
Sample: A project summary with clear sources and respectful tone.Show Answer
Unwanted contact, embarrassment later, or identity theft risk.Show Answer
It shows honesty, helps others find the original, and respects creators.How to use this section: Work through each checkpoint. Each includes a mini-goal, guided discussion, real-life tie-in, mini-summary, and three guiding questions with hidden answers.
Checkpoint 1 — Your Digital Footprint
Mini-goal: Understand how posts and metadata form a lasting record of your values.
Guided discussion: Every click can leave traces: posts, comments, likes, tags, locations, and device data. Even deletions may live on in screenshots or archives. This footprint shapes how future classmates, teachers, or employers see you. A helpful rule: imagine your future self reading today’s post aloud to a group you respect. Would you still share it? Footprints are not only risks—they are chances to show growth, kindness, and skill. Think of your account as a portfolio: what patterns would a stranger see? Integrity means aligning your online record with your real values, even when no adult is watching. Small habits—checking tone, using privacy controls, and refusing gossip—build a footprint you can stand by.
Real-life tie-in: A team application asks for your public profiles. Your steady record of respectful comments and credited work strengthens your chances.
Mini-summary: Your footprint is your story. Choose posts that future-you can defend.
- List two parts of a digital footprint beyond posts.
- Why might “delete” not erase harm?
- Write one “future-self” test line.
Show Answer
Comments, likes, tags, locations, device/metadata.Show Answer
Screenshots, shares, and archives can persist.Show Answer
“Would I be proud reading this to my teacher and family next year?”Checkpoint 2 — Consent and Privacy in Sharing
Mini-goal: Apply consent and privacy principles before posting others’ images or stories.
Guided discussion: Consent means asking before sharing anything that identifies someone—face, name, uniform, ID, address, or private messages. Silence is not consent. Respectful asking includes context (“Where will it be posted? Who will see it? Can they change their mind later?”). Even with “public” content, dignity matters: zooming in on a stranger’s mistake to get views may be legal but not ethical. Privacy settings help, but the safest protection is thoughtful judgment. Group photos? Ask the group or blur faces. Class screenshots? Remove names. If you’re unsure, don’t post. If you already posted and someone objects, remove it quickly and apologize for the impact.
Real-life tie-in: Your friend aces a contest. Before posting their photo, you ask permission and share the caption you plan to use. They feel respected and proud.
Mini-summary: Consent protects dignity; privacy choices protect safety. Ask first, post later.
- What details can identify a person online?
- How do you repair a consent mistake?
- Write a respectful consent request.
Show Answer
Face, name, voice, school logo, uniform, location, handles, private messages.Show Answer
Remove content promptly, apologize clearly, and confirm the person is satisfied.Show Answer
“Can I post this photo on my class page today? About 200 people will see it. Okay if I tag you?”Checkpoint 3 — Spotting Misinformation: A 4-Step Flow
Mini-goal: Use a quick flow to decide whether to share or stop.
Guided discussion: Try this flow: Pause (notice emotion spikes; misinformation rides on anger or surprise). Source (who published it? credible outlet? official page? Is the account verified and consistent over time?). Corroborate (can two independent, reliable sources confirm the claim? reverse image search or check date/context). Context (is the claim satire, old news reused, or edited out of context?). If any step fails, stop and label it privately: “unverified.” Sharing wrong info—even with good intent—can harm people and your own credibility. If it’s urgent (safety), share official guidance, not rumors. When corrected, thank the person and update your post; this models integrity.
Real-life tie-in: A viral post claims a school closure. You run the flow and find no official notice. You avoid spreading confusion and wait for verified updates.
Mini-summary: Pause, Source, Corroborate, Context—four steps that protect trust.
- Why do emotions matter in verification?
- Name two signs of a credible source.
- How can images mislead?
Show Answer
Strong emotions can bypass careful thinking; pausing reduces impulsive sharing.Show Answer
Clear authorship, consistent reporting, corrections policy, official domain.Show Answer
Old photos reused, cropped context, or AI/edited images.Checkpoint 4 — Credit, Remix, and Plagiarism
Mini-goal: Give proper credit and avoid academic or creative dishonesty.
Guided discussion: Creativity builds on others’ work, but integrity requires attribution. Plagiarism is presenting someone’s words, ideas, code, or media as your own. Attribution includes creator, title/description, and source link or reference; add date if available. Remix means transforming with your own analysis or style while still crediting the base materials. Quoting? Use quotation marks for exact words. Paraphrasing? Use your own structure and vocabulary and still cite. For images and music in projects, prefer materials you created yourself or works that allow reuse with credit. When in doubt, ask your teacher about acceptable references for the assignment.
Real-life tie-in: Your video project includes background music. You swap it for a track you composed and add credits for photos. Your grade—and reputation—benefit.
Mini-summary: Credit is respect in action. Cite clearly; create honestly.
- Write a one-line attribution for a photo you found.
- Is paraphrasing without credit acceptable?
- What makes a remix original?
Show Answer
“Photo by A. Cruz, ‘Sunrise Over Bay,’ accessed 2025, source: example-site.”Show Answer
No. Ideas still require attribution even when reworded.Show Answer
Meaningful transformation—new purpose, structure, analysis, or style—with clear credit.Checkpoint 5 — Kind Communication: Comment, Don’t Combust
Mini-goal: Write comments that reduce harm and increase understanding.
Guided discussion: Online, tone is easy to misread. Before you hit “send,” shrink your message: fewer words, clearer purpose. Use respectful starters: “I see it differently because…,” “Could you share the source?,” or “I felt hurt by that joke; can we avoid targeting people?” Avoid pile-ons and sarcasm; they escalate quickly and can become harassment. If a thread turns hostile, step back, report when needed, and move to a private, calm channel. Public shaming can cause long-term harm. If you caused harm, repair directly: apologize, remove the post, and ask what would help. Kindness is not weakness; it’s skill.
Real-life tie-in: A classmate posts a risky dare video. You message privately: “I care about your safety; I’m worried this encourages harm. Can we take it down?”
Mini-summary: Clear, respectful, brief messages protect dignity and keep dialogue open.
- Write a respectful disagreement line.
- When should you move a conflict off a public thread?
- What are two repair steps after a harmful post?
Show Answer
“I see it differently because the data says ___. Could we check together?”Show Answer
When emotions are high, privacy is needed, or safety/consent is involved.Show Answer
Apologize specifically and remove/replace the post; check what the person needs.Checkpoint 6 — Security Basics: Protect What Protects You
Mini-goal: Keep accounts safe with simple, high-impact habits.
Guided discussion: Good security enables integrity: you can’t stand by your posts if someone hijacks your account. Use strong, unique passphrases (four random words or 12+ characters mixing types). Turn on 2FA using an authenticator app or text codes. Beware of links that ask for logins; type the site address yourself. Update apps and systems to patch vulnerabilities. Lock devices with PINs or biometrics. Back up important school work to trusted storage. Security is everyone’s job: one weak account in a group can expose others’ data. If a breach occurs, change passwords immediately, log out other sessions, and alert people who might be affected.
Real-life tie-in: Your club account gets a suspicious “verify now” message. You ignore the link, open the official app, and see no alert. Crisis avoided.
Mini-summary: Strong passwords, 2FA, updates, and caution with links keep your voice yours.
- Why use different passwords for different sites?
- What’s a safe response to a login alert message?
- Name one device habit that protects privacy.
Show Answer
If one leaks, others remain safe.Show Answer
Do not click the link; go to the official site/app directly and check.Show Answer
Use a screen lock; disable previews on the lock screen; keep updates on.Checkpoint 7 — Your Posting Policy
Mini-goal: Draft a personal policy you can apply in seconds before sharing.
Guided discussion: A short policy helps under pressure. Sample five lines: (1) Purpose — I post to inform, uplift, or invite learning. (2) People — I protect dignity and ask consent for others’ data/images. (3) Proof — I verify with the 4-step flow. (4) Credit — I cite creators and sources. (5) Pause — I reread tone and imagine future-me reading it aloud. Customize these lines for your platforms. Keep them visible near your device. Share your policy with friends so they understand your boundaries. Policies are living documents—revise after mistakes to grow wiser.
Real-life tie-in: During a heated trend, your policy reminds you to pause and fact-check. You choose a thoughtful post that helps classmates stay calm.
Mini-summary: A clear, five-line policy turns good intentions into reliable action.
- Write one line you’ll add to your policy.
- Which policy line protects creators?
- How will you keep your policy visible?
Show Answer
Example: “No screenshots of private chats without written consent.”Show Answer
Credit—citing creators, titles, and sources.Show Answer
Phone note widget, notebook front page, or sticky note on the desk.-
Fact-Check Flow: A post claims free tablets for
first 100 commenters.
Show Answer
Pause emotions; check source (unknown page); no corroboration on official sites; likely scam → do not share, report. -
Consent Call: You filmed classmates for a vlog.
Show Answer
Ask permission, blur faces for anyone who declines, and share where it will be posted. -
Credit Case: You used an infographic in a report.
Show Answer
Add attribution: creator, title, source, date; explain how you used it. -
Repair Move: You posted an unverified rumor.
Show Answer
Delete/update post, thank the corrector, share verified info, and note the lesson learned. -
Security Save: Strange login from another country.
Show Answer
Change password, enable 2FA, log out other sessions, review connected apps.
-
Write a respectful consent message for a group photo.
Show Answer
“Can I post this group photo on my account tonight? I’ll tag the team—okay for everyone?” -
Run the 4-step flow on a trending claim of your choice. Share your
decision.
Show Answer
Decision sample: “Stop—no reliable source confirms it; waiting for official update.” -
Turn this plagiarized caption into credited text. “Amazing photo I
took!” (actually by J. Dizon).
Show Answer
“Photo by J. Dizon (2025), shared with permission. My thoughts: ___.” -
Create a one-sentence posting policy about private chats.
Show Answer
“No screenshots of private messages without written consent from everyone involved.” -
Draft a kind correction under a friend’s misleading post.
Show Answer
“Hey! I think this is from 2019. Here’s a recent source—maybe update?” -
List three strong passphrase words (no personal info).
Show Answer
Example: river • lantern • galaxy • waffle (combine with separators). -
Rewrite a harsh comment into a respectful one. “Your project is
trash.”
Show Answer
“I got lost in Slide 3. Could you add labels to the chart?” -
Identify what to blur or crop in a school hallway photo.
Show Answer
Faces, ID cards, schedules on boards, room numbers if sensitive. -
Paraphrase a rumor into a verification request.
Show Answer
“I heard ___. Do we have an official notice or link?” -
Write a short apology for sharing without consent.
Show Answer
“I posted without asking. I removed it and won’t share your image again.”
-
Multiple choice: First step when a post triggers
strong emotions?
A) share fast B) pause C) joke about it D) ignore foreverShow Answer
B. -
True/False: Paraphrasing removes the need for credit.
Show Answer
False. -
Fill-in: Attribution includes creator, title/description, and
______.
Show Answer
Source (and date if available). -
Short answer: Why is public shaming harmful?
Show Answer
It damages dignity, spreads harm widely, and can last in footprints. -
Multiple choice: Strongest security step?
A) same password everywhere B) 2FA C) sharing passwords with friends D) writing passwords on deskShow Answer
B. -
True/False: Consent is needed even for “public” spaces when people
are identifiable.
Show Answer
True (ethical best practice). -
Fill-in: The 4-step flow is Pause → Source → ______ → Context.
Show Answer
Corroborate. -
Short answer: Write a respectful disagreement opener.
Show Answer
“I see it differently because ___. May I share another source?” -
Multiple choice: Which is plagiarism?
A) quoting with citation B) paraphrasing with citation C) using an image with permission and credit D) copying text without creditShow Answer
D. -
True/False: Deleting a post always deletes the footprint.
Show Answer
False. -
Fill-in: Security is a ______ job.
Show Answer
Shared/everyone’s. -
Short answer: Name one sign a post might be misleading.
Show Answer
Unclear source, sensational tone, mismatched date, or edited image. -
Multiple choice: Best first response after posting
without consent?
A) defend yourself B) ignore comments C) remove and apologize D) blame othersShow Answer
C. -
True/False: Giving credit reduces your own credibility.
Show Answer
False; it increases trust. -
Short answer: State one line from your posting policy.
Show Answer
Example: “I verify claims with two reliable sources before sharing.”
-
Footprint Audit: Review your last 30 days of
activity. List three posts to keep, two to archive, and one to
rewrite with better tone or credit.
Show Answer
Teacher guidance: Look for thoughtful reasons tied to values, consent, and accuracy. -
Source Sleuth: Compare two reports of the same
event. Identify what each gets right/wrong and how you know.
Show Answer
Teacher guidance: Reward use of official pages, timestamps, and independent confirmation. -
Caption Clinic: Select three images and write model
attributions.
Show Answer
Teacher guidance: Check creator, title/description, source, date. -
Policy Poster: Design a 5-line posting policy card
for your device.
Show Answer
Teacher guidance: Assess clarity, brevity, and practicality. -
Kindness Campaign: Draft three comment templates
that de-escalate tough threads.
Show Answer
Teacher guidance: Emphasize neutral language, questions, and thanks for corrections.
Notebook Task: In 6–8 sentences, describe a post you might share this week. Apply the 4-step flow, state your consent/credit plan, and write the exact caption you will use. End with one promise to protect someone’s dignity online.

No comments:
Post a Comment