CLICK here
Digital Rights
Letter Soup
Role-play
Complete the sentence
Memory
End of game
CLICK HERE TO PAINT
Remember that when you have found all the words you must click on the brush icon again to stop painting.
WORDS
- CENSURA
- CIBERACOSO
- CIBERSEGURIDAD
- CONSTITUCIÓN
- DELITOS
- ESPIONAJE
- EXPRESIÓN
- FAKENEWS
- INTERNET
- LIBERTAD
- METADATOS
- PROTECCIÓN
- SEXTING
- UBICACIÓN
Find the words that refer to Digital Law
Return to menu
What information does metadata provide about you?
Metadata is the ‘data of data’, i.e. a piece of data that describes information or quality of another piece of data. A clear example is found in mail, metadata is who sent the mail, to whom it is addressed, date, time or if there are attachments.
You will now be presented a memory game in which you have to make an assimilation between image and text, about what information is shared when surfing the internet.
Continue
What information does metadata provide about you?
¡Lo lograste!
Wïnpet mä të tsyoo'ntä'äky
¿Qué información entregan los metadatos sobre ti?
¡Lo lograste!
Return to menu
It is very important that you know how to act in a situation of digital violence. ROLE PLAY You are a community authority and you are faced with several cases of digital violence: How prepared do you think you are to make the right decision?
START
There is a case in your community where sensitive photographs of a woman have been spread and her integrity has been damaged to the extent that the community is rejecting her and her family, so she comes to you....
Do you know how to deal with the situation and bring justice to this new form of violence?
YES
NO
Remember to take advice and have the necessary information to ensure that your help is positive. NOTE THAT: You should not re-victimise the person who comes to you; empathy is about your affective engagement in a case that is not your own.
From the "Código Penal Federal" you can find support in the "Ley Olimpia", a set of reforms whose initiative is to recognise digital violence and punish crimes that violate sexual intimacy through digital media.
Press here to learn more
A citizen comes to you to complain that his image was slandered with information that was private...
Are you aware of the legal knowledge you need to have to solve this case?
YES
NO
TYPES OF OFFENCES
- Disclosure of secrets and illegal access to computer systems and hardware
- Sexual harassment
- Alteration or manipulation of means of electronic identification
- Crimes against the privacy of sexual information
- Copyright offenses
- Telephone fraud
- Falsification of documents
- Pornography
- Identity theft
Remember to get advice and have the necessary information so that your help will be positive. FOR THIS CASE, NOTE THAT: The Penal Code describes the types of computer crimes.
Press here to learn more
Do you consider it necessary to take a workshop on digital rights?
YES
NO
If you would like to attend workshops to learn more about these topics, please contact SURCO, they will be able to forward your request.
To have a direct contact click on your social network of choice
To be part of their information channel click here.
If you want to hear about this and more click here.
You have a high level of knowledge about digital violence
If you answered all the questions with “yes”
You have a medium high level of knowledge about digital violence
If you answered 2 questions with “yes”
You have a low level of knowledge about digital violence
If you answered 1 question with “yes”
If you did not answer any question with “yes”
You have a very low level of knowledge about digital violence
Return to menu
What do you know about cybersecurity?
Cybersecurity is the practice of protecting devices, systems, networks and data from attacks or other harmful purposes. This practice is applied in very different contexts depending on the information that is generated and processed through computers, servers, mobile devices, networks and electronic systems. In the following exercises you will have to fill in the spaces with one of the three options that appear in the text. Only one is correct. How much do you know about cybercrime?
accidents
cyberbullying
harassment
The highest rate of ___________ was registered in Michoacán, followed by Guerrero and ________. It affects predominantly _____________, particularly those between the ages of ___________.
cyberbullying
Yucatán
Coahuila
Oaxaca
Oaxaca
young people
children
elderlies
young people
25 and 40
8 and 13
18 and 29
18 and 29
If you receive or take an image of a person, this does not give you the right to distribute it under any circumstances.One of the most potentially privacy-intrusive interactions is known as _________: it happens when you choose to send either textual or visual messages with erotic or sexual content. This may result in you receiving hostile threats or some form of blackmail, such as the __________.
blackmail
exposition
sexting
sexting
menace
sextortion
extortion
sextortion
Cyberbullying is a form of harassment and responds to a series of _________ that seek to exert power over another person. They may be hostile threats that are repeated, distressing the_______ and establishing an abuse of power by the_______.
aggressions
decisions
ideas
aggressions
authority
population
victim
victim
professor
stalker
friend
stalker
Some recommendations before sexting
Think twice before you post: Everything that you post online or that leaves your own mobile phone is forever out of your control and can reach anyone. When doing so, use secure apps that you can trust. Find out more about the use and functioning of secure applications, in the following links you can find some options that may be of interest to you:
Regresar al menú
Thanks for playing!
Return to menu
Mapamundi inglés
Belen Gonzalez
Created on October 10, 2024
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Teaching Challenge: Transform Your Classroom
View
Frayer Model
View
Math Calculations
View
Interactive QR Code Generator
View
Piñata Challenge
View
Interactive Scoreboard
View
Interactive Bingo
Explore all templates
Transcript
CLICK here
Digital Rights
Letter Soup
Role-play
Complete the sentence
Memory
End of game
CLICK HERE TO PAINT
Remember that when you have found all the words you must click on the brush icon again to stop painting.
WORDS
Find the words that refer to Digital Law
Return to menu
What information does metadata provide about you?
Metadata is the ‘data of data’, i.e. a piece of data that describes information or quality of another piece of data. A clear example is found in mail, metadata is who sent the mail, to whom it is addressed, date, time or if there are attachments.
You will now be presented a memory game in which you have to make an assimilation between image and text, about what information is shared when surfing the internet.
Continue
What information does metadata provide about you?
¡Lo lograste!
Wïnpet mä të tsyoo'ntä'äky
¿Qué información entregan los metadatos sobre ti?
¡Lo lograste!
Return to menu
It is very important that you know how to act in a situation of digital violence. ROLE PLAY You are a community authority and you are faced with several cases of digital violence: How prepared do you think you are to make the right decision?
START
There is a case in your community where sensitive photographs of a woman have been spread and her integrity has been damaged to the extent that the community is rejecting her and her family, so she comes to you....
Do you know how to deal with the situation and bring justice to this new form of violence?
YES
NO
Remember to take advice and have the necessary information to ensure that your help is positive. NOTE THAT: You should not re-victimise the person who comes to you; empathy is about your affective engagement in a case that is not your own.
From the "Código Penal Federal" you can find support in the "Ley Olimpia", a set of reforms whose initiative is to recognise digital violence and punish crimes that violate sexual intimacy through digital media.
Press here to learn more
A citizen comes to you to complain that his image was slandered with information that was private...
Are you aware of the legal knowledge you need to have to solve this case?
YES
NO
TYPES OF OFFENCES
Remember to get advice and have the necessary information so that your help will be positive. FOR THIS CASE, NOTE THAT: The Penal Code describes the types of computer crimes.
Press here to learn more
Do you consider it necessary to take a workshop on digital rights?
YES
NO
If you would like to attend workshops to learn more about these topics, please contact SURCO, they will be able to forward your request.
To have a direct contact click on your social network of choice
To be part of their information channel click here.
If you want to hear about this and more click here.
You have a high level of knowledge about digital violence
If you answered all the questions with “yes”
You have a medium high level of knowledge about digital violence
If you answered 2 questions with “yes”
You have a low level of knowledge about digital violence
If you answered 1 question with “yes”
If you did not answer any question with “yes”
You have a very low level of knowledge about digital violence
Return to menu
What do you know about cybersecurity?
Cybersecurity is the practice of protecting devices, systems, networks and data from attacks or other harmful purposes. This practice is applied in very different contexts depending on the information that is generated and processed through computers, servers, mobile devices, networks and electronic systems. In the following exercises you will have to fill in the spaces with one of the three options that appear in the text. Only one is correct. How much do you know about cybercrime?
accidents
cyberbullying
harassment
The highest rate of ___________ was registered in Michoacán, followed by Guerrero and ________. It affects predominantly _____________, particularly those between the ages of ___________.
cyberbullying
Yucatán
Coahuila
Oaxaca
Oaxaca
young people
children
elderlies
young people
25 and 40
8 and 13
18 and 29
18 and 29
If you receive or take an image of a person, this does not give you the right to distribute it under any circumstances.One of the most potentially privacy-intrusive interactions is known as _________: it happens when you choose to send either textual or visual messages with erotic or sexual content. This may result in you receiving hostile threats or some form of blackmail, such as the __________.
blackmail
exposition
sexting
sexting
menace
sextortion
extortion
sextortion
Cyberbullying is a form of harassment and responds to a series of _________ that seek to exert power over another person. They may be hostile threats that are repeated, distressing the_______ and establishing an abuse of power by the_______.
aggressions
decisions
ideas
aggressions
authority
population
victim
victim
professor
stalker
friend
stalker
Some recommendations before sexting
Think twice before you post: Everything that you post online or that leaves your own mobile phone is forever out of your control and can reach anyone. When doing so, use secure apps that you can trust. Find out more about the use and functioning of secure applications, in the following links you can find some options that may be of interest to you:
Regresar al menú
Thanks for playing!
Return to menu