Want to create interactive content? It’s easy in Genially!

Get started free

Mapamundi inglés

Belen Gonzalez

Created on October 10, 2024

Start designing with a free template

Discover more than 1500 professional designs like these:

Teaching Challenge: Transform Your Classroom

Frayer Model

Math Calculations

Interactive QR Code Generator

Piñata Challenge

Interactive Scoreboard

Interactive Bingo

Transcript

CLICK here

Digital Rights

Letter Soup

Role-play

Complete the sentence

Memory

End of game

CLICK HERE TO PAINT

Remember that when you have found all the words you must click on the brush icon again to stop painting.

WORDS

  • CENSURA
  • CIBERACOSO
  • CIBERSEGURIDAD
  • CONSTITUCIÓN
  • DELITOS
  • ESPIONAJE
  • EXPRESIÓN
  • FAKENEWS
  • INTERNET
  • LIBERTAD
  • METADATOS
  • PROTECCIÓN
  • SEXTING
  • UBICACIÓN

Find the words that refer to Digital Law

Return to menu

What information does metadata provide about you?

Metadata is the ‘data of data’, i.e. a piece of data that describes information or quality of another piece of data. A clear example is found in mail, metadata is who sent the mail, to whom it is addressed, date, time or if there are attachments.

You will now be presented a memory game in which you have to make an assimilation between image and text, about what information is shared when surfing the internet.

Continue

What information does metadata provide about you?

¡Lo lograste!

Wïnpet mä të tsyoo'ntä'äky

¿Qué información entregan los metadatos sobre ti?

¡Lo lograste!

Return to menu

It is very important that you know how to act in a situation of digital violence. ROLE PLAY You are a community authority and you are faced with several cases of digital violence: How prepared do you think you are to make the right decision?

START

There is a case in your community where sensitive photographs of a woman have been spread and her integrity has been damaged to the extent that the community is rejecting her and her family, so she comes to you....

Do you know how to deal with the situation and bring justice to this new form of violence?

YES

NO

Remember to take advice and have the necessary information to ensure that your help is positive. NOTE THAT: You should not re-victimise the person who comes to you; empathy is about your affective engagement in a case that is not your own.

From the "Código Penal Federal" you can find support in the "Ley Olimpia", a set of reforms whose initiative is to recognise digital violence and punish crimes that violate sexual intimacy through digital media.

Press here to learn more

A citizen comes to you to complain that his image was slandered with information that was private...

Are you aware of the legal knowledge you need to have to solve this case?

YES

NO

TYPES OF OFFENCES

  • Disclosure of secrets and illegal access to computer systems and hardware
  • Sexual harassment
  • Alteration or manipulation of means of electronic identification
  • Crimes against the privacy of sexual information
  • Copyright offenses
  • Telephone fraud
  • Falsification of documents
  • Pornography
  • Identity theft

Remember to get advice and have the necessary information so that your help will be positive. FOR THIS CASE, NOTE THAT: The Penal Code describes the types of computer crimes.

Press here to learn more

Do you consider it necessary to take a workshop on digital rights?

YES

NO

If you would like to attend workshops to learn more about these topics, please contact SURCO, they will be able to forward your request.

To have a direct contact click on your social network of choice
To be part of their information channel click here.
If you want to hear about this and more click here.

You have a high level of knowledge about digital violence

If you answered all the questions with “yes”

You have a medium high level of knowledge about digital violence

If you answered 2 questions with “yes”

You have a low level of knowledge about digital violence

If you answered 1 question with “yes”

If you did not answer any question with “yes”

You have a very low level of knowledge about digital violence

Return to menu

What do you know about cybersecurity?

Cybersecurity is the practice of protecting devices, systems, networks and data from attacks or other harmful purposes. This practice is applied in very different contexts depending on the information that is generated and processed through computers, servers, mobile devices, networks and electronic systems. In the following exercises you will have to fill in the spaces with one of the three options that appear in the text. Only one is correct. How much do you know about cybercrime?

accidents

cyberbullying

harassment

The highest rate of ___________ was registered in Michoacán, followed by Guerrero and ________. It affects predominantly _____________, particularly those between the ages of ___________.

cyberbullying

Yucatán

Coahuila

Oaxaca

Oaxaca

young people

children

elderlies

young people

25 and 40

8 and 13

18 and 29

18 and 29

If you receive or take an image of a person, this does not give you the right to distribute it under any circumstances.One of the most potentially privacy-intrusive interactions is known as _________: it happens when you choose to send either textual or visual messages with erotic or sexual content. This may result in you receiving hostile threats or some form of blackmail, such as the __________.

blackmail

exposition

sexting

sexting

menace

sextortion

extortion

sextortion

Cyberbullying is a form of harassment and responds to a series of _________ that seek to exert power over another person. They may be hostile threats that are repeated, distressing the_______ and establishing an abuse of power by the_______.

aggressions

decisions

ideas

aggressions

authority

population

victim

victim

professor

stalker

friend

stalker

Some recommendations before sexting

Think twice before you post: Everything that you post online or that leaves your own mobile phone is forever out of your control and can reach anyone. When doing so, use secure apps that you can trust. Find out more about the use and functioning of secure applications, in the following links you can find some options that may be of interest to you:

Regresar al menú

Thanks for playing!

Return to menu