Lesson Overview
Participants will better understand others’ perspectives and feelings in the context of individuals sharing personal information online.
Participants will better understand others’ perspectives and feelings in the context of individuals sharing personal information online.
Ready?
Begin Lesson
Ask students to pair up and give each student a copy of the “Understanding and Sharing the Feelings of Others” handouts. Allow students 15 minutes to read and discuss the scenarios. Walk around the room and help students with additional teacher prompts contained in the handout.
Inform students that some forms of snooping are actually illegal and, in nearly all cases, snooping is probably not ethical. In different kinds of relationships, people want to share various pieces of information about themselves. This variation is reasonable and normal. It is also reasonable and normal for one person to think an action is acceptable but for someone else to be less comfortable with it.
Now we are going to extend the scenarios we just talked about. On your sheet of paper, draw two separate comic strips (if students are not excited about the idea of a comic strip, suggest that they write a short story instead), illustrating:
Give students 30 minutes to finish their comics.
Community Standards/Guidelines are a set of rules Meta put in place that determines what is and isn’t allowed on Facebook and Instagram.
They’re at the heart of how Facebook and Instagram think about safety.
To develop policies Facebook and Instagram identify issues, work with outside experts on solutions, and then craft policies and operational support to make sure those issues are addressed.
There are a number of ways that Facebook and Instagram's products and ecosystems differ, but when it comes to what is and isn't allowed on the platforms, the policies are the same.
The key area where Facebook and Instagram differ is that Instagram does not require you to set up an account using your real name.
Instagram is a place where anyone can express themselves, whether on behalf of their pet hedgehog or someone who may be questioning their sexuality and might not be ready to come out using their real name.
Policies try to balance freedom of expression and safety, but doing this for a community of a billion people from all corners of the world will always be challenging.
In-app reporting allows anyone to report anything to us — from Stories to Explore content — if they think it breaks the rules.
Real people working 24/7 who review reports and take action accordingly, and AI technology trained to proactively find rule-breaking content, and alert Meta's teams so they can take appropriate action.
When you violate the community guidelines your content might be deleted/removed (or Facebook may ask you to).
If you do not remove it on your own, it may impact your access.
If someone notices their account is no longer active, the account may have been removed by Facebook due to misuse.
Meta is re-evaluating when an account should be removed from Instagram.
Accounts are now removed after a certain number of violations within a window of time.
We’ve talked about some boundaries to consider when you are engaging online, but it’s useful to remember that there are rules and policies set by others in the digital world too.
You don’t set them, but you need to follow them if you want to use some services or platforms.
Congrats!
You've finished the lesson
Students will learn how to keep their online information more secure by using and maintaining strong passwords. Students will learn about the principles of strong password design and the potential problems of password sharing.
View PageStudents will learn about malicious online users who might attempt to use security weaknesses to gather information about them.
View PageStudents will learn what information verification is and why it is important for news consumers to verify the stories they read or view.
View PageStudents will learn about a five-step checklist they can use to verify the origin, source, date, location, and motivation of a news image or video.
View PageStudents will define what a scrape (a copy from an original) is and explain why this can make the verification process more difficult.
View PageStudents will learn how to keep their online information more secure by using and maintaining strong passwords. Students will learn about the principles of strong password design and the potential problems of password sharing.
View PageStudents will learn about malicious online users who might attempt to use security weaknesses to gather information about them.
View PageStudents will learn what information verification is and why it is important for news consumers to verify the stories they read or view.
View PageStudents will learn about a five-step checklist they can use to verify the origin, source, date, location, and motivation of a news image or video.
View PageStudents will define what a scrape (a copy from an original) is and explain why this can make the verification process more difficult.
View Page