0% found this document useful (0 votes)
185 views35 pages

Legal, Ethical, and Societal Issues in Media and Information

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
185 views35 pages

Legal, Ethical, and Societal Issues in Media and Information

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 35

LEGAL,

ETHICAL, AND
SOCIETAL
ISSUES IN
MEDIA AND
A.
COPYRIGH
T
Copyright refers to the legal right of the owner of intellectual property.
A copyright is a type of intellectual property that gives its owner the
exclusive right to copy, distribute, adapt, display, and perform a creative
work, usually for a limited time. The creative work may be in a literary,
artistic, educational, or musical form. Copyright is intended to protect the
original expression of an idea in the form of a creative work, but not the
idea itself. A copyright is subject to limitations based on public interest
considerations In simpler terms, copyright is the right to copy. This means
that the original creators of products and anyone they give authorization to
are the only ones with the exclusive right to reproduce the work.
EXAMPLES OF
COPYRIGHT
B. FAIR
USE
In its most general sense, a fair use is any copying of copyrighted material done for a
limited and “transformative” purpose, such as to comment upon, criticize, or
parody a copyrighted work. Such uses can be done without permission from the
copyright owner. In other words, fair use is a defense against a claim of copyright
infringement. In Media Literacy, this can relate to software and information that people
commonly take, not knowing that it is against the law.

EXAMPLE OF FAIR USE


Most fair use analysis falls into two categories: (1) commentary and
criticism, or (2) parody.

1. Commentary and Criticism


If you are commenting upon or critiquing a copyrighted work—for instance, writing a book review—
fair use principles allow you to reproduce some of the work to achieve your purposes. Some
examples of commentary and criticism include:

•quoting a few lines from a Bob Dylan song in a music review


•summarizing and quoting from a medical article on prostate cancer in a news report
•copying a few paragraphs from a news article for use by a teacher or student in a lesson, or
•copying a portion of a Sports Illustrated magazine article for use in a related court case.

The underlying rationale of this rule is that the public reaps benefits from your review, which is
enhanced by including some of the copyrighted material. Additional examples of commentary or
criticism are provided in the examples of fair use cases.
2. PARODY

A parody is a work that ridicules another, usually well-known


work, by imitating it in a comic way. Judges understand that,
by its nature, parody demands some taking from the original
work being parodied. Unlike other forms of fair use, a fairly
extensive use of the original work is permitted in a parody in
order to “conjure up” the original.
C.
PLAGIARISM
Plagiarism is presenting work or ideas from another source as your own,
with or without consent of the original author, by incorporating it into your
work without full acknowledgement. All published and unpublished
material, whether in manuscript, printed or electronic form, is covered under
this definition.
EXAMPLES OF PLAGIARISM
• Copying parts of a text word for word, without quotation marks
• Paraphrasing a text by changing a few words or altering the sentence
structure, without citing the source
• Giving incorrect information about a source

Plagiarism has consequences or penalties for about six years of imprisonment,


and a fine of fifty thousand to one hundred fifty thousands pesos or equivalent
to one thousand two hundred dollars to three thousands six hundred dollars.
d.
NETIQUETT
The correct or acceptable way of communicating on the internet.

E
Netiquette thus describes the rules of conduct for respectful and
appropriate communication on the internet. Netiquette is often
referred to as etiquette for the internet. These are not legally
binding rules, but recommended rules of etiquette. Netiquette is
mostly used for dealing with unknown people on the internet.

The word netiquette is a colloquial acronym for “network


etiquette”, a set of social conventions that facilitate interaction
through networks, and that include from chats and emails to blogs and
forums.
There are 9 rules that people should know:

1. Make Real People a Priority


2. Use Respectful Language
3. Share With Discretion
4. Don't Exclude Others
5. Choose Friends Wisely
6. Respect People's Privacy
7. Fact Check Before Reposting
8. Don't Spam
9. Respond to Emails and Texts Promptly
EXAMPLE OF
NETIQUETTE
Double Checking

When you’re in the middle of a fast-paced conversation, it’s easy to send


replies as soon as you write them. While speaking too quickly in verbal
communication allows you to catch flubs and correct yourself, doing it
online can lead to problems. A single misspelling can lead to disaster.
For instance, let’s say you’re talking to somebody about ducks. Now, take a
look at your keyboard. If you have a standard QWERTY keyboard, you’ll
see that the letter F is right next to the letter D. We’ll let you do the math on
what failing to catch a mistake could lead to there.
F. DIGITAL
DIVIDE
The digital divide is a global issue that refers to the unequal distribution of
access to digital technologies and the internet. While the internet has become an
essential tool for communication, learning, and commerce in the 21st century, not all
individuals and communities have equal access to it. The digital divide can be
influenced by various factors, including infrastructure, affordability, digital skills,
and cultural barriers.

The digital divide matters because it can limit opportunities for individuals and
communities to access information, education, and employment. Without access
to digital technologies, people may be unable to participate in online learning,
access health services, or find job opportunities. This can lead to further inequality
and social exclusion, as those who are already marginalized may be further left
behind.
Causes:
1. Lack of infrastructure
2. Affordability
3. Digital skills
4. Cultural barriers
Consequences:
5. Information and educational
6. 2. Employment
7. Social exclusion
ADVANTAGES OF DIGITAL
DIVIDE
None. The digital divide is generally considered a negative phenomenon, as it creates unequal
access to digital technologies and limits opportunities for individuals and communities.

DISADVANTAGES OF DIGITAL
DIVIDE
Limitations on access Reduced economic Social exclusion: Increased inequality:
to information: Those opportunities: Without Those without access The digital divide can
without access to access to digital to digital technologies create and perpetuate
digital technologies technologies, may be unable to inequalities between
may not be able to individuals may be participate in online those with access to
access information that unable to participate in social networks and digital technologies
is readily available the modern workforce, other digital and those without,
online, such as news, limiting their communities, limiting creating a cycle of
educational resources, opportunities for their ability to connect disadvantage.
and job postings. employment and with others and
income generation. participate in social
activities..
EXAMPLE OF DIGITAL DIVIDE
F. Internet
ADDICTION
Merriam-Webster Dictionary defines addiction as “a compulsive,
chronic, physiological or psychological need for a habit-
forming substance, behavior, or activity having harmful physical,
psychological, or social effects.”

Internet addiction may come in different forms, such as social


media addiction,
videogame addiction, cybersex or online sex addiction, and onlin
e gambling addiction.
Internet addiction may be developed due to several factors like
stress, anxiety, depression, other forms of addiction, lack of
social support, or lack of parental guidance, or inactivity. These
are some of the signs and symptoms of Internet addiction you may
want to be mindful of:

 Being less conscious of time spent online or with gadgets that


enable Internet access
• Failing to complete tasks or activities intended to be finished at
the time you were using the Internet
• Having less time with friends and family
• Lack of remorse for your excessive Internet use
• Feeling more excited with Internet activities rather than real-life
or physical activities
 
EXAMPLE OF ADDICTION
g. CYBER
BULLYING
Cyberbullying or cyber harassment is a form of bullying or
harassment using electronic means. Cyberbullying and cyber
harassment are also known as online bullying. It has become increasingly
common, especially among teenagers, as the digital sphere has expanded
and technology has advanced. Cyberbullying is when someone,
typically a teenager, bullies or harasses others on the internet and
other digital spaces, particularly on social media sites. Harmful
bullying behavior can include posting rumors, threats, sexual remarks, a
victims' personal information, or pejorative labels. Bullying or harassment
can be identified by repeated behavior and an intent to harm. Victims of
cyberbullying may experience lower self-esteem, increased suicidal
ideation, and various negative emotional responses, including being
anxious, frustrated, angry, or depressed.
EXAMPLE OF CYBER
BULLYING
Other Examples of Cyberbullying

There are several types of bullying that can occur online, and they all look different.

• Harassment can include comments, text messages, or threatening emails all designed to
make the person being cyberbullied feel scared, embarrassed, or ashamed of themselves.

Other forms of harassment include:


• Using group chats as a way to gang up on one person.
• Making derogatory comments about a person based on their race, gender, sexual
orientation, economic status, or other characteristics.
• Posting mean or untrue things on social media sites, such as Twitter, Facebook, or
Instagram, as a way to publicly hurt the person experiencing the cyberbullying.
• Impersonation - A person may try to pretend to be the person they are cyberbullying to
attempt to embarrass, shame, or hurt them publicly.

Some examples of this include:

• Hacking into someone’s online profile and changing any part of it, whether it be a
photo or their "About Me" portion, to something that is either harmful or inappropriate.

• Catfishing, which is when a person creates a fake persona to trick someone into a
relationship with them as a joke or for their own personal gain.

• Making a fake profile using the screen name of their target to post inappropriate or
rude remarks on other people’s pages.
Not all forms of cyberbullying are the same, and there are other tactics used
by cyberbullies to ensure that their target feels as bad as possible.
Some tactics include:

• Taking nude or otherwise degrading photos of a person without their


consent.
• Sharing or posting nude pictures with a wide audience to embarrass the
person they are cyberbullying
• Sharing personal information about a person on a public website that
could cause them to feel unsafe
• Physically bullying someone in school and getting someone else to record
it so that it can be watched and passed around later. Circulating rumors
about a person.
h. VIRTUAL
SELF
Virtual Self as an Online Identity: In the context of the internet and social
media, a "virtual self" can refer to the online persona or identity that a
person creates for themselves. This online identity can differ from a person's
real-world identity, as they may choose to present themselves differently, use a
different name or username, or interact with others in a different way.

Virtual Self as a Digital Representation: In the context of virtual reality or


gaming, a "virtual self" can refer to the avatar or digital representation of a
person within a virtual world or game. This virtual self can be customized by
the user to look and behave in a specific way, and can allow the user to interact
with the virtual environment and other users within it.
Virtual Self as a Conceptual Idea: In a broader sense, the
idea of a "virtual self" can also refer to the concept of self-
identity and how it is influenced by technology and the
internet. For example, some argue that social media and other
online platforms can shape how people perceive themselves
and their place in the world, creating a kind of "virtual self"
that is distinct from their physical self.

Overall, the term "virtual self" reflects the ways in which


technology and the internet have changed how we think about
identity and self-expression, and the different ways in which
we can represent ourselves in digital spaces
J. OTHERS
Hacking
- refers to the practice of modifying or altering computer software and hardware to accomplish
a goal that is considered to be outside of the creator's original objective.- those individuals who
engage in computer hacking activities are typically referred to as
“hackers”
Phishing
- is the attempt to obtain sensitive information such as usernames, passwords, and credit card
details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in
an electronic communication.
Illegal Downloading- refers to obtaining files that you do not have the right to use from the
Internet.
Illegal Downloading Sites Legal Downloading Sites
The Pirate Bay  iTunes
Kickass.to  Yahoo Music
TorrentDownloads.me Amazon
YTS.ag NetflixRARBG.to Ruckus
Digital Piracy
- the practice of illegally copying and selling digital
music, video, computer software, etc.
The Philippine copyright law or officially known as the Republic Act
No. 8293 is based on the copyright law of the United States. The
Philippine copyright law also protects trademarks, patents and even
various forms of intellectual property.

Section 185.1. of Republic Act No. 8293 is hereby amended to read


as follows:
SEC. 185. Fair Use of a Copyrighted Work. – 185.1. The fair use of a
copyrighted work for criticism, comment, news reporting, teaching
including limited number of copies for classroom use, scholarship,
research, and similar purposes is not an infringement of copyright. 

Republic Act No. 10175 Or the Cybercrime Prevention Act of 2012


- is a law in the Philippines approved on September 12, 2012 which
aims to address Legal issues concerning online
interactions and the Internet.
Republic Act No. 10175
Among the cybercrime offenses included in the bill
are :
•cybersquatting
•cybersex
•child pornography
•identity theft
•illegal access to data and libel.
ACTIVITY TIME
ACTIVITY TIME
QUI
Z
1.________ is any copying of copyrighted material done for a limited and
“transformative” purpose, such as to comment upon, criticize, or parody a
copyrighted work.
a)Fair use
b)Copyright
c)Plagiarism
d)Netiquette
2. The word netiquette is a colloquial acronym
for “___________”.
a)Network ethics
b)Networking etiquettes
c)Network etiquette
d)Network ethical
3. What Legal, Ethical and Social issues in Media Information refers to the legal right
of the owner of intellectual property?
a)Plagiarism
b)Copyright
c)Fair use
d)Netiquette

4. __________ is a physical or psychological need to do, take, or use something, to the


point where it could be harmful to you.
a)Bullying
b)Netiquette
c)Addiction
d)Virtual Self
5. This is a global issue that refers to the unequal distribution of access to digital
technologies and the internet.
a)Cyberbullying
b)Virtual Self
c)Digital world
d)Digital Divide
6-7. Give 2 factors that may developed Internet Addiction
8. The term "________" reflects the ways in which technology and the internet have
changed how we think about identity and self-expression, and the different ways in
which we can represent ourselves in digital spaces.
a)Virtual Self
b)Virtual Divide
c)Virtual
d)Digital Self
9-10 Give at least two examples of Legal, Ethical and Social Issues
in Media and Information.

You might also like