0% found this document useful (0 votes)
15 views43 pages

L7 Mil

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1/ 43

Media and Information Literacy

Lesson 7:
Legal, Ethical, and
Societal Issues in Media
and Information
DIGITAL CITIZENSHIP
ability to find, access, use, and create
information effectively; engage with other users and
with content in an active, critical, sensitive and
ethical manner; and navigate the online and ICT
environment safely and responsibly, being aware of
one’s own rights (UNESCO, 2016)
Issues in Media and
Information Literacy
INTELLECTUAL PROPERTY
refers to the creations of the mind such as
inventions, literary and artistic works, designs,
symbols, names, and images used in commerce
Types of Intellectual Property

Copyright Patent Trademark

Industrial Design Geographical Indications and


Appellations of Origin
COPYRIGHT
a legal term used to describe the rights that
creators have over their literary and artistic
works and gives the creator the sole right to
publish and sell that work.
• Protects the form of material expression and is
only available for works that are fixed in
tangible form.
• Not mandatory but commended
PLAGIARISM
an act or instance of victimization or closely
imitating the language and thoughts of another
author while not authorization; the illustration of
that author’s work as one’s own, as by not
crediting the first author.
Examples of Acts of Plagiarism
• Copying media (especially images) from other
websites to paste them into your own papers or
websites
• Making a video using footage from others’ videos or
using copyrighted music as part of the soundtrack
• Performing another person’s copyrighted music (i.e.,
playing a cover)
• Composing a piece of music that borrows heavily
from another composition.
FAIR USE
a legal principle stating that one can use a
copyrighted work without a license for the
following purposes: commentary, criticism,
reporting , research, and teaching.
the spectrum of rights

Copyright Creative Commons Public Domain


All Rights Reserved Some Rights Reserved No Rights Reserved
Re-use requires the Re-use is permitted May be used without
permission from the without permission
under the specifications permission
copyright owner.
shared in the license.
PATENT
exclusive right granted for invention, which is
a pt or a process that provides, in general, a new
way of doing something, or offers a new technical
solution to a problem.
• Provides the right to
consent on the invention or
a way for others to use it
(functional use)
• Technical information about
the invention must be
disclosed to the public
Famous Patent
“The Lightbulb” by Thomas Edison

“Omni-directional, vertical-lift, helicopter


drone” by Edward G. Vanderlip

“Electronic Device”
by Apple
TRADEMARK
distinguished sign of goods or services that
identifies and differentiates from one enterprise
to ano; a signature mark.
Trademark Symbols

Registered Unregistered Unregistered service


trademark trademark trademark
Valuable Trademarks
INDUSTRIAL DESIGN
protects only the appearance or aesthetic
features of a product such as shape, surface,
patterns, lines, or color.
GEOGRAPHICAL INDICATIONS AND
APPELLATION OF ORIGIN
signs used on products possessing qualities, a
status or characteristics that are essentially
attributable to that location of origin.
Example of Geographical Indications
and Appelations of Origin
Intellectual Property Code of the
Philippines (RA 8293)
Copyright Validity Period
LITERARY WORKS During the lifetime of the author plus
50 years after death
ART 25 years from the date of creation
PHOTOGRAPHIC WORK 50 years from publication
AUDIO-VISUAL WORK 50 years from publication
Intellectual Property Code of the
Philippines (RA 8293)
Copyright Validity Period
SOUND RECORDING 50 years from year recording took
place
BROADCAST RECORDING 20 years from the date of broadcast
TRADEMARK Valid for 10 years and may be renewed
for a periods of 10 years
INVETION PATENT Valid for 20 years from filling date
application.
Common Issues on Data
Privacy

Hacking Phishing Identity Theft


HACKING
involves activities that seek to compromise
digital devices, such as computers, smartphones,
tablets, and even entire networks.
• An attempt to exploit a computer system or a
private network inside a computer
• Unauthorized access to or control over
computer network security systems for some
illicit purpose
PHISHING
a type of social engineering attack often used
to steal user data, including login credentials and
credit card numbers.
• As with real fishing, there’s more than one way
to reel in a victim
• Unlike other kinds of online threats, phishing
does not require particularly sophisticated
technical expertise
NATIONAL
PRIVACY
COMMISSION
DATA PRIVACY
ACT OF 2012
(RA 10173)
IDENTITY THEFT
occurs when a criminal obtains or uses the
personal information of someone else to assume
either identity or access their accounts for the
purpose of committing fraud, receiving benefits or
gaining financially in some way.
CYBERCRIME
also called computer crime. Any criminal
activity that involves the use of computer,
networked device, or a network as an instrument
to further illegal ends.
Other Forms of Cybercrimes
• Piracy or Illegal Downloads
• Cybersquatting
• Online Drug Trafficking
• Cyber Liber or Cyber Defamation
• Online Harassment (Cyberstalking, Internet,
Trolls, etc.)
• Internet Pornography
• Online Predators and Other Sex Crimes
CRYBERCRIME
PREVENTION
ACT (RA 19175)
CYBERBULLYING
the use of digital means of communication
that could hurt or harass a person such as
intentionally sending hurtful texts or SHS
messages, posting embarrassing photos or videos,
and spreading malicious rumors online.
FAKE INFORMATION
news, stories, or hoaxes created by
deliberately misinform or deceive readers and
created to either influence people’s views, push a
political agenda, or cause confusion and can often
be a profitable business for online publisher.
Types of False Information
Clickbait Propaganda Satire/Parody

False Context Manipulated Content

Misleading Headlines Biased/Slanted News


COMPUTER ADDICTION
an overdependence or a damaging need to do
something on computer or internet; excessive use
of computers to the extent that it interferes with
daily life.
Triggers for Computer Addiction

Computer Games Online Shopping Social Media

Video Streaming Online Gambling


Effects of Computer Addiction
• Sleep deprivation
• Anxiety
• Depression
• Relationship Problems
DIGITAL DIVIDE
the digital inequity or gap between groups in
terms of knowledge, usgae, and access to ICT due
to circumstances like location, income, and age.
NETIQUETTE
defined as a set of rules for
proper and acceptable online
behavior; denotes the proper
attitude that one should have and
observed when communicating
online.
Core Rules of Netiquette (SHEA, 1994)
1. Remember the Human
2. Adhere to the same standards of
behavior online that you follow in real
life
3. Know where you are in cyberspace.
4. Respect other people’s time and
bandwidth
5. Make yourself look good online
Core Rules of Netiquette (SHEA, 1994)
6. Share expert knowledge
7. Help keep flame wars under control
8. Respect other people’s privacy
9. Don’t abuse your power
10. Be forgiving of other people’s
mistakes
THANK YOU

You might also like