You are on page 1of 7

Easter College

SENIOR HIGH SCHOOL DEPARTMENT


Easter School Road Guisad, Baguio City

Media and Information Literacy

3rdst Quarter, 2nd Semester


MODULE 2:
Legal, Ethical, and Societal Issues in

Media and Information Literacy

SY: 2022-2023

Prepared by:
SHERYL B. BUMANES
Faculty, Senior High School

C. Explain
1|Page SHERYL B. BUMANES
09467512562/sbumanes@eastercollege.ph
A. Legal Issues
Fair Use

- Refers to the copying of a copyrighted material, with the purpose of using it for a review, commentary,
critic, or parody, without the need to ask permission from the copyright owner.
Parody – refers to the ridicules another in a funny, inoffensive, and no derogatory manner.

- instances which exempt copyright permission request

 taking a screenshot photo from a famous movie and turning it into meme

 citing a few lines from a song of a famous singer as an introduction to a book review

 material is used for non-profit education purpose

 the material has been transformed completely from the original

 Material was used for different purpose and audience.


Intellectual Property

- Pertains to the output of a person’s intellectual pursuit such as literary and artistic works, inventions,
logos, symbols and signs, as well as names and images used for commercial purpose or
advertisements.

- Owners have the right to control the reproduction of their work, including the right to receive payment
for that reproduction. An author may grant or sell those rights to others, including publishers or
recording companies.

- Violation of a copyright is called infringement.

Patent

- Pertains to an exclusive right granted to an invention.

- Protects the owner from other people who deliberately or unintentionally copy his invention.

Trademark

- Refers to a specific sign associated with a particular brand of goods or services.

- Use by companies to distinguish their products from other available and similar products in the market.

Trade Secret

- A secret device or technique used by a company in manufacturing its product.

Plagiarism

- An act or instance of using or closely imitating the language and thoughts of another author without
authorization; the representation of that author’s work as one’s own, as by not crediting the original
author.
Difference between plagiarism and copyright infringement

- Plagiarism is using someone else’s work without giving proper credit – a failure to cite adequately.

- Copyright infringement is using someone else’s creative work which can include song, a video, a movie
clip, a piece of visual art, photography and other creative works, without authorization or compensation,
if compensation is appropriate.

2|Page SHERYL B. BUMANES


09467512562/sbumanes@eastercollege.ph
- Schools enforce plagiarism while courts enforce copyright infringement.

B. Ethical Issues
Netiquette
1. NO YELLING, PLEASE 6. Set a respectful tone
2. Sarcasm can (and will) backfire 7. Submit files the right way
3. Don’t abuse the chat box 8. Read first
4. Attempt to find your own answer 9. Think before you type
5. Stop ... grammar time! 10. Be kind and professional

Virtual Self

- Means a human characteristic or persona within an avatar most likely in computer games, videos or
any computer related activities.

- Digital identity or assumed identity in the virtual world.

- How to Protect Digital Self

1. Look in the Mirror


Start your security assessment with what’s known as a threat-modeling exercise. Ask yourself
what you want to protect and from whom, and estimate the likelihood that the specific parties would
compromise your data.
2. Master Your Passwords
A good password manager generates, stores, and updates all your passwords with a button
press. The actual passwords are encrypted and accessible solely by you, but the system is only as
good as your master password.
3. Ditch Touch ID
It’s a neat way to quickly unlock your phone, but your fingerprint sensor is also one of the easier
ways for someone to access your device. Think of it this way: It’s simple to wrestle your thumb onto
your phone, not so for the strong passphrase nested in the corner of your brain.
4. Avoid Cookies
Cookies are small bits of code that are temporarily installed on your computer when you visit a
website. Even after you close your browser, cookies continue to track information. This is your new
mantra: Flush the cache, delete the cookies, protect your privacy.
5. Browse Safely
To surf the web is to publicly share your browsing activity with online data collectors. Foil their
plans by downloading HTTPS Everywhere. This browser extension for Chrome, Firefox, and Opera
forces encrypted communication with tens of thousands of websites, including those that don’t use
HTTPS by default.
6. Know Thy Settings
You won’t believe what Google knows about you. Personal information, search logs, browsing
habits, locations—all of it stored and used for ad targeting, unless you know how to navigate your
privacy settings. Find them and learn how they work. Granted, you won’t be able to opt out of
everything, but you’ll definitely mitigate the intrusion.
7. Layer Up
Two-factor authentication requires you to provide a second method of identifying information
along with your password to earn access—an ever-changing six-digit code, a fingerprint, a retina scan,
an NFC key fob. Many web services offer this option.
8. Go Virtual
3|Page SHERYL B. BUMANES
09467512562/sbumanes@eastercollege.ph
Virtual private networks can be useful for maintaining browser secrecy, but not all can be trusted.
Digital Footprint

- Sometimes called a digital shadow or an electronic footprint – refers to the trail of data you leave when
using the internet. It includes websites you visit, emails you send, and information you submit online. A
digital footprint can be used to track a person’s online activities and devices. Internet users create their
digital footprint either actively or passively.

- One’s overall impact, impression or effect as manifested on the internet.

Digital Citizenship
Digital access- Full electronic participation in society
Digital commerce - electronic buying and selling of goods.
Digital communication - Electronic exchange of information
Digital literacy - Teaching and learning about technology and its use.
Digital etiquette- Electronic standards of conduct or procedure
Digital law- Electronic responsibility for actions and deeds
Digital rights and responsibilities- Those freedoms extended to everyone in a digital world
Digital health and wellness- Physical and psychological well-being in a digital world
Digital security- Electronic precautions to guarantee safety.
C. Societal Issues
Cyberbullying
- Bullying that takes place online, or using electronic technology such as cellphones, computers and
tablets over communication tools including social media sites, text messages, chat and websites.

- Examples:

 Text messages or emails composed to insult or demean

 Rumors or false statements spread by email or posted on social networking sites.

 Humiliating photos, videos, websites

 Fake profiles deliberately shared across social media.


Types of Cyberbullying
1. Exclusion
Exclusion is the act of leaving someone out deliberately. Exclusion exists with in-person bullying
situations, but is also used online to target and bully a victim. For example, your child might be
excluded/uninvited to groups or parties while they see other friends being included, or left out of message
threads or conversations that involve mutual friends.
2. Harassment
Harassment is a broad category under which many types of cyberbullying fall into, but it generally refers
to a sustained and constant pattern of hurtful or threatening online messages sent with the intention of doing
harm to someone.
3. Outing/Doxing
Outing, also known as doxing, refers to the act of openly revealing sensitive or personal information
about someone without their consent for purposes of embarrassing or humiliating them. This can range from
the spreading of personal photos or documents of public figures to sharing an individual’s saved personal
messages in an online private group. The key is the lack of consent from the victim.
4. Trickery

4|Page SHERYL B. BUMANES


09467512562/sbumanes@eastercollege.ph
Trickery is similar to outing, with an added element of deception. In these situations, the bully will
befriend their target and lull them into a false sense of security. Once the bully has gained their target’s trust,
they abuse that trust and share the victim’s secrets and private information to a third party or multiple third
parties.
5. Cyberstalking
Cyberstalking is a particularly serious form of cyberbullying that can extend to threats of physical harm
to the child being targeted. It can include monitoring, false accusations, threats, and is often accompanied by
offline stalking. It is a criminal offense and can result in a restraining order, probation, and even jail time for the
perpetrator.
6. Fraping
Fraping is when a bully uses your child’s social networking accounts to post inappropriate content with
their name. It can be harmless when friends write funny posts on each other’s profiles, but has potential to be
incredibly harmful. For example, a bully posting racial/homophobic slurs through someone else’s profile to ruin
their reputation.
7. Masquerading
Masquerading happens when a bully creates a made up profile or identity online with the sole purpose
of cyberbullying someone. This could involve creating a fake email account, fake social media profile, and
selecting a new identity and photos to fool the victim. In these cases, the bully tends to be someone the victim
knows quite well.
8. Dissing
Dissing refers to the act of a bully spreading cruel information about their target through public posts or
private messages to either ruin their reputation or relationships with other people. In these situations, the bully
tends to have a personal relationship with the victim, either as an acquaintance or as a friend.
9. Trolling
Trolling is when a bully will seek out to intentionally upset others by posting inflammatory comments
online. Trolling may not always be a form of cyberbullying, but it can be used as a tool to cyberbully when done
with malicious and harmful intent. These bullies tend to be more detached from their victims, and do not have a
personal relationship.
10. Flaming
This type of online bullying constitutes of posting about or directly sending insults and profanity to their
target. Flaming is similar to trolling, but will usually be a more direct attack on a victim to incite them into online
fights.
11. Nation
Breaking into someone’s email or other online account and sending messages that will cause
embarrassment or damage to the person’s reputation and affect his or her relationship with other.
12. Gossip
Posting or sending cruel gossip to damage a person’s reputation and relationships with friends, family
and acquaintances.
Digital Divide
The Digital Divide, or the digital split, is a social issue referring to the differing amount of information
between those who have access to the Internet (specially broadband access) and those who do not have
access. The term became popular among concerned parties, such as scholars, policy makers, and advocacy
groups, in the late 1990s. The digital divide is the gap that exists between individuals who have access to
modern information and communication technology and those who lack access. There are three key stages
that influence digital inequality worldwide.
Digital inequality is evident between communities living in urban areas and those living in rural
settlements; between socioeconomic groups; between less economically developed countries and more
economically developed countries; between the educated and uneducated population. Individuals with access
to a broadband connection can be digitally split. How? Low-performance computers, limited broadband speeds
and limited access to subscription-based content widen the gap.
5|Page SHERYL B. BUMANES
09467512562/sbumanes@eastercollege.ph
3 Types of Digital Divide
There are numerous types of the digital divide that influence our efforts in accessing the internet. Some
of the vivid gaps in digital inequality include:
A. Gender Divide
According to a 2013 report, the internet gender gap is striking especially in developing countries.
Though mobile connectivity is spreading drastically, it is not spreading equally. Women are still lagging. Men in
low-income countries are 90% more likely to own a mobile phone than women. This translates to 184 million
women who lack access to mobile connectivity. Even among women owning mobile phones, 1.2 billion women
in low and mid-income countries have no access to the internet.
B. Social Divide
Internet access creates relationships and social circles among people with shared interests. Social
media platforms like Twitter and Facebook create online peer groups based on similar interests. More than
ever internet usage has influenced social stratification which is evident in societies among those that are
connected to the internet and those that are not. Non-connected groups are sidelined since they don’t share in
the internet benefits of the connected groups.
C. Universal Access Divide
Individuals living with physical disabilities are often disadvantaged when it comes to accessing the
internet. They may have the necessary skills but cannot exploit the available hardware and software. Some
parts of the world will remain segregated from the internet and its vast potential due to lack of digital literacy
skills, low education levels, and inadequate broadband infrastructure.
Internet Addiction
Internet addiction is a behavioral addiction in which a person becomes dependent on use of the
Internet, or other online devices, as a maladaptive way of coping with life's stresses. Internet addiction is
becoming widely recognized and acknowledged, particularly in countries where it is affecting large numbers of
people, such as South Korea, where it has been declared a national health problem.

D. Elaborate

Laws in the Philippines on media and information


1. PHILIPPINE LAWS ON INTELLECTUAL PROPERTY
R.A. 8293 - An Act prescribing the Intellectual Property Code and establishing the Intellectual Property
Office, providing for its powers and functions, and for other purposes
R.A. 165- An Act creating a patent office, prescribing its powers and duties, regulating the issuance of
patents, and appropriating funds therefore
R.A. 166- An Act to provide for the registration and protection of trade-marks, trade-names, and service
marks, defining unfair competition and false marking and providing remedies against the same, and for other
purposes
2. Anti-bullying Act of 2013 or Republic Act no. 10627
3. Cybercrime Prevention Act or Republic Act No. 10175
a. Offenses against the confidentiality, integrity and availability of computer data and systems

 Illegal access - he access to the whole or any part of a computer system without right.

 Illegal interception - The interception made by technical means without right of any non-
public transmission of computer data to, from, or within a computer system including
electromagnetic emissions from a computer system carrying such computer data.

 Data interference - The intentional or reckless alteration, damaging, deletion or


deterioration of computer data, electronic document, or electronic data message, without
right, including the introduction or transmission of viruses.
b. Misuse of Devices

6|Page SHERYL B. BUMANES


09467512562/sbumanes@eastercollege.ph
- The use, production, sale, procurement, importation, distribution, or otherwise making
available, without right, of:
a. A device, including a computer program, designed or adapted primarily for the purpose of
committing any of the offenses under this Act; or
b. A computer password, access code, or similar data by which the whole or any part of a
computer system is capable of being accessed with intent that it be used for the purpose of committing
any of the offenses under this Act.
c. Cyber-squatting - The acquisition of a domain name over the internet in bad faith to profit,
mislead, destroy reputation, and deprive others from registering the same, if such a domain
name is:
a. Similar, identical, or confusingly similar to an existing trademark registered with the
appropriate government agency at the time of the domain name registration:
b. Identical or in any way similar with the name of a person other than the registrant, in
case of a personal name; and
c. Acquired without right or with intellectual property interests in
d. Computer-Related Offenses

 Computer-Related Forgery
 Computer-Related Fraud
 Computer-Related Identity Theft
e. Content- Related Offenses

 Cybersex

 Child Pornography

 Unsolicited Commercial Communications

 Libel
f. Other Offenses

 Aiding or abetting in the Commission of Cybercrime

 Attempt in the Commission of Cybercrime

7|Page SHERYL B. BUMANES


09467512562/sbumanes@eastercollege.ph

You might also like