0% found this document useful (0 votes)
89 views

Lesson 7

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
89 views

Lesson 7

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Lesson 7: LEGAL, ETHICAL, AND SOCIETAL ISSUES IN MEDIA AND INFORMATION

Topic Outline:

• Fair Use

• Intellectual Property

• Plagiarism

• Netiquette

• Digital Divide

• Virtual Self

• Dangers of the Internet

Fair Use

• Refers to the copying of a copyrighted material with the purpose of using it for a review,
commentary, or parody, without the need to ask permission from the copyright owner.

PARODY

• Refers to the ridicules another in a funny, inoffensive, and nonderogatory manner.

• Example: taking a screenshot photo from a famous movie and turning it into a meme.

• The material will be used for nonprofit educational purpose.

• The material has been transformed completely from the original.

• The material was used for different purpose and audience.

Intellectual Property

COPYRIGHT TRADEMARK PATENT

Gives the owner exclusive rights Gives the owner exclusive use of Property rights relating to an
to the material. certain images/phrases. invention.

Protects works of authorship, Protects a word, phrase, symbol Has limited duration usually 20
published or unpublished. or design that identifies the years from date of application
source of the product.

Protects creative of intellectual Used mostly in commerce Considered a property therefore


work. Used for music, photos and it can be bought, sold,
forms of art. mortgaged, or licensed by owner.

Copyright owner decides who Prevents companies from selling Prevents anyone from making,
may financially profit from it. a similar product with the same using or selling the patented
or similar word or symbol. invention.

Only good within the country of A form of protection for a brand Only effective in the country it
origin unless agreed upon by name. was filed.
other countries to honor each
other’s copyright.

INTERNET COPYRIGHT INFRINGEMENT: MYTHS VS. FACTS

MYTHS FACTS
ONCE A WORK IS POSTED You cannot use, copy or post someone else’s photos, images, songs or
ONLINE, IT LOSES COPYRIGHT articles without their permission. The person who created them owns
PROTECTION these works and they have copyright protection from the moment the
works were created and they never lose this ownership protection

I CAN COPY A WORK ONLINE You cannot use other people’s work unless they first give you permission.
PROVIDED I GIVE THE OWNER Some websites say you can use any material from their site provided you
CREDIT OR A LINK BACK. link back and give them credit. But check first and get permission unless it’s
specifically granted on the work.

IF I ALTER THE WORK OR ONLY Derivative works are still covered by Copyright. The only exception is if you
USE PART OF IT, I AM NOT are writing a review or critique and you’re referring to the work. This is
BREACHING COPYRIGHT. considered fair use.

IF THERE IS NO COPYRIGHT There is no requirement to display a copyright symbol or register any work
SYMBOL OR NOTICE, THE to have copyright protection. It is protected from the moment it is created
WORK CAN BE FREELY USED. and the owner does not lose their copyright if they don’t use the copyright
symbol

I CAN USE ANOTHER You are breaching Copyright whether you make money or not. The
PERSON’S WORK AS LONG AS I argument that you are giving the owner free advertising does not count.
DON’T PROFIT FINANCIALLY Any money you make would be taken into account by a court decision
FROM IT against you.

COPYRIGHT INFRINGEMENT EXAMPLES:

• Racal issues public apology for design infringement of Yamaha bikes

• Yamaha said Racal violated intellectual property rights when the latter incorporated the
design cues of its MD110 under bone and JR125 scooter from the Yamaha Sniper and
Mio Soul, respectively.

• Bulacan school ordered to pay P608,450 for copyright infringement


• The case stemmed from the complaint filed by author and publisher Raymund Sta.
Maria Catabijan, who said the school copied his work books and sold reproductions to
its students.

• ABS-CBN files copyright infringement case against Willing Willie

• ABS-CBN alleged that each segment of the defunct "Wowowee" was "reproduced" in
"Willing Willie" namely: 1) introduction of the host by one "DJ Coki," 2) dance number of
Revillame, 3) "Biga-ten" segment named as "Bigtime Ka," and 4) "Willie of Fortune" was
repackaged as "Willtime Bigtime."

• ABS-CBN also claimed that "the look and feel of the new show was strikingly similar to
the previous one" from set design, stage, studio viewers' layout, sequencing, blocking,
and camera angles.

Plagiarism

• an act or instance of using or closely imitating the language and thoughts of another author
without authorization; the representation of that author's work as one's own, as by not crediting
the original author.

• Visit the link for examples: http://www.spot.ph/newsfeatures/54502/copycat-nation-10-high-


profile-plagiarism-cases-in-the-philippines

Netiquette

1. NO YELLING, PLEASE

• There’s a time and a place for everything—BUT IN MOST SITUATIONS TYPING IN ALL CAPS IS
INAPPROPRIATE.

2. Sarcasm can (and will) backfire

• Sarcasm has been the source of plenty of misguided arguments online, as it can be incredibly
difficult to understand the commenter’s intent. What may seem like an obvious joke to you
could come across as off-putting or rude to those who don’t know you personally.  

3. Attempt to find your own answer

• Attempt to find the answers to any other questions on your own using a search engine like
Google or Bing. Relatively simple questions can usually be answered within seconds—which
saves everyone time. If your questions remain unanswered after a bit of effort, feel free to bring
them up with your instructor

4. Stop ... grammar-time!

• Always make an effort to use proper punctuation, spelling and grammar.  

5. Don’t get cute with text colors


• Stick to the basic black text color—if you need to emphasize something in your sentence use
bold or italicized words. This will help ensure everyone can easily read your message without
acquiring a headache.

6. Brevity rules

• Keep email messages short and to the point. 

7. Read first

• Take some time to read through each of the previous discussion post responses before writing
your own response.  

8. Don’t over share

• Personal information is valuable to identity thieves, so try not to share more than is necessary.

9. Be kind

• Make a point to be respectful in your comments—even if you disagree or dislike someone’s


stance on a topic.

Digital Divide

• Refers to the economic, educational, and social inequalities experienced by those who cannot
afford to have computer and internet access.

• Pertain to the gap on the kind of information which can be accessed, and the available form of
communication that is allowed to be distributed

Digital Divide Factors:

• Disparity between:

• Developed country and developing country

• Urban and rural/ remote area

• Differences caused by:

• Income

• Education and job training

• Race

• Gender

• Age

• Disabilities

Virtual self 
 means a human characteristic or persona within an avatar most likely in computer games,
videos or any computer related activities.

• Digital identity or assumed identity in the virtual world.

How to Protect your Digital Self

• Look in the Mirror

• Start your security assessment. Ask yourself what you want to protect and from whom,
and estimate the likelihood that the specific parties would compromise your data.

• Master Your Passwords

• A good password manager generates, stores, and updates all your passwords with a
button press. The actual passwords are encrypted and accessible solely by you, but the
system is only as good as your master password.

• Ditch Touch ID

• It’s a neat way to quickly unlock your phone, but your fingerprint sensor is also one of
the easier ways for someone to access your device.

• Avoid Cookies

• Cookies are small bits of code that are temporarily installed on your computer when you
visit a website

• Even after you close your browser, cookies continue to track information. This is your
new mantra: Flush the cache, delete the cookies, protect your privacy.

• Browse Safely

• To surf the web is to publicly share your browsing activity with online data collectors.

• Know Thy Settings

• You won’t believe what Google knows about you. Seriously. Personal information,
search logs, browsing habits, locations—all of it stored and used for ad targeting, unless
you know how to navigate your privacy settings.

• Go Virtual

• Virtual private networks can be useful for maintaining browser secrecy, but not all can
be trusted. Do your research and only choose a VPN service that doesn’t

Digital Footprint

• one's unique set of digital activities, actions, and communications that leave a data trace on the
Internet or on a computer or other digital device and can identify the particular user or device:

• one’s overall impact, impression, or effect as manifested on the Internet;


Digital Citizenship

• the quality of habits, actions, and consumption patterns that impact the ecology of digital
content and communities.

All good digital citizens

• Protect the private information of themselves and others.


• Stay safe online
• Balance the time they spend online and using media.
• Carefully manage their digital footprint
• Respect copy right and intellectual property
• Stand up to cyberbullying when they see it happening
• Respect themselves and others.

Cyber Bullying

• bullying that takes place online, or using electronic technology such as cell phones,
computers, and tablets over communication tools including social media sites, text
messages, chat, and websites.

Types of cyberbullying

1. EXCLUSION – deliberate excluding someone from an online group.

2. GOSSIP - posting or sending cruel gossip to damage a person’s reputation and relationships with
friends, family, and acquaintances.

3. HARASSMENT – repeatedly posting or sending offensive, rude, and insulting messages.

4. NATION – breaking into someone’s e-mail or other online account and sending messages that
will cause embarrassment or damage to the person’s reputation and affect his or her
relationship with other.

5. OUTING AND TRICKERY – tricking someone into revealing secrets or embarrassing information,
which is then shared online.

6. CYBERSTALKING – posting or sending unwanted or intimidating messages, which may include


threats.

7. CYBERTHREATS – remarks on the internet threatening or implying violent behavior, displaying


suicidal tendencies.

How to stop Cyberbullying


Computer addiction

• the excessive use of computers to the extent that it interferes with daily life.

• This excessive use may for example interfere with work or sleep, result in problems with social
interaction, or affect mood, relationships, and thought processes.

LAWS IN THE PHILIPPINES on MEDIA AND INFORMATION

Intellectual Property Rights in the Philippines AKA REPUBLIC ACT NO. 8293

Anti-Bullying Act of 2013 AKA REPUBLIC ACT NO. 10627

Cybercrime Prevention Act AKA REPUBLIC ACT NO. 10175

A. Offenses against the confidentiality, integrity and availability of computer data and systems

1. Illegal Access

2. Illegal Interception

3. Data Interference

4. System Interference

5. Misuse of Devices

6. Cyber-Squatting

B. Computer-Related Offenses

1. Computer-Related Forgery

2. Computer-Related Fraud

3. Computer –Related Identity Theft

C. Content-Related Offenses

1. Cybersex

2. Child Pornography

3. Unsolicited Commercial Communications

4. Libel

D. Other Offenses

1. Aiding or Abetting in the Commission of Cybercrime

2. Attempt in the Commission of Cybercrime


Case Studies

Collaborate on this activity. Choose 4 -5 members by group. You also have an option to work on it alone
in case there are no more groups available. Research about a case that happened in the Philippines
regarding the suggested issues of using unguarded internet. Choose only one issue and answer the
questions provided.

• Copyright and Plagiarism

• State the case chosen.

• The effect of such case to the person.

• Do you think technology and the internet have made copyright and plagiarism easier?

• What is there to learn about the case? (individual answers)

• Cyber Bullying

• State the case chosen.

• The effect of such case to the person being bullied and the bully.

• Ado you think technology and the internet has made bullying easier?

• Give suggestion to avoid cyberbullying. (individual answers)

This activity must be placed on a word document. Only one needs to submit provided that all the names
of the members are included. Kindly follow the question and answer format. Thanks!

You might also like