Lesson 7: Legal, Ethical, and Societal Issues in Media and Information PDF

Summary

This document is a lesson plan for a secondary school class on legal, ethical, and societal issues in media and information. It discusses copyright, intellectual property, online conduct, digital issues, fair use, and common knowledge, along with how to avoid plagiarism and deal with cyberbullying and other issues.

Full Transcript

Opening Prayer Checking of Attendance Lesson 7 Legal, Ethical, and Societal Issues in Media and Information Learning Objectives: put into practice understanding of the intellectual property, copy right, and fair use guidelines; demonstrate proper conduct and behavio...

Opening Prayer Checking of Attendance Lesson 7 Legal, Ethical, and Societal Issues in Media and Information Learning Objectives: put into practice understanding of the intellectual property, copy right, and fair use guidelines; demonstrate proper conduct and behavior online; put into action personal resolve to combat digital divide, addiction, and bullying; discuss current issues related to copyright; explain actions to promote ethical use of media and information. A. LEGAL Our right to the freedom of opinion and expression is globally recognized for all. This is enshrined in the Universal Declaration of Human Rights, established in 1948: "Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers." The Philippines is one of the signatories of this Declaration. ARTICLE III Bill of Rights, Section 4 "NO LAW SHALL BE PASSED ABRFIDGING THE FREEDOM OF SPEECH, OF EXPRESSION, OR OF THE PRESS” ARTICLE III Bill of Rights, Section 7 1987 PHILIPPINE CONSTITUTION PERTAINS TO THE RIGHT TO PRIVACY OF COMMUNICATION AND CORRESPONDENCE. IT STATES THAT THE PRIVACY OF COMMUNICATION AND CORRESPONDENCE IS INVIOLABLE, AND ANY FORM OF INTERCEPTION OR SURVEILLANCE IS PROHIBITED EXCEPT WHEN AUTHORIZED BY LAW OR IN CASES OF NATIONAL SECURITY. Copyright Law and Intellectual Property Rights Copyright Ownership The owner of a copyright is the creator of the literary, artistic, musical, or other creative work, such as an author, composer, painter, sculptor, scientist, or technologist. Copyright law protects the intellectual property rights of creators, while balancing the public's interest in accessing and using creative works. Rights of Copyright Owners Copyright owners have the exclusive right to publish, sell, and reproduce their work. They can grant or sell these rights to others, like publishers or recording companies. Infringement and Damages Copying a copyrighted work is only considered infringement if it produces a "substantial similarity" between the original work and the copy. Private Communications Letters and other written private communications are owned by the addressee and recipient, but cannot be published or disseminated without the consent of the writer or their heirs, unless the court deems it necessary for public good or the interest of justice. The Berne Convention The Berne Convention is an international copyright agreement that establishes a set of minimum standards for the protection of literary and artistic works. Adopted in 1886, it has been revised several times, with the latest revision occurring in 1971. The convention aims to ensure that creators of literary and artistic works are able to control how their works are used, both in their country of origin and in other countries that have signed the agreement. Understanding Fair Use Fair Use Fair use is a legal doctrine that permits the use of copyrighted material without obtaining permission from the copyright holder, under certain circumstances. Factors to Consider The four factors to consider for fair use are the purpose and character of the use, the nature of the copyrighted work, the amount and substantiality of the portion used, and the effect of the use on the potential market for or value of the copyrighted work. Transformative Use Fair use is more likely to be found when the use of the copyrighted material is transformative, meaning it adds new expression, meaning, or message to the original work. Educational and Nonprofit Use The use of copyrighted material for educational or nonprofit purposes is more likely to be considered fair use than commercial use. Limitations of Fair Use Fair use is not a blanket exception to copyright law, and the boundaries of what constitutes fair use can be complex and context-dependent. Understanding Common Knowledge Widely Known Facts Common knowledge refers to information that is widely known and does not need to be attributed to a single source. Easily Accessible This type of information can be found in numerous places and is readily available to the general public. Uncopyrighted Content Common knowledge is not subject to copyright restrictions and can be freely used without attribution. Opening Prayer Checking of Attendance Plagiarism: Understanding and Avoiding Unethical Academic Practices Plagiarism Plagiarism is the act of using someone else's work or ideas and passing them off as your own, without proper attribution or credit. Types of Plagiarism Plagiarism can take many forms, including verbatim copying, paraphrasing without credit, and using someone else's ideas or research without acknowledgment. Consequences of Plagiarism Plagiarism is a serious academic offense that can result in penalties such as failing grades, academic suspension, or even expulsion. Avoiding Plagiarism To avoid plagiarism, always properly cite sources, use quotation marks for direct quotes, and ensure that your work is original and properly attributed. Prohibited Media and Information-related Deeds under Philippine Law These prohibited media and information-related deeds under the Philippines' RA 10175 (Cybercrime Prevention Act) and RA 10627 (Anti-Bullying Act) aim to protect individuals and society from various forms of digital exploitation and abuse. Cybersex Engaging in the willful engagement, maintenance, control, or operation of any apparatus or device to initiate and control the transmission of any obscene, indecent, or lascivious images, messages, or representations via the internet Cyberbullying The use of electronic means to harass, threaten, or intimidate another person through repeated and hostile behavior, which may include sending messages, posting negative comments, or sharing private information Computer-related Forgery The intentional act of inputting, altering, deleting, or manipulating data, resulting in unauthentic data, with the intent to be utilized for an unlawful act Computer-related Identity Theft The unlawful access and use of another person's identifying information, such as personal data or account credentials, with the intent to commit fraud or other crimes Unauthorized Access and Processes Unauthorized Access Gaining access to computer systems, networks, or data without proper authorization, such as through hacking, credential theft, or exploiting vulnerabilities. Misuse of Devices Using computing devices, such as computers, smartphones, or IoT devices, for malicious purposes like distributing malware, launching attacks, or circumventing security measures. Cyber-Squatting Registering and using domain names that are confusingly similar to those of legitimate entities, with the intent to profit or cause harm. Malicious Scripts Running unauthorized scripts or programs on a system to perform unauthorized actions or gain control. Data Manipulation Illegally modifying, deleting, or creating data within a computer system for nefarious purposes. System Hijacking Taking control of a computer or network device without the owner's consent, often to launch further attacks. Unlawful Online Content Cyber Sex Libel Unauthorized and explicit The publication of false online sexual activities, statements that harm an including the production, individual's reputation or distribution, and possession character. of pornographic material. Child Pornography Bullying The exploitation of minors Repeated, aggressive through the creation, behavior that creates an distribution, or possession intimidating or hostile of sexually explicit content environment, often through involving children. digital means. B. ETHICAL The rise of computing and the Internet bring with it a host of concerns about the proper conduct of one’s self online. Children as young as two years old are often allowed by their parents to access gadgetry, making them “leave digital footprints before they learn how to walk.” Guidelines in the Usage of Digital Media and Information Netiquette is short for network etiquette or etiquette of cyberspace. Attitude Follow the same principles of good behavior online that you follow in life offline. Be pleasant and polite. Don’t use offensive language, and don’t be confrontational. When you are new to a group, take a look around. When you send email or post to a group, you’re taking up other people’s time. It is your responsibility to ensure that the time they spend reading your post is not wasted. Before you copy people on your messages, ask yourself whether they really need to know. Don’t abuse your power. For example, system administrators should never read private emails. When someone makes a mistake, be kind about it. Avoid contentious topics about politics or religion, if at all. Content Make yourself look good. Know what you’re talking about and make sense. Share expert knowledge that you encounter regularly. Do not share fake or misleading news, unsupported opinions, and black propaganda. Respect other people’s privacy. Never use all caps. Remember that somebody’s timeline is his/her personal space. A warning: When you communicate through cyberspace your words are recorded. And chances are, they’re stored somewhere where you have no control over them. They can come back to haunt you. So think twice before you click. C. SOCIAL Along with the advantages and positive impacts that the Internet and computing age have brought to use comes a host of potential harms. Be aware and be prepared on how to address these threats. From ignoring to reporting to proper authorities, there are ways to make our computing experience wholesome and safer. Sexting The sending of digital text messages containing suggestive, provocative, or explicit sexual photographs. Illegal drugs are drugs that a person is not allowed to own or use. Online gambling means of using the Internet to place bets on events of uncertain outcome like casino and sports. Pornography encompasses texts, pictures, and films which feature sex for the sole or primary purpose of arousing people sexually. Posers people who try to give off the impression that they are one thing when they are really another. Phishing tricks the user into unwittingly handing over the password to the scammer, often through professional-looking emails pretending to be from trustworthy businesses. Hacking the gaining of unauthorized access to data in a network or computer. Computer Addiction the excessive use of computers, gadgets, and the Internet to the extent that it interferes with one’s daily life. Online Trolling the one who publishes controversial posts and comments on social media to incite anger from others or to distract people from the main issues or post. Lesson 7 Legal, Ethical, and Societal Issues in Media and Information Activity 4: Comic Strip Instructions: Create a 4-6 panel comic strip that tells a story related to your chosen issue. You can draw it in a short bond paper. Your comic should include: A clear introduction to the issue. Characters representing different perspectives (ex. a journalist, a social media user, a business). A conflict or dilemma that highlights the ethical, legal, or societal aspects of the issue. A resolution or call to action. Select one of the following topics to focus on: The impact of misinformation (fake news) Privacy concerns in social media The responsibilities of influencers The consequences of copyright infringement Name: Surname, First Name, MI. Date Started: mm/dd/yy Surname, First Name, MI. Date Finished: mm/dd/yy Grade & Section: Activity 4: Comic Strip (Chosen Topic) 1 2 3 4 5 6 7 8

Use Quizgecko on...
Browser
Browser