SlideShare a Scribd company logo
1 of 3
CHAPTER 7-
LEGAL, ETHICAL AND SOCIETAL ISSUES IN
MEDIA AND INFORMATION
REPUBLIC ACT NO. 10175
- Or the Cybercrime Prevention Act of
2012
- is a law in the Philippines approved on
September 12, 2012 which aims to address
legal issues concerning online interactions and
the Internet
REPUBLIC ACT NO. 10175
Among the cybercrime offenses included in
the bill are cybersquatting, cybersex, child
pornography, identity theft, illegal access to
data and libel.
CYBER means…
• relating to, or involving computers or
computer networks (such as the Internet)
Cyberspace
- refers to the virtual computer world,
and more specifically, is an electronic medium
used to form a global computer network to
facilitate online communication
Cybercrime
- refers to the criminal activities carried
out by means of computers or the Internet
CYBERBULLYING
the use of electronic communication to
bully a person, typically by sending messages
of an intimidating or threatening nature
HACKING
- refers to the practice of modifying or altering
computer software and hardware to
accomplish a goal that is considered to be
outside of the creator's original objective.
HACKING
Those individuals who engage in computer
hacking activities are typically referred to as
“hackers”.
PHISHING
- is the attempt to obtain sensitive
information such as usernames, passwords,
and credit card details (and, indirectly, money),
often for malicious reasons, by disguising as a
trustworthy entity in an electronic
communication.
ILLEGAL DOWNLOADING
- refers to obtaining files that you do not have
the right to use from the Internet.
LEGAL DOWNLOADING SITES
The Pirate Bay iTunes
Kickass.to Yahoo Music
Torrent Downloads.me
Amazon YTS.ag
Netflix
RARBG.to Ruckus
DIGITAL PIRACY
- the practice of illegally copying and
selling digital music, video, computer software,
etc.
IDENTITY THEFT
- is the deliberate use of someone else's
identity, usually as a method to gain a financial
advantage or obtain credit and other benefits
in the other person's name, and perhaps to the
other person's disadvantage or loss
CYBER DEFAMATION
- is an unprivileged false statement of fact
which tends to harm the reputation of a
person or company
2 TYPESOF DEFAMATION:
1. Libel - written
2. Slander - verbal
CYBERSEX
• also called computer sex, Internet sex,
net sex
• is a virtual sex encounter in which two
or more people (connected remotely via
internet) send each other sexually explicit
contents or sexually explicit acts
CHILDPORNOGRAPHY
- is a form of child sexual exploitation
CYBERSQUATTING
• is registering, trafficking in, or using an
Internet domain name with bad faith intent to
profit from the goodwill of a trademark
belonging to someone else.
CYBERSQUATTING
• The cybersquatter then offers to sell the
domain to the person or company who owns a
trademark contained within the name at an
inflated price.
COPYRIGHT
• a legal device that gives the creator of a
literary, artistic, musical, or other creative work
the sole right to publish and sell that work.
COPYRIGHT
Copyright owners have the right to control the
reproduction of their work, including the right
to receive payment for that reproduction.
Violation of a copyright is called
INFRINGEMENT.
PLAGIARISM
• an act or instance of using or closely
imitating the language and thoughts of
another author without authorization; the
representation of that author's work as one's
own, as by not crediting the original author
FAIR USE
is a legal concept that allows the reproduction
of copyrighted material for certain purposes
without obtaining permission and without
paying a fee. Purposes permitting the
application of fair use generally include review,
news reporting, teaching, or scholarly research.
COMPUTER ADDICTION
- the excessive use of computers to the
extent that it interferes with daily life. This
excessive use may for example interfere with
work or sleep, result in problems with social
interaction, or affect mood, relationships and
thought processes.
DIGITAL DIVIDE
- an economic inequality between groups
in terms of access to, use of, or knowledge of
ICT. The divide within countries can refer to
inequalities between individuals, households,
businesses, and geographic areas at different
socioeconomic (and other
demographic) levels
VIRTUAL SELF
- The persona you create about yourself
virtually
NETIQUETTE
• the correct or acceptable way of
communicating on the Internet.
10 RULES OF NETIQUETTE
1. When typing never write in all capital letter
2. Don’t plagiarize
3. Use proper quotes and always use the whole
quote
4. Do not gossip and keep personal information
personal
5. Do not steal those photographs off the web
6. Watch your language
7. Be patient with internet newbies
8. NO spamming
9. If you are using a header (such as in an email)
make sure your content really pertains to the
header.
10. Avoid overuse of emoticons.

More Related Content

What's hot

Cyberspace
CyberspaceCyberspace
CyberspaceG Prachi
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide showBeckusq
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldRownel Cerezo Gagani
 
CYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIORCYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIORDharmik Navadiya
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ictcyb1337
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpointDLRUDO01
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.Rushabh Shah
 
Cyberspace
CyberspaceCyberspace
CyberspaceUtchi
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social mediaAM Oh
 
Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsPrabesh Shrestha
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society Sumama Shakir
 
Chapter 1
Chapter 1Chapter 1
Chapter 1Hajar Len
 
Hamdan mohammed al shehhi
Hamdan mohammed al shehhiHamdan mohammed al shehhi
Hamdan mohammed al shehhiAhmed Sleem
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computerRoshanMaharjan13
 
Social interaction within 10 years
Social interaction within 10 yearsSocial interaction within 10 years
Social interaction within 10 yearssilvia garzon
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
Digi teen
Digi teenDigi teen
Digi teen13aaa
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar
 
21st century project
21st century project21st century project
21st century projectjsmith141
 

What's hot (20)

Cyberspace
CyberspaceCyberspace
Cyberspace
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorld
 
CYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIORCYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIOR
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpoint
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social media
 
Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethics
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Hamdan mohammed al shehhi
Hamdan mohammed al shehhiHamdan mohammed al shehhi
Hamdan mohammed al shehhi
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Social interaction within 10 years
Social interaction within 10 yearsSocial interaction within 10 years
Social interaction within 10 years
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Digi teen
Digi teenDigi teen
Digi teen
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?
 
21st century project
21st century project21st century project
21st century project
 

Similar to Chapter 7

LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfLEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfRegineManuel2
 
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...Mark Jhon Oxillo
 
7-l-e-s-i-m-i-170730072409 (1).pptx
7-l-e-s-i-m-i-170730072409 (1).pptx7-l-e-s-i-m-i-170730072409 (1).pptx
7-l-e-s-i-m-i-170730072409 (1).pptxMARSTONGLENNTUGAHAN
 
Legal, Ethical, and Societal Issues of Media and Information
Legal, Ethical, and Societal Issues of Media and InformationLegal, Ethical, and Societal Issues of Media and Information
Legal, Ethical, and Societal Issues of Media and InformationJhoelKenneth
 
MIL reportings (GROUP 9).pdf
MIL reportings (GROUP 9).pdfMIL reportings (GROUP 9).pdf
MIL reportings (GROUP 9).pdfmariebanghit
 
Media and information literacy ethics-5.pptx
Media and information literacy ethics-5.pptxMedia and information literacy ethics-5.pptx
Media and information literacy ethics-5.pptxRobertCarreonBula
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computerMuhammad Haroon
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.RIZALEAHSAMANIEGO
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
Ethical Issue Digital Age Technology Presentatiopdf
Ethical Issue Digital Age Technology PresentatiopdfEthical Issue Digital Age Technology Presentatiopdf
Ethical Issue Digital Age Technology PresentatiopdfDesireDelosSantos
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; familyDr.Keshav Sathaye
 
Online Safety and Security.pptx
Online Safety and Security.pptxOnline Safety and Security.pptx
Online Safety and Security.pptxmhavzgreda1
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxAnecitaLCalamohoy
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxAnecitaLCalamohoy
 
Cybercrimes
CybercrimesCybercrimes
CybercrimesFit Tri
 
Chapter 1
Chapter 1Chapter 1
Chapter 1Hajar Len
 
Disadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptxDisadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptxDixsonCaluag2
 
ICT, the Self, and Society.pdf
ICT, the Self, and Society.pdfICT, the Self, and Society.pdf
ICT, the Self, and Society.pdfTeacherAnneApolinari
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxJoelGautham
 

Similar to Chapter 7 (20)

LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfLEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
 
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
 
7-l-e-s-i-m-i-170730072409 (1).pptx
7-l-e-s-i-m-i-170730072409 (1).pptx7-l-e-s-i-m-i-170730072409 (1).pptx
7-l-e-s-i-m-i-170730072409 (1).pptx
 
Legal, Ethical, and Societal Issues of Media and Information
Legal, Ethical, and Societal Issues of Media and InformationLegal, Ethical, and Societal Issues of Media and Information
Legal, Ethical, and Societal Issues of Media and Information
 
MIL reportings (GROUP 9).pdf
MIL reportings (GROUP 9).pdfMIL reportings (GROUP 9).pdf
MIL reportings (GROUP 9).pdf
 
Media and information literacy ethics-5.pptx
Media and information literacy ethics-5.pptxMedia and information literacy ethics-5.pptx
Media and information literacy ethics-5.pptx
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Ethical Issue Digital Age Technology Presentatiopdf
Ethical Issue Digital Age Technology PresentatiopdfEthical Issue Digital Age Technology Presentatiopdf
Ethical Issue Digital Age Technology Presentatiopdf
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Online Safety and Security.pptx
Online Safety and Security.pptxOnline Safety and Security.pptx
Online Safety and Security.pptx
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Disadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptxDisadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptx
 
ICT, the Self, and Society.pdf
ICT, the Self, and Society.pdfICT, the Self, and Society.pdf
ICT, the Self, and Society.pdf
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptx
 

More from ICCT foundation inc (20)

Hm122 prelim exam-media
Hm122 prelim exam-mediaHm122 prelim exam-media
Hm122 prelim exam-media
 
Hm122 midterm-exam-media
Hm122 midterm-exam-mediaHm122 midterm-exam-media
Hm122 midterm-exam-media
 
Chapter 2-types of media
Chapter 2-types of mediaChapter 2-types of media
Chapter 2-types of media
 
Chapter 6 media codes and convention
Chapter 6 media  codes and conventionChapter 6 media  codes and convention
Chapter 6 media codes and convention
 
Chapter 8.legal. opportunities
Chapter 8.legal. opportunitiesChapter 8.legal. opportunities
Chapter 8.legal. opportunities
 
Chapter 9 current trends
Chapter 9 current trendsChapter 9 current trends
Chapter 9 current trends
 
Chapter 11 people media
Chapter 11 people mediaChapter 11 people media
Chapter 11 people media
 
quiz 100 items
quiz 100 itemsquiz 100 items
quiz 100 items
 
Chapter 10 meida
Chapter 10 meida Chapter 10 meida
Chapter 10 meida
 
Question aire hackcing.bullly,
Question aire hackcing.bullly, Question aire hackcing.bullly,
Question aire hackcing.bullly,
 
Comic sample
Comic sampleComic sample
Comic sample
 
Shooting star
Shooting starShooting star
Shooting star
 
Ppt animation-trigger
Ppt animation-triggerPpt animation-trigger
Ppt animation-trigger
 
Pairs2
Pairs2Pairs2
Pairs2
 
A long quiz
A long quizA long quiz
A long quiz
 
Q1= anwer key
Q1= anwer keyQ1= anwer key
Q1= anwer key
 
Activities
ActivitiesActivities
Activities
 
Hand out of lesson
Hand out of lessonHand out of lesson
Hand out of lesson
 
A long quiz
A long quizA long quiz
A long quiz
 
Custom animation
Custom animationCustom animation
Custom animation
 

Recently uploaded

Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 

Recently uploaded (20)

Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 

Chapter 7

  • 1. CHAPTER 7- LEGAL, ETHICAL AND SOCIETAL ISSUES IN MEDIA AND INFORMATION REPUBLIC ACT NO. 10175 - Or the Cybercrime Prevention Act of 2012 - is a law in the Philippines approved on September 12, 2012 which aims to address legal issues concerning online interactions and the Internet REPUBLIC ACT NO. 10175 Among the cybercrime offenses included in the bill are cybersquatting, cybersex, child pornography, identity theft, illegal access to data and libel. CYBER means… • relating to, or involving computers or computer networks (such as the Internet) Cyberspace - refers to the virtual computer world, and more specifically, is an electronic medium used to form a global computer network to facilitate online communication Cybercrime - refers to the criminal activities carried out by means of computers or the Internet CYBERBULLYING the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature HACKING - refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator's original objective. HACKING Those individuals who engage in computer hacking activities are typically referred to as “hackers”. PHISHING - is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. ILLEGAL DOWNLOADING - refers to obtaining files that you do not have the right to use from the Internet. LEGAL DOWNLOADING SITES The Pirate Bay iTunes Kickass.to Yahoo Music Torrent Downloads.me Amazon YTS.ag Netflix RARBG.to Ruckus DIGITAL PIRACY - the practice of illegally copying and selling digital music, video, computer software, etc. IDENTITY THEFT - is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss CYBER DEFAMATION - is an unprivileged false statement of fact which tends to harm the reputation of a person or company 2 TYPESOF DEFAMATION: 1. Libel - written
  • 2. 2. Slander - verbal CYBERSEX • also called computer sex, Internet sex, net sex • is a virtual sex encounter in which two or more people (connected remotely via internet) send each other sexually explicit contents or sexually explicit acts CHILDPORNOGRAPHY - is a form of child sexual exploitation CYBERSQUATTING • is registering, trafficking in, or using an Internet domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else. CYBERSQUATTING • The cybersquatter then offers to sell the domain to the person or company who owns a trademark contained within the name at an inflated price. COPYRIGHT • a legal device that gives the creator of a literary, artistic, musical, or other creative work the sole right to publish and sell that work. COPYRIGHT Copyright owners have the right to control the reproduction of their work, including the right to receive payment for that reproduction. Violation of a copyright is called INFRINGEMENT. PLAGIARISM • an act or instance of using or closely imitating the language and thoughts of another author without authorization; the representation of that author's work as one's own, as by not crediting the original author FAIR USE is a legal concept that allows the reproduction of copyrighted material for certain purposes without obtaining permission and without paying a fee. Purposes permitting the application of fair use generally include review, news reporting, teaching, or scholarly research. COMPUTER ADDICTION - the excessive use of computers to the extent that it interferes with daily life. This excessive use may for example interfere with work or sleep, result in problems with social interaction, or affect mood, relationships and thought processes. DIGITAL DIVIDE - an economic inequality between groups in terms of access to, use of, or knowledge of ICT. The divide within countries can refer to inequalities between individuals, households, businesses, and geographic areas at different socioeconomic (and other demographic) levels VIRTUAL SELF - The persona you create about yourself virtually NETIQUETTE • the correct or acceptable way of communicating on the Internet. 10 RULES OF NETIQUETTE 1. When typing never write in all capital letter 2. Don’t plagiarize 3. Use proper quotes and always use the whole quote 4. Do not gossip and keep personal information personal 5. Do not steal those photographs off the web 6. Watch your language 7. Be patient with internet newbies 8. NO spamming
  • 3. 9. If you are using a header (such as in an email) make sure your content really pertains to the header. 10. Avoid overuse of emoticons.