SlideShare a Scribd company logo
1 of 11
Download to read offline
Objec&ve 101.02 3%
Explain safety and legal issues in the digital media
environment.
Physical Safety Issues
q Electrical Hazards
☐ Electrical connec&ons not handled properly, may
result in electric shock, burn, or other injury.
q Tripping Hazards
☐ Connec&ng cables not managed properly, could
result in blocked walkway or tripping hazard.
q Ergonomics
☐ Designing the workplace to best fit the worker,
reducing strain on the body and enhancing
comfort during digital media crea&on.
Digital Safety Issues
q Cyberbullying
☐ When a person is threatened, harassed,
humiliated, tormented, or otherwise targeted
using the Internet, mobile phones, or other
digital technology.
q Iden&ty TheL
☐ When personal informa&on (SSN, credit card
number, passwords, etc.) is stolen and used to
gain access to financial or personal accounts.
Digital Safety Issues
q Virus/Malware
☐ Programs that are specifically designed to
damage a computer when installed; can access
personal informa&on, corrupt files, and even
erase the hard drive completely.
q Spam
☐ Unwanted emails (usually sent in a large volume)
that adver&se products or promote services that
were not requested by the recipient.
Digital Safety Issues
q Online Hoax
☐ A false claim that is spread through electronic
means (email, social media, blogs, etc.);
examples include chain leYers, untrue
accusa&ons, etc.
q Internet Addic&on
☐ Compulsive disorder that causes an unhealthy
obsession with the Internet and other digital
resources; examples include online gambling
addic&on, cybersex addic&on, social media
addic&on, etc.
Legal Terms in Digital Media
q Intellectual Property
☐ Original crea&ons of the mind that can be
protected by law; literary and ar&s&c works,
designs, symbols, images, names, etc.
q Copyright
☐ The exclusive legal right to reproduce, publish,
sell or distribute the expression of an intellectual
property (literature, design, audio, video, etc.)
Legal Terms in Digital Media
q Trademark
☐ A mark (logo, symbol, word, phrase, etc.) legally
registered or established by a company to
represent a service or product; cannot be used
without the permission of the owner.
q Fair Use
☐ A legal allowance of using a copyrighted material
without permission from the owner, provided
the circumstances are reasonable and do not
make the material less profitable.
Crea;ve Commons
q A nonprofit organiza&on that enables the sharing
and use of crea&vity and knowledge through free
legal tools.
q Free, easy-to-use copyright licenses provide a
simple, standardized way to give the public
permission to share and use your crea&ve work —
on condi&ons of your choice.
q Crea&ve Commons licenses are not an alterna&ve to
copyright. They work alongside copyright and
enable you to modify your copyright terms to best
suit your needs.
Crea;ve Commons
q Crea&ve Commons Video
q Crea&ve Commons Licenses
☐ Six types with different features
Legal Terms in Digital Media
q Plagiarism
☐ Taking someone else’s work or ideas and passing
them off as your own.
q Libel
☐ A published (wriYen or printed) false statement
that is damaging to a person’s reputa&on or
success.
q Slander
☐ An oral (spoken) false statement that is
damaging to a person’s reputa&on or success.
Legal Terms in Digital Media
q Invasion of Privacy
☐ Intruding into someone’s personal space, using
their image or likeness, or revealing informa&on
about them without their permission.

More Related Content

Similar to dm10102ppt.pdf

Discovering computers- Chapter 1 (1).pptx
Discovering computers- Chapter 1 (1).pptxDiscovering computers- Chapter 1 (1).pptx
Discovering computers- Chapter 1 (1).pptx
GIFTCHIMWENDO
 
Intellectual property protection
Intellectual property protectionIntellectual property protection
Intellectual property protection
MSIZI NDABA
 
MindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverMindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no cover
PJStarr
 
PowerPoint presentation
PowerPoint presentationPowerPoint presentation
PowerPoint presentation
webhostingguy
 
Welcome-to-Our-Journey-in-Information-Security-Cybercrime-and-E-Commerce.pptx
Welcome-to-Our-Journey-in-Information-Security-Cybercrime-and-E-Commerce.pptxWelcome-to-Our-Journey-in-Information-Security-Cybercrime-and-E-Commerce.pptx
Welcome-to-Our-Journey-in-Information-Security-Cybercrime-and-E-Commerce.pptx
MDUODOYHOSSANRAFI221
 

Similar to dm10102ppt.pdf (20)

Cyber Safety
Cyber Safety Cyber Safety
Cyber Safety
 
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossLeadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
 
Intellectual property in cyberspace
Intellectual property in cyberspaceIntellectual property in cyberspace
Intellectual property in cyberspace
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Chicago business affairs workshop (ip)
Chicago business affairs workshop (ip)Chicago business affairs workshop (ip)
Chicago business affairs workshop (ip)
 
Discovering computers- Chapter 1 (1).pptx
Discovering computers- Chapter 1 (1).pptxDiscovering computers- Chapter 1 (1).pptx
Discovering computers- Chapter 1 (1).pptx
 
Intellectual property protection
Intellectual property protectionIntellectual property protection
Intellectual property protection
 
Maximizing your Productivity Through Ethical & Innovative Use of Smartphones
Maximizing your Productivity Through Ethical & Innovative Use of SmartphonesMaximizing your Productivity Through Ethical & Innovative Use of Smartphones
Maximizing your Productivity Through Ethical & Innovative Use of Smartphones
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
 
Awareness Against Cyber Crime
Awareness Against Cyber CrimeAwareness Against Cyber Crime
Awareness Against Cyber Crime
 
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
MindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverMindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no cover
 
PowerPoint presentation
PowerPoint presentationPowerPoint presentation
PowerPoint presentation
 
Notice to client form
Notice to client formNotice to client form
Notice to client form
 
Ipr
IprIpr
Ipr
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
Welcome-to-Our-Journey-in-Information-Security-Cybercrime-and-E-Commerce.pptx
Welcome-to-Our-Journey-in-Information-Security-Cybercrime-and-E-Commerce.pptxWelcome-to-Our-Journey-in-Information-Security-Cybercrime-and-E-Commerce.pptx
Welcome-to-Our-Journey-in-Information-Security-Cybercrime-and-E-Commerce.pptx
 
FINALS QUIZ media information and literacy 1.pptx
FINALS QUIZ media information and literacy 1.pptxFINALS QUIZ media information and literacy 1.pptx
FINALS QUIZ media information and literacy 1.pptx
 

Recently uploaded

Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
Overkill Security
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 

Recently uploaded (20)

Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi Daparthi
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 

dm10102ppt.pdf

  • 1. Objec&ve 101.02 3% Explain safety and legal issues in the digital media environment.
  • 2. Physical Safety Issues q Electrical Hazards ☐ Electrical connec&ons not handled properly, may result in electric shock, burn, or other injury. q Tripping Hazards ☐ Connec&ng cables not managed properly, could result in blocked walkway or tripping hazard. q Ergonomics ☐ Designing the workplace to best fit the worker, reducing strain on the body and enhancing comfort during digital media crea&on.
  • 3. Digital Safety Issues q Cyberbullying ☐ When a person is threatened, harassed, humiliated, tormented, or otherwise targeted using the Internet, mobile phones, or other digital technology. q Iden&ty TheL ☐ When personal informa&on (SSN, credit card number, passwords, etc.) is stolen and used to gain access to financial or personal accounts.
  • 4. Digital Safety Issues q Virus/Malware ☐ Programs that are specifically designed to damage a computer when installed; can access personal informa&on, corrupt files, and even erase the hard drive completely. q Spam ☐ Unwanted emails (usually sent in a large volume) that adver&se products or promote services that were not requested by the recipient.
  • 5. Digital Safety Issues q Online Hoax ☐ A false claim that is spread through electronic means (email, social media, blogs, etc.); examples include chain leYers, untrue accusa&ons, etc. q Internet Addic&on ☐ Compulsive disorder that causes an unhealthy obsession with the Internet and other digital resources; examples include online gambling addic&on, cybersex addic&on, social media addic&on, etc.
  • 6. Legal Terms in Digital Media q Intellectual Property ☐ Original crea&ons of the mind that can be protected by law; literary and ar&s&c works, designs, symbols, images, names, etc. q Copyright ☐ The exclusive legal right to reproduce, publish, sell or distribute the expression of an intellectual property (literature, design, audio, video, etc.)
  • 7. Legal Terms in Digital Media q Trademark ☐ A mark (logo, symbol, word, phrase, etc.) legally registered or established by a company to represent a service or product; cannot be used without the permission of the owner. q Fair Use ☐ A legal allowance of using a copyrighted material without permission from the owner, provided the circumstances are reasonable and do not make the material less profitable.
  • 8. Crea;ve Commons q A nonprofit organiza&on that enables the sharing and use of crea&vity and knowledge through free legal tools. q Free, easy-to-use copyright licenses provide a simple, standardized way to give the public permission to share and use your crea&ve work — on condi&ons of your choice. q Crea&ve Commons licenses are not an alterna&ve to copyright. They work alongside copyright and enable you to modify your copyright terms to best suit your needs.
  • 9. Crea;ve Commons q Crea&ve Commons Video q Crea&ve Commons Licenses ☐ Six types with different features
  • 10. Legal Terms in Digital Media q Plagiarism ☐ Taking someone else’s work or ideas and passing them off as your own. q Libel ☐ A published (wriYen or printed) false statement that is damaging to a person’s reputa&on or success. q Slander ☐ An oral (spoken) false statement that is damaging to a person’s reputa&on or success.
  • 11. Legal Terms in Digital Media q Invasion of Privacy ☐ Intruding into someone’s personal space, using their image or likeness, or revealing informa&on about them without their permission.