SlideShare a Scribd company logo
1 of 43
Legal, ethical, and societal issues in media and
information involve problems and difficult choices
connected to making, spreading, and using media
and information in the digital era. This includes
worries about keeping things private, false
information, using someone else's work without
permission, controlling what can be said or
shown, unfairness, and how these things affect
people, society, and the rules we follow.
REPUBLIC ACT
10175
REPUBLIC ACT 10175
The 2012 Philippine Republic Act 10175 was
created to stop cybercrime. It deals with
legal problems concerning online activities
like taking someone's web address,
engaging in inappropriate online behavior,
sharing inappropriate content involving
children, stealing someone's identity, and
accessing someone's data without
permission.
WHAT IS CYBER?
WHAT IS CYBER?
"Cyber" is a word part that talks about
stuff connected to computers, the
internet, and technology. We hear it
when talking about keeping computer
systems safe from online dangers, the
digital world where online stuff happens,
and harmful actions aimed at computer
systems or data.
CYBERSPACE
CYBERSPACE
Cyberspace is like a made-up world on
the internet. It's where all the online
stuff happens, like talking to people,
sharing things, and doing things on the
computer. It's not a real place you can
visit but more like a place in your mind
where you use the internet and
computer stuff to do things.
CYBERCRIME
CYBERCRIME
Cybercrime is when people do illegal
things using computers, the internet,
or digital tech, like hacking, tricking
others, or spreading harmful stuff.
It's a big danger to people and
society, so the authorities work to
stop it.
CYBERBULLYING
CYBERBULLYING
Cyberbullying is like online bullying,
where people use phones or computers
to hurt, scare, or threaten others. It
can be done in different ways and can
really hurt people's feelings and
thoughts. Many countries have made
rules and plans to stop cyberbullying.
HACKING
HACKING
Hacking is when someone sneaks into
computer systems or devices without
permission to do bad things, like
stealing information or causing
problems. They use tricks like finding
weak points in software, tricking
people, or using harmful software.
PHISHING
PHISHING
Phishing is a trick used by
cybercriminals. They pretend to be
someone you trust to make you give
them important information. They use
this info to do bad things like stealing
your identity or money. It's a big
problem in the online world.
ILLEGAL
DOWNLOADING
ILLEGAL DOWNLOADING
Illegal downloading, or piracy, means taking
digital stuff like movies or music without
permission or paying for it. This breaks the
rules about owning things made by others
and can get you in trouble with the law, like
paying fines or even going to jail. It also
hurts the people who create these things
and the businesses that sell them.
DIGITAL PIRACY
DIGITAL PIRACY
Digital piracy is when people share digital
stuff like movies or music online without
permission. This breaks the rules about
owning things made by others and can get
you in trouble. They do it using things like
torrent websites, file-sharing sites, or illegal
streaming services. It's a big problem that
can hurt the people who create these things
and the businesses that sell them.
IDENTITY THEFT
IDENTITY THEFT
Identity theft is when someone steals
your private information, like your name
or credit card details, and uses it to do
bad things, like stealing your money or
tricking others. It can really harm your
financial history and how people see
you, and it's hard to fix once it happens.
CYBERDEFAMATION
CYBERDEFAMATION
Cyberdefamation, or online defamation,
is when people say false and harmful
things about someone or a business on
the internet, like on social media. These
lies can damage their reputation and
cause big problems in their personal and
work life. The rules about this can be
different in different places.
2 TYPES OF
DEFAMATION
1. Libel - Libel is when someone writes
or prints false and harmful things about
someone else, and other people see it.
This can hurt the person's reputation,
and it's important that the statements
are untrue.
2 TYPES OF
DEFAMATION
2. Slander - Slander is like telling lies about
someone or something that can damage
their reputation when other people hear it.
It's similar to libel but involves spoken
words or gestures, and other people must
hear these false statements.
CYBERSEX
CYBERSEX
Cybersex, which is also called online sex or
virtual sex, is when people engage in sexual
talk or activities using digital tools like chat
rooms, messaging, video calls, or social
media. It includes explicit conversations,
sharing sexual content, and playing roles,
but it's important that everyone involved
agrees to it, and it should be legal and
respectful to make sure it's safe.
CHILD
PORNOGRAPHY
CHILD PORNOGRAPHY
Child pornography, also known as child
exploitation material, is against the law. It
involves explicit sexual content that includes kids
who are under 18 years old. This content can be
in the form of pictures, sounds, or words, and it
shows them in sexual situations. The police and
groups around the world strongly disapprove of
and fight against child pornography to protect
children and stop their abuse.
CYBERSQUATTING
CYBERSQUATTING
Cybersquatting is when people register website
names that are very similar to well-known
trademarks or brands, usually with bad
intentions to make money from them. They
might try to trick people or do dishonest things.
Laws like the U.S. Anticybersquatting Consumer
Protection Act and UDRP help trademark owners
take legal action against these cybersquatters
and solve problems without going to court.
COPYRIGHT
COPYRIGHT
Copyright is a protection for things people
create, like paintings and photos, as long as
they're put into a solid form. These creations
should be original, which means they were
made by a person with some creativity, even
if it's just a little bit, according to the
Supreme Court. This protection helps the
creators keep others from copying or using
their work without permission.
WHO IS A
COPYRIGHT
OWNER?
WHO IS A COPYRIGHT
OWNER?
Copyright is a protection for things people
create, like paintings and photos, as long as
they're put into a solid form. These creations
should be original, which means they were made
by a person with some creativity, even if it's just
a little bit, according to the Supreme Court. This
protection helps the creators keep others from
copying or using their work without permission.
FAIR USE
FAIR USE
Fair use is a rule in the United States that allows
people to use copyrighted stuff in certain situations
without asking the owner for permission. It's a way
to balance the rights of the copyright owners and the
public's need to use creative things. This rule applies
when you're using the material for things like giving
an opinion, reporting news, teaching, studying, or
doing research. However, whether something counts
as fair use depends on the specific situation and
needs to be looked at on a case-by-case basis.
PLAGIARISM
PLAGIARISM
Plagiarism is when you use someone else's
work without giving them credit or saying
where you got it from. This can get you in
trouble in school or at work. It can happen in
different ways, like copying, rephrasing, or
using their ideas without saying where you
found them. To avoid plagiarism, it's
important to give credit and say where you
got the information.
NETIQUETTE
NETIQUETTE
Netiquette is like having good manners on
the internet. It means being polite and
respectful when you're online, whether on
social media, in emails, or on forums. This
includes not using rude words, writing
correctly, and respecting people's privacy.
When you follow netiquette, it helps make
online conversations positive and helpful.
“THANK YOU”

More Related Content

What's hot

Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...Arniel Ping
 
1.media and information literacy (mil)
1.media and information literacy (mil)1.media and information literacy (mil)
1.media and information literacy (mil)Juan Paolo Cunanan
 
Information literacy
Information literacyInformation literacy
Information literacyJohan Koren
 
Media and Information Literacy: The Evolution of Traditional to New Media (Ti...
Media and Information Literacy: The Evolution of Traditional to New Media (Ti...Media and Information Literacy: The Evolution of Traditional to New Media (Ti...
Media and Information Literacy: The Evolution of Traditional to New Media (Ti...MatthewNarido
 
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Arniel Ping
 
MEDIA-AND-INFORMATION-SOURCES-1.pptx
MEDIA-AND-INFORMATION-SOURCES-1.pptxMEDIA-AND-INFORMATION-SOURCES-1.pptx
MEDIA-AND-INFORMATION-SOURCES-1.pptxAltheaYu2
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Information Literacy
Information LiteracyInformation Literacy
Information Literacybeedivb
 
module 2 mil lecture.pptx
module 2 mil lecture.pptxmodule 2 mil lecture.pptx
module 2 mil lecture.pptxCindyPontillas4
 
Contextualized online search and research skills
Contextualized online search and research skillsContextualized online search and research skills
Contextualized online search and research skillsJonathan Jr Marcelino
 
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...Mark Jhon Oxillo
 
Information Literacy - Media and Information Literacy (MIL)
Information Literacy - Media and Information Literacy (MIL)Information Literacy - Media and Information Literacy (MIL)
Information Literacy - Media and Information Literacy (MIL)Mark Jhon Oxillo
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT TechnologiesMaria Eloisa Blanza
 
Responsible Use of Social Media
Responsible Use of Social MediaResponsible Use of Social Media
Responsible Use of Social MediaGab Billones
 
mil 7 Demonstrate ethical use of information..pptx
mil 7 Demonstrate ethical use of information..pptxmil 7 Demonstrate ethical use of information..pptx
mil 7 Demonstrate ethical use of information..pptxDesireTSamillano
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologiesDeped
 

What's hot (20)

Ethical Use Of Information
Ethical Use Of InformationEthical Use Of Information
Ethical Use Of Information
 
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
 
1.media and information literacy (mil)
1.media and information literacy (mil)1.media and information literacy (mil)
1.media and information literacy (mil)
 
Information literacy
Information literacyInformation literacy
Information literacy
 
Media and Information Literacy: The Evolution of Traditional to New Media (Ti...
Media and Information Literacy: The Evolution of Traditional to New Media (Ti...Media and Information Literacy: The Evolution of Traditional to New Media (Ti...
Media and Information Literacy: The Evolution of Traditional to New Media (Ti...
 
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
 
MEDIA-AND-INFORMATION-SOURCES-1.pptx
MEDIA-AND-INFORMATION-SOURCES-1.pptxMEDIA-AND-INFORMATION-SOURCES-1.pptx
MEDIA-AND-INFORMATION-SOURCES-1.pptx
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Information Literacy
Information LiteracyInformation Literacy
Information Literacy
 
Tips to spot false news
Tips to spot false newsTips to spot false news
Tips to spot false news
 
module 2 mil lecture.pptx
module 2 mil lecture.pptxmodule 2 mil lecture.pptx
module 2 mil lecture.pptx
 
Contextualized online search and research skills
Contextualized online search and research skillsContextualized online search and research skills
Contextualized online search and research skills
 
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
 
Information Literacy - Media and Information Literacy (MIL)
Information Literacy - Media and Information Literacy (MIL)Information Literacy - Media and Information Literacy (MIL)
Information Literacy - Media and Information Literacy (MIL)
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT Technologies
 
Responsible Use of Social Media
Responsible Use of Social MediaResponsible Use of Social Media
Responsible Use of Social Media
 
mil 7 Demonstrate ethical use of information..pptx
mil 7 Demonstrate ethical use of information..pptxmil 7 Demonstrate ethical use of information..pptx
mil 7 Demonstrate ethical use of information..pptx
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologies
 
ICT as a Platform for Change
ICT as a Platform for Change ICT as a Platform for Change
ICT as a Platform for Change
 
Trends in ict
Trends in ictTrends in ict
Trends in ict
 

Similar to Legal, Ethical and Societal Issues in Media and Information

ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Online Safety and Security.pptx
Online Safety and Security.pptxOnline Safety and Security.pptx
Online Safety and Security.pptxmhavzgreda1
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaAlexander Berta
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptxSSPTRGCELL
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptxangellaclarianes1
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of PrivacyDiane Allen
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_otherslisamholden
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_otherslisamholden
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_otherslisamholden
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_otherslisamholden
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Digi teen
Digi teenDigi teen
Digi teen13aaa
 
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfLEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfRegineManuel2
 

Similar to Legal, Ethical and Societal Issues in Media and Information (20)

Lesson1.pptx
Lesson1.pptxLesson1.pptx
Lesson1.pptx
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
CYBER SAFETY.pptx
CYBER SAFETY.pptxCYBER SAFETY.pptx
CYBER SAFETY.pptx
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Online Safety and Security.pptx
Online Safety and Security.pptxOnline Safety and Security.pptx
Online Safety and Security.pptx
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptx
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
Hamad Rabban.It
Hamad Rabban.ItHamad Rabban.It
Hamad Rabban.It
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Digi teen
Digi teenDigi teen
Digi teen
 
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfLEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
 

Recently uploaded

ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 

Recently uploaded (20)

ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 

Legal, Ethical and Societal Issues in Media and Information

  • 1.
  • 2. Legal, ethical, and societal issues in media and information involve problems and difficult choices connected to making, spreading, and using media and information in the digital era. This includes worries about keeping things private, false information, using someone else's work without permission, controlling what can be said or shown, unfairness, and how these things affect people, society, and the rules we follow.
  • 4. REPUBLIC ACT 10175 The 2012 Philippine Republic Act 10175 was created to stop cybercrime. It deals with legal problems concerning online activities like taking someone's web address, engaging in inappropriate online behavior, sharing inappropriate content involving children, stealing someone's identity, and accessing someone's data without permission.
  • 6. WHAT IS CYBER? "Cyber" is a word part that talks about stuff connected to computers, the internet, and technology. We hear it when talking about keeping computer systems safe from online dangers, the digital world where online stuff happens, and harmful actions aimed at computer systems or data.
  • 8. CYBERSPACE Cyberspace is like a made-up world on the internet. It's where all the online stuff happens, like talking to people, sharing things, and doing things on the computer. It's not a real place you can visit but more like a place in your mind where you use the internet and computer stuff to do things.
  • 10. CYBERCRIME Cybercrime is when people do illegal things using computers, the internet, or digital tech, like hacking, tricking others, or spreading harmful stuff. It's a big danger to people and society, so the authorities work to stop it.
  • 12. CYBERBULLYING Cyberbullying is like online bullying, where people use phones or computers to hurt, scare, or threaten others. It can be done in different ways and can really hurt people's feelings and thoughts. Many countries have made rules and plans to stop cyberbullying.
  • 14. HACKING Hacking is when someone sneaks into computer systems or devices without permission to do bad things, like stealing information or causing problems. They use tricks like finding weak points in software, tricking people, or using harmful software.
  • 16. PHISHING Phishing is a trick used by cybercriminals. They pretend to be someone you trust to make you give them important information. They use this info to do bad things like stealing your identity or money. It's a big problem in the online world.
  • 18. ILLEGAL DOWNLOADING Illegal downloading, or piracy, means taking digital stuff like movies or music without permission or paying for it. This breaks the rules about owning things made by others and can get you in trouble with the law, like paying fines or even going to jail. It also hurts the people who create these things and the businesses that sell them.
  • 20. DIGITAL PIRACY Digital piracy is when people share digital stuff like movies or music online without permission. This breaks the rules about owning things made by others and can get you in trouble. They do it using things like torrent websites, file-sharing sites, or illegal streaming services. It's a big problem that can hurt the people who create these things and the businesses that sell them.
  • 22. IDENTITY THEFT Identity theft is when someone steals your private information, like your name or credit card details, and uses it to do bad things, like stealing your money or tricking others. It can really harm your financial history and how people see you, and it's hard to fix once it happens.
  • 24. CYBERDEFAMATION Cyberdefamation, or online defamation, is when people say false and harmful things about someone or a business on the internet, like on social media. These lies can damage their reputation and cause big problems in their personal and work life. The rules about this can be different in different places.
  • 25. 2 TYPES OF DEFAMATION 1. Libel - Libel is when someone writes or prints false and harmful things about someone else, and other people see it. This can hurt the person's reputation, and it's important that the statements are untrue.
  • 26. 2 TYPES OF DEFAMATION 2. Slander - Slander is like telling lies about someone or something that can damage their reputation when other people hear it. It's similar to libel but involves spoken words or gestures, and other people must hear these false statements.
  • 28. CYBERSEX Cybersex, which is also called online sex or virtual sex, is when people engage in sexual talk or activities using digital tools like chat rooms, messaging, video calls, or social media. It includes explicit conversations, sharing sexual content, and playing roles, but it's important that everyone involved agrees to it, and it should be legal and respectful to make sure it's safe.
  • 30. CHILD PORNOGRAPHY Child pornography, also known as child exploitation material, is against the law. It involves explicit sexual content that includes kids who are under 18 years old. This content can be in the form of pictures, sounds, or words, and it shows them in sexual situations. The police and groups around the world strongly disapprove of and fight against child pornography to protect children and stop their abuse.
  • 32. CYBERSQUATTING Cybersquatting is when people register website names that are very similar to well-known trademarks or brands, usually with bad intentions to make money from them. They might try to trick people or do dishonest things. Laws like the U.S. Anticybersquatting Consumer Protection Act and UDRP help trademark owners take legal action against these cybersquatters and solve problems without going to court.
  • 34. COPYRIGHT Copyright is a protection for things people create, like paintings and photos, as long as they're put into a solid form. These creations should be original, which means they were made by a person with some creativity, even if it's just a little bit, according to the Supreme Court. This protection helps the creators keep others from copying or using their work without permission.
  • 36. WHO IS A COPYRIGHT OWNER? Copyright is a protection for things people create, like paintings and photos, as long as they're put into a solid form. These creations should be original, which means they were made by a person with some creativity, even if it's just a little bit, according to the Supreme Court. This protection helps the creators keep others from copying or using their work without permission.
  • 38. FAIR USE Fair use is a rule in the United States that allows people to use copyrighted stuff in certain situations without asking the owner for permission. It's a way to balance the rights of the copyright owners and the public's need to use creative things. This rule applies when you're using the material for things like giving an opinion, reporting news, teaching, studying, or doing research. However, whether something counts as fair use depends on the specific situation and needs to be looked at on a case-by-case basis.
  • 40. PLAGIARISM Plagiarism is when you use someone else's work without giving them credit or saying where you got it from. This can get you in trouble in school or at work. It can happen in different ways, like copying, rephrasing, or using their ideas without saying where you found them. To avoid plagiarism, it's important to give credit and say where you got the information.
  • 42. NETIQUETTE Netiquette is like having good manners on the internet. It means being polite and respectful when you're online, whether on social media, in emails, or on forums. This includes not using rude words, writing correctly, and respecting people's privacy. When you follow netiquette, it helps make online conversations positive and helpful.