LESSON 7 – LEGAL, ETHICAL AND SOCIETAL ISSUES IN MEDIA AND INFORMATION
FAIR USE
• Refers to the copying of a copyrighted material, with the purpose of using it for a review,
commentary, critic, or parody, without the need to ask permission from the copyright owner.
• Instances which exempt copyright permission requests :
o Taking a screenshot photo from a famous move and turning it into a meme
o Citing a few lines from a song of a famous singer as an introduction to a book review.
o Material is used for non-profit education purpose
INTELLECTUAL PROPERTY
• Pertains to the output of a person’s intellectual pursuit such as literary and artistic works,
inventions, logos, symbols and signs, as well as names and images used for commercial purpose
or advertisements.
• Copyright
o a legal device that gives the creator of a literary, artistic, musical, or other creative work
the sole right to publish and sell that work.
o Owners have the right to control the reproduction of their work, including the right to
receive payment for that reproduction. An author may grant or sell those rights to others,
including publishers or recording companies.
o Violation of a copyright is called infringement.
o 5 Myths vs. Facts on Internet Copyright Infringement
▪ Myth 1 : Once a “work” is posted online, it loses copyright protection.
Fact : You cannot use, copy, or post someone else’s photo, images, song, or
articles without their permission. The person who created them owns these
“works” and they have copyright protection from the moment their “works” were
created and they never lose their ownership protection.
▪ Myth 2 : I can copy a “work” online provided I give the owner credit or a link back.
Fact : You cannot use other people’s “works” unless they give first their
permission. Some websites say you can use any material from their site provided
you link back and give them credit. But check first and give permission unless it
is specifically granted on the “work”.
▪ Myth 3 : If I alter the “work” or only use a part of it, I am not breaching for
copyright.
Fact : Derivative works are still covered by copyright. The only exception is if you
are writing a review or critique and you are referring to the “work”. This is
considered fair use.
▪ Myth 4 : If there is no copyright symbol or notice, the “work” can be freely used.
Fact : There is no requirement to display a copyright symbol or register any
“work” to have copyright protection. It is protected from the moment it is
created and the owner does not lose their copyright if they don’t use the
copyright symbol.
▪ Myth 5 : I can use another people’s “work” as long I don’t profit financially from
it.
Fact : You are breaching copyright whether you make money or not. The
argument that you are giving the owner free advertising does not count. Any
money you make would be taken into account by a court decision against you.
• Patent
o Pertains to an exclusive right granted to an invention.
o Protects the owner from other people who deliberately or unintentionally copy his
invention.
• Trademark
o Refers to a specific sign associated with a particular brand of goods or services.
o Use by companies to distinguish their products from other available and similar products
in the market.
• Trade Secret
o A secret device or technique used by a company in manufacturing its product
• Read : https://secureyourtrademark.com/blog/71-notorious-patent-trademark-and-copyright-
infringement-cases/#chapter6
PLAGIARISM
• an act or instance of using or closely imitating the language and thoughts of another author
without authorization; the representation of that author's work as one's own, as by not crediting
the original author.
• Read : http://www.spot.ph/newsfeatures/54502/copycat-nation-10-high-profile-plagiarism-
cases-in-the-philippines
DIFFERENCE BETWEEN PLAGIARISM AND COPYRIGHT INFRINGEMENT
• Plagiarism is using someone else’s work without giving proper credit – a failure to cite adequately
• Copyright infringement is using someone else’s creative work which can include song, a video, a
movie clip, a piece of visual art, a photography and other creative works, without authorization
or compensation, if compensation is appropriate.
• Schools enforce plagiarism while courts enforce copyright infringement.
CYBERBULLYING
• bullying that takes place online, or using electronic technology such as cell phones, computers,
and tablets over communication tools including social media sites, text messages, chat, and
websites.
• examples :
o text messages or emails composed to insult or demean
o rumors or false statements spread by email or posted on social networking sites
o humiliating photos, videos, websites
o fake profiles deliberately shared across social media.
• TYPES OF CYBERBULLYING
o EXCLUSION
▪ deliberate excluding someone from an online group.
o GOSSIP
▪ posting or sending cruel gossip to damage a person’s reputation and relationships
with friends, family, and acquaintances.
o HARASSMENT
▪ repeatedly posting or sending offensive, rude, and insulting messages.
o NATION
▪ breaking into someone’s e-mail or other online account and sending messages
that will cause embarrassment or damage to the person’s reputation and affect
his or her relationship with other.
o OUTING AND TRICKERY
▪ tricking someone into revealing secrets or embarrassing information, which is
then shared online.
o CYBERSTALKING
▪ posting or sending unwanted or intimidating messages, which may include
threats.
o CYBERTHREATS
▪ remarks on the internet threatening or implying violent behavior, displaying
suicidal tendencies.
• HOW TO STOP CYBERBULLYING
COMPUTER ADDICTION
• the excessive use of computers to the extent that it interferes with daily life.
• This excessive use may for example interfere with work or sleep, result in problems with social
interaction, or affect mood, relationships, and thought processes.
• The following symptoms could indicate Internet or computer addiction:
o Losing track of time spent online
o Experiencing difficulty completing tasks at home or work
o Isolation from friends and family
o Feeling defensive or guilty about Internet usage
o Experiencing a sense of euphoria when involved in online activities
• Individuals who have an Internet addiction may also experience physical symptoms that could
include:
o Strained vision
o Sleep problems
o Carpal tunnel syndrome
o Significant weight loss or weight gain
o Severe headaches
DIGITAL DIVIDE
• an economic inequality between groups in terms of access to, use of, or knowledge of ICT.
• The DIVIDE WITHIN COUNTRIES (such as the digital divide in the Philippines) can refer to
inequalities between individuals, households, businesses, and geographic areas at different
socioeconomic (and other demographic) levels.
• The GLOBAL DIGITAL DIVIDE designates countries as the units of analysis, and examines the divide
between developing and developed countries on an international scale.
• Factors :
o Disparity between :
▪ Developed countries and developing countries
▪ Urban area and rural/remote area
o Differences caused by :
▪ Income
▪ Education and job training
▪ Race
▪ Gender
▪ Age
▪ Disabilities
VIRTUAL SELF
• means a human characteristic or persona within an avatar most likely in computer games, videos
or any computer related activities.
• Digital identity or assumed identity in the virtual world.
• Protecting the Virtual Self, please read : https://www.wired.com/2017/07/protect-digital-self/
DIGITAL FOOTPRINT
• A trail of data you create while using the internet which includes the websites you visit, email you
send, and information you submit to online services.
• Data trail left by the interactions in a digital environment, including the use of TV, mobile phone,
the World Wide Web, the internet and other connected devices and sensors
• If you have a good digital footprint…
o Display your professional profile online
o Your digital footprint supports your qualifications
o Display your thought leadership
o Display expertise
o Reach millions of people searching for relevant information
o Be an influencer
o Authenticity
o Credibility
o Trustworthiness
DIGITAL CITIZENSHIP
• The quality of habits, actions, and consumption patterns that impact the ecology of digital content
and communities
• Norms of appropriate, responsible behavior with regard to technology use.
• PRINCIPLE OF CHARACTER
o Adaptability
o Compassion
o Contemplation
o Courage
o Honesty
o Initiative
o Loyalty
o Optimism
o Perseverance
o Respect
o Responsibility
o Trustworthiness
• ELEMENTS OF DIGITAL CITIZENSHIP
o Digital Access
▪ Full electronic participation in society
o Digital Commerce
▪ Electronic buying and selling of goods
o Digital Communication
▪ Electronic exchange of information
o Digital Literacy
▪ Teaching and learning about technology and its use
o Digital Etiquette
▪ Electronic standards of conduct or procedure
o Digital Law
▪ Electronic responsibility for actions and deeds
o Digital Rights and Responsibilities
▪ Those freedoms extended to everyone in a digital world
o Digital Health and Wellness
▪ Physical an psychological well-being in a digital world
o Digital Security
▪ Electronic precautions to guarantee safety
LAWS IN THE PHILIPPINES on MEDIA AND INFORMATION
1. Intellectual Property Rights in the Philippines or REPUBLIC ACT NO. 8293
2. Anti-Bullying Act of 2013 or REPUBLIC ACT NO. 10627
3. Cybercrime Prevention Act or REPUBLIC ACT NO. 10175
a. Offenses against the confidentiality, integrity and availability of computer data and
systems
▪ Illegal Access
• The access to the whole or any part of a computer system without right.
▪ Illegal Interception
• made by technical means without right of any non-public transmission of
computer data to, from, or within a computer system including
electromagnetic emissions from a computer system carrying such
computer data.
▪ Data Interference
• The intentional or reckless alteration, damaging, deletion or
deterioration of computer data, electronic document, or electronic data
message, without right, including the introduction or transmission of
viruses.
▪ System Interference
• The intentional alteration or reckless hindering or interference with the
functioning of a computer or computer network by inputting,
transmitting, damaging, deleting, deteriorating, altering or suppressing
computer data or program, electronic document, or electronic data
message, without right or authority, including the introduction or
transmission of viruses.
▪ Misuse of Devices
• The use, production, sale, procurement, importation, distribution, or
otherwise making available, without right of a device or an access code
for the purpose of committing a cybercrime offense
▪ Cyber-Squatting
• The acquisition of a domain name over the internet in bad faith to profit,
mislead, destroy reputation, and deprive others from registering the
same if such domain is similar to existing trademark registered with the
appropriate government agency or to a name of a person other than the
registrant
b. Computer-Related Offenses
▪ Computer-Related Forgery
▪ Computer-Related Fraud
▪ Computer –Related Identity Theft
c. Content-Related Offenses
▪ Cybersex
▪ Child Pornography
▪ Unsolicited Commercial Communications
▪ Libel
d. Other Offenses
▪ Aiding or Abetting in the Commission of Cybercrime
▪ Attempt in the Commission of Cybercrime
Note : Refer to the links to know more about the laws.