SlideShare ist ein Scribd-Unternehmen logo
Legal, ethical, and societal issues in media and
information involve problems and difficult choices
connected to making, spreading, and using media
and information in the digital era. This includes
worries about keeping things private, false
information, using someone else's work without
permission, controlling what can be said or
shown, unfairness, and how these things affect
people, society, and the rules we follow.
REPUBLIC ACT
10175
REPUBLIC ACT 10175
The 2012 Philippine Republic Act 10175 was
created to stop cybercrime. It deals with
legal problems concerning online activities
like taking someone's web address,
engaging in inappropriate online behavior,
sharing inappropriate content involving
children, stealing someone's identity, and
accessing someone's data without
permission.
WHAT IS CYBER?
WHAT IS CYBER?
"Cyber" is a word part that talks about
stuff connected to computers, the
internet, and technology. We hear it
when talking about keeping computer
systems safe from online dangers, the
digital world where online stuff happens,
and harmful actions aimed at computer
systems or data.
CYBERSPACE
CYBERSPACE
Cyberspace is like a made-up world on
the internet. It's where all the online
stuff happens, like talking to people,
sharing things, and doing things on the
computer. It's not a real place you can
visit but more like a place in your mind
where you use the internet and
computer stuff to do things.
CYBERCRIME
CYBERCRIME
Cybercrime is when people do illegal
things using computers, the internet,
or digital tech, like hacking, tricking
others, or spreading harmful stuff.
It's a big danger to people and
society, so the authorities work to
stop it.
CYBERBULLYING
CYBERBULLYING
Cyberbullying is like online bullying,
where people use phones or computers
to hurt, scare, or threaten others. It
can be done in different ways and can
really hurt people's feelings and
thoughts. Many countries have made
rules and plans to stop cyberbullying.
HACKING
HACKING
Hacking is when someone sneaks into
computer systems or devices without
permission to do bad things, like
stealing information or causing
problems. They use tricks like finding
weak points in software, tricking
people, or using harmful software.
PHISHING
PHISHING
Phishing is a trick used by
cybercriminals. They pretend to be
someone you trust to make you give
them important information. They use
this info to do bad things like stealing
your identity or money. It's a big
problem in the online world.
ILLEGAL
DOWNLOADING
ILLEGAL DOWNLOADING
Illegal downloading, or piracy, means taking
digital stuff like movies or music without
permission or paying for it. This breaks the
rules about owning things made by others
and can get you in trouble with the law, like
paying fines or even going to jail. It also
hurts the people who create these things
and the businesses that sell them.
DIGITAL PIRACY
DIGITAL PIRACY
Digital piracy is when people share digital
stuff like movies or music online without
permission. This breaks the rules about
owning things made by others and can get
you in trouble. They do it using things like
torrent websites, file-sharing sites, or illegal
streaming services. It's a big problem that
can hurt the people who create these things
and the businesses that sell them.
IDENTITY THEFT
IDENTITY THEFT
Identity theft is when someone steals
your private information, like your name
or credit card details, and uses it to do
bad things, like stealing your money or
tricking others. It can really harm your
financial history and how people see
you, and it's hard to fix once it happens.
CYBERDEFAMATION
CYBERDEFAMATION
Cyberdefamation, or online defamation,
is when people say false and harmful
things about someone or a business on
the internet, like on social media. These
lies can damage their reputation and
cause big problems in their personal and
work life. The rules about this can be
different in different places.
2 TYPES OF
DEFAMATION
1. Libel - Libel is when someone writes
or prints false and harmful things about
someone else, and other people see it.
This can hurt the person's reputation,
and it's important that the statements
are untrue.
2 TYPES OF
DEFAMATION
2. Slander - Slander is like telling lies about
someone or something that can damage
their reputation when other people hear it.
It's similar to libel but involves spoken
words or gestures, and other people must
hear these false statements.
CYBERSEX
CYBERSEX
Cybersex, which is also called online sex or
virtual sex, is when people engage in sexual
talk or activities using digital tools like chat
rooms, messaging, video calls, or social
media. It includes explicit conversations,
sharing sexual content, and playing roles,
but it's important that everyone involved
agrees to it, and it should be legal and
respectful to make sure it's safe.
CHILD
PORNOGRAPHY
CHILD PORNOGRAPHY
Child pornography, also known as child
exploitation material, is against the law. It
involves explicit sexual content that includes kids
who are under 18 years old. This content can be
in the form of pictures, sounds, or words, and it
shows them in sexual situations. The police and
groups around the world strongly disapprove of
and fight against child pornography to protect
children and stop their abuse.
CYBERSQUATTING
CYBERSQUATTING
Cybersquatting is when people register website
names that are very similar to well-known
trademarks or brands, usually with bad
intentions to make money from them. They
might try to trick people or do dishonest things.
Laws like the U.S. Anticybersquatting Consumer
Protection Act and UDRP help trademark owners
take legal action against these cybersquatters
and solve problems without going to court.
COPYRIGHT
COPYRIGHT
Copyright is a protection for things people
create, like paintings and photos, as long as
they're put into a solid form. These creations
should be original, which means they were
made by a person with some creativity, even
if it's just a little bit, according to the
Supreme Court. This protection helps the
creators keep others from copying or using
their work without permission.
WHO IS A
COPYRIGHT
OWNER?
WHO IS A COPYRIGHT
OWNER?
Copyright is a protection for things people
create, like paintings and photos, as long as
they're put into a solid form. These creations
should be original, which means they were made
by a person with some creativity, even if it's just
a little bit, according to the Supreme Court. This
protection helps the creators keep others from
copying or using their work without permission.
FAIR USE
FAIR USE
Fair use is a rule in the United States that allows
people to use copyrighted stuff in certain situations
without asking the owner for permission. It's a way
to balance the rights of the copyright owners and the
public's need to use creative things. This rule applies
when you're using the material for things like giving
an opinion, reporting news, teaching, studying, or
doing research. However, whether something counts
as fair use depends on the specific situation and
needs to be looked at on a case-by-case basis.
PLAGIARISM
PLAGIARISM
Plagiarism is when you use someone else's
work without giving them credit or saying
where you got it from. This can get you in
trouble in school or at work. It can happen in
different ways, like copying, rephrasing, or
using their ideas without saying where you
found them. To avoid plagiarism, it's
important to give credit and say where you
got the information.
NETIQUETTE
NETIQUETTE
Netiquette is like having good manners on
the internet. It means being polite and
respectful when you're online, whether on
social media, in emails, or on forums. This
includes not using rude words, writing
correctly, and respecting people's privacy.
When you follow netiquette, it helps make
online conversations positive and helpful.
“THANK YOU”

Weitere ähnliche Inhalte

Was ist angesagt?

Quiz Show Game (Evolution of Media)
Quiz Show Game (Evolution of Media)Quiz Show Game (Evolution of Media)
Quiz Show Game (Evolution of Media)
Nicole Tan
 
Media and Information Languages
Media and Information LanguagesMedia and Information Languages
Media and Information Languages
Betty Estrada
 
People media by shiela aquino
People media by shiela aquinoPeople media by shiela aquino
People media by shiela aquino
shengaquino
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment Technologies
Mark Jhon Oxillo
 
Responsible Use of Media and Information.pptx
Responsible Use of Media and Information.pptxResponsible Use of Media and Information.pptx
Responsible Use of Media and Information.pptx
ErvinJhonPatrickBina1
 
MEDIA AND INFORMATION LITERACY (MIL)
MEDIA AND INFORMATION LITERACY (MIL)MEDIA AND INFORMATION LITERACY (MIL)
MEDIA AND INFORMATION LITERACY (MIL)
Marvin Bronoso
 
Evolution of media
Evolution of mediaEvolution of media
Evolution of media
Neil Pelayre
 
Media and Information Literacy- Introduction to Media and Information Literacy
Media and Information Literacy- Introduction to Media and Information LiteracyMedia and Information Literacy- Introduction to Media and Information Literacy
Media and Information Literacy- Introduction to Media and Information Literacy
J Q
 
Media and Information Literacy (MIL) 2. The Evolution of Traditional to New M...
Media and Information Literacy (MIL) 2. The Evolution of Traditional to New M...Media and Information Literacy (MIL) 2. The Evolution of Traditional to New M...
Media and Information Literacy (MIL) 2. The Evolution of Traditional to New M...
Arniel Ping
 
Current And Future Trends in Media and Information - Media and Information Li...
Current And Future Trends in Media and Information - Media and Information Li...Current And Future Trends in Media and Information - Media and Information Li...
Current And Future Trends in Media and Information - Media and Information Li...
Mark Jhon Oxillo
 
ICT as a Platform for Change
ICT as a Platform for Change ICT as a Platform for Change
ICT as a Platform for Change
Grayzon Gonzales, LPT
 
Media and Information Literacy (MIL) - 11. People Media
Media and Information Literacy (MIL) - 11. People MediaMedia and Information Literacy (MIL) - 11. People Media
Media and Information Literacy (MIL) - 11. People Media
Arniel Ping
 
Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...
Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...
Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...
Arniel Ping
 
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Arniel Ping
 
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdfMIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
EricAntonio9
 
Introduction to Media and Information Literacy
Introduction to Media and Information LiteracyIntroduction to Media and Information Literacy
Introduction to Media and Information Literacy
John Michael Mendoza
 
Evolution of traditional to new media
Evolution of traditional to new mediaEvolution of traditional to new media
Evolution of traditional to new media
Dyenkaye Saludez
 
Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...
Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...
Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...
Arniel Ping
 
Media and Information Literacy (MIL) 1. Introduction to MIL (Part 2)- Charact...
Media and Information Literacy (MIL) 1. Introduction to MIL (Part 2)- Charact...Media and Information Literacy (MIL) 1. Introduction to MIL (Part 2)- Charact...
Media and Information Literacy (MIL) 1. Introduction to MIL (Part 2)- Charact...
Arniel Ping
 
The evolution of traditional to new media
The evolution of traditional to new media The evolution of traditional to new media
The evolution of traditional to new media
Dantoy14
 

Was ist angesagt? (20)

Quiz Show Game (Evolution of Media)
Quiz Show Game (Evolution of Media)Quiz Show Game (Evolution of Media)
Quiz Show Game (Evolution of Media)
 
Media and Information Languages
Media and Information LanguagesMedia and Information Languages
Media and Information Languages
 
People media by shiela aquino
People media by shiela aquinoPeople media by shiela aquino
People media by shiela aquino
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment Technologies
 
Responsible Use of Media and Information.pptx
Responsible Use of Media and Information.pptxResponsible Use of Media and Information.pptx
Responsible Use of Media and Information.pptx
 
MEDIA AND INFORMATION LITERACY (MIL)
MEDIA AND INFORMATION LITERACY (MIL)MEDIA AND INFORMATION LITERACY (MIL)
MEDIA AND INFORMATION LITERACY (MIL)
 
Evolution of media
Evolution of mediaEvolution of media
Evolution of media
 
Media and Information Literacy- Introduction to Media and Information Literacy
Media and Information Literacy- Introduction to Media and Information LiteracyMedia and Information Literacy- Introduction to Media and Information Literacy
Media and Information Literacy- Introduction to Media and Information Literacy
 
Media and Information Literacy (MIL) 2. The Evolution of Traditional to New M...
Media and Information Literacy (MIL) 2. The Evolution of Traditional to New M...Media and Information Literacy (MIL) 2. The Evolution of Traditional to New M...
Media and Information Literacy (MIL) 2. The Evolution of Traditional to New M...
 
Current And Future Trends in Media and Information - Media and Information Li...
Current And Future Trends in Media and Information - Media and Information Li...Current And Future Trends in Media and Information - Media and Information Li...
Current And Future Trends in Media and Information - Media and Information Li...
 
ICT as a Platform for Change
ICT as a Platform for Change ICT as a Platform for Change
ICT as a Platform for Change
 
Media and Information Literacy (MIL) - 11. People Media
Media and Information Literacy (MIL) - 11. People MediaMedia and Information Literacy (MIL) - 11. People Media
Media and Information Literacy (MIL) - 11. People Media
 
Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...
Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...
Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...
 
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
 
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdfMIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
 
Introduction to Media and Information Literacy
Introduction to Media and Information LiteracyIntroduction to Media and Information Literacy
Introduction to Media and Information Literacy
 
Evolution of traditional to new media
Evolution of traditional to new mediaEvolution of traditional to new media
Evolution of traditional to new media
 
Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...
Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...
Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...
 
Media and Information Literacy (MIL) 1. Introduction to MIL (Part 2)- Charact...
Media and Information Literacy (MIL) 1. Introduction to MIL (Part 2)- Charact...Media and Information Literacy (MIL) 1. Introduction to MIL (Part 2)- Charact...
Media and Information Literacy (MIL) 1. Introduction to MIL (Part 2)- Charact...
 
The evolution of traditional to new media
The evolution of traditional to new media The evolution of traditional to new media
The evolution of traditional to new media
 

Ähnlich wie Legal, Ethical and Societal Issues in Media and Information

Lesson1.pptx
Lesson1.pptxLesson1.pptx
Lesson1.pptx
RoNTertainmentTV
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
SheejamolMathew
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
nitss007
 
CYBER SAFETY.pptx
CYBER SAFETY.pptxCYBER SAFETY.pptx
CYBER SAFETY.pptx
ssuser482fec
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
Preet Hanspal
 
Online Safety and Security.pptx
Online Safety and Security.pptxOnline Safety and Security.pptx
Online Safety and Security.pptx
mhavzgreda1
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
Alexander Berta
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
SSPTRGCELL
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptx
angellaclarianes1
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
Diane Allen
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
Muhammad Haroon
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
lisamholden
 
Hamad Rabban.It
Hamad Rabban.ItHamad Rabban.It
Hamad Rabban.It
HamadRabban
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
lisamholden
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
lisamholden
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
lisamholden
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 
Digi teen
Digi teenDigi teen
Digi teen
13aaa
 
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfLEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
RegineManuel2
 

Ähnlich wie Legal, Ethical and Societal Issues in Media and Information (20)

Lesson1.pptx
Lesson1.pptxLesson1.pptx
Lesson1.pptx
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
CYBER SAFETY.pptx
CYBER SAFETY.pptxCYBER SAFETY.pptx
CYBER SAFETY.pptx
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Online Safety and Security.pptx
Online Safety and Security.pptxOnline Safety and Security.pptx
Online Safety and Security.pptx
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptx
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
Hamad Rabban.It
Hamad Rabban.ItHamad Rabban.It
Hamad Rabban.It
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Digi teen
Digi teenDigi teen
Digi teen
 
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfLEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
 

Kürzlich hochgeladen

คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 

Kürzlich hochgeladen (20)

คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 

Legal, Ethical and Societal Issues in Media and Information

  • 1.
  • 2. Legal, ethical, and societal issues in media and information involve problems and difficult choices connected to making, spreading, and using media and information in the digital era. This includes worries about keeping things private, false information, using someone else's work without permission, controlling what can be said or shown, unfairness, and how these things affect people, society, and the rules we follow.
  • 4. REPUBLIC ACT 10175 The 2012 Philippine Republic Act 10175 was created to stop cybercrime. It deals with legal problems concerning online activities like taking someone's web address, engaging in inappropriate online behavior, sharing inappropriate content involving children, stealing someone's identity, and accessing someone's data without permission.
  • 6. WHAT IS CYBER? "Cyber" is a word part that talks about stuff connected to computers, the internet, and technology. We hear it when talking about keeping computer systems safe from online dangers, the digital world where online stuff happens, and harmful actions aimed at computer systems or data.
  • 8. CYBERSPACE Cyberspace is like a made-up world on the internet. It's where all the online stuff happens, like talking to people, sharing things, and doing things on the computer. It's not a real place you can visit but more like a place in your mind where you use the internet and computer stuff to do things.
  • 10. CYBERCRIME Cybercrime is when people do illegal things using computers, the internet, or digital tech, like hacking, tricking others, or spreading harmful stuff. It's a big danger to people and society, so the authorities work to stop it.
  • 12. CYBERBULLYING Cyberbullying is like online bullying, where people use phones or computers to hurt, scare, or threaten others. It can be done in different ways and can really hurt people's feelings and thoughts. Many countries have made rules and plans to stop cyberbullying.
  • 14. HACKING Hacking is when someone sneaks into computer systems or devices without permission to do bad things, like stealing information or causing problems. They use tricks like finding weak points in software, tricking people, or using harmful software.
  • 16. PHISHING Phishing is a trick used by cybercriminals. They pretend to be someone you trust to make you give them important information. They use this info to do bad things like stealing your identity or money. It's a big problem in the online world.
  • 18. ILLEGAL DOWNLOADING Illegal downloading, or piracy, means taking digital stuff like movies or music without permission or paying for it. This breaks the rules about owning things made by others and can get you in trouble with the law, like paying fines or even going to jail. It also hurts the people who create these things and the businesses that sell them.
  • 20. DIGITAL PIRACY Digital piracy is when people share digital stuff like movies or music online without permission. This breaks the rules about owning things made by others and can get you in trouble. They do it using things like torrent websites, file-sharing sites, or illegal streaming services. It's a big problem that can hurt the people who create these things and the businesses that sell them.
  • 22. IDENTITY THEFT Identity theft is when someone steals your private information, like your name or credit card details, and uses it to do bad things, like stealing your money or tricking others. It can really harm your financial history and how people see you, and it's hard to fix once it happens.
  • 24. CYBERDEFAMATION Cyberdefamation, or online defamation, is when people say false and harmful things about someone or a business on the internet, like on social media. These lies can damage their reputation and cause big problems in their personal and work life. The rules about this can be different in different places.
  • 25. 2 TYPES OF DEFAMATION 1. Libel - Libel is when someone writes or prints false and harmful things about someone else, and other people see it. This can hurt the person's reputation, and it's important that the statements are untrue.
  • 26. 2 TYPES OF DEFAMATION 2. Slander - Slander is like telling lies about someone or something that can damage their reputation when other people hear it. It's similar to libel but involves spoken words or gestures, and other people must hear these false statements.
  • 28. CYBERSEX Cybersex, which is also called online sex or virtual sex, is when people engage in sexual talk or activities using digital tools like chat rooms, messaging, video calls, or social media. It includes explicit conversations, sharing sexual content, and playing roles, but it's important that everyone involved agrees to it, and it should be legal and respectful to make sure it's safe.
  • 30. CHILD PORNOGRAPHY Child pornography, also known as child exploitation material, is against the law. It involves explicit sexual content that includes kids who are under 18 years old. This content can be in the form of pictures, sounds, or words, and it shows them in sexual situations. The police and groups around the world strongly disapprove of and fight against child pornography to protect children and stop their abuse.
  • 32. CYBERSQUATTING Cybersquatting is when people register website names that are very similar to well-known trademarks or brands, usually with bad intentions to make money from them. They might try to trick people or do dishonest things. Laws like the U.S. Anticybersquatting Consumer Protection Act and UDRP help trademark owners take legal action against these cybersquatters and solve problems without going to court.
  • 34. COPYRIGHT Copyright is a protection for things people create, like paintings and photos, as long as they're put into a solid form. These creations should be original, which means they were made by a person with some creativity, even if it's just a little bit, according to the Supreme Court. This protection helps the creators keep others from copying or using their work without permission.
  • 36. WHO IS A COPYRIGHT OWNER? Copyright is a protection for things people create, like paintings and photos, as long as they're put into a solid form. These creations should be original, which means they were made by a person with some creativity, even if it's just a little bit, according to the Supreme Court. This protection helps the creators keep others from copying or using their work without permission.
  • 38. FAIR USE Fair use is a rule in the United States that allows people to use copyrighted stuff in certain situations without asking the owner for permission. It's a way to balance the rights of the copyright owners and the public's need to use creative things. This rule applies when you're using the material for things like giving an opinion, reporting news, teaching, studying, or doing research. However, whether something counts as fair use depends on the specific situation and needs to be looked at on a case-by-case basis.
  • 40. PLAGIARISM Plagiarism is when you use someone else's work without giving them credit or saying where you got it from. This can get you in trouble in school or at work. It can happen in different ways, like copying, rephrasing, or using their ideas without saying where you found them. To avoid plagiarism, it's important to give credit and say where you got the information.
  • 42. NETIQUETTE Netiquette is like having good manners on the internet. It means being polite and respectful when you're online, whether on social media, in emails, or on forums. This includes not using rude words, writing correctly, and respecting people's privacy. When you follow netiquette, it helps make online conversations positive and helpful.