Freedom of Expression Digital Environment Intellectual Property Social Media John Stuart Mill 1987 Constitution Article 3, Section 4 Libel True Immunity from Libel Atty. Loreto C. Ata Online/Cyber Libel False Freedom of Speech and of the Press Defamation False True False Unit 5 According to George Reynolds in his book, "Ethics in Information Technology" this refers to the right of individuals to express their opinions, beliefs, and ideas without fear of retaliation or censorship What are the scope of Freedom of Expression He is the known as the father of Utilitarianism. This states that no law shall be passed abridging the freedom of speech, of expression, or of the press, or the right of the people peaceably to assemble and petition the government for redress of grievances It is a criminal offense that involves the publication or public airing of false, malicious, and defamatory statements about a person or entity that can damage their reputation. Opinions are not libelous but facts can be. Refers to the legal protection granted to individuals or any entities from being sued for making defamatory statements According to him, there are ten defenses in libel suits It is the use of the computer system or any other electronic device where online communication takes place X liked and shared the video so he is liable for cyber libel This is one of the ten defenses in libel suits which protects open debate of governmental concerns. The act of harming a person's reputation through the use of words and is broken into two categories When the defaming words are spoken, it is considered as libel; if the words are written, this is known as slander. Unit 7 The growth of e-commerce has revolutionized the way businesses and consumers interact, making it easier to buy and sell goods and services online Text messages can never be considered evidence True Identity Theft RA 8792 Electronic Commerce Act of 2000/ Ecommerce Law False Mass Media Public Key Encryption Digital Signature Legal Tender Banknotes, Coins, Checks, Electronic Funds, Money Orders False Encryption Nature of the problem Level of care taken in building the software Terms of any contracts or agreements True False Secret Key Encryption RA 8484 is the Access Devices Regulating Act of 1998 Not an effect of breach to a business An act providing for the recognition and use of electronic commercial and non-commercial transactions, penalties for unlawful use thereof, and other purposes Business media and mass media are equivalent Refers to traditional forms of media such as TV, radio, newspaper, and magazines An asymmetric encryption technique that uses different keys for encryption and decryption, allowing computers over the internet to securely communicate with each other An asymmetric cryptography that is used to validate the authenticity of a digital document, message, or software Anything recognized by law as a means to settle public or private debt or meet a financial obligation, including tax payments, contracts, and legal fines or damages Types of Legal Tenders You are responsible for any system error It is a method by which information is converted into a secret code that hides the information’s true meaning Factors that may be considered in determining the extent of liability of computer programmers You should contact your bank after losing your card You should not tell your bank when you lost your card What is known as symmetric encryption