Senior High School Media and Information Literacy Quarter 1 – Module 8 Legal, Ethical, and Societal Issues in Media and Information COPYRIGHT 2020 Section 9 of the Presidential Decree No. 49 provides: “No copy shall subsist in any work of the Government of the Philippines. However, prior approval of the government agency or office wherein the work is created shall be necessary for exploitation of such work for profit.” The original version of this material has been developed in the Schools Division of Surigao del Norte through the Learning Resource Management and Development Section of the Curriculum Implementation Division. This material can be reproduced for educational purposes; modified for the purpose of translation into another language; and creating of an edited version and enhancement of work are permitted, provided all original work of the author and illustrator must be acknowledged and the copyright must be attributed. No work may be derived from any part of this material for commercial purposes and profit. This material has been approved and published for online distribution through the Learning Resource Management and Development System (LRMDS) Portal (http://lrmds.deped.gov.ph) and Division Network Academy (https://netacadsdn.com). Development Team of the Module Writer: Lucyl L. Morales Editor: Iris Jane M. Canoy Reviewer: Krystel Grace L. Calderon Illustrators: Danilo L. Galve, Stephen B. Gorgonio Layout Artists: Ivan Paul V. Damalerio, Alberto S. Elcullada, Jr. Management Team: Ma. Teresa M. Real Laila F. Danaque Dominico P. Larong, Jr. Gemma C. Pullos Manuel L. Limjoco, Jr. Printed in the Philippines by Department of Education – Schools Division of Surigao del Norte Office Address: Tel. No.: E-mail Address: Peñaranda St., Surigao City (086) 826-8216 surigao.delnorte@deped.gov.ph Senior High School Media and Information Literacy Quarter 1 – Module 8 Legal, Ethical, and Societal Issues in Media and Information ii Introductory Message For the facilitator: Welcome to the Media and Information Literacy Self-Learning Module on Legal, Ethical, and Societal Issues in Media and Information. This module was collaboratively designed, developed and reviewed by educators both from public and private institutions to assist you, the teacher or facilitator in helping the learners meet the standards set by the K to 12 Curriculum while overcoming their personal, social, and economic constraints in schooling. This learning resource hopes to engage the learners into guided and independent learning activities at their own pace and time. Furthermore, this also aims to help learners acquire the needed 21st century skills while taking into consideration their needs and circumstances. In addition to the material in the main text, you will also see this box in the body of the module: Notes to the Teacher This contains helpful tips or strategies that will help you in guiding the learners. As a facilitator, you are expected to orient the learners on how to use this module. You also need to keep track of the learners' progress while allowing them to manage their own learning. Furthermore, you are expected to encourage and assist the learners as they do the tasks included in the module. For the learner: Welcome to the Media and Information Literacy Self-Learning Module on Legal, Ethical, and Societal Issues in Media and Information. This module was designed to provide you with fun and meaningful opportunities for guided and independent learning at your own pace and time. You will be enabled to process the contents of the learning resource while being an active learner. Legal, Ethical, and Societal Issues in Media and Information CONTENT STANDARD The learner organizes a creative and interactive symposium for the community focusing on being a media and information literate individual. PERFORMANCE STANDARD The learners should be able to demonstrates understanding of media and information literacy (MIL) and MIL related concepts. LEARNING COMPETENCY The learners should be able to: 1. Cite practical situation when to apply knowledge in intellectual property, copy right, and fair use guidelines 2. Create a campaign add to combat digital divide, addiction, and bullying LEARNING OBJECTIVES The learner: 1. Explains and puts into practice the understanding of the intellectual property, copy right, and fair use guidelines 2. Demonstrates proper conduct and behavior online (netiquette, virtual self) 3. Puts into action their personal resolve to combat digital divide, addiction, and bullying 4. Explains actions to promote ethical use of media and information 5. Enumerates opportunities and challenges in media and information. INTRODUCTION Information and media literacy (IML) enables people to show and make informed judgments as users of information and media. Basically, media literacy helps students become wiser consumers of media as well as responsible producers of their own media. In a larger context, the ethical use of media is each person's responsibility whether one is a student or a professional. Proper use of media Can make you a better, well-informed individual, but can also enable you to create a change in the world. In this module, you will learn on different legal, ethical, and societal issues in media and information. Specifically, you will know how to put into practice the knowledge in intellectual property, copyright and fair use. You will also encourage to create a campaign add to combat digital divide, addiction, and bullying. 1 PRE-TEST Instructions: Read each item carefully and identify what is asked or described. Encircle the letter of the correct answer. “This is your first task; I wish you Good Luck!” 1. It is a legal concept that allows the reproduction of copyrighted material for certain purposes without obtaining permission and without paying a fee A. Plagiarism C. Copyright B. Fair Use D. infringement 2. It is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss A. Identity theft C. plagiarism B. cyber defamation D. digital piracy 3. Refers to the virtual computer world, and more specifically, is an electronic medium used to form a global computer network to facilitate online communication A. Cybercrime C. Cybersex B. Cyberbullying D. Cyberspace 4. What Republic Act that aims to address legal issues concerning online interactions and the Internet A. REPUBLIC ACT NO. 10185 B. REPUBLIC ACT NO. 10175 C. REPUBLIC ACT NO. 11276 D. REPUBLIC ACT NO. 12115 5. Phishing is the attempt to obtain sensitive information such as the following EXCEPT one. A. usernames C. credit card details B. passwords D. address 6. It is described as the practice of illegally copying and selling digital music, video, computer software, etc. A. Cyber defamation C. digital piracy B. identity theft D. Cybersquatting 2 7. Which of the following statements describe what is Fair Use? A. Legal concept that allows the reproduction of copyrighted material for certain purposes without obtaining permission and without paying a fee B. Registering, trafficking in, or using an Internet domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else. C. act of stealing can be avoided by acknowledging the source or the original creator through citations. D. Set of rules for behaving properly online. 8. Which of the following statements is true about Copyright? A. Allows the reproduction of copyrighted material for certain purposes without obtaining permission and without paying a fee B. Disparities in access to telephones, personal computers, and the internet across certain demographic groups C. The owner has the exclusive right to reproduce, distribute, perform, display, license, and to prepare derivative works based on the copyrighted work. D. Uses internet domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else. 9. Those individuals who engage in computer hacking activities are typically referred to as _______. A. hacker C. composer B. writer D. handler 10. Plagiarism can be avoided by ______________the source or the original creator through citations. A. forgetting C. mentioning B. paying D. acknowledging 11. Which of the following is NOT an exclusive right of the owner of the copyright? A. reproduces C. distributes B. report D. perform 12. In relation to cyberbullying, which of the following is NOT an example of this? A. text messages or emails composed to insult or demean B. rumors or false statements spread by email or posted on social networking sites C. humiliating photos, videos D. spreading good news 3 13. A Media teacher has a textbook that she thinks would be ideal for her students. However, the school cannot afford to buy a class set. The teacher may A. Legally make multiple copies of stories from the textbook for use in class B. Legally make one copy of a story she likes and post it on the Internet for students to use C. Not copy the story for her students D. Require the students to buy books. 14. A teacher uses clipart from the Internet for a class PowerPoint presentation. Is this fair use? A. Yes C. Maybe B. No D. All of the above 15. A student wants to use a popular song for a video he is creating for a class assignment. The best advice to give him would be A. Choose another song B. Use only 10 seconds of the song C. Use only a minute of a song D. To go ahead and use the whole song “Congratulations you made it! If you think all your answers are correct, very good! This shows that you already know much about the topics in this module. You may still study the module to review what you already know. Who knows, you might learn a few more new things as well. If you think you got a low score, don’t feel bad. This means that this module is for you. It will help you to understand some important concepts that you can apply in your daily life. If you study this module carefully, you will learn the answers to all the items in the test and a lot more! Are you ready? Let’s go!” 4 REVIEW OF THE PREVIOUS MODULE The previous module is all about media codes and conventions. Match the type of codes and conventions to its example/ description by writing the correct answer on the space before the number. Type of Code/Convention Example/ Description _______1. Technical code a. acting _______2. Written code b. printed language _______3. Symbolic code c. system of signs _______4. convention d. story convention _______5. code e. camerawork PRESENTATION OF THE NEW MODULE With the existence of the new media, everyone is at liberty contributed and post information online. The problem with this evolutionary form of media is the lack of check and balance that traditional media requires. Often, those who post their opinions are taken as facts that may sometimes result of defamation. With this different case all over the world. Such a problem reiterates the need for responsible use of social media information. With current provision in the law help in ensuring everyone’s right to privacy. However, it is important to note that self-discretion goes a long way in protecting one’s privacy. ACTIVITY “SEEK YE FIRST” Instructions: Locate the given words in the grid. Circle the 10 words listed below. P O R N O G R A P H Y O K P W S F Y G U Y N K Q A U P V L D E C B C W H U Q M C S H T A O D S O E A L E I T O A H S G I I C U P R R O S A A I G T I P V Y Q E Y B I I J S K O U A C I B O E U R U P I U A A I R E D E K F G J I L L A A E O I P 5 L R O I E T I G L A I U O S Q A K G N I K C A H Y T O E M Y T A A Y H D L O I T I I A A U I E X E S R E B Y C E N G O U G E I U O A C I O U T S G I P I N F R I N G E M E N T A E D D I F R O G F R H K I O E T S Guide Question: 1. What do you think does these concepts mean? “Very good! I know you can do it. Now it’s time for you to EXPLORE the mystery behind those words. You’re doing great!” COPYRIGHT PLAGIARISM CYBERSEX DIGITAL DIVIDE INFRINGEMENT HACKING CYBER CYBERBULLYING DIGITAL PIRACY PORNOGRAPHY ANALYSIS PICTURE ANALYSIS Instructions: Give what is your point of view regarding on the pictures below. 1. https://www.google.com/search?q=picture+on+cyberbullying&source 2. https://www.google.com/search?q=picture+on+cybersex&tbm 3. https://www.google.com/search?q=picture+on+digital+piracy+&tbm 6 4. https://www.google.com/search?q=copyright&tbm 5. https://www.google.com/search?q=computer+addiction&tbm “Good job! I told you can do this.” ABSTRACTION REPUBLIC ACT NO. 10175 Cybercrime Prevention Act of 2012 • It is a law in the Philippines approved on September 12, 2012 with main purpose to address legal issues concerning online interactions and the Internet • Cybercrime offenses are the following: cybersquatting, cybersex, child pornography, identity theft, illegal access to data and libel. CYBER means connecting to, or relating computers or computer networks (such as the Internet) CYBERSPACE denotes to the virtual computer world and it is an electronic medium used to make a global computer network to enable online communication CYBERCRIME denotes to the criminal happenings carried out by means of computers or the Internet CYBERBULLYING is the use of electronic gadgets to communicate someone just to bully through sending frightening or threatening messages. HACKING denotes to the exercise of adjusting or changing computer software and hardware to complete a goal that is considered to be outside of the creator's original objective. Hacking individuals who participate in computer hacking activities are known to as “hackers”. PHISHING is the attempt to get delicate information like the usernames, passwords, and credit card details. ILLEGAL DOWNLOADING refers to getting files 7 that you do not have the right to use from the Internet. DIGITAL PIRACY is the practice of copying and selling digital music, video, computer software illegally. IDENTITY THEFT refers to the deliberate use of someone else's identity, usually as a method to get a financial benefit or gain credit and other benefits in the other person's name. CYBER DEFAMATION is a lowly false statement of fact that inclines to harm the name of a person or company Types of Defamation: 1. Libel is a written method of defamation which is expressed by print, writing, pictures, dummies, signs or any other medium of communication embodied in physical form that is harmful to a person’s reputation and or exposes a person to public hatred or contempt or harms a person in his/her profession or business. 2. Slander – also known as oral or spoken defamation, is the legal term for the act of harming a person’s reputation whether in his/her profession or business by telling other people something that is not true that can damage that person. CYBERSEX is also called computer sex, Internet sex, netsex • It is a virtual sex meeting in which two or more people send each other sexually clear contents or sexually clear acts. CHILD PORNOGRAPHY is a form of child sexual manipulation CYBERSQUATTING is recording, trading in, or using an Internet domain name with bad faith intent to yield from the goodwill of a trademark belonging to someone else. The cybersquatter then offers to trade the domain to the person or company who owns a trademark confined within the name at an inflated price. COPYRIGHT it means the right to copy. A person violating copyright commits plagiarism. PLAGIARISM happens when someone else’s work is used by a different person and claimed as his or her own. This performance of stealing can be avoided by recognizing the source or the original maker through citations. INFRINGEMENT is the violation of a copyright. The exclusive rights of the copyright owner are subject to limitation by doctrine of “fair use”. FAIR USE of copyrighted work for criticism, comment, news reporting, teaching, scholarship, or research is not copyright infringement. FAIR USE is a legal concept that allows copyrighted material to be reproduce without getting consent and without paying a fee. Review, news reporting, teaching, or scholarly research are some of the purposes that permits the application of fair use. COMPUTER ADDICTION is the extreme use of computers to the degree that it affects with daily life. This extreme use may interfere with work or sleep, result in problems with social interaction, or affect mood, relationships and thought processes. 8 DIGITAL DIVIDE as the gaps in accessing to telephones, personal computers, and the internet across certain demographic groups. Different segments have different levels of access to digital developments due to a number of factors. CYBERBULLYING, or BULLYING through electronic means, it is one of the many problems brought about by developments in technology. With the presence smartphones, tablets, laptops, and 24/7 access to internet, cyberbullying can occur to anyone, anywhere, and at any time. This may include exposing awkward content about someone or sending messages with the intention of hurting the receiver emotionally or mentally. Examples of cyberbullying: text messages or emails composed to insult or demean; rumors or false statements spread by email or posted on social networking sites; and humiliating photos, videos, websites, or making fake profiles shared on social media. NETIQUETTE or NETWORK ETIQUETTE is a set of rules for behaving properly online. • It refers to the proper attitude that an individual should observe when interacting online. • Is a combination of the words network and etiquette and it is defined as a set of rules for suitable online behavior. The Core Rules of Netiquette Rule 1. Remember the human. Do not forget that the individual that is reading your mail or posting is the individual with feelings that can be hurt. • Corollary 1 to Rule #1: It's not good to hurt other people's emotions. Rule 2. Adhere to the same standards of behavior online that you follow in real life. • Corollary 1: Be ethical. • Corollary 2: Breaking the law is bad Netiquette. Rule 3. Know where you are in cyberspace. • Corollary 1: Netiquette varies from domain to domain. • Corollary 2: Lurk before you leap. Rule 4. Respect other people's time and bandwidth. 9 APPLICATION To apply your learning in this lesson, 1. Make a short educational campaign video about how to combat digital divide, addiction, bullying and other legal societal issues on media information. 2. Choose only one issue. Give a short description about it. 3. The minimum time is 1 minute and maximum time of 3 minutes. 4. In the end portion of your educational campaign video, give advices or tips on how to use media information responsibly. 5. Do share your educational video through Facebook on your FB account. EVALUATION RUBRIC FOR EDUCATIONAL CAMPAIGN VIDEO Excellent Needs Improvement Good Satisfactory Concept The video clearly demonstrates a key concept. (30 pts) The video demonstrates key concepts. (25 pts.) The video demonstrates a previous concept. (20pts.) The video does not demonstrate a clear concept. (15 pts.) Design The quality and materials in the video are very well organized and understandable. (30 pts.) The quality and materials in the video adequately organized and somewhat clear.(25pts.) The quality and materials in the video lacked some organization and 50% clear. (20pts.) The quality and materials in the video are not organized and lack clarity. (15 pts.) Final Product Final product looks professional and the concepts were visibly demonstrated. (40 pts.) Final product looks decent and the concepts were somewhat demonstrated. ( 5 pts.) Final product l required more revisions and the concepts were not clearly demonstrated. (30 pts.) Final product looks unrefined and the concepts were not demonstrated. (25 pts.) Score TOTAL SCORE /100pts. Enjoy in making your campaign video!!! That was excellent! 10 REFLECT You did it well! Congratulations! You have just had an amazing learning journey. For the last time, share your final insights by completing the following sentence prompts. It was such a wonderful learning experience with you. 1. 2. 3. One thing I found interesting about copyright is _________ One thing that I cannot forget in this module is _____________ Another thing I would like to learn about legal and societal issues in media information is that ____________________________________________ LEARN MORE A. Make an essay on how to promote ethical use of media and information. ___________________________________________________________________ ___________________________________________________________________ ___________________________________________________________________ ___________________________________________________________________ B. In a form of a table, enumerate the opportunities and challenges in media and information. OPPORTUNITIES CHALLENGES MEDIA AND INFORMATION Watch the video in the following websites: 1. https://www.youtube.com/watch?v=6kW_gJioncA 2. https://www.youtube.com/watch?v=zLSCqVxHwPE 3. https://www.youtube.com/watch?v=b_fulKc5wh0 It will give you additional information about this lesson. It would be very much exciting to learn more! Don’t forget to share what you have learned to others. 11 POST-TEST Instructions: Read each item carefully and identify what is asked or described. Encircle the letter of the correct answer. “You can do it!” ☺ 1. Which of the following is NOT an exclusive right of the owner of the copyright? A. reproduces C. distributes B. report D. performs 2. In relation to cyberbullying, which of the following is NOT an example of this? A. text messages or emails composed to insult or demean B. rumors or false statements spread by email or posted on social networking sites C. humiliating photos, videos D. spreading good news 3. A Media teacher has a textbook that she thinks would be ideal for her students. However, the school cannot afford to buy a class set. The teacher may A. Legally make multiple copies of stories from the textbook for use in class B. Legally make one copy of a story she likes and post it on the Internet for students to use C. Not copy the story for her students D. Require the students to buy books. 4. A teacher uses clipart from the Internet for a class Powerpoint presentation. Is this fair use? A. Yes C. Maybe B. No D. All of the above 5. A student wants to use a popular song for a video he is creating for a class assignment. The best advice to give him would be A. Choose another song B. Use only 10 seconds of the song C. Use only a minute of a song D. To go ahead and use the whole song 6. Those individuals who engage in computer hacking activities are typically referred to as _______. A. hacker C. composer B. writer D. handler 12 7. Plagiarism can be avoided by ______________the source or the original creator through citations. A. forgetting C. mentioning B. paying D. acknowledging 8. It is described as the practice of illegally copying and selling digital music, video, computer software, etc. A. Cyber defamation B. identity theft C. digital piracy D. Cybersquatting 9. Which of the following statements describe what is Fair Use? A. Legal concept that allows the reproduction of copyrighted material for certain purposes without obtaining permission and without paying a fee B. Registering, trafficking in, or using an Internet domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else. C. act of stealing can be avoided by acknowledging the source or the original creator through citations. D. Set of rules for behaving properly online. 10. Which of the following statements is true about Copyright? A. Allows the reproduction of copyrighted material for certain purposes without obtaining permission and without paying a fee B. Disparities in access to telephones, personal computers, and the internet across certain demographic groups C. The owner has the exclusive right to reproduce, distribute, perform, display, license, and to prepare derivative works based on the copyrighted work. D. Uses internet domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else. 11. It is a legal concept that allows the reproduction of copyrighted material for certain purposes without obtaining permission and without paying a fee A. Plagiarism C. Copyright B. Fair Use D. infringement 12. It is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss A. Identity theft C. plagiarism B. cyber defamation D. digital piracy 13 13. Refers to the virtual computer world, and more specifically, is an electronic medium used to form a global computer network to facilitate online communication A. Cybercrime C. Cybersex B. Cyberbullying D. Cyberspace 14. What Republic Act that aims to address legal issues concerning online interactions and the Internet A. REPUBLIC ACT NO. 10185 B. REPUBLIC ACT NO. 10175 C. REPUBLIC ACT NO. 11276 D. REPUBLIC ACT NO. 12115 15. Phishing is the attempt to obtain sensitive information such as the following EXCEPT one. A. usernames C. credit card details B. passwords D. address “Hey, I would like to send my congratulation to you! You’re so amazing. I hope you got a perfect score by this time. But if you still have some errors, you may read the module again and do some additional research.” 14 REFERENCES http://www.albion.com/netiquette/book/0963702513p32.html https://sites.google.com/view/elearningmil/lessons/the-legal-ethical-andsocietal-issues-in-media-and-information/netiquette https://www.slideshare.net/markjhonoxillo/legal-ethical-and-societal-issues-inmedia-and-information 15 For inquiries or feedback, please write or call: Department of Education – Schools Division of Surigao del Norte Peñaranda St., Surigao City Surigao del Norte, Philippines 8400 Tel. No: (086) 826-8216 Email Address: surigao.delnorte@deped.gov.ph 16