Lesson 7

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Media and Information Literacy

Lesson 7: Legal, Ethical and Societal Issues in MIL


Part 1: Netiquette, Digital Footprints and Digital Issues in the Philippines

Netiquette
 set of rules for behaving properly online.
 respecting other users’ views and displaying common courtesy when posting your views to online discussion
groups.

The Core Rules of Netiquette


 Rule 1: Remember the Human
Practice the Golden Rule: Do unto others as you would have others do unto you. Remember, your written words
are read by real people, all deserving of respectful communication. Before you press "send" or "submit," ask
yourself, "Would I be okay with this if someone else had written it?"

 Rule 2: Adhere to the same standards of behavior online that you follow in real life
While it can be argued that standards of behavior may be different in the virtual world, they certainly should not
be lower. You should do your best to act within the laws and ethical manners of society whenever you inhabit
"cyberspace." Would you behave rudely to someone face-to-face? On most occasions, no. Neither should you
behave this way in the virtual world.

 Rule 3: Know where you are in cyberspace


"Netiquette varies from domain to domain." (Shea, 1994) Depending on where you are in the virtual world, the
same written communication can be acceptable in one area, where it might be considered inappropriate in
another. What you text to a friend may not be appropriate in an email to a classmate or colleague.

 Rule 4: Respect other people's time and bandwidth


Electronic communication takes time: time to read and time in which to respond. Most people today lead busy
lives, just like you do, and don't have time to read or respond to frivolous emails or discussion posts. As a virtual
world communicator, it is your responsibility to make sure that the time spent reading your words isn't wasted.
Make your written communication meaningful and to the point, without extraneous text or superfluous graphics
or attachments that may take forever to download.

 Rule 5: Make yourself look good online


One of the best things about the virtual world is the lack of judgment associated with your physical appearance,
sound of your voice, or the clothes you. You will, however, be judged by the quality of your writing, so keep the
following tips in mind:
 Always check for spelling and grammar errors
 Know what you're talking about and state it clearly
 Be pleasant and polite

 Rule 6: Share expert knowledge


When you post a question and receive intelligent answers, share the results with others. Are you an expert at
something? Post resources and references about your subject matter. Recently expanded your knowledge about
a subject that might be of interest to others? Share that as well.

 Rule 7: Help keep flame wars under control


What is meant by "flaming" and "flame wars?" "Flaming is what people do when they express a strongly held
opinion without holding back any emotion." (Shea, 1994). While "flaming" is not necessarily forbidden in virtual
communication, "flame wars," when two or three people exchange angry posts between one another, must be
controlled or the camaraderie of the group could be compromised. Don't feed the flames; extinguish them by
guiding the discussion back to a more productive direction.
 Rule 8: Respect other people's privacy
Depending on what you are reading in the virtual world, be it an online class discussion forum, Facebook page,
or an email, you may be exposed to some private or personal information that needs to be handled with care.
Perhaps someone is sharing some medical news about a loved one or discussing a situation at work. What do
you think would happen if this information "got into the wrong hands?" Embarrassment? Hurt feelings? Loss of a
job? Just as you expect others to respect your privacy, so should you respect the privacy of others. Be sure to err
on the side of caution when deciding to discuss or not to discuss virtual communication.

 Rule 9: Don't abuse your power


Just like in face-to-face situations, there are people in cyberspace who have more "power" than others. They
have more expertise in technology or they have years of experience in a particular skill or subject matter. Maybe
it's you who possesses all of this knowledge and power! Just remember: knowing more than others do or having
more power than others may have does not give you the right to take advantage of anyone.

 Rule 10: Be forgiving of other people's mistakes.


Not everyone has the same amount of experience working in the virtual world. And not everyone knows the
rules of netiquette. At some point, you will see a stupid question, read an unnecessarily long response, or
encounter misspelled words; when this happens, practice kindness and forgiveness as you would hope someone
would do if you had committed the same offense. If it's a minor "offense," you might want to let it slide. If you
feel compelled to respond to a mistake, do so in a private email rather than a public forum.

Digital Footprint
 It is a trail of data you create while using the Internet. In includes the websites you visit, emails you send, and
information you submit to online services.
Cyber Bullying - bullying that takes place online, or using electronic technology such as cell phones,
computers, and tablets over communication tools including social media sites, text messages, chat, and
websites.

Part 2: Intellectual Property, Fair Use and Creative Commons


Piracy - the unauthorized reproduction or use of a copyrighted book, recording, television program, patented invention,
trademarked product, etc.

Intellectual Property - refers to creations of the mind, such as inventions; literary and artistic works; designs; and
symbols, names and images used in commerce.

Types of Intellectual Property:


 Copyright - is a legal term used to describe the rights that creators have over their literary and artistic works.
Works covered by copyright range from books, music, paintings, sculpture and films, to computer programs,
databases, advertisements, maps and technical drawings.

Republic act 8293


INTELLECTUAL PROPERTY CODE OF THE PHILIPPINES
Copyright Validity Period
LITERARY WORKS During the lifetime of the author plus 50 years after death.
ART 25 years from the date of creation
PHOTOGRAPHIC WORK 50 years from publication
AUDIO- VISUAL WORK 50 years from publication
SOUND RECORDING 50 years from year recording took place
BROADCAST RECORDING 20 years from date of broadcast
TRADEMARK Valid for 10 years and may be renewed for a periods of 10 years
INVENTION PATENT Valid for 20 years from filing date application
 Patent - is an exclusive right granted for an invention.
 Trademarks - is a sign capable of distinguishing the goods or services of one enterprise from those of other
enterprises. TM means the owner of the mark has common law rights even though the mark has not been
registered while the ®, on the other hand, is only used for marks that have been granted registration.
Infringement - refers to the violation of a law or a right.

 Industrial Design - constitutes the ornamental or aesthetic aspect of an article. It may consist of three-
dimensional features, such as the shape or surface of an article, or of two-dimensional features, such as
patterns, lines or color.
 Geographical Indications and Appellations of Origin - are signs used on goods that have a specific geographical
origin and possess qualities, a reputation or characteristics that are essentially attributable to that place of
origin. Most commonly, a geographical indication includes the name of the place of origin of the goods.

Fair Use - means you can use copyrighted material without a license only for certain purposes. These include:
 Commentary
 Criticism
 Reporting
 Research
 Teaching

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy