0% found this document useful (0 votes)
130 views10 pages

Media Information Literacy Q1M8

This document provides information about a Senior High School module on Media and Information Literacy focusing on Legal, Ethical, and Societal Issues in Media and Information. It includes sections on copyright laws, the development team behind the module, and an introductory message for facilitators and learners. The module aims to engage learners in guided and independent learning about key media literacy concepts while considering their needs and circumstances.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
130 views10 pages

Media Information Literacy Q1M8

This document provides information about a Senior High School module on Media and Information Literacy focusing on Legal, Ethical, and Societal Issues in Media and Information. It includes sections on copyright laws, the development team behind the module, and an introductory message for facilitators and learners. The module aims to engage learners in guided and independent learning about key media literacy concepts while considering their needs and circumstances.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Senior High School

Media and Information COPYRIGHT 2020

Section 9 of the Presidential Decree No. 49 provides:

Literacy “No copy shall subsist in any work of the Government of the Philippines.
However, prior approval of the government agency or office wherein the work is created shall
be necessary for exploitation of such work for profit.”
Quarter 1 – Module 8 The original version of this material has been developed in the Schools Division of Surigao del
Legal, Ethical, and Societal Issues Norte through the Learning Resource Management and Development Section of the Curriculum
Implementation Division. This material can be reproduced for educational purposes; modified for the
in Media and Information purpose of translation into another language; and creating of an edited version and enhancement of
work are permitted, provided all original work of the author and illustrator must be acknowledged and
the copyright must be attributed. No work may be derived from any part of this material for commercial
purposes and profit.
This material has been approved and published for online distribution through the Learning
Resource Management and Development System (LRMDS) Portal (http://lrmds.deped.gov.ph) and
Division Network Academy (https://netacadsdn.com).

Development Team of the Module

Writer: Lucyl L. Morales


Editor: Iris Jane M. Canoy
Reviewer: Krystel Grace L. Calderon
Illustrators: Danilo L. Galve, Stephen B. Gorgonio
Layout Artists: Ivan Paul V. Damalerio, Alberto S. Elcullada, Jr.
Management Team: Ma. Teresa M. Real
Laila F. Danaque
Dominico P. Larong, Jr.
Gemma C. Pullos
Manuel L. Limjoco, Jr.

Printed in the Philippines by

Department of Education – Schools Division of Surigao del Norte

Office Address: Peñaranda St., Surigao City


Tel. No.: (086) 826-8216
E-mail Address: surigao.delnorte@deped.gov.ph
Senior High School Introductory Message
For the facilitator:
Welcome to the Media and Information Literacy Self-Learning Module on Legal,
Ethical, and Societal Issues in Media and Information.
This module was collaboratively designed, developed and reviewed by
educators both from public and private institutions to assist you, the teacher or
facilitator in helping the learners meet the standards set by the K to 12 Curriculum
while overcoming their personal, social, and economic constraints in schooling.
Media and Information This learning resource hopes to engage the learners into guided and
independent learning activities at their own pace and time. Furthermore, this also aims

Literacy to help learners acquire the needed 21st century skills while taking into consideration
their needs and circumstances.

Quarter 1 – Module 8 In addition to the material in the main text, you will also see this box in the body
of the module:
Legal, Ethical, and Societal Issues
in Media and Information
Notes to the Teacher

This contains helpful tips or strategies that will help


you in guiding the learners.

As a facilitator, you are expected to orient the learners on how to use this
module. You also need to keep track of the learners' progress while allowing them to
manage their own learning. Furthermore, you are expected to encourage and assist
the learners as they do the tasks included in the module.
For the learner:
Welcome to the Media and Information Literacy Self-Learning Module on Legal,
Ethical, and Societal Issues in Media and Information.
This module was designed to provide you with fun and meaningful opportunities
for guided and independent learning at your own pace and time. You will be enabled
to process the contents of the learning resource while being an active learner.

ii
PRE-TEST
Legal, Ethical, and Societal Issues
in Media and Information Instructions: Read each item carefully and identify what is asked or described.
Encircle the letter of the correct answer. “This is your first task; I wish you Good Luck!”

CONTENT STANDARD 1. It is a legal concept that allows the reproduction of copyrighted material for
The learner organizes a creative and interactive symposium for the community certain purposes
focusing on being a media and information literate individual. without obtaining permission and without paying a fee
A. Plagiarism C. Copyright
PERFORMANCE STANDARD B. Fair Use D. infringement
The learners should be able to demonstrates understanding of media and
information literacy (MIL) and MIL related concepts. 2. It is the deliberate use of someone else's identity, usually as a method to gain
a financial advantage or obtain credit and other benefits in the other person's
LEARNING COMPETENCY name, and perhaps to the other person's disadvantage or loss
The learners should be able to: A. Identity theft C. plagiarism
1. Cite practical situation when to apply knowledge in intellectual property, B. cyber defamation D. digital piracy
copy right, and fair use guidelines
2. Create a campaign add to combat digital divide, addiction, and bullying 3. Refers to the virtual computer world, and more specifically, is an electronic
medium used to form a global computer network to facilitate online
LEARNING OBJECTIVES communication
The learner: A. Cybercrime C. Cybersex
1. Explains and puts into practice the understanding of the intellectual B. Cyberbullying D. Cyberspace
property, copy right, and fair use guidelines
2. Demonstrates proper conduct and behavior online (netiquette, virtual self) 4. What Republic Act that aims to address legal issues concerning online
3. Puts into action their personal resolve to combat digital divide, addiction, interactions and the Internet
and bullying A. REPUBLIC ACT NO. 10185
4. Explains actions to promote ethical use of media and information B. REPUBLIC ACT NO. 10175
5. Enumerates opportunities and challenges in media and information. C. REPUBLIC ACT NO. 11276
D. REPUBLIC ACT NO. 12115
INTRODUCTION
5. Phishing is the attempt to obtain sensitive information such as the following
Information and media literacy (IML) enables people to show and make EXCEPT one.
informed judgments as users of information and media. Basically, media literacy helps A. usernames C. credit card details
students become wiser consumers of media as well as responsible producers of their B. passwords D. address
own media. In a larger context, the ethical use of media is each person's responsibility
whether one is a student or a professional. Proper use of media 6. It is described as the practice of illegally copying and selling digital music, video,
Can make you a better, well-informed individual, but can also enable you to create a computer software, etc.
change in the world. A. Cyber defamation C. digital piracy
B. identity theft D. Cybersquatting
In this module, you will learn on different legal, ethical, and societal issues in
media and information. Specifically, you will know how to put into practice the
knowledge in intellectual property, copyright and fair use. You will also encourage to
create a campaign add to combat digital divide, addiction, and bullying.

1 2
7. Which of the following statements describe what is Fair Use? 13. A Media teacher has a textbook that she thinks would be ideal for her students.
A. Legal concept that allows the reproduction of copyrighted material for However, the school cannot afford to buy a class set. The teacher may
certain purposes without obtaining permission and without paying a A. Legally make multiple copies of stories from the textbook for use in
fee class
B. Registering, trafficking in, or using an Internet domain name with bad B. Legally make one copy of a story she likes and post it on the Internet
faith intent to profit from the goodwill of a trademark belonging to for students to use
someone else. C. Not copy the story for her students
C. act of stealing can be avoided by acknowledging the source or the D. Require the students to buy books.
original creator through citations.
D. Set of rules for behaving properly online. 14. A teacher uses clipart from the Internet for a class PowerPoint presentation. Is
this fair use?
8. Which of the following statements is true about Copyright? A. Yes C. Maybe
A. Allows the reproduction of copyrighted material for certain purposes B. No D. All of the above
without obtaining permission and without paying a fee
B. Disparities in access to telephones, personal computers, and the 15. A student wants to use a popular song for a video he is creating for a class
internet across certain demographic groups assignment. The best advice to give him would be
C. The owner has the exclusive right to reproduce, distribute, perform, A. Choose another song
display, license, and to prepare derivative works based on the B. Use only 10 seconds of the song
copyrighted work. C. Use only a minute of a song
D. Uses internet domain name with bad faith intent to profit from the D. To go ahead and use the whole song
goodwill of a trademark belonging to someone else.
“Congratulations you made it!
9. Those individuals who engage in computer hacking activities are typically
referred to as _______. If you think all your answers are correct, very good! This shows that you already
A. hacker C. composer know much about the topics in this module. You may still study the module to review
B. writer D. handler what you already know. Who knows, you might learn a few more new things as well.

10. Plagiarism can be avoided by ______________the source or the original If you think you got a low score, don’t feel bad. This means that this module is
creator through citations. for you. It will help you to understand some important concepts that you can apply in
A. forgetting C. mentioning your daily life. If you study this module carefully, you will learn the answers to all the
B. paying D. acknowledging items in the test and a lot more!

11. Which of the following is NOT an exclusive right of the owner of the copyright? Are you ready? Let’s go!”
A. reproduces C. distributes
B. report D. perform

12. In relation to cyberbullying, which of the following is NOT an example of this?


A. text messages or emails composed to insult or demean
B. rumors or false statements spread by email or posted on social
networking sites
C. humiliating photos, videos
D. spreading good news

3 4
REVIEW OF THE PREVIOUS MODULE Guide Question:
1. What do you think does these concepts mean?
The previous module is all about media codes and conventions. Match the type
of codes and conventions to its example/ description by writing the correct answer on “Very good! I know you can do it. Now it’s time for you to EXPLORE the mystery
the space before the number. behind those words. You’re doing great!”
Type of Code/Convention Example/ Description
_______1. Technical code a. acting COPYRIGHT PLAGIARISM CYBERSEX
_______2. Written code b. printed language DIGITAL DIVIDE INFRINGEMENT HACKING
_______3. Symbolic code c. system of signs CYBER CYBERBULLYING DIGITAL PIRACY
_______4. convention d. story convention PORNOGRAPHY
_______5. code e. camerawork

PRESENTATION OF THE NEW MODULE ANALYSIS

With the existence of the new media, everyone is at liberty contributed and post PICTURE ANALYSIS
information online. The problem with this evolutionary form of media is the lack of Instructions: Give what is your point of view regarding on the pictures below.
check and balance that traditional media requires. Often, those who post their opinions
are taken as facts that may sometimes result of defamation. With this different case 1.
all over the world. Such a problem reiterates the need for responsible use of social
media information.
With current provision in the law help in ensuring everyone’s right to privacy.
However, it is important to note that self-discretion goes a long way in protecting one’s
privacy.
https://www.google.com/search?q=picture+on+cyberbullying&source

ACTIVITY
“SEEK YE FIRST” Instructions: Locate the given words in the grid. Circle the 10 2.
words listed below.
P S E D I V I D L A T I G I D
O F C S C Y B E R K A E E N I
R Y B O U Q O K O G A X I F F
N G C E P E E F I N Y E U R R https://www.google.com/search?q=picture+on+cybersex&tbm
O U W A R Y U G E I H S O I O
G Y H L R B R J T K D R A N G 3.
R N U E O I U I I C L E C G F
A K Q I S I P L G A O B I E R
P Q M T A J I L L H I Y O M H
H A C O A S U A A Y T C U E K
Y U S A I K A A I T I E T N I
O P H H G O A E U O I N S T O https://www.google.com/search?q=picture+on+digital+piracy+&tbm
K V T S T U I O O E A G G A E
P L A G I A R I S M A O I E T
W D O I P C E P Q Y U U P D S

5 6
that you do not have the right to use from the Internet. DIGITAL PIRACY is the practice
4. of copying and selling digital music, video, computer software illegally. IDENTITY
THEFT refers to the deliberate use of someone else's identity, usually as a method to
get a financial benefit or gain credit and other benefits in the other person's name.

CYBER DEFAMATION is a lowly false statement of fact that inclines to harm


https://www.google.com/search?q=copyright&tbm the name of a person or company

5. Types of Defamation:
1. Libel is a written method of defamation which is expressed by print,
writing, pictures, dummies, signs or any other medium of communication
embodied in physical form that is harmful to a person’s reputation and or
exposes a person to public hatred or contempt or harms a person in
his/her profession or business.
2. Slander – also known as oral or spoken defamation, is the legal term for
https://www.google.com/search?q=computer+addiction&tbm
the act of harming a person’s reputation whether in his/her profession or
“Good job! I told you can do this.”
business by telling other people something that is not true that can
damage that person.
ABSTRACTION
CYBERSEX is also called computer sex, Internet sex, netsex • It is a virtual sex
REPUBLIC ACT NO. 10175 meeting in which two or more people send each other sexually clear contents or
sexually clear acts. CHILD PORNOGRAPHY is a form of child sexual manipulation
Cybercrime Prevention Act of 2012
• It is a law in the Philippines approved on September 12, 2012 with main CYBERSQUATTING is recording, trading in, or using an Internet domain name
purpose to address legal issues concerning online interactions and the with bad faith intent to yield from the goodwill of a trademark belonging to someone
Internet else. The cybersquatter then offers to trade the domain to the person or company who
• Cybercrime offenses are the following: cybersquatting, cybersex, child owns a trademark confined within the name at an inflated price.
pornography, identity theft, illegal access to data and libel.
COPYRIGHT it means the right to copy. A person violating copyright commits
CYBER means connecting to, or relating computers or computer networks plagiarism. PLAGIARISM happens when someone else’s work is used by a different
(such as the Internet) CYBERSPACE denotes to the virtual computer world and it is person and claimed as his or her own. This performance of stealing can be avoided
an electronic medium used to make a global computer network to enable online by recognizing the source or the original maker through citations. INFRINGEMENT is
communication CYBERCRIME denotes to the criminal happenings carried out by the violation of a copyright. The exclusive rights of the copyright owner are subject to
means of computers or the Internet CYBERBULLYING is the use of electronic limitation by doctrine of “fair use”. FAIR USE of copyrighted work for criticism,
gadgets to communicate someone just to bully through sending frightening or comment, news reporting, teaching, scholarship, or research is not copyright
threatening messages. infringement. FAIR USE is a legal concept that allows copyrighted material to be
reproduce without getting consent and without paying a fee. Review, news reporting,
HACKING denotes to the exercise of adjusting or changing computer software teaching, or scholarly research are some of the purposes that permits the application
and hardware to complete a goal that is considered to be outside of the creator's of fair use.
original objective. Hacking individuals who participate in computer hacking activities
are known to as “hackers”. COMPUTER ADDICTION is the extreme use of computers to the degree that
it affects with daily life. This extreme use may interfere with work or sleep, result in
PHISHING is the attempt to get delicate information like the usernames, problems with social interaction, or affect mood, relationships and thought processes.
passwords, and credit card details. ILLEGAL DOWNLOADING refers to getting files

7 8
DIGITAL DIVIDE as the gaps in accessing to telephones, personal computers, APPLICATION
and the internet across certain demographic groups. Different segments have different
levels of access to digital developments due to a number of factors. To apply your learning in this lesson,
1. Make a short educational campaign video about how to combat digital
CYBERBULLYING, or BULLYING through electronic means, it is one of the divide, addiction, bullying and other legal societal issues on media
many problems brought about by developments in technology. With the presence information.
smartphones, tablets, laptops, and 24/7 access to internet, cyberbullying can occur to 2. Choose only one issue. Give a short description about it.
anyone, anywhere, and at any time. This may include exposing awkward content 3. The minimum time is 1 minute and maximum time of 3 minutes.
about someone or sending messages with the intention of hurting the receiver 4. In the end portion of your educational campaign video, give advices or
emotionally or mentally. tips on how to use media information responsibly.
5. Do share your educational video through Facebook on your FB account.
Examples of cyberbullying: text messages or emails composed to insult or
demean; rumors or false statements spread by email or posted on social networking EVALUATION RUBRIC FOR EDUCATIONAL CAMPAIGN VIDEO
sites; and humiliating photos, videos, websites, or making fake profiles shared on
social media.
Needs
Excellent Good Satisfactory Score
Improvement
NETIQUETTE or NETWORK ETIQUETTE is a set of rules for behaving
properly online. Concept The video The video The video The video
clearly demonstrates demonstrates does not
• It refers to the proper attitude that an individual should observe when
demonstrates a key concepts. a previous demonstrate
interacting online.
key concept. (25 pts.) concept. a clear
• Is a combination of the words network and etiquette and it is defined as
(30 pts) (20pts.) concept.
a set of rules for suitable online behavior.
(15 pts.)
The Core Rules of Netiquette Design The quality and The quality The quality The quality
materials in the and materials and materials and materials
Rule 1. Remember the human. Do not forget that the individual that is reading video are very in the video in the video in the video
your mail or posting is the individual with feelings that can be hurt. well organized adequately lacked some are not
• Corollary 1 to Rule #1: It's not good to hurt other people's emotions. and organized and organization organized
understandable. somewhat and 50% and lack
Rule 2. Adhere to the same standards of behavior online that you follow in real (30 pts.) clear.(25pts.) clear. clarity.
life. (20pts.) (15 pts.)
• Corollary 1: Be ethical. Final Final product Final product Final product l Final product
• Corollary 2: Breaking the law is bad Netiquette. Product looks looks decent required more looks
professional and the revisions and unrefined and
Rule 3. Know where you are in cyberspace. and the concepts the concepts the concepts
• Corollary 1: Netiquette varies from domain to domain. concepts were were were not were not
• Corollary 2: Lurk before you leap. visibly somewhat clearly demonstrated.
demonstrated. demonstrated. demonstrated. (25 pts.)
Rule 4. Respect other people's time and bandwidth. (40 pts.) ( 5 pts.) (30 pts.)
TOTAL SCORE
/100pts.

Enjoy in making your campaign video!!! That was excellent!

9 10
REFLECT POST-TEST

You did it well! Congratulations! You have just had an amazing learning journey. Instructions: Read each item carefully and identify what is asked or described.
Encircle the letter of the correct answer. “You can do it!” ☺
For the last time, share your final insights by completing the following sentence
prompts. It was such a wonderful learning experience with you. 1. Which of the following is NOT an exclusive right of the owner of the copyright?
A. reproduces C. distributes
1. One thing I found interesting about copyright is _________ B. report D. performs
2. One thing that I cannot forget in this module is _____________
3. Another thing I would like to learn about legal and societal issues in media 2. In relation to cyberbullying, which of the following is NOT an example of this?
information is that ____________________________________________ A. text messages or emails composed to insult or demean
B. rumors or false statements spread by email or posted on social
LEARN MORE networking sites
C. humiliating photos, videos
A. Make an essay on how to promote ethical use of media and information. D. spreading good news
___________________________________________________________________
___________________________________________________________________ 3. A Media teacher has a textbook that she thinks would be ideal for her students.
___________________________________________________________________ However, the school cannot afford to buy a class set. The teacher may
___________________________________________________________________ A. Legally make multiple copies of stories from the textbook for use in
B. In a form of a table, enumerate the opportunities and challenges in media class
and information. B. Legally make one copy of a story she likes and post it on the Internet
OPPORTUNITIES CHALLENGES for students to use
C. Not copy the story for her students
MEDIA AND D. Require the students to buy books.
INFORMATION
4. A teacher uses clipart from the Internet for a class Powerpoint presentation. Is
this fair use?
Watch the video in the following websites: A. Yes C. Maybe
1. https://www.youtube.com/watch?v=6kW_gJioncA B. No D. All of the above
2. https://www.youtube.com/watch?v=zLSCqVxHwPE
3. https://www.youtube.com/watch?v=b_fulKc5wh0 5. A student wants to use a popular song for a video he is creating for a class
assignment. The best advice to give him would be
It will give you additional information about this lesson. It would be very much A. Choose another song
exciting to learn more! Don’t forget to share what you have learned to others. B. Use only 10 seconds of the song
C. Use only a minute of a song
D. To go ahead and use the whole song

6. Those individuals who engage in computer hacking activities are typically


referred to as _______.
A. hacker C. composer
B. writer D. handler

11 12
7. Plagiarism can be avoided by ______________the source or the original 13. Refers to the virtual computer world, and more specifically, is an electronic
creator through citations. medium used to form a global computer network to facilitate online
A. forgetting C. mentioning communication
B. paying D. acknowledging A. Cybercrime C. Cybersex
B. Cyberbullying D. Cyberspace
8. It is described as the practice of illegally copying and selling digital music, video,
computer software, etc. 14. What Republic Act that aims to address legal issues concerning online
A. Cyber defamation interactions and the Internet
B. identity theft A. REPUBLIC ACT NO. 10185
C. digital piracy B. REPUBLIC ACT NO. 10175
D. Cybersquatting C. REPUBLIC ACT NO. 11276
D. REPUBLIC ACT NO. 12115
9. Which of the following statements describe what is Fair Use?
A. Legal concept that allows the reproduction of copyrighted material for 15. Phishing is the attempt to obtain sensitive information such as the following
certain purposes without obtaining permission and without paying a EXCEPT one.
fee A. usernames C. credit card details
B. Registering, trafficking in, or using an Internet domain name with bad B. passwords D. address
faith intent to profit from the goodwill of a trademark belonging to
someone else. “Hey, I would like to send my congratulation to you! You’re so amazing.
C. act of stealing can be avoided by acknowledging the source or the
original creator through citations. I hope you got a perfect score by this time. But if you still have some errors, you
D. Set of rules for behaving properly online. may read the module again and do some additional research.”

10. Which of the following statements is true about Copyright?


A. Allows the reproduction of copyrighted material for certain purposes
without obtaining permission and without paying a fee
B. Disparities in access to telephones, personal computers, and the
internet across certain demographic groups
C. The owner has the exclusive right to reproduce, distribute, perform,
display, license, and to prepare derivative works based on the
copyrighted work.
D. Uses internet domain name with bad faith intent to profit from the
goodwill of a trademark belonging to someone else.

11. It is a legal concept that allows the reproduction of copyrighted material for
certain purposes without obtaining permission and without paying a fee
A. Plagiarism C. Copyright
B. Fair Use D. infringement

12. It is the deliberate use of someone else's identity, usually as a method to gain
a financial advantage or obtain credit and other benefits in the other person's
name, and perhaps to the other person's disadvantage or loss
A. Identity theft C. plagiarism
B. cyber defamation D. digital piracy

13 14
REFERENCES

http://www.albion.com/netiquette/book/0963702513p32.html

https://sites.google.com/view/elearningmil/lessons/the-legal-ethical-and-
societal-issues-in-media-and-information/netiquette

https://www.slideshare.net/markjhonoxillo/legal-ethical-and-societal-issues-in-
media-and-information

For inquiries or feedback, please write or call:

Department of Education – Schools Division of Surigao del Norte


Peñaranda St., Surigao City
Surigao del Norte, Philippines 8400
Tel. No: (086) 826-8216
Email Address: surigao.delnorte@deped.gov.ph

15 16

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy