Surveillance techniques
Thanks to the networked nature of the internet, in which information is always flowing both ways, there's no shortage of ways for apps, devices and websites to collect information about us.

Thanks to the networked nature of the internet, in which information is always flowing both ways, there's no shortage of ways for apps, devices and websites to collect information about us.

In Canada, consumers have certain rights to use copyrighted material without permission or license from the owner of the copyright. These rights are defined in the Copyright Act as Fair Dealing exemptions and were redefined in the 2012 changes to the Act. A good knowledge of Fair Dealing can be extremely helpful in understanding what you and your students can do with media in class. It's important to note that the Copyright Act provides very little definition for many of these terms; instead, most of the specifics of Fair Dealing have come from court rulings, and the new exemptions and other changes done in 2012 will likely also be further defined in the same way.

The question of whether media education, or digital media literacy, “works” is a bit misplaced. There is no doubt that it works in the same sense that other areas of study “work,” in that students who’ve received media education know more about digital media literacy than those that haven’t – just as students who take history courses know more about history than those that don’t.

What is intellectual property?: A novel? A film script? A joke? A cook book? A character in a TV show? A painting? The lyrics to a song? All of these are intellectual property.

Once you’ve found information online – or someone has shared it with you – how do you know if it’s true, or at least credible? In other words, how do you verify the information? The internet is a unique medium in that it allows anyone – not just experts – to write on any topic and to broadcast it to a wide audience.

Software threats are malicious pieces of computer code and applications that can damage your computer, as well as steal your personal or financial information. For this reason, these dangerous programs are often called malware (short for “malicious software”).

Learn more about our team.

Social justice activists and writers have built on Peggy McIntosh’s original essay on privilege in 1988, by adding to and modifing the original list to highlight how privilege is not merely about race or gender, but that it is a series of interrelated hierarchies and power dynamics that touch all facets of social life: race, class, gender, sexual orientation, religion, education, gender identity, age, physical ability, passing, etc. These categories will be further discussed below.

This public awareness program, created in partnership between MediaSmarts and the Facebook Canadian Election Integrity Initiative, focuses on authentication of online information.