SlideShare a Scribd company logo
1 of 32
LEGAL, ETHICAL
AND SOCIETAL
ISSUE
LESSON 7
In contemporary time, the creation of the
human mind is given so much value to the
extent that mechanism to protect these
creations are put in place. One such
mechanism is legal and ethical in nature. We
know of it today as the intellectual property
right.
Intellectual property (IP) is a category
of property that includes intangible creations
of the human intellect.
Copyright
Legal term used to describe the right that
creators have over their literary and artistic
works.
Copyright
■Books
■Music
■Paintings
■Films
■Computer Programs
Patent
Provide the patent owner with the
right to decide how or whether the
invention can be used by others in
exchange for this right.
Exclusive tight granted for an
invention
Trademark
A sign capable of distinguishing goods
or service of one enterprise from
those of other enterprise.
Trademark
Industrial Design
Constitute the ornamental or aesthetic
aspect of an article/object.
Design of an object (shape or surface,
patterns, lines or color)
Geographical indication and
appellation of origin
Sign used on good that have specific
geographical origin and possess
qualities.
Name of the place of origin of the
goods/products.
What is Copyright?
A copyright is a type of intellectual
property that gives its owner the
exclusive right to copy, distribute,
adapt, display, and perform a creative
work, usually for a limited time.
Literary Work
NOVEL POEMS PLAY
FILM MUSIC GAMES
REGISTERING COPYRIGHT
WIPO adhere to the Berne Convention
that provide automatic copyright
protection this means that a registration
or any other formality is not required.
IP LAW IN THE PH
Thus, Republic Act 8293, also known as “The intellectual
Property code of 1997” was enacted. According to this
piece of legislation, intellectual property rights consist of:
1. Copyright and related rights;
2. Trademarks and service marks;
3. Geographic indications;
4. Industrial Design;
Here are few of the terms indicated in RA 8293
which you may find helpful in your understanding
of copyright and intellectual property.
Term Definition
Author The natural person who created the work
Collective work A work which has been created by two or more natural person
at the initiative and under the direction of another
Communication to the
public or communicate
to the public
The making of a work available to the public by wire or
wireless means in such a way that members of the public may
access of these works
Public lending The transfer of possession of the original or a copy of a work
or sound recording for a limited period
Rental Transfer of possession of the original of work or sound
recording for limited period of time for profit-making
purposes
Reproduction The making of one or more copied of a work or a sound
recording in any manner or form
Work of applied art An artistic creation with utilitarian functions or incorporated
in a useful article, whether made by hand or produce on an
Copyright Protected Works
Under Philippine copyright, both original work and derivative works
protected.
Original works are those that are literary or artistic
in nature which include the following
 Books, Articles and old writings
 Musical compositions, with or without words
 Computer programs
Derivative works, on the other hand, refer to:
 Dramatizations, translation, adaptations and other
alterations of literary
 Collection of literary, scholarly or artistic works.
WORKS NOT PROTECTED
There are also works that are not
covered by copyright due to insufficient
authorship or due to the work being of
importance of public interest.
THE USE OF “FAIR USE”
In its most general sense, a fair use is any
copying of copyrighted material done for a limited
and “transformative” purpose, such as to
comment upon, criticize, or parody a copyrighted
work.
LEGAL SHARING USING CREATIVE
COMMONS
Apart from invoking fair use, licenses provided
by creative commons (A nonprofit licensing
organization) can enable the legal sharing and
use of works and to easily change terms form
“all rights reserved to some rights reserved.”
Flame Wars
Known among the internet users (netizens) is
the term flamer defined as someone who
knowingly attacks other netizens or expresses in
aggressive manner his opinion on controversial
issues. To widen your online vocabulary, you
may check the following terms on the Internet:
RESPONSIBLE NETIZENSHIP
Netiquette refers to observing proper
etiquette as you engage in activities over
the Internet. It is contrary to what Flame
Warriors display. Online discussion members
who adhere to rules of netiquette have high
respect for the view and opinions of other.
CORE RULES OF NETIQUETTE
1.Do not provoke or attack other.
2.The virtual world does not dismiss the fact that
you are talking to another human being who is
entitled to his or her feelings.
3.Privacy is a natural human right. Respect should
be always observed.
4.Nobody is perfect. Learn to admit mistakes.
5.Great power comes with great responsibility. Yield
your power over the Internet wisely.
CYBERBULLYING
The tagline “think before you click” just about
summarize the campaign. It simply means that
before you post anything on the wen you have to
think thoroughly before sharing the information.
It’s just bullying but it happens in the
internet, cyberbullying has been one of the
worst kinds of flaming activities because
even innocent people are victimized by this.
Cyberbullying is a type of offensive action
toward another which takes place using
electronic technology.
INTERNET ADDICTION
The internet has introduced a whole new
experience to human civilization. But excessive
use of online media can be a result of computer
addiction, online addiction or internet addiction
disorder (IAD) is an impulsive control problem. It
can take the form of any of the following:
• Cybersex addiction – Compulsive use of internet
pornography, adult chat rooms, or adult fantasy role-
playing games.
• Cyber-relationship addiction- addiction to social
networking, chat rooms, texting and messaging.
• Net Compulsion- such as compulsive online gaming,
gambling or stock trading
• Information overload- compulsive Web surfing or
database searching, leading to lower work productivity
and less social interaction with the family and friends.
• Computer addiction – obsessive playing of off-line
computer games or obsessive computer programming
STEALING OR BORROWING
■ Some may opt to literally copy the information and pass
it off as their own, or some will extend all effort to cite
their sources.
■ When the first situation happens, the person committed
a grave sin in scholarship which is called plagiarism.
Plagiarism is tricky. Institutions differ in the way they
perceive the concept of plagiarism. Table below are
some forms of plagiarism that are often committed by
people.
Sources
Not Cited
The Ghost Writer The writer turns in another’s work,
word for word as his or her own.
The Photocopy The writer copies significant portions of
text straight from a single source
without alteration.
The potluck Paper The writer tries to disguise plagiarism
by copying from several different
sources.
The Poor Disguise The writer altered the paper’s
appearance by slightly changing key
words and phrases.
The Labor of Laziness The writer takes the time to paraphrase
most f the paper from other sources
and make it all fit together.
The Self-Stealer The writer “borrows” generously from
Sources
Cited
The Forgotten Footnote The writer mentions an author’s name for a
source but neglects to include specific
information.
Misinformer The writer provides inaccurate information
regarding the sources, making it impossible
to find them.
The Too-Perfect
Paraphrase
The writer properly cites a source, but
neglects to put quotation marks text that
has been copied word to word or close to it.
The Resourceful Citer The writer properly cites all sources,
paraphrasing and using quotation
appropriately. But it contains no original
work.
The Perfect Crime The writer properly quotes and cites
sources in some places, but goes on to
paraphrase other arguments from those
sources without citation.

More Related Content

Similar to lesson 7.pptx

computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slidesthothakhail
 
LSC530 Kids, Authorship, Copyright and Fair Use
LSC530 Kids, Authorship, Copyright and Fair UseLSC530 Kids, Authorship, Copyright and Fair Use
LSC530 Kids, Authorship, Copyright and Fair UseRenee Hobbs
 
Alfredo alvarado ppt edtc6340 modified_week4
Alfredo alvarado ppt  edtc6340 modified_week4Alfredo alvarado ppt  edtc6340 modified_week4
Alfredo alvarado ppt edtc6340 modified_week4alalv020572
 
Alfredo alvarado ppt edtc6340 modified_w3
Alfredo alvarado ppt  edtc6340 modified_w3Alfredo alvarado ppt  edtc6340 modified_w3
Alfredo alvarado ppt edtc6340 modified_w3alalv020572
 
Copyright And Fairuse
Copyright And FairuseCopyright And Fairuse
Copyright And Fairusewebbs1
 
Lesson 1. Computer ethics and safety.pptx
Lesson 1. Computer ethics and safety.pptxLesson 1. Computer ethics and safety.pptx
Lesson 1. Computer ethics and safety.pptxCherryLim21
 
scivis ethics
scivis ethicsscivis ethics
scivis ethicsscivis
 
Intellectual property trademark copyright, patent and confidentiality
Intellectual property trademark copyright, patent and confidentialityIntellectual property trademark copyright, patent and confidentiality
Intellectual property trademark copyright, patent and confidentialityTayyabUllah3
 
Alfredo alvarado ppt edtc6340
Alfredo alvarado ppt  edtc6340Alfredo alvarado ppt  edtc6340
Alfredo alvarado ppt edtc6340alalv020572
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in CyberspaceTushar Rajput
 
Most commonly asked questions relating to copyright
Most commonly asked questions relating to copyrightMost commonly asked questions relating to copyright
Most commonly asked questions relating to copyrightAhmedTalaat127
 
Copyright crashcourse coram6340.64
Copyright crashcourse coram6340.64Copyright crashcourse coram6340.64
Copyright crashcourse coram6340.64Cora Mendez
 
Copyright © and fair use
Copyright © and fair useCopyright © and fair use
Copyright © and fair usemrecord
 
Copyright © and fair use
Copyright © and fair useCopyright © and fair use
Copyright © and fair usemrecord
 

Similar to lesson 7.pptx (20)

computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
 
MIL-Q1M8.pptx
MIL-Q1M8.pptxMIL-Q1M8.pptx
MIL-Q1M8.pptx
 
LSC530 Kids, Authorship, Copyright and Fair Use
LSC530 Kids, Authorship, Copyright and Fair UseLSC530 Kids, Authorship, Copyright and Fair Use
LSC530 Kids, Authorship, Copyright and Fair Use
 
Alfredo alvarado ppt edtc6340 modified_week4
Alfredo alvarado ppt  edtc6340 modified_week4Alfredo alvarado ppt  edtc6340 modified_week4
Alfredo alvarado ppt edtc6340 modified_week4
 
Alfredo alvarado ppt edtc6340 modified_w3
Alfredo alvarado ppt  edtc6340 modified_w3Alfredo alvarado ppt  edtc6340 modified_w3
Alfredo alvarado ppt edtc6340 modified_w3
 
Yendys
YendysYendys
Yendys
 
Copyrights and fair use
Copyrights and fair useCopyrights and fair use
Copyrights and fair use
 
Copyright And Fairuse
Copyright And FairuseCopyright And Fairuse
Copyright And Fairuse
 
Lesson 1. Computer ethics and safety.pptx
Lesson 1. Computer ethics and safety.pptxLesson 1. Computer ethics and safety.pptx
Lesson 1. Computer ethics and safety.pptx
 
MIL WEEK 8.pptx
MIL WEEK 8.pptxMIL WEEK 8.pptx
MIL WEEK 8.pptx
 
scivis ethics
scivis ethicsscivis ethics
scivis ethics
 
Intellectual property trademark copyright, patent and confidentiality
Intellectual property trademark copyright, patent and confidentialityIntellectual property trademark copyright, patent and confidentiality
Intellectual property trademark copyright, patent and confidentiality
 
Alfredo alvarado ppt edtc6340
Alfredo alvarado ppt  edtc6340Alfredo alvarado ppt  edtc6340
Alfredo alvarado ppt edtc6340
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in Cyberspace
 
Most commonly asked questions relating to copyright
Most commonly asked questions relating to copyrightMost commonly asked questions relating to copyright
Most commonly asked questions relating to copyright
 
Copyright crashcourse coram6340.64
Copyright crashcourse coram6340.64Copyright crashcourse coram6340.64
Copyright crashcourse coram6340.64
 
Copyright and IPR issues
Copyright and IPR issues   Copyright and IPR issues
Copyright and IPR issues
 
Copyright © and fair use
Copyright © and fair useCopyright © and fair use
Copyright © and fair use
 
Copyright © and fair use
Copyright © and fair useCopyright © and fair use
Copyright © and fair use
 

Recently uploaded

CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 

Recently uploaded (20)

CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 

lesson 7.pptx

  • 2. In contemporary time, the creation of the human mind is given so much value to the extent that mechanism to protect these creations are put in place. One such mechanism is legal and ethical in nature. We know of it today as the intellectual property right.
  • 3. Intellectual property (IP) is a category of property that includes intangible creations of the human intellect.
  • 4. Copyright Legal term used to describe the right that creators have over their literary and artistic works.
  • 6. Patent Provide the patent owner with the right to decide how or whether the invention can be used by others in exchange for this right. Exclusive tight granted for an invention
  • 7. Trademark A sign capable of distinguishing goods or service of one enterprise from those of other enterprise.
  • 9. Industrial Design Constitute the ornamental or aesthetic aspect of an article/object. Design of an object (shape or surface, patterns, lines or color)
  • 10. Geographical indication and appellation of origin Sign used on good that have specific geographical origin and possess qualities. Name of the place of origin of the goods/products.
  • 11. What is Copyright? A copyright is a type of intellectual property that gives its owner the exclusive right to copy, distribute, adapt, display, and perform a creative work, usually for a limited time.
  • 14. REGISTERING COPYRIGHT WIPO adhere to the Berne Convention that provide automatic copyright protection this means that a registration or any other formality is not required.
  • 15. IP LAW IN THE PH Thus, Republic Act 8293, also known as “The intellectual Property code of 1997” was enacted. According to this piece of legislation, intellectual property rights consist of: 1. Copyright and related rights; 2. Trademarks and service marks; 3. Geographic indications; 4. Industrial Design;
  • 16. Here are few of the terms indicated in RA 8293 which you may find helpful in your understanding of copyright and intellectual property.
  • 17. Term Definition Author The natural person who created the work Collective work A work which has been created by two or more natural person at the initiative and under the direction of another Communication to the public or communicate to the public The making of a work available to the public by wire or wireless means in such a way that members of the public may access of these works Public lending The transfer of possession of the original or a copy of a work or sound recording for a limited period Rental Transfer of possession of the original of work or sound recording for limited period of time for profit-making purposes Reproduction The making of one or more copied of a work or a sound recording in any manner or form Work of applied art An artistic creation with utilitarian functions or incorporated in a useful article, whether made by hand or produce on an
  • 18. Copyright Protected Works Under Philippine copyright, both original work and derivative works protected. Original works are those that are literary or artistic in nature which include the following  Books, Articles and old writings  Musical compositions, with or without words  Computer programs Derivative works, on the other hand, refer to:  Dramatizations, translation, adaptations and other alterations of literary  Collection of literary, scholarly or artistic works.
  • 19. WORKS NOT PROTECTED There are also works that are not covered by copyright due to insufficient authorship or due to the work being of importance of public interest.
  • 20. THE USE OF “FAIR USE” In its most general sense, a fair use is any copying of copyrighted material done for a limited and “transformative” purpose, such as to comment upon, criticize, or parody a copyrighted work.
  • 21. LEGAL SHARING USING CREATIVE COMMONS Apart from invoking fair use, licenses provided by creative commons (A nonprofit licensing organization) can enable the legal sharing and use of works and to easily change terms form “all rights reserved to some rights reserved.”
  • 22. Flame Wars Known among the internet users (netizens) is the term flamer defined as someone who knowingly attacks other netizens or expresses in aggressive manner his opinion on controversial issues. To widen your online vocabulary, you may check the following terms on the Internet:
  • 23. RESPONSIBLE NETIZENSHIP Netiquette refers to observing proper etiquette as you engage in activities over the Internet. It is contrary to what Flame Warriors display. Online discussion members who adhere to rules of netiquette have high respect for the view and opinions of other.
  • 24. CORE RULES OF NETIQUETTE
  • 25. 1.Do not provoke or attack other. 2.The virtual world does not dismiss the fact that you are talking to another human being who is entitled to his or her feelings. 3.Privacy is a natural human right. Respect should be always observed. 4.Nobody is perfect. Learn to admit mistakes. 5.Great power comes with great responsibility. Yield your power over the Internet wisely.
  • 26. CYBERBULLYING The tagline “think before you click” just about summarize the campaign. It simply means that before you post anything on the wen you have to think thoroughly before sharing the information.
  • 27. It’s just bullying but it happens in the internet, cyberbullying has been one of the worst kinds of flaming activities because even innocent people are victimized by this. Cyberbullying is a type of offensive action toward another which takes place using electronic technology.
  • 28. INTERNET ADDICTION The internet has introduced a whole new experience to human civilization. But excessive use of online media can be a result of computer addiction, online addiction or internet addiction disorder (IAD) is an impulsive control problem. It can take the form of any of the following:
  • 29. • Cybersex addiction – Compulsive use of internet pornography, adult chat rooms, or adult fantasy role- playing games. • Cyber-relationship addiction- addiction to social networking, chat rooms, texting and messaging. • Net Compulsion- such as compulsive online gaming, gambling or stock trading • Information overload- compulsive Web surfing or database searching, leading to lower work productivity and less social interaction with the family and friends. • Computer addiction – obsessive playing of off-line computer games or obsessive computer programming
  • 30. STEALING OR BORROWING ■ Some may opt to literally copy the information and pass it off as their own, or some will extend all effort to cite their sources. ■ When the first situation happens, the person committed a grave sin in scholarship which is called plagiarism. Plagiarism is tricky. Institutions differ in the way they perceive the concept of plagiarism. Table below are some forms of plagiarism that are often committed by people.
  • 31. Sources Not Cited The Ghost Writer The writer turns in another’s work, word for word as his or her own. The Photocopy The writer copies significant portions of text straight from a single source without alteration. The potluck Paper The writer tries to disguise plagiarism by copying from several different sources. The Poor Disguise The writer altered the paper’s appearance by slightly changing key words and phrases. The Labor of Laziness The writer takes the time to paraphrase most f the paper from other sources and make it all fit together. The Self-Stealer The writer “borrows” generously from
  • 32. Sources Cited The Forgotten Footnote The writer mentions an author’s name for a source but neglects to include specific information. Misinformer The writer provides inaccurate information regarding the sources, making it impossible to find them. The Too-Perfect Paraphrase The writer properly cites a source, but neglects to put quotation marks text that has been copied word to word or close to it. The Resourceful Citer The writer properly cites all sources, paraphrasing and using quotation appropriately. But it contains no original work. The Perfect Crime The writer properly quotes and cites sources in some places, but goes on to paraphrase other arguments from those sources without citation.

Editor's Notes

  1. Copyright (or author's right) is a legal term used to describe the rights that creators have over their literary and artistic works.