3. lesson objectives:
▹ Cite practical situation when to
apply knowledge in intellectual
property, copy right, and fair use
guidelines;
▹ Create a campaign add to combat
digital divide, addiction, and
bullying;
3
4. What issues do you see
in the poster?
Which ones do you
understand? Which
one do you not know?
What possible dangers
and issues of ungraded
use of internet are
depicted in the
picture?
Which of these
pictures happened to
your friends? Why did
they happen?
4
5. 5
In contemporary times, the creation
of the human mind is given so much
value to the extent that mechanisms
to protect these creations are put in
place.
One such mechanism is legal and
ethical in nature. We know it today as
the Intellectual property right.
7. 7
intellectual property
▹ Intellectual property (IP) as defined by
the World Intellectual Property
Organization (WIPO), is the “creation of
the mind, such as inventions, literary and
artistic works, designs and symbols,
names, and images used in commerce”.
▹ Since the products of human intellect
have a direct influence on human
civilization and on the development of
societies, there should be safeguards on
intellectual property.
8. 8
TERMS DESCRIPTIONS COVERAGE
Copyright
Legal term used to
describe the rights that
creators have over their
literary and artistic works;
a set of rights granted to
the author or creator of a
work to restrict others’
ability to copy, redistribute,
and reshape the content
(UNESCO, 2011, 182).
Books
Music
Paintings
Sculptures
Films
Computer programs
Databases
Advertisements
Maps
Technical drawings
9. 9
Copyright does not cover
“ideas, procedures,
methods of operation or
mathematical concepts”
because no one person or
institution can claim sole
ownership of these.
Sufficient authorship must
exist for these to be
covered by copyright. Even
titles, slogans, or logos may
or may not have copyright.
10. 10
If you are an author of an particular
work, you are entitled to two types of
rights under a copyright law. These
are the following:
▹ Economic Rights or the rights of
an owner/author to be properly
compensated financially upon his
or her permission for the work to
be used by another; and
▹ Moral Rights or the rights to non-
economic interests of the author.
11. 11
TERMS DESCRIPTIONS COVERAGE
Patent
Provides the patent owner
with the right to decide
how or whether, the
invention can be used by
others in exchange for
this right. The patent
owner makes technical
information about the
invention publicly
available in the published
patent document.
Exclusive right granted
for an invention
12. 12
TERMS DESCRIPTIONS COVERAGE
Trademark
A sign capable of
distinguished goods or
services of one
enterprise from those
of other enterprises
Dates back to ancient
times when craftsmen
used to put their
signature or “mark” on
their products
Products sold or
services offered by
a business entity
13. 13
TERMS DESCRIPTIONS COVERAGE
Industrial Design
Constitutes the
ornamental or aesthetic
aspect of an
article/object
Design of an object
(shape or surface,
patterns, lines, or
colors)
14. 14
TERMS DESCRIPTIONS COVERAGE
Geographical Indication
and Appellation of
Origin
Sign used on goods
that have specific
geographical origin or
possess qualities, a
reputation or
characteristics that are
essentially attributable
to that place of origin
The name of the
place of origin of the
goods/products
15. 15
fair use
▹ The IP law of the Philippines
specifies certain limitations or
exceptions to copyright including
a provision also referred to as fair
use or fair dealing cause.
16. 16
fair use
▹ Fair use limits the rights of holders
who are entitled to reproduce works
for a limited time period.
▹ When you wish to copy an entire
work or portions of it even with the
copyright holder failing to give his or
permission, fair use may be invoked
in certain occasions.
17. 17
fair use
▹ The expiration of a copyright term
empowers the general public to have
unlimited access and use of the work as
it has become part of the “public
domain”.
▹ Anything that is within the realms of
public domain cannot owned by anyone
and has no copyright coverage.
18. 18
So what are the works are covered by fair use?
When the work is:
▹ A criticism or a commentary;
▹ A parody;
▹ A news report;
▹ An artistic expression or artifact;
▹ Scholarly and research works;
▹ A product of a time-shifting device such as a TV program recorder; or
▹ An information found through Web search engines;
19. 19
It becomes available for unlimited use by the public provided
that:
▹ Its use is based on a factual and historical news event;
▹ It is only a small portion of the work and the purpose is a
commentary;
▹ Its use is “transformative”;
▹ It is used solely for the purpose of scholarly analysis; and
▹ It is not infringing and does not hurt the market value of
the copyrighted material.
20. 20
plagiarism
– is the act of
copying
copyrighted
information or
creative work off
the Web, or from
other information
sources, without
properly
acknowledging
the author.
21. some forms of plagiarism
(www.plagiarism.org)
source not cited
▹ ghost writer
▹ photocopy
▹ potluck paper
▹ poor disguise
▹ labor of laziness
▹ self-stealer
source cited
▹ forgotten footnote
▹ misinformer
▹ too-perfect
paraphrase
▹ resourceful citer
▹ perfect crime
21
22. 22
ghost writer
- the writer turns
in another’s work,
word-for-word, as
his or her own.
23. 23
photocopy
- the writer copies
significant
portions of text
straight from a
single source,
without
alternation.
24. 24
potluck paper
- the writer tries to
disguise plagiarism by
copying from several
different sources,
tweaking the
sentences to make
them fit together
while retraining most
of the original
phrasing.
25. 25
poor disguise
- although the writer
has retained the
essential content of
the source, he or she
has altered the
paper’s appearance
slightly by changing
key words and
phrases.
26. 26
labor of
laziness
- the writer takes the
time to paraphrase
most of the paper
from other sources
and make it all fit
together, instead of
spending the same
effort on the original
work.
27. 27
self-stealer
- the writer “borrows”
generously from his or
her previous work,
violating policies
concerning the
expectation of
originality adopted by
most academic
institutions.
28. some forms of plagiarism
(www.plagiarism.org)
source not cited
▹ ghost writer
▹ photocopy
▹ potluck paper
▹ poor disguise
▹ labor of laziness
▹ self-stealer
source cited
▹ forgotten footnote
▹ misinformer
▹ too-perfect
paraphrase
▹ resourceful citer
▹ perfect crime
28
29. 29
forgotten
footnote
- the writer mentions
an author’s name for a
source, but neglects
to include specific
information on the
location of the
material preference.
Tis often masks other
forms of plagiarism by
obscuring source
locations.
30. 30
misinformer
- the writer provides
inaccurate
information regarding
the sources, making it
impossible to find
them.
31. 31
too-perfect
phrase
The writer properly cites
a source, but neglects to
put in quote marks text
has been copied word-
for-word, or close to it.
Although attributing the
basic ideas to the
source, the writer is
falsely claiming original
presentation and
interpretation of the
information.
32. 32
resourceful
citer
- the writer properly cites
all sources, paraphrasing
and using quotations
properly. The catch? The
paper contains almost no
original work!
It is sometimes difficult to
spot this form of
plagiarism because it
looks like any other well-
researched documented.
33. 33
perfect crime
- the writer properly
quotes and cites sources
in some places, but goes
on to paraphrase other
arguments from those
sources without citation.
This way, the writer tries
to pass off the
paraphrased material as
his or her own analysis of
the cited material.
35. 35
digital footprint
When students use the Internet,
they leave behind a digital trail of
what they do and where they go in
search of information.
This trail creates a digital imprint
of their virtual life. This is also
called digital footprint, which
enables some other online users,
including strangers, to identify
them through their online behavior.
36. 36
netiquette
- it refers to observing proper
etiquette as you engaged in
activities over the Internet.
- Online discussion members who
adhere to rules of netiquette
have high respect for the views
and opinions of other members
and have high regard for
courtesy.
37. general guidelines to address
issues related to cyber threats:
▹ think before you create,
share, and post
message online;
▹ post wholesome
pictures and videos all
the time;
▹ protect your computer
and gadgets from
viruses and worms by
checking suspicious
messages and links;
▹ use strong password;
▹ choose the most secure
and trusted digital
resources;
▹ always acknowledge
your sources when used
in writing school
reports and research;
▹ respect other people’s
opinions;
▹ comment on posts
politely and
appropriately;
▹ promote a positive self-
image online;
▹ respect one’s privacy;
37
38. other legal, ethical & social issues
digital divide, addiction, and cyberbullying
39. 39
digital divide
- In the digital age, sources of
information have become readily
available, as we can simply surf the
Internet for answers to our daily
concerns, big or small.
- But not all the place in the
Philippines have access to the
Internet and the mass media; thus,
some people rely on community
elders and officials for information,
especially on indigenous or local
knowledge.
40. 40
digital divide
- Digital divide refers to a situation in
which disparity in access to
Information exists between
information-rich and information-
poor societies.
- Denying people access to
information prevents them from
exercising their freedom of
expression and participating in
civic activities.
41. 41
internet addiction
- The Internet has introduced a
whole new experience to human
civilization. You, being part of the
Information Age, perhaps, have
grown overly reliant on the Internet
for almost everything.
- But excessive use of online media
can interfere with certain
mechanisms that keep flame wars
and cyberbullying at bay.
42. 42
internet addiction
- According to an article at
HealthGuide.org, internet
addiction, “otherwise
known as computer
addiction, online
addiction, or Internet
addiction disorder (IAD),
is an impulse-control
problem.”
43. 43
it can take the form of any of the
following:
▹ cybersex addiction
compulsive use of Internet
pornography, adult chat rooms, or
adult fantasy role-play sites
impacting negatively on real-life
intimate relationships.
44. 44
it can take the form of any of the
following:
▹ cyber-relationship addiction
addiction to social networking, chat
rooms, texting, and messaging to the
point where virtual, online friends
become more important than real-
life relationships with family and
friends.
45. 45
it can take the form of any of the
following:
▹ Net compulsions
such as compulsive online gaming,
gambling, stock trading, or
compulsive use of online auction
sites often resulting in financial or
job-related problems.
46. 46
it can take the form of any of the
following:
▹ information overload
compulsive web surfing or database
searching, leading to lower work
productivity and less social
interaction with family and friends.
47. 47
it can take the form of any of the
following:
▹ computer addiction
obsessive playing of off-line
computer games or obsessive
computer programming.
48. 48
examples of cyberbullying:
▹ text messages or emails composed to
insult or demean;
▹ rumors or false statements spread by
email or posted on social networking
sites; and
▹ humiliating photos, videos, websites, or
fake profiles deliberately shared across
social media.
49. 49
cyberbullying
- refers to bullying that
takes place online, or
using electronic
technology such as cell
phones, computers, and
tablets over
communication tools
including social media
sites, text messages,
chat, and websites.