SlideShare a Scribd company logo
1 of 32
ADVANCE
EDUCATIONAL
TECHNOLOGY
MA. NIDA A. BALDELOBAR
SST-1
TOPICS
DEEP WEB KNOWLEDGE
EDUCATIONAL COPYRIGHT
KNOWLEDGE
DEEP WEB
KNOWLEDGE
COPYRIGHT
EDUCATION
FOR
TEACHERS
COPYRIGHT
- is a form of protection provided by the laws
to the authors of ‘original works of authorship,’
including literary, dramatic, musical, artistic,
and certain other intellectual works. This
protection is available to both published and
unpublished works” (Library of Congress).
WHAT
IS VIOLATED
BOOKS ARE
In 1790, the first Copyright Act was enacted in the
United States. Since that time there have been many
revisions to the law. The Copyright Act Revision of 1976
added the “fair use” clause. “The Copyright Act of 1976
grants a numberof exclusive rights to copyright owners,
including: reproduction right, distribution right, right
to create adaptations, and performance and display rights”
(Stanford University Libraries).
HISTORY OF COPYRIGHT
| Copyright Law LEGAL ISSUES on
COPYRIGHT LAW
RA 8293
WHAT
IS VIOLATED
BOOKS ARE
Its called the Intellectual Property
Code of the Philippines or
Republic Act 8293 or specifically
the law on COPYRIGHT.
WHAT
IS VIOLATED
BOOKS ARE
Philippine Copyright Law
• is enshrined in the Intellectual Property Code of the Philippines,
officially known as Republic Act No. 8293.
• law is partly based on United States copyright law
• principles of the Berne Convention for the Protection of Literary and
Artistic Works.
• also protect patents, trademarks, and other forms of intellectual
property.
• There are laws that protect copyrights: the Optical Media Act (which
protects music, movies, computer programs, and video games) is an
example of such.
• enforced through a body established by the law: the Intellectual
Property Office, or IPO, and its various branches.
WHAT
IS VIOLATED
BOOKS ARE
WH Y AR E C O P YR IG H T LAWS
IM P O R TAN T TO TEAC H ER S ?
 because there are limitations that they
must know and should make the right
decisions when copying protected
materials. In addition, educators are
given special privileges called “fair use”
that should be known when copying
protected materials.
WHAT
IS VIOLATED
BOOKS ARE
“Fair use is a copyright principle based on the
belief that the public is entitled to freely use
portions of copyrighted materials for
purposes of commentary and criticism”
(Stanford University Libraries).
WHAT IS FAIR USE?
WHAT
IS VIOLATED
BOOKS ARE
FAIR USE
Since the copyright law
prohibits the unauthorized
use of copyrighted
materials while allowing
criticism, teaching,
research, news reporting,
etc., certain privileges are
given to teachers for
particular uses of
copyright works.
WHAT
IS VIOLATED
BOOKS ARE
Four factors are used in determining Fair Use
Purpose and character of the use
Nature of the copyrighted work
Amount and substantiality of
the material used
 The effect of use on the
potential market of the work
WHAT
IS VIOLATED
BOOKS ARE
The INTELLECTUAL
PROPERTYCODE
SPLITS WORKS THAT
MAYBE COPYRIGHTED
WHAT
IS VIOLATED
BOOKS ARE
WHAT
IS VIOLATED
BOOKS ARE
LEGAL ACTION
on COPYRIGHT
INFRINGEMENT
WHAT
IS VIOLATED
BOOKS ARE
The Intellectual Property Code gives the power
of mediating copyright problems (before,
during, and after the copyright application
process) to a bureau of the Intellectual Property
Office known as the Bureau of Legal Affairs, as
covered by Section 10 of the code. This body is
empowered with the following functions:
WHAT
IS VIOLATED
BOOKS ARE
1. Hear objections on items being applied for copyright
2. Address copyright violations where damages are no less than 200,000
pesos
a. Give the following penalties for copyright violations:
i. Issue cease and desist orders which have a fixed time where the
copyright violator must stop violating the copyright being infringed
ii. Accept voluntary orders of compliance or discontinuance as ordered by
the Director of Legal Affairs which must consist of the following:
iii. Assurance to comply with the intellectual property law violated
iv. Assurance to refrain from unlawful activity on the case being
investigated
v. Assurance to refund, replace, recall, or repair defective products
vi. Assurance to reimburse the complainant (usually the copyright holder)
of all charges, fees, and payments related to the case
vii.Seizure of the products that have been subject to infringement
viii. Forfeiture of all paraphernalia and properties (whether real or
personal) involved with the infringement
WHAT
IS VIOLATED
BOOKS ARE
ix. Imposition of administrative of fines no less than 50,000
pesos but no more than 300,000 pesos. For every day of
continued violation, a fine of 5,000 pesos is imposed.
x. Cancellation of any document (permit, registration, etc.)
attributed to the product at the discretion of the Director
of Legal Affairs xi. Withholding of any document pending
approval of the Bureau from the respondent (the
copyright violator) xii. Assessment of damages xiii.
Censorship of the product xiv. Other penalties in line with
Executive Order 983 (1983)
WHAT
IS VIOLATED
BOOKS ARE
References:
• The Lawphil Project. 6 June 1997. Republic Act No. 8293. 9 May 2011.
<http://www.lawphil.net/statutes/repacts/ra1997/ra_8293_1997.html>
• The Lawphil Project. 6 June 1997. RepublicAct No. 8293. 9 May 2011.
<http://www.lawphil.net/statutes/repacts/ra1997/ra_8293_1997.html
WHAT
IS VIOLATED
BOOKS ARE
End

More Related Content

Similar to Advance_EdTech_Report.pptx

Copyright presentation
Copyright presentationCopyright presentation
Copyright presentationmarivelcg
 
What is copyright jcholliday=eb
What is copyright jcholliday=ebWhat is copyright jcholliday=eb
What is copyright jcholliday=ebbibliowoman
 
Copyright and Openness
Copyright and OpennessCopyright and Openness
Copyright and Opennessosswatch
 
A violation of copyright law through photocopying in
A violation of copyright law through photocopying inA violation of copyright law through photocopying in
A violation of copyright law through photocopying inAlexander Decker
 
A violation of copyright law through photocopying in
A violation of copyright law through photocopying inA violation of copyright law through photocopying in
A violation of copyright law through photocopying inAlexander Decker
 
Investigative Report - Copyright
Investigative Report - CopyrightInvestigative Report - Copyright
Investigative Report - Copyrightejg29
 
Copyright snapshot2
Copyright snapshot2Copyright snapshot2
Copyright snapshot2frank3589
 
Copyright Essentials
Copyright EssentialsCopyright Essentials
Copyright EssentialsTom Keays
 
Copyright Laws Presentation
Copyright Laws PresentationCopyright Laws Presentation
Copyright Laws PresentationNobleJo
 
Legal and Access issues in Collection Development for Libraries
Legal and Access issues in Collection Development for LibrariesLegal and Access issues in Collection Development for Libraries
Legal and Access issues in Collection Development for LibrariesAllana Delgado
 
DOCUMENT RESUMEED 479 254 IR 022 044AUTHOR Alexander, .docx
DOCUMENT RESUMEED 479 254 IR 022 044AUTHOR Alexander, .docxDOCUMENT RESUMEED 479 254 IR 022 044AUTHOR Alexander, .docx
DOCUMENT RESUMEED 479 254 IR 022 044AUTHOR Alexander, .docxelinoraudley582231
 
PATENTS AND COPYRIGHT
PATENTS AND COPYRIGHTPATENTS AND COPYRIGHT
PATENTS AND COPYRIGHTsreekanthskt
 
Copyright presentation 4
Copyright presentation 4Copyright presentation 4
Copyright presentation 4marivelcg
 

Similar to Advance_EdTech_Report.pptx (20)

Copyright lecture
Copyright lectureCopyright lecture
Copyright lecture
 
Copyright lecture
Copyright lectureCopyright lecture
Copyright lecture
 
Copyright presentation
Copyright presentationCopyright presentation
Copyright presentation
 
What is copyright jcholliday=eb
What is copyright jcholliday=ebWhat is copyright jcholliday=eb
What is copyright jcholliday=eb
 
IPR
IPRIPR
IPR
 
Copyright act
Copyright actCopyright act
Copyright act
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Copyright and Openness
Copyright and OpennessCopyright and Openness
Copyright and Openness
 
A violation of copyright law through photocopying in
A violation of copyright law through photocopying inA violation of copyright law through photocopying in
A violation of copyright law through photocopying in
 
festus and ishola
festus and isholafestus and ishola
festus and ishola
 
A violation of copyright law through photocopying in
A violation of copyright law through photocopying inA violation of copyright law through photocopying in
A violation of copyright law through photocopying in
 
Investigative Report - Copyright
Investigative Report - CopyrightInvestigative Report - Copyright
Investigative Report - Copyright
 
Copyright snapshot2
Copyright snapshot2Copyright snapshot2
Copyright snapshot2
 
Copyright Essentials
Copyright EssentialsCopyright Essentials
Copyright Essentials
 
Copyright Laws Presentation
Copyright Laws PresentationCopyright Laws Presentation
Copyright Laws Presentation
 
Legal and Access issues in Collection Development for Libraries
Legal and Access issues in Collection Development for LibrariesLegal and Access issues in Collection Development for Libraries
Legal and Access issues in Collection Development for Libraries
 
ILL & Copyright: Putting it all Together
ILL & Copyright: Putting it all TogetherILL & Copyright: Putting it all Together
ILL & Copyright: Putting it all Together
 
DOCUMENT RESUMEED 479 254 IR 022 044AUTHOR Alexander, .docx
DOCUMENT RESUMEED 479 254 IR 022 044AUTHOR Alexander, .docxDOCUMENT RESUMEED 479 254 IR 022 044AUTHOR Alexander, .docx
DOCUMENT RESUMEED 479 254 IR 022 044AUTHOR Alexander, .docx
 
PATENTS AND COPYRIGHT
PATENTS AND COPYRIGHTPATENTS AND COPYRIGHT
PATENTS AND COPYRIGHT
 
Copyright presentation 4
Copyright presentation 4Copyright presentation 4
Copyright presentation 4
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Advance_EdTech_Report.pptx

  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 16. COPYRIGHT - is a form of protection provided by the laws to the authors of ‘original works of authorship,’ including literary, dramatic, musical, artistic, and certain other intellectual works. This protection is available to both published and unpublished works” (Library of Congress).
  • 17. WHAT IS VIOLATED BOOKS ARE In 1790, the first Copyright Act was enacted in the United States. Since that time there have been many revisions to the law. The Copyright Act Revision of 1976 added the “fair use” clause. “The Copyright Act of 1976 grants a numberof exclusive rights to copyright owners, including: reproduction right, distribution right, right to create adaptations, and performance and display rights” (Stanford University Libraries). HISTORY OF COPYRIGHT
  • 18. | Copyright Law LEGAL ISSUES on COPYRIGHT LAW RA 8293
  • 19. WHAT IS VIOLATED BOOKS ARE Its called the Intellectual Property Code of the Philippines or Republic Act 8293 or specifically the law on COPYRIGHT.
  • 20. WHAT IS VIOLATED BOOKS ARE Philippine Copyright Law • is enshrined in the Intellectual Property Code of the Philippines, officially known as Republic Act No. 8293. • law is partly based on United States copyright law • principles of the Berne Convention for the Protection of Literary and Artistic Works. • also protect patents, trademarks, and other forms of intellectual property. • There are laws that protect copyrights: the Optical Media Act (which protects music, movies, computer programs, and video games) is an example of such. • enforced through a body established by the law: the Intellectual Property Office, or IPO, and its various branches.
  • 21. WHAT IS VIOLATED BOOKS ARE WH Y AR E C O P YR IG H T LAWS IM P O R TAN T TO TEAC H ER S ?  because there are limitations that they must know and should make the right decisions when copying protected materials. In addition, educators are given special privileges called “fair use” that should be known when copying protected materials.
  • 22. WHAT IS VIOLATED BOOKS ARE “Fair use is a copyright principle based on the belief that the public is entitled to freely use portions of copyrighted materials for purposes of commentary and criticism” (Stanford University Libraries). WHAT IS FAIR USE?
  • 23. WHAT IS VIOLATED BOOKS ARE FAIR USE Since the copyright law prohibits the unauthorized use of copyrighted materials while allowing criticism, teaching, research, news reporting, etc., certain privileges are given to teachers for particular uses of copyright works.
  • 24. WHAT IS VIOLATED BOOKS ARE Four factors are used in determining Fair Use Purpose and character of the use Nature of the copyrighted work Amount and substantiality of the material used  The effect of use on the potential market of the work
  • 25. WHAT IS VIOLATED BOOKS ARE The INTELLECTUAL PROPERTYCODE SPLITS WORKS THAT MAYBE COPYRIGHTED
  • 27. WHAT IS VIOLATED BOOKS ARE LEGAL ACTION on COPYRIGHT INFRINGEMENT
  • 28. WHAT IS VIOLATED BOOKS ARE The Intellectual Property Code gives the power of mediating copyright problems (before, during, and after the copyright application process) to a bureau of the Intellectual Property Office known as the Bureau of Legal Affairs, as covered by Section 10 of the code. This body is empowered with the following functions:
  • 29. WHAT IS VIOLATED BOOKS ARE 1. Hear objections on items being applied for copyright 2. Address copyright violations where damages are no less than 200,000 pesos a. Give the following penalties for copyright violations: i. Issue cease and desist orders which have a fixed time where the copyright violator must stop violating the copyright being infringed ii. Accept voluntary orders of compliance or discontinuance as ordered by the Director of Legal Affairs which must consist of the following: iii. Assurance to comply with the intellectual property law violated iv. Assurance to refrain from unlawful activity on the case being investigated v. Assurance to refund, replace, recall, or repair defective products vi. Assurance to reimburse the complainant (usually the copyright holder) of all charges, fees, and payments related to the case vii.Seizure of the products that have been subject to infringement viii. Forfeiture of all paraphernalia and properties (whether real or personal) involved with the infringement
  • 30. WHAT IS VIOLATED BOOKS ARE ix. Imposition of administrative of fines no less than 50,000 pesos but no more than 300,000 pesos. For every day of continued violation, a fine of 5,000 pesos is imposed. x. Cancellation of any document (permit, registration, etc.) attributed to the product at the discretion of the Director of Legal Affairs xi. Withholding of any document pending approval of the Bureau from the respondent (the copyright violator) xii. Assessment of damages xiii. Censorship of the product xiv. Other penalties in line with Executive Order 983 (1983)
  • 31. WHAT IS VIOLATED BOOKS ARE References: • The Lawphil Project. 6 June 1997. Republic Act No. 8293. 9 May 2011. <http://www.lawphil.net/statutes/repacts/ra1997/ra_8293_1997.html> • The Lawphil Project. 6 June 1997. RepublicAct No. 8293. 9 May 2011. <http://www.lawphil.net/statutes/repacts/ra1997/ra_8293_1997.html