SlideShare a Scribd company logo
1 of 34
LESSON 13:
INFORMATION
CONTROL
AND PRIVACY
LEARNING OUTCOMES
• Apply the laws in real-life scenarios.
• Explain the importance of the laws in
information management in the
Philippines.
INFORMATION CONTROL
• Information control is a mechanism where the control actions
are of implicit, indirect nature, and the information given to the
controlled object is an informative picture, which is used by the
object to work out an allegedly autonomous line of behavior.
• In terms of information handling, there are two most-talk laws
in the Philippines related to this 1. Intellectual Property Act of
the Philippines, 2. Data Privacy Act, and 3. Freedom of
Information Act.
INTELLECTUAL PROPERTY
(REPUBLIC ACT NO. 8293)
• Intellectual property (IP) is a legal concept that refers to creations
of the mind for which exclusive rights are recognized. It is An Act
Prescribing the Intellectual Property Code and Establishing “The
Intellectual Property Office, Providing for Its Powers and
Functions, and for Other Purposes. Section 1 of this Act state that
this act shall be known as the "Intellectual Property Code of the
Philippines.“
• According to the World Intellectual Property Organization (WIPO),
intellectual property (IP) is divided into two categories: industrial
property and copyright. Industrial property includes inventions
(patents), trademarks, industrial designs, and geographic
indications of source, while copyright includes literary and
artistic works such as novels, poems, plays, films, musical works,
The term “Intellectual Property Rights"
consists of:
• Copyright and Related Rights
• Trademarks and Service Marks
• Geographic Indications
• Industrial Designs
• Patents
• Layout-Designs (Topographies) of Integrated Circuits
• Protection of Undisclosed Information
THE INTELLECTUAL PROPERTY OFFICE OF
THE PHILIPPINES (IP PHILIPPINES)
• Is the government agency in charge of the implementation of
the law protecting intellectual property rights in the Philippines
as provided for under RA 8293 or the Intellectual Property Code
of the Philippines and the revised IP Code of the Philippines
known as RA 10372.
COPYRIGHT
• Is a collection of rights that
automatically vest to someone
who creates an original work of
authorship – like a literary work,
song, movie, or software. These
rights include the right to
reproduce the work, to prepare
derivative works, to distribute
copies, and to perform and
display the work publicly.
COPYRIGHT
• Terms of Protection: Generally, throughout the author's life
plus 50 years after his or her death. Penalty: 1st offense-Php
50,000.00 to Php 150,000.00 and/ or 1-3 years imprisonment;
2nd offense- Php 150,000.00 to Php 500,000.00 and/ or 3-6
years imprisonment. 3rd offense- Php 500,000.00 to 1.5 M
and/or 6-9 years of imprisonment.
TRADEMARK
• Is a word, phrase, symbol,
and/or design that identifies
and distinguishes the source
of the goods of one party from
those of others.
• While a service mark is a word,
phrase, symbol, and/or design
that identifies and
distinguishes the source of a
service rather than goods.
Some examples include brand
TRADEMARK
• The term "trademark" is often used in a general sense to refer
to both trademarks and service marks. Terms of Protection: 10
years from the application's filing date. Penalty: Php 50,000.00
to Php 200,000.00 and 2 to 5 years imprisonment.
GEOGRAPHICAL INDICATION (GI)
• Is a sign used on products
with a specific geographical
origin and possesses
qualities or a reputation
due to that origin—for
example, Mangoes of Cebu,
Cashew nuts of Palawan,
etc.
INDUSTRIAL DESIGN
• May consist of three-
dimensional features, such
as the shape of an article,
or two-dimensional
features, such as patterns,
lines, or color. For
example, coca-cola bottle
design, iPod/iPhone/iPad,
etc.
PATENT
• Is a grant of a right to the inventor by the government. The
patent gives the inventor (or patent holder, if the patent has
been assigned) the right to exclude others from making or
using the invention for a selected period. Terms of Protection:
20 years (time-bound). Penalty: not less than Php 100,000.00
to not more than Php 300,000.00 and/ or not less than six
months to not more than three years imprisonment.
LAYOUT DESIGNS (TOPOGRAPHIES) OF
INTEGRATED CIRCUITS
• Are a three-dimensional
arrangement of elements
forming an integrated
circuit intended for
manufacturing. This
arrangement and ordering
of elements follow from the
electronic function that the
integrated circuit is to
UNDISCLOSED INFORMATION
• Refers to information that is secret and has commercial value
because it is secret. For example, scientific information,
formula, code, financial statements, etc., whether tangible or
intangible. Industries and companies need to have information
control, especially in dealing with sensitive industry secrets, by
requiring employees to sign contracts with non-disclosure
agreements (NDAs).
EXAMPLES OF INTELLECTUAL PROPERTY
INFRINGEMENT
• Illegal duplication of a licensed software
• Selling of fake trademarked devices
• Recreating the same patents without further improvement
SECTION 2 OF THIS ACT
• States that the state recognizes that an effective Intellectual
Property system is vital to developing domestic and creative
activity, facilitates technology transfer, attracts foreign
investments, and ensures market access for our products. It
shall protect and secure the people's exclusive rights,
particularly when beneficial to the people.
DIGITAL RIGHTS MANAGEMENT (DRM)
• It is used to describe the processes by which the author or
publisher of work exerts their rights to control what the
purchaser of the work is entitled to do. It represents the control
by which one can prevent a person or an organization from
copying, printing, editing, or making privileged information
available to others.
• While information gets to be disseminated faster to consumers,
control as to how it is shared becomes an issue. Downloading
pirated music online does not help music artists, as they are
deprived of the royalties they are entitled to.
Techniques designed to control access and
reproduction of online information:
• Encryption - It is converting data or information so that only
authorized parties can understand. Its primary purpose is to protect
the confidentiality of digital data stored on computer systems or
transmitted via the Internet or other computer networks.
• Serial keys - Also known as a product or software key, it is a series of
alphanumeric characters acting as a key to denote that the product or
software is original.
• Scrambling - Data scrambling is done to hide sensitive information
from authorized users. Scrambling is accomplished by adding
components to the original signal or changing some important
component of the original signal to make extracting the original signal
difficult.
INFORMATION PRIVACY
DATA PRIVACY ACT OF 2012 (REPUBLIC ACT 10173)
• This act aims to safeguard every individual's right to privacy
while ensuring the free flow of information for innovation,
growth, and national development.
SCOPE
• Defines rights of data subjects
• Provides parameters for securing, processing, and providing
access to personal information by any natural and juridical
person in the government or private sector.
• Imposes penal and pecuniary sanctions for unlawful use or
disclosure of information.
SEC. 1 THIS ACT SHALL BE KNOWN AS THE
“DATA PRIVACY ACT OF 2012”
• According to this Act, it is the policy of the State to protect the
fundamental human right of privacy, of communication while
ensuring the free flow of information to promote innovation
and growth. The State recognizes the vital role of information
and communications technology in nation-building and its
inherent obligation to ensure that personal information in
information and communications systems in the government
and the private sector are secured and protected.
SCOPE
• This Act applies to the processing of all types of personal
information and to any natural and juridical person involved in
personal information processing, including those personal
information controllers and processors who, although not
found or established in the Philippines, use equipment that is
located in the Philippines, or those who maintain an office,
branch or agency in the Philippines subject to the immediately
succeeding paragraph: Provided, That the requirements of
Section 5 are complied with.
PERSONAL INFORMATION
• It refers to any information from which an individual's identity
is apparent or can be ascertained by the entity holding the
information or when put together with other information that
would directly and certainly identify an individual.
Sensitive Personal Information may be
defined as
• Race, ethnic origin, marital status, age, color, and religious,
philosophical, or political affiliations
• Health, education, genetic or sexual life, or to any proceeding for
any offense committed or alleged to have been committed by a
person, the disposal of such proceeding, or the sentence of any
court in such proceedings
• Issued by government agencies peculiar to an individual, e.g.,
social security numbers, previous or current health records,
licenses or their denials, suspension or revocation, tax returns
• Specifically established by an executive order or an act of
Congress to be kept classified.
GENERAL PRINCIPLES
• Collection must be for a declared, specified, and legitimate
purpose
• Personal information shall be processed fairly and lawfully
• Processing should ensure data quality
• Personal information shall not be retained longer than
necessary
• Any authorized further processing shall have adequate
safeguards
What acts are punishable under the DPA?
ACTS PUNISHABLE PENALTY
Unauthorized processing of personal
information
Imprisonment-1 to 3 years Fine - P500K to
P2M
Unauthorized processing of sensitive personal
information
Imprisonment-3 to 6 years Fine - P500K to
P4M
Accessing personal information due to
negligence
Imprisonment-1 to 3 years Fine - P500K to
P2M
Accessing sensitive personal information due
to negligence
Imprisonment-3 to 6 years Fine - P500K to
P4M
Improper disposal of personal information Imprisonment-6 months to 2 years Fine -
P100K to P500k
Improper disposal of sensitive personal
information
Imprisonment-1 to 3 years Fine - P100K to
P1M
Processing of personal information for
unauthorized purposes
Imprisonment-1 year & 6 mos. to 5 years Fine
- P500K to P1M
Processing of sensitive personal information
for unauthorized purposes
Imprisonment-2 to 7 years Fine - P500K to
P2M
Unauthorized access or intentional breach Imprisonment-1 to 3 years Fine - P500K to
P1M
DEPARTMENT OF INFORMATION AND
COMMUNICATIONS TECHNOLOGY ACT OF
2015 (REPUBLIC ACT NO. 10844)
• Another law that is closely related to the management of
information and communication technology is RA 10844, or the
Department of Information and Communications Technology
Act of 2015.
• It is the institution of the Department of Information and
Communication Technology with its mandate that it shall be
the primary policy, planning, coordinating, implementing, and
administrative entity of the Executive Branch of the government
that will plan, develop and promote the national ICT
development agenda.
• This Act indicates a clear intention of the Philippines
government to establish control over and develop and direct
ICT infrastructure and regulation in the country. It is considered
vital to national development, economic confidence, and
growth.
The Declaration of Policy of this act state
that
(a)To recognize the vital role of information and communication
in nation-building;
(b)To ensure the provision of £ strategic, reliable, cost-efficient
and citizen-centric information and communications
technology (ICT) infrastructure, systems, and resources as
instruments of good governance and global competitiveness;
(c)To ensure universal access to quality, affordable, reliable, and
secure Id' services;
(d)To promote the development and widespread use of emerging
ICT and foster and accelerate the convergence of ICT and ICT-
enabled facilities;
(e) To ensure the availability and accessibility of ICT services in
areas not adequately served by the private sector
(f) To foster an ICT sector policy environment that will promote a
broad marketed development of the ICT and ICT-enabled services
(1CT-ES) sectors, a level playing field, a partnership between the
public and private sectors, strategic alliance with foreign investors,
and balanced investments between high-growth and economically-
depressed areas;
(g) To promote and assist the development of local ICT content,
applications, and services which may include support for ICT-based
start-up enterprises through strategic partnerships;
(h) To promote the use of ICT for the enhancement of key public
services, such as education, public health and safety, revenue
generation, and socio-civic purposes;
(i) To encourage the use of ICT for the development and promotion
(j) To promote digital literacy, ICT expertise, and knowledge-
building among citizens to enable them to participate and compete
in an evolving ICT age:
(k) To empower, through the use of ICT, the disadvantaged
segments of the population, including the elderly, persons with
disabilities, and indigenous and minority groups;
(l) To ensure the rights of individuals to privacy and confidentiality
of their personal information;
(m) To ensure the security of critical ICT infrastructures including
information assets of the government, individuals, and businesses;
and
(n) To provide oversight over agencies governing and regulating the
ICT sector and ensure consumer protection and welfare, data
THANK YOU!
GROUP MEMBERS:
ESPINOSA, EDREI I.
GALPO, MARIELLE LOISE TUISA
HADJI NAIF, SITTIE AFNAH NORAINAH
JAMAL, SALICH ABAGA
BSCE – 2A

More Related Content

Similar to Lesson-13_IT-REPORT.pptx. Information technology

Chapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxChapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptx
RomanoGabrillo1
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issues
Sagar Rahurkar
 

Similar to Lesson-13_IT-REPORT.pptx. Information technology (20)

4514611.ppt
4514611.ppt4514611.ppt
4514611.ppt
 
Cyber securitylaw
Cyber securitylawCyber securitylaw
Cyber securitylaw
 
Pubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkPubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David Mink
 
Media Laws in the Philippines
Media Laws in the PhilippinesMedia Laws in the Philippines
Media Laws in the Philippines
 
FOIL
FOILFOIL
FOIL
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
Chapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxChapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptx
 
Legal&ethical presentation wk6_barnett
Legal&ethical presentation wk6_barnettLegal&ethical presentation wk6_barnett
Legal&ethical presentation wk6_barnett
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management
 
Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...
 
RTI
RTIRTI
RTI
 
Information-Control.pptx
Information-Control.pptxInformation-Control.pptx
Information-Control.pptx
 
Lorson Resources Limited - Records & Information Presentation: Data Protectio...
Lorson Resources Limited - Records & Information Presentation: Data Protectio...Lorson Resources Limited - Records & Information Presentation: Data Protectio...
Lorson Resources Limited - Records & Information Presentation: Data Protectio...
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issues
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
LESSON 7.pptx
LESSON 7.pptxLESSON 7.pptx
LESSON 7.pptx
 
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptxOVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Open Government Data: Understanding Open Access vs. Public Domain
Open Government Data: Understanding Open Access vs. Public DomainOpen Government Data: Understanding Open Access vs. Public Domain
Open Government Data: Understanding Open Access vs. Public Domain
 

Recently uploaded

DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
Health
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 

Recently uploaded (20)

kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 

Lesson-13_IT-REPORT.pptx. Information technology

  • 2. LEARNING OUTCOMES • Apply the laws in real-life scenarios. • Explain the importance of the laws in information management in the Philippines.
  • 3. INFORMATION CONTROL • Information control is a mechanism where the control actions are of implicit, indirect nature, and the information given to the controlled object is an informative picture, which is used by the object to work out an allegedly autonomous line of behavior. • In terms of information handling, there are two most-talk laws in the Philippines related to this 1. Intellectual Property Act of the Philippines, 2. Data Privacy Act, and 3. Freedom of Information Act.
  • 4. INTELLECTUAL PROPERTY (REPUBLIC ACT NO. 8293) • Intellectual property (IP) is a legal concept that refers to creations of the mind for which exclusive rights are recognized. It is An Act Prescribing the Intellectual Property Code and Establishing “The Intellectual Property Office, Providing for Its Powers and Functions, and for Other Purposes. Section 1 of this Act state that this act shall be known as the "Intellectual Property Code of the Philippines.“ • According to the World Intellectual Property Organization (WIPO), intellectual property (IP) is divided into two categories: industrial property and copyright. Industrial property includes inventions (patents), trademarks, industrial designs, and geographic indications of source, while copyright includes literary and artistic works such as novels, poems, plays, films, musical works,
  • 5. The term “Intellectual Property Rights" consists of: • Copyright and Related Rights • Trademarks and Service Marks • Geographic Indications • Industrial Designs • Patents • Layout-Designs (Topographies) of Integrated Circuits • Protection of Undisclosed Information
  • 6. THE INTELLECTUAL PROPERTY OFFICE OF THE PHILIPPINES (IP PHILIPPINES) • Is the government agency in charge of the implementation of the law protecting intellectual property rights in the Philippines as provided for under RA 8293 or the Intellectual Property Code of the Philippines and the revised IP Code of the Philippines known as RA 10372.
  • 7. COPYRIGHT • Is a collection of rights that automatically vest to someone who creates an original work of authorship – like a literary work, song, movie, or software. These rights include the right to reproduce the work, to prepare derivative works, to distribute copies, and to perform and display the work publicly.
  • 8. COPYRIGHT • Terms of Protection: Generally, throughout the author's life plus 50 years after his or her death. Penalty: 1st offense-Php 50,000.00 to Php 150,000.00 and/ or 1-3 years imprisonment; 2nd offense- Php 150,000.00 to Php 500,000.00 and/ or 3-6 years imprisonment. 3rd offense- Php 500,000.00 to 1.5 M and/or 6-9 years of imprisonment.
  • 9. TRADEMARK • Is a word, phrase, symbol, and/or design that identifies and distinguishes the source of the goods of one party from those of others. • While a service mark is a word, phrase, symbol, and/or design that identifies and distinguishes the source of a service rather than goods. Some examples include brand
  • 10. TRADEMARK • The term "trademark" is often used in a general sense to refer to both trademarks and service marks. Terms of Protection: 10 years from the application's filing date. Penalty: Php 50,000.00 to Php 200,000.00 and 2 to 5 years imprisonment.
  • 11. GEOGRAPHICAL INDICATION (GI) • Is a sign used on products with a specific geographical origin and possesses qualities or a reputation due to that origin—for example, Mangoes of Cebu, Cashew nuts of Palawan, etc.
  • 12. INDUSTRIAL DESIGN • May consist of three- dimensional features, such as the shape of an article, or two-dimensional features, such as patterns, lines, or color. For example, coca-cola bottle design, iPod/iPhone/iPad, etc.
  • 13. PATENT • Is a grant of a right to the inventor by the government. The patent gives the inventor (or patent holder, if the patent has been assigned) the right to exclude others from making or using the invention for a selected period. Terms of Protection: 20 years (time-bound). Penalty: not less than Php 100,000.00 to not more than Php 300,000.00 and/ or not less than six months to not more than three years imprisonment.
  • 14. LAYOUT DESIGNS (TOPOGRAPHIES) OF INTEGRATED CIRCUITS • Are a three-dimensional arrangement of elements forming an integrated circuit intended for manufacturing. This arrangement and ordering of elements follow from the electronic function that the integrated circuit is to
  • 15. UNDISCLOSED INFORMATION • Refers to information that is secret and has commercial value because it is secret. For example, scientific information, formula, code, financial statements, etc., whether tangible or intangible. Industries and companies need to have information control, especially in dealing with sensitive industry secrets, by requiring employees to sign contracts with non-disclosure agreements (NDAs).
  • 16. EXAMPLES OF INTELLECTUAL PROPERTY INFRINGEMENT • Illegal duplication of a licensed software • Selling of fake trademarked devices • Recreating the same patents without further improvement
  • 17. SECTION 2 OF THIS ACT • States that the state recognizes that an effective Intellectual Property system is vital to developing domestic and creative activity, facilitates technology transfer, attracts foreign investments, and ensures market access for our products. It shall protect and secure the people's exclusive rights, particularly when beneficial to the people.
  • 18. DIGITAL RIGHTS MANAGEMENT (DRM) • It is used to describe the processes by which the author or publisher of work exerts their rights to control what the purchaser of the work is entitled to do. It represents the control by which one can prevent a person or an organization from copying, printing, editing, or making privileged information available to others. • While information gets to be disseminated faster to consumers, control as to how it is shared becomes an issue. Downloading pirated music online does not help music artists, as they are deprived of the royalties they are entitled to.
  • 19. Techniques designed to control access and reproduction of online information: • Encryption - It is converting data or information so that only authorized parties can understand. Its primary purpose is to protect the confidentiality of digital data stored on computer systems or transmitted via the Internet or other computer networks. • Serial keys - Also known as a product or software key, it is a series of alphanumeric characters acting as a key to denote that the product or software is original. • Scrambling - Data scrambling is done to hide sensitive information from authorized users. Scrambling is accomplished by adding components to the original signal or changing some important component of the original signal to make extracting the original signal difficult.
  • 20. INFORMATION PRIVACY DATA PRIVACY ACT OF 2012 (REPUBLIC ACT 10173) • This act aims to safeguard every individual's right to privacy while ensuring the free flow of information for innovation, growth, and national development.
  • 21. SCOPE • Defines rights of data subjects • Provides parameters for securing, processing, and providing access to personal information by any natural and juridical person in the government or private sector. • Imposes penal and pecuniary sanctions for unlawful use or disclosure of information.
  • 22. SEC. 1 THIS ACT SHALL BE KNOWN AS THE “DATA PRIVACY ACT OF 2012” • According to this Act, it is the policy of the State to protect the fundamental human right of privacy, of communication while ensuring the free flow of information to promote innovation and growth. The State recognizes the vital role of information and communications technology in nation-building and its inherent obligation to ensure that personal information in information and communications systems in the government and the private sector are secured and protected.
  • 23. SCOPE • This Act applies to the processing of all types of personal information and to any natural and juridical person involved in personal information processing, including those personal information controllers and processors who, although not found or established in the Philippines, use equipment that is located in the Philippines, or those who maintain an office, branch or agency in the Philippines subject to the immediately succeeding paragraph: Provided, That the requirements of Section 5 are complied with.
  • 24. PERSONAL INFORMATION • It refers to any information from which an individual's identity is apparent or can be ascertained by the entity holding the information or when put together with other information that would directly and certainly identify an individual.
  • 25. Sensitive Personal Information may be defined as • Race, ethnic origin, marital status, age, color, and religious, philosophical, or political affiliations • Health, education, genetic or sexual life, or to any proceeding for any offense committed or alleged to have been committed by a person, the disposal of such proceeding, or the sentence of any court in such proceedings • Issued by government agencies peculiar to an individual, e.g., social security numbers, previous or current health records, licenses or their denials, suspension or revocation, tax returns • Specifically established by an executive order or an act of Congress to be kept classified.
  • 26. GENERAL PRINCIPLES • Collection must be for a declared, specified, and legitimate purpose • Personal information shall be processed fairly and lawfully • Processing should ensure data quality • Personal information shall not be retained longer than necessary • Any authorized further processing shall have adequate safeguards
  • 27. What acts are punishable under the DPA? ACTS PUNISHABLE PENALTY Unauthorized processing of personal information Imprisonment-1 to 3 years Fine - P500K to P2M Unauthorized processing of sensitive personal information Imprisonment-3 to 6 years Fine - P500K to P4M Accessing personal information due to negligence Imprisonment-1 to 3 years Fine - P500K to P2M Accessing sensitive personal information due to negligence Imprisonment-3 to 6 years Fine - P500K to P4M Improper disposal of personal information Imprisonment-6 months to 2 years Fine - P100K to P500k Improper disposal of sensitive personal information Imprisonment-1 to 3 years Fine - P100K to P1M Processing of personal information for unauthorized purposes Imprisonment-1 year & 6 mos. to 5 years Fine - P500K to P1M Processing of sensitive personal information for unauthorized purposes Imprisonment-2 to 7 years Fine - P500K to P2M Unauthorized access or intentional breach Imprisonment-1 to 3 years Fine - P500K to P1M
  • 28. DEPARTMENT OF INFORMATION AND COMMUNICATIONS TECHNOLOGY ACT OF 2015 (REPUBLIC ACT NO. 10844) • Another law that is closely related to the management of information and communication technology is RA 10844, or the Department of Information and Communications Technology Act of 2015. • It is the institution of the Department of Information and Communication Technology with its mandate that it shall be the primary policy, planning, coordinating, implementing, and administrative entity of the Executive Branch of the government that will plan, develop and promote the national ICT development agenda.
  • 29. • This Act indicates a clear intention of the Philippines government to establish control over and develop and direct ICT infrastructure and regulation in the country. It is considered vital to national development, economic confidence, and growth.
  • 30. The Declaration of Policy of this act state that (a)To recognize the vital role of information and communication in nation-building; (b)To ensure the provision of £ strategic, reliable, cost-efficient and citizen-centric information and communications technology (ICT) infrastructure, systems, and resources as instruments of good governance and global competitiveness; (c)To ensure universal access to quality, affordable, reliable, and secure Id' services; (d)To promote the development and widespread use of emerging ICT and foster and accelerate the convergence of ICT and ICT- enabled facilities;
  • 31. (e) To ensure the availability and accessibility of ICT services in areas not adequately served by the private sector (f) To foster an ICT sector policy environment that will promote a broad marketed development of the ICT and ICT-enabled services (1CT-ES) sectors, a level playing field, a partnership between the public and private sectors, strategic alliance with foreign investors, and balanced investments between high-growth and economically- depressed areas; (g) To promote and assist the development of local ICT content, applications, and services which may include support for ICT-based start-up enterprises through strategic partnerships; (h) To promote the use of ICT for the enhancement of key public services, such as education, public health and safety, revenue generation, and socio-civic purposes; (i) To encourage the use of ICT for the development and promotion
  • 32. (j) To promote digital literacy, ICT expertise, and knowledge- building among citizens to enable them to participate and compete in an evolving ICT age: (k) To empower, through the use of ICT, the disadvantaged segments of the population, including the elderly, persons with disabilities, and indigenous and minority groups; (l) To ensure the rights of individuals to privacy and confidentiality of their personal information; (m) To ensure the security of critical ICT infrastructures including information assets of the government, individuals, and businesses; and (n) To provide oversight over agencies governing and regulating the ICT sector and ensure consumer protection and welfare, data
  • 34. GROUP MEMBERS: ESPINOSA, EDREI I. GALPO, MARIELLE LOISE TUISA HADJI NAIF, SITTIE AFNAH NORAINAH JAMAL, SALICH ABAGA BSCE – 2A