Professional Documents
Culture Documents
Mil Module 8&9
Mil Module 8&9
1. Intellectual property, such as literary works, artistic works, creations, styles, marks,
titles, pictures, computer code, refers to any intellectual creation. Intellectual property
law exists for the protection of authors and includes fields such as copyright, trademark
law and patents. Furthermore Intellectual property is an umbrella concept that
encompasses both copyright and industrial property, such as copyright.
2. Intellectual property has five types, namely copyright, patent, trademark, industrial
design and geographical design. Copyright is the legal protection extended to the owner
of the rights in an original work. Patent refers to an exclusive right granted for an
invention. A trademark is a word, a group of words, sign, symbol, logo or a combination
thereof that identifies and differentiates the source of the goods or services of one entity
from those of others while Industrial design constitutes the ornamental or aesthetic
aspect of an article. Lastly, Geographical indications means any indications which
define the goods as originating in the territory of a country or a region or locality in that
territory, provided a given quality reputation or other characteristics of the product are
attributable to its geographical origin.
3. The similarities of fair-use and creative commons are they both protecting oneself
from violating the use of copyrighted works.
4. Infringement happens when you use, copy, reproduce or distribute ones work without
the express consent, written approval or permission from the owner.
WHAT I CAN DO
2. The intellectual property violated in the picture is copyright because the databases is
copied. Do not copy, share or alter without seeking permission from the owner.
3. It it obviously Trademark because it has similar logo and I think they use that logo
unregistered. Do a research. Before you settle on a logo, make sure it is not already
trademarked.
4. This is copyright infringement because first, you copy the drawing of the owner and
second you also post it without permission. If it’s not your original work, don’t use it
unless you have the permission of the owner. Also, if you can’t access the owner of that
work, just put credit on it or just create your own idea on what to draw.
ASSESSMENT
ACTIVITY 1
1. Tourism slogan “Pilipinas Kay Ganda” drew criticism a week after its launch in 2010
after its logo had a striking similarity to Poland’s “Polska,” from the font and the colors to
the use of a tree. An application where users can make a personalized name logo with
the tagline “Kay Ganda” then made the rounds on social media sites as Filipinos made
fun of the alleged plagiarism committed by the advertising agency tapped by DOT.
Slogans are often used to capture the attention of the audience it is trying to reach. It is
a hard and complicate job and to avoid controversies they should always create a
unique tourism slogan and avoid plagiarism.
2. Senator Tito Sotto, who became the talk of the town for his speeches on his stand on
reproductive health, parts of which were allegedly copied from several blogs and
websites. Sotto’s first reaction was to deny the charge, but his staff later admitted that
some parts of the speech were indeed copied from a blog, but supposedly only for
reference. To avoid these kind of problems, make sure you have the permission of the
owner or at least credit them. But is is much better if you will never use or make speech
that is not yours, think of a strong argument for your speech.
ACTIVITY 2
1. Fair use
2. ©
3. Copyright
4. Piracy
5. Industrial Design
6. 50 years
7. Infringement
8. Creative commons
9. Patent
1. Cybercrime refers to any crime or any illegal activities using technology such as
cellphone, computer an etc. through communication tools like social media sites.
4. We can protect ourselves from cybercrime by securing our information, thinking twice
before posting something, Be cautious when opening emails from financial institutions,
Use strong passwords, keep your settings private, ignore unsolicited emails and protect
your devices and computer. Be mindful of which website URLs you visit.
ASSESSMENT