Professional Documents
Culture Documents
M4 Prof Issues Intellect Prop
M4 Prof Issues Intellect Prop
• RA 8293
Intellectual and • Categories of Intellectual Property
4 5 6
7 8 9
Patent Patent Patent
The basic requirements for a creation to be considered Types of Patents Invention
patentable are that the creation would have a: • Invention • An invention must be a technical solution to issues in any
• novel idea, • Utility Model field of human activity.
• inventive, and • Industrial Design • It may come in may forms such as:
• can be applied in an industrial setting a product,
a device,
a machine, or
a process.
10 11 12
13 14 15
16 17 18
Patent Patent Patent
Utility Model Utility Model Industrial Design
• Utility model is not novel and it is just a part and • A utility model is a technical solution to issues present in any • An industrial design gives a product or handicraft a distinct
improvement of an invention or process while patent is field of human activity. look.
novel. • Utility models must also meet the criteria needed for • It may be 2-Dimensional (lines and colors), 3-Dimensional
• Patent have heavier and longer protection compared to that inventions to be patentable. (shapes) or a combination of both.
of utility model but both have the same format for • Utility models must be of practical utility through its form, • Industrial design registration protects the ornamental or
registration and are under the same law which is the configuration or composition. aesthetic aspects of the product.
Republic Act 8293 or also known as the Intellectual Property
Code. • Novel tools, and products are common examples of objects • The industrial design is good for five (5) years from filing
that can be considered as utility models. date of the application and may be renewed for not more
than two (2) consecutive periods of five (5) years each.
19 20 21
22 23 24
25 26 27
Copyright Copyright Copyright
• A copyright refers to the protection given to the owner of an Other Examples Other Examples
original work covering: • These include books, pamphlets, articles and other • Models or designs for works of art; original ornamental
literary works, writings; periodicals and newspapers; designs or models for articles of manufacture;
musical pieces, • lectures, sermons, addresses, dissertations prepared for • Illustrations, maps, plans, sketches, charts and
paintings, and oral delivery; letters; dramatic or dramatico-musical three-dimensional works relative to geography, topography,
computer programs, compositions; architecture or science;
among others. • choreographic works or entertainment in dumb shows; • Drawings or plastic works of a scientific or technical
musical compositions; character; photographic works including works produced by
• drawing, painting, architecture, sculpture, engraving, a process analogous to photography;
lithography;
28 29 30
31 32 33
34 35 36
Functions of the Intellectual Property Protection for
Intellectual Property Office Software
5. Publish regularly in its own publication the patents, marks, Copyright and Trademark Protection for Software
utility models and industrial designs, issued and approved,
and the technology transfer arrangements registered;
Complications • Copyright is used to protect the parts of a computer
program that are works of creative authorship.
6. Administratively adjudicate contested proceedings
affecting intellectual property rights, and
Surrounding Intangible Example:
• The source of a computer program is a creative work
7. Coordinate with other government agencies and the
private sector efforts to formulate and implement plans Property • Note that very short snippets of code may not be
and policies to strengthen the protection of intellectual copyrighted, because they are not sufficiently original or
property rights in the country. creative.
• Also, the code itself is not always enough to tell you
whether two or more programs are the same.
37 38 39
40 41 42
Intellectual Property Protection for Intellectual Property Protection for Intellectual Property Protection for
Software Software Software
Patents for Software Amazon 1-Click The Patentability of Algorithms
• Can software be patented? Controversy • An algorithm is a mathematically precise set of steps for
• Was the idea sufficiently non-obvious to be considered an computing something.
Example: invention? • Controversy, can a patent be used to protect algorithms?
• Amazon 1-Click • An idea cannot be patented if it would be obvious to skilled • It is not possible to patent a basic mathematical fact.
practitioners
• In 1997, Amazon applied for a patent
• In 1999, the US Patent Office, issued Amazon a patent for
this.
43 44 45
Intellectual Property Protection for Intellectual Property Protection for Intellectual Property Protection for
Software Software Software
The Patentability of Algorithms The Patentability of Algorithms The Creative Commons
Google’s search algorithm. Google’s search algorithm. • In many societies, there are many resources that are not
• Google’s main method for estimating the importance of a • The original PageRank patent did expired January 2019 owned by any one person.
Web Page, the Page Rank algorithm is patented. • Google holds an updated PageRank patent titled “Producing • Example: fish in the ocean, grass on public land, bench on
• This was invented by Larry Page and they were not simple to a ranking for pages using distances in a web-linked graph.” the park.
discover. • This patent uses more inputs that the original PageRank • These resources are called Commons.
• He created a set of formulas for estimating the importance algorithm, and the patent is still effective.
of a Web page.
46 47 48
Intellectual Property Protection for Intellectual Property Protection for Intellectual Property Protection for
Software Software Software
The Creative Commons The Creative Commons The Creative Commons
• Many popular media-sharing Web sites, like Flickr, YouTube, • Music is an interesting case for creative commons. • Creative Commons is working with the e-Law Center of
Google’s Picasa, allow users to set the license terms of their • Is there really such as thing as “free” music? the Arellano University School of Law to create Philippines
content using Creative Commons licenses. jurisdiction-specific licenses from the generic Creative
• Would you consider others to use your photo posted on Commons licenses.
• These makes it easy for other creators to download, reuse social media free of charge?
and remix their work without fear of lawsuits.
• If you need a photograph, you can find something and use
it, as long as you credit the creator.
49 50 51
Intellectual Property Protection for Intellectual Property Protection for Intellectual Property Protection for
Software Software Software
The Creative Commons (Philippines) The Creative Commons (Philippines) The Creative Commons (Philippines)
You are free to: Under the following terms: Notices:
• Share • Attribution • You do not have to comply with the license for elements of
Copy and redistribute the material in any medium or You must give appropriate credit, provide a link to the the material in the public domain or where your use is
format license, and indicate if changes were made. permitted by an applicable exception or limitation.
• Adapt You may do so in any reasonable manner, but not in any
way that suggests the licensor endorses you or your • No warranties are given.
Remix, transform, and build upon the material for any
purpose, even commercially. use. • The license may not give you all of the permissions
• No additional restrictions necessary for your intended use.
You may not apply legal terms or technological • Example - Other rights such as publicity, privacy, or moral
The licensor cannot revoke these freedoms as long as you measures that legally restrict others from doing
follow the license terms. rights may limit how you use the material.
anything the license permits.
52 53 54
Multicultural Perspective Multicultural Perspective Multicultural Perspective
BitTorrent, The Pirate Bay, and the Pirate Party BitTorrent, The Pirate Bay, and the Pirate Party BitTorrent, The Pirate Bay, and the Pirate Party
• Peer-to-Peer (P2P) technology is a way to share music, video • Because virtually anyone can join a P2P network just by • When P2P file sharing software is not configured properly,
and documents, play games, and facilitate online telephone installing particular software, millions of computers could be files not intended for sharing may be accessible to anyone
conversations. connected at one time. on the P2P network.
• The technology enables computers using the same or • Examples: BearShare, LimeWire, KaZaa, eMule, Vuze, • The Federal Trade Commission (FTC), the nation’s consumer
compatible P2P programs to form a network and share uTorrent and BitTorrent protection agency, has written this guide to highlight the
digital files directly with other computers on the network. security problems that can result when organizations allow
their employees – and others with access to their networks
– to use P2P file sharing software.
55 56 57
58 59 60
61 62 63
The Philosophical Foundation of The Philosophical Foundation of
Interdisciplinary Topics
Intangible Property Law Intangible Property Law
Plagiarism, the Web, and Writing The Consequentialist Argument The Consequentialist Argument
• In a creative culture based on remixing, is it acceptable to • Consider Linux operating system, and other open source • Consider Wikipedia, thousands of editors have contributed
cut-and-paste short passages from someone else and use it software products. articles or edits to Wikipedia.
without attribution? • Authors of this open source willingly give up most of their • Contributors do not get paid.
• The argument is that if the new work created by mixing is intellectual property rights. • For those who believe intellectual properties are necessary,
original and authentic overall, it does not matter if some of • Their simple demand: there is a significant debate about how long the “limited
the sentences are taken from elsewhere. time” of monopoly should last.
Be given credit
• Agree or disagree? If you reuse their code in your own code, you make
your code available to be reused in the same way
• Their motivation appears to be altruism, not
compensation.
64 65 66
67 68 69
70 71 72
References Contents
• https://ap.fftc.org.tw/article/531
• Data Privacy
• https://creativecommons.org/licenses/by/3.0/ph/
• https://ndvlaw.com/intellectual-property-protection-in-the-philippines
Philippines • Types of Information
• https://www.chanrobles.com/legal7code.htm#.YEQgRV0zbDI
• https://www.downloadprivacy.com/torrents-in-the-philippines#:~:text=Bittorrent%20technology%20is
%20legal%20in,%2C%20vuze%2C%20deluge%2C%20etc%E2%80%A6
Data Privacy • Exemptions to Data Privacy
• https://www.ftc.gov/tips-advice/business-center/guidance/peer-peer-file-sharing-guide-business
March 2021
• https://www.full-suite.com/blog/beginners-guide-to-intellectual-property-laws-philippines/
• https://www.sunstar.com.ph/article/1745623
• https://www.utc.edu/center-academic-excellence-cyber-defense/course-listing/cpsc3610.php
• wipo.int/edocs/mdocs/aspac/en/wipo_ip_mnl_3_18/wipo_ip_mnl_3_18_p_1.pdf
73
Is there a difference between Are there any exemptions to the Are there any exemptions to the
personal information and sensitive application of the Data Privacy Act? application of the Data Privacy Act?
personal information matter? including:
The Data Privacy Act explicitly states that its provisions are
not applicable in the following cases: (1) The fact that the individual is or was an officer or
• Therefore, any information that can be categorized under employee of the government institution;
any of the enumerated items are considered sensitive (a) Information about any individual who is or was an officer
personal information. or employee of a government institution that relates to the (2) The title, business address and office telephone number of
position or functions of the individual, including: the individual;
(3) The classification, salary range and responsibilities of the
position held by the individual; and
(4) The name of the individual on a document prepared by the
individual in the course of employment with the government;
Are there any exemptions to the Are there any exemptions to the Are there any exemptions to the
application of the Data Privacy Act? application of the Data Privacy Act? application of the Data Privacy Act?
The Data Privacy Act explicitly states that its provisions are The Data Privacy Act explicitly states that its provisions are The Data Privacy Act explicitly states that its provisions are
not applicable in the following cases: not applicable in the following cases: not applicable in the following cases:
(b) Information about an individual who is or was (c) Information relating to any discretionary benefit of a (d) Personal information processed for journalistic, artistic,
performing service under contract for a government financial nature such as the granting of a license or permit literary or research purposes;
institution that relates to the services performed, including given by the government to an individual, including the name
the terms of the contract, and the name of the individual of the individual and the exact nature of the benefit;
given in the course of the performance of those services;
Are there any exemptions to the Are there any exemptions to the Are there any exemptions to the
application of the Data Privacy Act? application of the Data Privacy Act? application of the Data Privacy Act?
The Data Privacy Act explicitly states that its provisions are The Data Privacy Act explicitly states that its provisions are The Data Privacy Act explicitly states that its provisions are not
not applicable in the following cases: not applicable in the following cases: applicable in the following cases:
(e) Information necessary in order to carry out the functions (f) Information necessary for banks and other financial
of public authority which includes the processing of personal institutions under the jurisdiction of the independent, central
data for the performance by the independent, central (g) Personal information originally collected from residents of
monetary authority and law enforcement and regulatory monetary authority or Bangko Sentral ng Pilipinas to comply foreign jurisdictions in accordance with the laws of those
agencies of their constitutionally and statutorily mandated with Republic Act No. 9510, and Republic Act No. 9160, as foreign jurisdictions, including any applicable data privacy
functions. Nothing in this Act shall be construed as to have amended, otherwise known as the Anti-Money Laundering laws, which is being processed in the Philippines.
amended or repealed Republic Act No. 1405, otherwise Act and other applicable laws; and
known as the Secrecy of Bank Deposits Act; Republic Act No.
6426, otherwise known as the Foreign Currency Deposit Act;
and Republic Act No. 9510, otherwise known as the Credit
Information System Act (CISA);
Objectives
Ethics in a Computing Culture
• Why does software fail?
• What are the consequences of software failure?
Thank You Chapter 5 • How can we help prevent software failures from
Trust, Safety, and Reliability occurring in the future?
• The consequences of the faulty program in the chemist • Safety-critical software: software that may affect • Real time: a program must do something within a
conference scenario were not especially costly, but someone’s safety if it fails to work properly specific amount of time
caused a few participants (approx. 300 of a supposed
6,000 chemists) to be inconvenienced. Is this number • Decision point: a place in computer code where the • Multiprocess: programs that execute at the same time
sufficient enough for either the conference organizers or next instruction executed depends on input data as one or more other programs
the programmer to have any ethical responsibility?
Bugs and Public Safety (continued) Bugs and Public Safety (continued) Case: Therac-25
• Many executives of software production companies, as • Brooks’s Law: “Adding people to a late project makes it • Therac-25: machine designed for cancer treatments
well as several famous computer scientists, have later.” – radiation overdose occurred at the Kennestone Oncology Center
asserted that the most important skill needed by a – Adding new people adds new lines of communication, which in Marietta, Georgia in 1985
software developer is the ability to communicate. increase the chances of miscommunication or missed – Less than 2 months later, a woman received a severe radiation
communication burn to her hip from a Therac-25 machine