Professional Documents
Culture Documents
Social and Prof Issues Module2
Social and Prof Issues Module2
Social and Prof Issues Module2
Module No. 2
Subject Code : IT 225
Subject Description : SOCIAL AND PROFESSIONAL ISSUES
Term : 2nd Semester 2023-2024
I. Learning Objectives:
- Determine how computing is changing who we are.
- Discuss computing and vulnerable groups.
- Discuss autonomous and pervasive technology..
1|Page
III. Learning Resources:
- COMPUTER ETHICS
William John Brinkman / Alton F. Sanders
V. Content Items:
Intellectual property is a category of property that includes intangible creations of
the human intellect. There are many types of intellectual property, and some countries
recognize more than others. The most well-known types are copyrights, patents,
trademarks, and trade secrets.
Intellectual property (IP) is a category of property that includes intangible creations
of the human intellect. There are many types of intellectual property, and some
countries recognize more than others. The most well-known types are copyrights,
patents, trademarks, and trade secrets.
When a business or an individual has an idea that they want to protect from being used
by others without their permission, it is best to seek legal protection of that intellectual
property.
By seeking property rights over your intellectual property — property that is a creation
of the mind, such as an invention, symbol, or even a name.
You establish rightful ownership and prevent the unlawful use of your property.
2|Page
What’s more, establishing intellectual property rights can help to fuel the economy and
stimulate further innovation.
Your intellectual property includes the intangible assets you create for your business,
such as names, designs, and automated processes. And just like tangible possessions,
your intellectual property needs to be monitored and protected.
1. Trademarks
Trademarks are the names, phrases, and symbols that differentiate your brand from
others in your industry. They must be distinctive and used in commerce to sell or
promote a product or service.
Examples: Words, symbols, names, colors, or sounds that identify where your goods
and services come from.
While you're not required to register a trademark with the United States Patent and
Trademark Office (USPTO) to protect your trademark nationally, having a registered
trademark can make it easier to challenge anyone who infringes on your trademark
rights.
Federal trademarks last as long as you use them with the public to promote your goods
or services. Trademark registration generally costs between $225 and $400 (not
including lawyers' fees).1 To see if your desired trademark is available, you can begin
3|Page
searching the USPTO website or with a general internet search. A trademark lawyer can
help you do a more detailed search to determine the availability of your desired
trademark.
2. Copyrights
A copyright grants legal rights to anything you create that expresses or embodies an
idea. It gives you exclusive rights to copy, distribute, reproduce, display, and license the
work.
Examples:
Software
Architectural designs
Graphic arts
Books
Databases
How you can protect them: Like trademarks, you have some rights to your original work
without registering the copyright at the U.S. Copyright Office. However, registering can
give you more leverage if you ever need to take an infringer to court. For instance, if an
employee writes an article or takes a photo within the scope of his employment, the
employer is the copyright owner automatically. However, an independent contractor
who writes an article or takes a photo will be the copyright owner of that asset (unless
he transfers the copyright through a written assignment agreement).
A copyright empowers you to profit from your creative assets. You can sell your
copyrighted assets and lease them in exchange for license fees and royalties.
A new copyright owned by an individual typically lasts 70 years after the death of the
copyright owner. A copyright owned by a corporation or other legal entity will last 95
years from the first date the work is used with the public. You can file to register a
copyright with the United States Copyright Office. The current online application fee for
basic registrations is $35 to $55.
4|Page
3. Patents
Patents are granted for new, useful inventions, and they will give you the right to
prevent others from making, using, or selling your invention. 3
Examples:
How you can protect them: Patent applications can be filed with the USPTO in the
United States, and internationally in the patent offices of the applicable country or
region. Utility and plant patents have a term of 20 years, while design patents have a
term of 15 years. They require a nonrefundable filing fee, along with issue, service, and
maintenance fees. This can add up to thousands of dollars, but some small
businesses qualify for discounts.
Before submitting your patent application, you can (but are not required to) use
the USPTO database to search existing patents and published patent applications to see
if your concept has comparatively novel features. A patent lawyer can also help you do
a more thorough search to determine the availability of patent protection for your
concept. The patent lawyer can also help you investigate whether any third parties have
patents that could prevent you from bringing your product or service to market.
4. Trade secrets
A trade secret is a piece of confidential business information whose secrecy gives you
an advantage over your competitors.
How you can protect them: Though trade secrets cannot be registered, they are
protected by staying secret. Ways to keep a trade secret under wraps include creating a
policy that explains who can access your trade secrets and how they're protected,
having new employees sign nondisclosure agreements before granting them access to
secrets, and keeping staff up-to-date on your policies with yearly training. You can take
5|Page
legal action against those who misappropriate your trade secrets, but you must be able
to prove the secret was obtained through illegal means.
Intellectual property rights can help you establish your brand identity, profit off
your unique assets, and prevent others from using your creations.
Licensing Issues
Anything that is not public domain has a copyright, possibly more than one. Under U.S.
federal law, the authors of a work hold copyright even if there is no copyright notice.
Who counts as an author under copyright law can be complicated, especially for
software that has been worked on by many hands. This is why licenses are important.
They can authorize uses of code in ways that would be otherwise impermissible under
copyright law and, drafted appropriately, can protect users from arbitrary actions by the
copyright holders.
In the proprietary software world, the license terms are designed to protect the
copyright. They're a way of granting a few rights to users while reserving as much legal
territory as possible for the owner (the copyright holder). The copyright holder is very
important, and the license logic so restrictive that the exact technicalities of the license
terms are usually unimportant.
As will be seen below, the copyright holder typically uses the copyright to protect the
license, which makes the code freely available under terms he intends to perpetuate
indefinitely. Otherwise, only a few rights are reserved and most choices pass to the
user. In particular, the copyright holder cannot change the terms on a copy you already
have. Therefore, in open-source software the copyright holder is almost irrelevant —
but the license terms are very important.
Normally the copyright holder of a project is the current project leader or sponsoring
organization. Transfer of the project to a new leader is often signaled by changing the
copyright holder. However, this is not a hard and fast rule; many open-source projects
have multiple copyright holders, and there is no instance on record of this leading to
legal problems. Some projects choose to assign copyright to the Free Software
Foundation, on the theory that it has an interest in defending open source and lawyers
available to do it.
6|Page
Why Software Licensing Is Important
Here are five types of common software license models you should know about. Four
are examples of open source licenses (which allow you to reuse code to some extent),
and one disallows any reuse whatsoever.
Public domain.
This is the most permissive type of software license. When software is in the public
domain, anyone can modify and use the software without any restrictions. But you
should always make sure it’s secure before adding it to your own codebase. Warning:
Code that doesn’t have an explicit license is NOT automatically in the public domain.
This includes code snippets you find on the internet.
Permissive.
Permissive licenses are also known as “Apache style” or “BSD style.” They contain
minimal requirements about how the software can be modified or redistributed. This
type of software license is perhaps the most popular license used with free and open
source software. Aside from the Apache License and the BSD License, another common
variant is the MIT License.
LGPL.
The GNU Lesser General Public License allows you to link to open source libraries in
your software. If you simply compile or link an LGPL-licensed library with your own
code, you can release your application under any license you want, even a proprietary
license. But if you modify the library or copy parts of it into your code, you’ll have to
release your application under similar terms as the LGPL.
7|Page
Copyleft.
Copyleft licenses are also known as reciprocal licenses or restrictive licenses. The most
well-known example of a copyleft or reciprocal license is the GPL. These licenses allow
you to modify the licensed code and distribute new works based on it, as long as you
distribute any new works or adaptations under the same software license. For example,
a component’s license might say the work is free to use and distribute for personal use
only. So any derivative you create would also be limited to personal use only. (A
derivative is any new software you develop that contains the component.)
The catch here is that the users of your software would also have the right to modify
the code. Therefore, you’d have to make your own source code available. But of course,
exposing your source code may not be in your best interests.
Proprietary.
Of all types of software licenses, this is the most restrictive. The idea behind it is that
all rights are reserved. It’s generally used for proprietary software where the work may
not be modified or redistributed.
8|Page
Data Privacy describes the practices which ensure that the data shared by customers is
only used for its intended purpose. In a world with ever-growing mountains of big data,
privacy is an increasing topic of scrutiny.
Information privacy is the right of individuals to have control over how their personal
information is collected and used. Many consider data privacy to be the most significant
consumer protection issue today. One factor which contributes to this is growing
technological sophistication, and the resulting types of data collected.
US data privacy laws are regulated at the federal level. There are a growing number of
data privacy laws by state. One example is the California Consumer Privacy Act (CCPA).
A data privacy officer or compliance officer within each organization will ensure the
practices and programs that comply with these laws. Compliance requirements for data
privacy are getting more complex as different jurisdictions enact their data protection
laws.
Jurisdictions including federal, states, and international bodies like the European Union
are enacting new data privacy regulations. New regulations get enacted thanks to
growing awareness among citizens and lawmakers who may not be data or technical
experts. High-profile data breaches have created heightened concern about how data
may be protected and kept private. Most regulators can exact hefty fines to enforce
their data privacy requirements. Consumer and regulator concern about protecting
sensitive data means jurisdictions are passing new data privacy acts and penalties to
enforce them.
9|Page
First, the fines and penalties written into data privacy regulations can be quite steep.
For example, under the EU’s General Data Protection Regulation (GDPR), organizations
can be fined 4% of annual global revenue or 20 million euros. Beyond the potential
punitive costs, cost-savings are possible benefits of a program that addresses key data
privacy issues. Data protection regulations like GDPR require not only safeguarding user
data, but also responding and sharing data upon request. Clean, efficient processes for
the organization to meet these data governance obligations can reap substantial cost-
savings.
In January 2019, Cisco reported that two-thirds of companies say they are seeing sales
delays due to data privacy questions from their customers. Violations of data privacy
erode consumer, investor, and stakeholder trust in the organization. When a
stakeholder has doubts about the organization’s ability to prevent identity theft, they
may be unwilling to conduct business with that organization. Conversely, this awareness
makes people more likely to do business with organizations that understand their
obligations under consumer data privacy laws. An organization that demonstrates a
solid understanding of data privacy principles is often seen as a leader in their category.
Healthy data privacy programs are only possible with investment and support from the
leadership team. Smart corporate board directors will grasp the value of this approach.
Data privacy principles are the policies and procedures governing who may access the
data. This includes people within the organization or department that has been granted
access. Therefore, it’s possible to have a healthy security stance without addressing
data privacy basics. However, it’s not possible to ensure data privacy without a solid
security stance.
Organizations that implement a healthy data privacy program reduce the number of
security incidents that result in privacy breaches. Fewer breaches mean the business
does not lose trust. Guarding against this erosion of trust is important to prevent losing
10 | P a g e
customers or other types of business. It also saves the business from fines, multi-year
penalties, or civil suits which often follow on significant breaches.
Besides an impact on the business, consider that data privacy issues can hurt the
individuals affected. Loss of personally identifiable information can negatively impact
individual users, customers or citizens. Cases have been reported of data subjects
dealing with breach and privacy problems for decades after data loss. Beyond the
punitive impacts enshrined in data protection regulations, an organization may be held
liable by the individual for these issues.
Forbes reported in 2014 that 46% of organizations suffered damage to their reputation
and brand value as a result of a privacy breach. The benefits of complying with data
privacy laws grow in clarity every day in a world where new jurisdictions are passing
their own data protection regulations.
Any software hosted in the cloud or on the web should be fully vetted and
secure before deploying within an otherwise secure organization. Have a data
privacy compliance checklist to protect your program before installing
something new.
Every member of your team should be fully trained and aware of the data
privacy basics for which they are responsible. Care given to crafting and
enforcing a corporate data privacy policy can ensure this is successful.
Personal data should be kept only as long as the relationship with the
customer or employee (and related legal obligations) are in effect. Your
11 | P a g e
organization can incur significant fines under the EU’s General Data Protection
Regulation (GDPR) if this program does not perform this function.
Ensure every customer, vendor, user or investor can understand your privacy
policies, terms and conditions. Ensure they are clear on what they are
agreeing to, and on the obligations to which they are subscribing.
Collecting data should always be done with a specific purpose for which
consent has been received. Most data protection laws and regulations
mandate an organization may not collect more data than is required for the
transaction. A data privacy consent form can help explain your company’s
policies and what the user is consenting to.
Always use secure channels and protocols (e.g. SFTP, TLS) to transmit
sensitive data. When data is exposed through insecure channels (e.g. FTP,
HTTP), incidents can occur.
12 | P a g e
11.Extra Credit: Dealing With the Unknown
Ensure your team, procedures, and command line are prepared for
unexpected contingencies. The big data privacy challenges of the modern
business landscape present new threats and compliance challenges on a
regular basis. A healthy program for data governance security and privacy can
adapt and adjust to keep your organization compliant and secure.
Healthcare records
Criminal justice investigations and proceedings
Financial institutions and transactions
Biological traits, such as genetic material
Residence and geographic records
Ethnicity
Privacy breach
Location-based service and geolocation
The challenge in data privacy is to share data while protecting personally
identifiable information. The fields of data security and information security
design and utilize software, hardware and human resources to address this
issue. As the laws and regulations related to Data Protection are constantly
changing, it is important to keep abreast of any changes in the law and
continually reassess your compliance with data privacy and security regulations.
Information types
Various types of personal information often come under privacy concerns.
Internet
The ability to control the information one reveals about oneself over the Internet,
and who can access that information, has become a growing concern. These
concerns include whether email can be stored or read by third parties without
consent, or whether third parties can continue to track the web sites someone
has visited. Another concern is web sites which are visited collect, store, and
possibly share personally identifiable information about users.
13 | P a g e
The advent of various search engines and the use of data mining created a
capability for data about individuals to be collected and combined from a wide
variety of sources very easily. The FTC has provided a set of guidelines that
represent widely accepted concepts concerning fair information practices in an
electronic marketplace called the Fair Information Practice Principles.
In order not to give away too much personal information, e-mails should be
encrypted and browsing of webpages as well as other online activities should be
done trace-less via anonymizers, or, in cases those are not trusted, by open
source distributed anonymizers, so-called mix nets, such as I2P – The Onion
Router or Tor.
Email isn’t the only Internet use with concern of privacy. Everything is accessible
over the Internet nowadays. However a major issue with privacy relates back to
social networking. For example, there are millions of users on Facebook, and
regulations have changed. People may be tagged in photos or have valuable
information exposed about themselves either by choice or most of the time
unexpectedly by others. It is important to be cautious of what is being said over
the Internet and what information is being displayed as well as photos because
this all can searched across the web and used to access private databases
making it easy for anyone to quickly go online and profile a person.
able television
The ability to control what information one reveals about oneself over cable
television, and who can access that information. For example, third parties can
track IP TV programs someone has watched at any given time.
Medical
A person may not wish for their medical records to be revealed to others. This
may be because they have concern that it might affect their insurance coverages
or employment. Or it may be because they would not wish for others to know
about medical or psychological conditions or treatments which would be
embarrassing. Revealing medical data could also reveal other details about one’s
personal life. Privacy Breach There are three major categories of medical privacy:
informational (the degree of control over personal information), physical (the
degree of physical inaccessibility to others), and psychological (the extent to
which the doctor respects patients’ cultural beliefs, inner thoughts, values,
feelings, and religious practices and allows them to make personal
decisions). Physicians and psychiatrists in many cultures and countries have
standards for doctor-patient relationships which include maintaining
confidentiality. In some cases, the physician-patient privilege is legally protected.
These practices are in place to protect the dignity of patients, and to ensure that
patients will feel free to reveal complete and accurate information required for
them to receive the correct treatment. The United States has laws governing
privacy of private health information, see HIPAA and the HITECH Act.
14 | P a g e
Financial
Locational
Political
Political privacy has been a concern since voting systems emerged in ancient times. The
secret ballot is the simplest and most widespread measure to ensure that political views
are not known to anyone other than the voter him/herself—it is nearly universal in
modern democracy, and considered to be a basic right of citizenship. In fact even
where other rights of privacy do not exist, this type of privacy very often does.
Educational
In the United Kingdom, in 2012 the Education Secretary Michael Gove described the
National Pupil Database as a “rich dataset” whose value could be “maximized” by
making it more openly accessible, including to private companies. Kelly Fiveash of The
Register said that this could mean “a child’s school life including exam results,
attendance, teacher assessments and even characteristics” could be available, with
15 | P a g e
third-party organizations being responsible for anonymizing any publications
themselves, rather than the data being anonymized by the government before being
handed over. An example of a data request that Gove indicated had been rejected in
the past, but might be possible under an improved version of privacy regulations, was
for “analysis on sexual exploitation.”
Legality
The legal protection of the right to privacy in general – and of data privacy in particular
– varies greatly around the world.
There is a significant challenge for organizations that hold sensitive data to achieve and
maintain compliance with so many regulations that have relevance to information
privacy.
On the Internet you almost always give away a lot of information about yourself:
Unencrypted e-mails can be read by the administrators of the e-mail server, if the
connection is not encrypted (no https), and also the Internet service provider and other
parties sniffing the traffic of that connection are able to know the contents.
Furthermore, the same applies to any kind of traffic generated on the Internet (web-
browsing,instant messaging, among others) In order not to give away too much
personal information, e-mails can be encrypted and browsing of webpages as well as
other online activities can be done traceless via anonymizers, or, in cases those are not
trusted, by open source distributed anonymizers, so called mix nets. Renowned open-
source mix nets are I2P – The Anonymous Network or tor.
The main difference between mediation and arbitration is the process used to solve
your conflict. Both options will help you solve a legal issue outside of the traditional
court process, but they use two different methods to get you from A to Z.
16 | P a g e
Then, those two arbitrators select a third arbitrator, at which point the dispute is
presented to the three chosen arbitrators. Decisions are made by majority vote.
Arbitration and mediation are similar in that they are alternatives to traditional
litigation, and sometimes they are used in conjunction with litigation (opposing parties
may first try to negotiate, and if that fails, move forward to trial). Both arbitration and
mediation employ a neutral third party to oversee the process, and they both can be
binding.
Litigation is generally something people seek to avoid. It's expensive, time consuming,
emotionally draining and unpredictable –- until a judge or jury decides the case, you
can never be certain of the outcome. Because litigation is so inefficient for most of us,
alternative dispute resolution, such as arbitration and mediation, has become
increasingly popular. But before moving forward with possible alternative dispute
resolutions, you should first know the difference between arbitration and mediation.
Mediation enjoys such high success rates because the parties are brought together in
an environment where they can freely and confidentially present their position in front
of a neutral third party. Mediation attempts to limit the issues and put them into proper
perspective. Participants often feel much better after having an opportunity to get
things "off their chest," and also benefit from hearing the other party's point of view.
The neutrality and more relaxed atmosphere of mediation may eliminate the desire to
continue hostile litigation once both parties have seen all the issues in a fair light.
Mediation can be used for any kind of dispute; there is no need to wait until a dispute
results in a lawsuit and is sent to mediation by a judge. Pre-lawsuit mediation is
becoming more widely accepted as a sensible way of resolving disputes before they
turn into litigation. Besides being confidential and non-binding, mediation is relatively
quick and inexpensive compared to litigating a dispute.
Please note that while most certified mediators are attorneys, mediators will not give
legal advice during the mediation and are not supposed to make legal conclusions
about the merits of either party's position. When the parties come to an eventual
agreement, the parties themselves will put the agreement in writing and sign it so that
it then becomes a binding contract.
17 | P a g e
Pre-Mediation Contracts
If you want to mediate a dispute, you and the opposing party should enter into a pre-
mediation contract. This simple contract should include the following:
If two or more parties have a dispute that they think may be appropriate for mediation,
they may contact an attorney to advise them on the benefits of mediation versus
litigation and to help them locate a mediator. If the parties like to mediate on their own
without the help of attorneys, then they should contact their state bar association who
will have a list of mediators to contact for an appointment. Alternatively, they can get in
touch with a mediation and/or arbitration organization.
Mediation is a less hostile, less confrontational format for resolving disputes, where
parties attempt to resolve their differences between themselves rather than relying on
an inefficient, expensive, and time-consuming judicial system. Before your litigation
advances, work with your attorney to determine if mediation is right for your case.
Mediation and arbitration have the same ultimate goal: to resolve the dispute and
capture the terms of that resolution in a signed agreement.
18 | P a g e
Mediation
A mediator is neutral, meaning they do not advocate for you or the other party, nor
will they try to push you in one direction or another; you maintain complete control
over what you agree and disagree to. A mediator will only advocate for the
resolution.
This neutrality makes it easier to find a mutually beneficial solution, rather than the
discussion leaning too heavily to one side.
Mediation is generally voluntary, always confidential, and can be used for most non-
criminal issues. It can be used to help solve personal issues like divorce or custody,
or can be used in a business context for issues such as contract disputes.
Arbitration
Like mediation, arbitration makes use of a neutral third party, but instead of being
there to oversee negotiations, the arbitrator is there to act as a judge in a more
formal capacity.
Entering into arbitration typically means that both parties have agreed to operate
under a specific set of rules like those set by the American Arbitration Association,
or JAMS.
During arbitration, each side is given the opportunity to tell their story and submit
relevant documents. Once the arbitrator has had time to review the case, they will
decide who wins and who loses.
19 | P a g e
Why use arbitration?
Save time: Because arbitration is less formal than litigation, it usually takes less time.
You and the other party may also agree to time saving measures like forgoing exchange
of discovery in simple cases.
Save money: Time equals money, and saving time means that you’re also bound to
save a pretty penny.
Allow flexibility: Arbitration does not have the same strict rules you would be expected
to follow in litigation. For example, you may present evidence in arbitration that would
be considered inadmissible in court.
Give you control:Unless otherwise specified in a contract, both parties have the power
to agree on a mediator, agree to time saving actions, and agree to the date and
location of the hearing.
Protect privacy: Unlike litigation, arbitration is a confidential process. If there are
sensitive topics to discuss, trade secrets to maintain, or other topics you don’t want in
the public record, arbitration is a good option.
Find a conclusion: In a binding arbitration, the decision is final, and except in certain
special circumstances, an appeal cannot be made. While this won’t feel ideal if you’re
on the losing side, it does mean that the issue cannot be drawn out and hold you
captive.
The process usually begins with one party, the claimant, sending a notice of
arbitration to the other party.
20 | P a g e
1. The parties in dispute directly select an arbitrator.
2. An arbitrator from an arbitration panel (the American Arbitration Association,
JAMS, etc.) is appointed by the court based on a contract signed by the
disputants.
3. Each disputant will choose an arbitrator, and together, those arbitrators will
choose a third arbitrator to form a panel.
At this point, the claimant will provide a summary of matters in dispute and outline
their proposed reward, and the respondent can provide a statement of response
which will admit or deny the claims. The respondent may also provide a counter
claim.
Once the official claims and responses have been made, there will be a period of
discovery and inspection. Parties are obligated to list the relevant documents in their
control and give the other party time to inspect them.
When the parties agree on the evidence to share, the documents are sent to the
arbitrator to review before the hearing.
During the hearing, both sides are given equal opportunity to present their case
(concerns, evidence, documents, witnesses, etc.).
The arbitrator will take time to review the evidence and deliver the decision.
Litigation is a process for handling disputes in the court system. Litigation is a
contested action, where someone else, such as a judge may make the final decisions
for the parties unless the parties settle before trial. Settlement can happen at any point
during the process.
Is Litigation the same as lawsuit?
“Litigation” is just another way of saying “lawsuit.” The parties involved in a lawsuit are
called litigants. A party to a lawsuit can be an individual person, a business, or an
“entity” like a homeowners' association or government agency. There's a difference
between civil litigation and criminal litigation.
21 | P a g e
What Are the Different Types of Litigation Cases
Criminal Cases
Criminal cases involve the government prosecuting an individual for violating state or
federal laws or allegedly committing a crime. The case is presented before the court by
the prosecutor, a state’s attorney (District Attorney), or the United States Attorney for a
federal crime.
Civil cases
The civil litigation process begins when a person or entity files a dispute against another
person or entity, suing for compensation for damages caused. The judge or jury
listening to the case will then apply the appropriate law to the facts presented in court
by both parties. The plaintiff files a complaint in court seeking monetary compensation,
an injunction, or order as a result of an action by the defendant.
One of the most common cases in civil litigation is personal injury claims. The plaintiff
asks for compensation for damage caused as a result of an action by the defendant.
The argument may be based on negligence, intentional wrongdoing, or strict liability.
Some of the claims filed include auto and motorcycle accidents, medical malpractice,
fraud, personal injury, animal attacks, and many more.
Contract Disputes
Breach of contract claims results from the failure of a person or entity to fulfill their
contractual obligations; thus, the plaintiff files a case in a civil court. The plaintiff asks
for compensation for the non-fulfillment of the contract signed. Some of the matters
handled include violation of business agreements and non-delivery of paid purchase.
Equitable Claims
The aggrieved party may ask the court to issue orders to an individual or entity to halt
an action or to take a specific action. Most cases involve plaintiffs seeking temporary
restraining or reprieve orders against the defendant.
A civil litigation lawyer represents a whole group or class of people filing for
compensation, against an organization, for the many injuries or damage caused to
22 | P a g e
them. Class action suits are complex to litigate and may end in huge compensation
payouts. An example is a group of consumers suing a company for a faulty product or
equipment that caused injury to them.
Divorce, legal separation, and custody disputes fall under civil litigation. The court rules
on breaking the union, sharing of the marital assets, child custody, and support. From
the complex nature of the cases, it would be best to find civil litigation lawyers with a
firm grasp of family law.
Property Disputes
Property cases involve disagreements about property ownership and boundaries. The
court may offer more than monetary compensation, issuing out restriction orders
against the trespasser.
Civil litigation proceedings are usually complex, requiring the professional knowledge of
experienced lawyers to present the cases. If you need a civil litigation lawyer in
Rockwall, TX, you can contact the Law Firm of Patrick Short.
VI. ASSESSMENT:
ASSIGNMENT#1:
23 | P a g e
ASSIGNMENT#2:
a. Medical
b. Financial
c. Locational
d. Political
e. Educational
ACTIVITY#1:
Give an example of ITEMS, and identify the next three columns:
1.
2.
3.
4.
5.
24 | P a g e
ACTIVITY#2:
Cartoon Analysis
1. What do you see in the cartoon? Make a list of the significant things in the
cartoon. How are the characters dressed?
2. What are the characters saying to each other?
3. What is happening in the cartoon? What is copyright infringement?
ACTIVITY#3:
25 | P a g e
QUIZ#1:
Instructions:
People who work in the area of intellectual property use lots of interesting vocabulary
words. Wrap your mind around some of that vocabulary so that you can be ready for
the next class. Use the vocabulary words below to fill in the blanks in these definitions.
Vocabulary words:
© Fair use Service mark
® Federal law Trade name
Copyright Goodwill Trade secret (undisclosed information)
26 | P a g e
clothing, watches, DVDs, foods, and pharmaceuticals, but virtually any type of product
can be counterfeited.
5. _____________________ is a concept under copyright law that allows someone to
use a copyrighted work, or part of work, without permission from the owner of the
work. News reporting, research, and teaching are normally considered fair uses.
6. _____________________ is a symbol used in the United States to give notice that a
work is protected by copyright. This symbol is normally followed by the name of the
owner of the copyright and the year of publication. You do not need to own a copyright
registration to use this symbol. Anyone who is the owner of the copyrights in an original
copyrightable work can use it.
7. A _____________________ is a word, name, symbol, sound, color(s), or device that
identifies the goods of one manufacturer or source and distinguishes them from the
goods of someone else. Famous trademarks include Coca-Cola and Pepsi for soda
products. _____________________can be registered and renewed indefinitely provided
they are used in commerce.
8. A _____________________ is a word, name, symbol, sound, color(s), or device that
identifies the services of one service provider and distinguishes them from the services
of someone else.
9. Otherwise known as a "commercial name", a _____________________is a name
used to identify a person's or entity's business or occupation. They are mostly used for
identification purposes for things like taxes, licenses, and contracts. They symbolize the
reputation of a business as a whole, unlike trademarks and service marks which
symbolize the reputation of the source for the quality of goods and services.
10. A _____________________otherwise known as an internet website address, is a
series of alphanumeric strings separated by periods, such as washingtonpost.com, that
identifies one or more addresses for computer network connections on the Internet.
11. _____________________ refers to the reputation, prestige and renown of a
business and is considered a key ingredient in the success of a business. It is not
tangible like a business' building or fleet of trucks, but is often just as valuable, or more
valuable, than such tangible assets.
12. _____________________ is a symbol used in the United States and in other parts
of the world to give notice that a mark is a registered trademark. In the United States,
this symbol indicates that an individual/company has registered the trademark or
service mark with the United States Patent and Trademark Office. If you do not own an
active trademark or service mark registration, you cannot use this symbol in connection
with your mark.
27 | P a g e
13. A _____________________ gives the person who owns it the right to stop other
people from making, using, or selling the invention (like a new drug). They are obtained
by filing a patent application in the U.S. Patent Office, which examines the application.
The U.S. Patent Office grants one of these if the invention is new, useful, and non-
obvious. If it is granted, it is valid for up to 20 years from the day the patent application
was filed.
14. A _____________________gives the person who owns it the right to stop other
people from making, using, or selling articles that copy the appearance of an article that
is shown in the design patent (like the decorations on a sneaker, or the shape of an
iPod® brand digital music player). These patents are obtained by filing an application in
the U.S. Patent Office, which examines the application. The U.S. Patent Office will grant
the patent if the design is new, original, and ornamental. If it is granted, it is valid for
14 years after the day the patent is granted.
15. _____________________is a warning applied to articles to let everyone know that
an application for a patent or design patent to protect some aspect of the article has
been filed in the U.S. Patent Office, but the application has not yet been approved.
Anyone who copies the article should be careful because a patent could cover the
article, and any person who copies the article might infringe the patent if one is issued.
16. A _____________________is a formula, process, device, or other business
information that has commercial value and is kept confidential to maintain an
advantage over competitors.
17. _____________________refers to copying of another person’s idea or work and
claiming it as your own.
18. _____________________ is the act of producing copies of items designed to mimic
legitimate products for distribution without permission from the owner of the intellectual
property rights in the authentic products.
19. _____________________is the body of law created by the Congress of the United
States to apply nationally to all matters of interstate commerce and the rights of the
people under the Constitution of the United States. This body of law pre-empts all other
laws that are in conflict.
20. _____________________refers to creations of the mind: inventions, literary and
artistic works, confidential information, and symbols, names, images, and designs used
in commerce.
28 | P a g e
QUIZ#2:
1. A dispute resolution method where a mediator assists parties to exchange ideas,
information or possible alternatives.
a. Mediation
b. Conciliation
c. Arbitration
d. Facilitation
2. An informal dispute resolution method where the two parties discuss the issues
before a conciliator who will assist the parties to reach an agreement.
a. Mediation
b. Arbitration
c. Conciliation
d. Judicial determination
a. Mediation
b. Facilitation
c. Arbitration
d. Judicial Determination
4. A dispute resolution method where both parties present their case before an
independent arbitrator who will make a final and binding decision.
a. Arbitration
b. Conciliation
c. Judicial Determination
d. Mediation
a. True
b. False
a. True
b. False
a. True
b. False
14. In ... an arbitrator or arbitration tribunal decides on the outcome of the case.
30 | P a g e
a. litigation
b. mediation
c. arbitration
d. negotiation
15.In ... , an independent third party helps the disputing parties to reach a
settlement.
a. litigation
b. mediation
c. arbitration
d. negotiation
Approved by:
31 | P a g e