Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

LESSON 6:Intellectual Property, Copyright and Fair

Use Guidelines
(GROUP 4 )

The origins of the Internet go back to the 1960’s. It had many milestones from then until now.
Internet has changed business, education, government, healthcare, and even the ways in which
we interact with our loved ones. It became one of the key drivers of social evolution. The
changes in social communication are one of its particular significance. Most communication
barriers have been removed because of the internet

Copyright is a legal device authorizing the creator of a literary piece, artistic work, musicals or
other creative compositions the sole right to publish and sell such work. Copyright owners
have the right to control the reproduction of their work, including the right to receive payment
for that reproduction. An author may grant or sell those rights to others, including publishers
or recording companies. Violation of such right is called infringement.

- Copyright is a legal device authorizing the creator of a literary piece, artistic work,
musicals or other creative compositions the sole right to publish and sell such work
Copyright law gives creators of original material the exclusive right to further use and
duplicate that material for a given amount of time, at which point the copyrighted item
becomes public domain. (KENTON, 2020)

Plagiarism is an instance of using or closely imitating the language and thoughts of another
author without authorization; the representation of that author's work as one's own, as by not
crediting the original.

✓ Plagiarism is an instance of using or closely imitating the language and thoughts of another
author without authorization

Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text
message by someone posing as a legitimate institution to lure individuals into providing
sensitive data such as personally identifiable information, banking and credit card details, and
passwords. The information is then used to access important accounts and can result in
identity theft and financial loss.
- Phishing is a cybercrime in which a target or targets are contacted by email, telephone
or text message by someone posing as a legitimate institution to lure individuals into
providing sensitive data

Cyberbullying is bullying that takes place online

Computer addiction is the excessive use of computers to the extent that it interferes with
daily life.

(GROUP 5)

Digital divide is an economic inequality between groups in terms of access to, use of, or
knowledge of ICT

*The fair use of a copyrighted work for criticism, comment, news, reporting, teaching
including multiple copies for classroom use, scholarship, research and similar purposes is not
an infringement of copyright.

Decompilation which is the reproduction of the code and translation of the forms of the
computer programs to achieve the inter-operability of an independently created computer
program with other programs, may also constitute fair use.

TO DETERMINE WHETHER USE OF A WORK CONSTITUTES FAIR USE, THE FOLLOWING


FACTORS ARE CONSIDERED:

1. The purpose and character of the use, including whether such use is of a commercial nature
or is for non-profit educational purposes;

2. The nature of the copyrighted work;

3. The amount and substantiality of the portion used in relation to the copyrighted work as a
whole; and 4. The effect of the use upon the potential market for or value of the copyrighted
work.

Republic Act No. 8293 or the Intellectual Property Code of the Philippines

An act prescribing the intellectual property code and establishing the intellectual
property office, providing for its powers and functions, and for other purposes .
It shall protect and secure the exclusive rights of scientists, inventors, artists and other
gifted citizens to their intellectual property and creations, particularly when beneficial to the
people, for such periods as provided in this act. The use of intellectual property bears a social
function.

-END-
CASE ANALYSIS: Computer addiction

1. Read the news article on computer addiction: “Four in ten teenage girls 'are addicted to
internet: Youngsters increasingly showing signs of compulsion with their tablets and smart
phones.”

2. Access this website https://www.dailymail.co.uk/news/article-2623903/Four-


tenteenage-girls-addicted-internet-Youngsters-increasingly-showing-signs-compulsiontablets-
smart-phones.html

3. After reading the article, answer the following questions:

• From the research, do boys and girls share the same Internet usage? Explain your
answer. Cite statistics or data.

• Cite one real life example in your school or community of teenagers who have
experienced computer addiction. What happened to them? Have they recovered from their
addiction?

• Give two pieces of advice from tablets for schools to avoid computer addiction.

You might also like