Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

INFORMATION CONTROL walking back and forth, which

obviously were not part of the


With so much information
film.
around, how do you make sure
they are safe from illegal In the end, you decided
activities? A large to download a torrent file of
requirement for information the film, hoping for a better
control comes from commerce, quality, only to discover that
industry, and copyright owners it was the same pirated video
in general. Information you saw in the pirated DVD.
control comes in the form of
According to The Software
keeping secrets inside a
Alliance (www.bsa.org) (2018),
business or selling IPR
software piracy is “the
(Intellectual Property Rights)
unauthorized copying or
to those prepared to purchase
distribution of copyrighted
it.
software… can be done through
Information control is copying, downloading, sharing,
about allowing those who have selling or installing multiple
appropriate authority access copies of software onto
to and use of information on personal or work computers.”
the basis of the authority Most software has licenses,
that they hold. But why is such as activation keys, that
there a need for control in are normally identified with
the first place? Earlier in just one computer. Having a
this chapter, the concept of pirated software means trying
information being non- to use the same key for
rivalrous and non-exclusive several computers. Some people
has been discussed. An example upload software onto a website
is movies being sold in so others can download it, as
different formats- DVDS, MP4, is the case of using torrent
etc. If that is the case, how to upload/download a movie.
can you make sure that the
Examples of software
said movie will not be
piracy as identified by The
distributed illegally?
Software Alliance (2018)
include:
Software Piracy • Distributing software or
mobile apps from the internet
Let’s say you wanted to
in a manner that violates the
watch the latest movie showing
license terms
in the cinemas. However, you
decided to save the money • Buying a single copy of a
instead, so you bought a software program and
pirated DVD copy of the film installing it on multiple
in one of the market places devices without authorization
you passed by on your way
• Making and/or sharing copies
home. Upon watching it, cinema
of installation CDs
and you can hear the audience
laughing, and see shadows you • Sharing the login
noticed the film was taken by credentials (without
a video camera inside the authorization) used to access
a web-based software form of CDs or DVDs, media
application (“Software as a content can now be searched,
Service”) accessed, and consumed using
multiple devices and even
Some might say, “I paid
through different distribution
for the software already,
networks. One such example is
shouldn’t that be mine to use
Spotify. Consumers before
and distribute wherever and
would buy physical albums in
whenever I want to?” As with
the form of CDs, then later
the discussion earlier this
transitioned to digital copies
chapter regarding information
typically bought via iTunes
having zero-marginal cost,
Store for Apple. However, with
buying a DVD copy of a movie
social media having a big
costing 10 dollars, does not
effect on song reviews and
mean buying the movie itself.
recommendations, a mobile app
Thus, paying for the movie
such as Spotify is able to
does not mean you are buying
create playlists which can be
the actual movie, but paying
listened to, and if wanted,
for the license to watch it
downloaded for a fee. As a
for personal use. So just
result, it is now possible to
because a person bought an
disseminate, find, or consume
original DVD of the movie does
the same content/ information
not mean that he or she can
via multiple devices or
create copies and distribute
distribution networks. This
it or share it online.
convergence of devices and
This typical scenario networks, according to Thierer
boils down to the fact that (2011), has created issues
information is difficult to instead of maintaining an
control. While measures are in effective information control
place, such as DVD region policy.
codes and such, Adam Thierer
Another such example is
in 2011, identified four
an application called VideoFX
issues which further
which is available in Google
complicate the problem on
Play. According to the app
information control: (1)
description, you can “create
convergence, (2) scale, (3)
amazing lip sync music videos
volume, and (4) unprecedented
with special effects and your
individual empowerment/user-
choice of music. Simply select
generation of content.
a music track and start lip
syncing! Make videos that
you’ll be proud to share with
1. Convergence
your friends!” In one mobile
Technological device, you can take a video,
advancements and social media select a saved music file, and
have paved the way for media send it to a social media
content such as music and platform such as Facebook or
movies to be distributed from Twitter. The issue here is,
their “traditional” what if the music used is
distribution platforms. What copyrighted?
consumers used to buy in the
2. Scale 3. Volume
For those who like to Nowadays, news and media
watch Japanese animé and outlets abound in print and
Korean dramas, English online. News agencies such as
subtitles are a must. Before, Manila Bulletin or The
fans would wait days or weeks Philippine Star have not only
before the subtitles become print copies of their news
available for viewing. This is (i.e., newspapers) but also
because the subtitles are digital copies which can be
actually translated, edited, accessed through their
and embedded by fans of the websites mb.com.ph and
show, most of whom are not www.philstar.com,
professionals. Majority of respectively. Broadcasting
them are students and young companies such as ABS-CBN and
adults who simply like GMA7 also have television
watching the series. broadcasts, radio broadcasts,
TV radios, and news websites,
With technology and fast
most of which have the same
internet connectivity, viewers
content. This development can
no longer need to wait days to
be attributed to the
watch the foreign shows with
increasing volume of media
English subtitles. Oftentimes,
content and communications
the subtitles are ready within
activities happening across
a few hours after the show has
the world, greatly
been aired in its local
complicating government
country. This is because the
regulatory efforts to control
internet has given everyone
information.
access to anything they would
like to search, upload, and
download anywhere in the
4. Unprecedented individual
world. Technology such as
empowerment
Google Translate has also
helped make translation of The popularity of social
these shows much faster. media such as Facebook,
Concerns regarding copyright Twitter, and Instagram has
have greatly increased because made it possible for
of this. But while some individuals to post anything
countries such as China and they want. This also includes
North Korea impose certain creation of blogs which have
restrictions on what their become mainstream media for
citizens can and cannot access individuals to showcase their
online, Thierer (2011) talents, skills, and hobbies.
mentions that “the scale of This creates issues when it
modern digital speech and comes to content restriction
content dissemination [still] as most people are doing this
greatly complicates government using their private accounts.
efforts to control information Unless reported, the said
flows.” content will be difficult to
control.
So how do we control IP is any creation or
information dissemination? product of the human mind and
Organizations, such as The may be expressed in the form
Software Alliance, software of original ideas,
industries such as Microsoft expressions, and processes.
and IBM, as well as government Intellectual property rights
entities in countries across (IPR) are the rights given to
the globe, are working hand in persons over their creations.
hand to solve the issue of They usually give the creator
software piracy. One solution an exclusive right over the
they have come up with is use of his or her creation for
identifying exclusive rights a certain period of time.
to information, as with any According to the Intellectual
given physical asset. This has Property Code of the
led to the identification of Philippines (Republic Act No.
intellectual property rights. 8293 s. 1998), IPR consists of
the following:

1. Copyright and related


Intellectual Property (IP)
rights
Intellectual property
2. Trademarks and service
(IP) refers to a number of
marks
distinct types of intangible
assets for which a set of 3. Geographic indications
exclusive rights are
4. Industrial design
recognized. IP includes
musical, literary, and 5. Patents
artistic works such as Taylor
6. Layout designs
Swift’s new album, J. K.
(topographies) of Integrated
Rowling’s new book, and the
Circuits (ICs)
latest iPhone. However, IP is
not just limited to these 7. Protection of undisclosed
items. It can also include information
words, phrases, symbols, and
even designs. Are you familiar
with the following logos found The Intellectual Property
in Figure 4.6? Office of the Philippines (IP
Philippines) is the government
agency in charge of the
implementation of the law
protecting intellectual
property rights in the
Philippines as provided for
under R.A. 8293, or the
Intellectual Property Code of
the Philippines, and the
revised Intellectual Property
Code of the Philippines known
Figure 4.6 Popular logos as R.A. 10372.
Copyright and Related Rights Digital Rights Management
Copyright is a set of Digital rights management
exclusive rights granted by a (DRM) is used to describe the
state to the creator of an processes by which the author
original work or their or publisher of a work exerts
assignee for a limited period his or her rights to control
of time in exchange for public what the purchaser of the work
disclosure of the work, and is entitled to do. This
includes the right to copy, represents the control by
distribute, and adapt the which one can prevent a person
work. Copyright owners on the or an organization from
other hand, is the permission copying, printing, editing, or
can license or permanently otherwise making the
transfer or assign their privileged information
exclusive rights others. available to other people.
Digital rights, granted to
With the introduction of
individuals to legitimately
technology and the internet,
perform actions involving to
the print age is slowly
the use of a computer, any
becoming obsolete with
electronic device, or a
publishers shifting to the
communications network. It is
digital age. Before, a person
particularly related to the
needed to copy or re-print a
protection and realization of
physical book for additional
existing rights in the context
copies. With digital
of new digital technologies,
technologies, copies are made
especially the internet.
at zero cost with minimal
Copyright provides detection. And it is not just
protection for original books. Movies, music, software
expression which includes applications, etc. can now be
literary, artistic, scholarly, copied and shared faster, with
and scientific creations such less cost. With this set-up,
as books, articles, the prevalence of peer-to-peer
newspapers, lectures, letters, (P2P) and torrent sites have
musical compositions, and made information control much
paintings. It also extends to harder.
derivative works such as
While information gets to
illustrations, maps,
be disseminated faster to
photographic works,
consumers, control as to how
advertisements, computer
it is shared becomes an issue.
programs, etc.
Downloading pirated music
In the Philippines, all online does not help the music
copyrighted materials are artists as they are deprived
recorded and stored at the of the royalties they are
National Library or the entitled to. At the same time,
Supreme Court Library (R.A. getting the music for free
10372, 2013). does not mean being safe from
malicious software and hacking
attacks.
Thus, companies and 2. Serial keys
organizations have come up
Also known as a product
with possible solutions to
key or a software key, it is a
this digital dilemma. The
series of alphanumeric
following are techniques
characters acting as a key to
designed to control access and
denote that the product or
reproduction of online
software is original. In some
information:
cases, product keys are used
for product activation. One
such example is Microsoft
1. Encryption
Windows OS. A product key is
Encryption is the process used to activate the operating
of converting data or system online. Online
information in such a way that activation helps maintain
only authorized parties can software authenticity by
understand. Its primary making sure no one else has
purpose is to protect the used the same product key.
confidentiality of digital
data stored on computer
systems or transmitted via the 3. Scrambling
internet or other computer
Data scrambling is done
networks. Encryption occurs
to hide sensitive information
every time someone uses an ATM
from unauthorized users.
or buys something online with
Scrambling is accomplished by
a smartphone, makes a mobile
the addition of components to
phone call, or presses a key
the original signal or the
fob to unlock a car. This is
changing of some important
done so that information being
component of the original
sent is kept safe and secure.
signal in order to make the
DRM systems for extraction of the original
multimedia often encrypt signal difficult. It is often
material in such a way that done with the aid of
only a particular device can encryption.
play or retrieve it, enforcing
While region coding
constraints on how it is used.
identifies which players can
DVDs use an encryption scheme
only play certain DVDs,
to prevent users from viewing
computers with DVD drives
discs on unauthorized players.
become another option for
This is the concept of region
would-be pirates. Thus, the
coding discussed earlier.
content scramble system (CSS)
Region coding prevents discs
was introduced to restrict
sold in one part of the world
access to content only for
from being used on players
licensed applications.
sold in another.
Meaning, even if the DVD was
recognized by the DVD player
in a computer, certain
applications or programs
needed to play the video might
not allow it.
4. Tag embedding Figure 4.7 Apple’s iPod

Similar to how pictures Trademark


can include watermarks to
A trademark is a
denote information on the
distinctive sign used by an
owner of the picture, tag
individual, business
embedding does the same to
organization, or other legal
information content.
entity to identify the
Watermarks are not complete
products or services to
DRM mechanisms in their own
consumers. The mark comes from
right, but are used as part of
a unique source, and it
a system for copyright
distinguishes its product
enforcement, such as helping
(trademark) or services
provide prosecution evidence
(service mark) from the
Du for legal purposes, rather
others. Rights in a mark shall
than direct technological
be acquired through
restriction.
registration made validly in
In terms of data embedded accordance with the provisions
into the actual content, the of the IP code. For marks with
use of metadata is included to geographical indications, a
identify the owner’s name, notice stating that a given
author, and date of purchase, product originates in a given
among other pertinent geographical area must be
information. identified. This is relatively
new in the Philippine IP
regime as marks are identified
based on the territory,
region, or locality
Patent attributed. In the
A patent is a set of Philippines, one of the most
exclusive rights granted by a popular trademarks based on
state to an inventor for a locality is the Pampanga’s
limited period of time in Best delicacies logo.
exchange for the public
disclosure of an invention.
The exclusive right granted to
patentee in most countries is
Protection of Undisclosed
the right to prevent others
Information
from making, using, selling,
or distributing the patented Industries and companies
invention without permission. need to have information
One example of a patented control especially in dealing
design is that of Apple’s with sensitive industry
iPod. secrets. To protect these
industry secrets, also called
trade secrets, companies
usually require employees to
sign contracts with non-
disclosure agreements (NDAs).
Trade secret is the term Terms of Penalty
used for any method, formula, Protection
Copyright Generally, 1st offense:
device, process, or any
throughout $50,000 to
information that gives the the life of P150,000
business a unique competitive the author and/or 1-3
advantage over its plus 50 years
competition. It includes years after imprisonment
his or her
company research and
death. 2nd offense:
development information, P150,000 to
software algorithms, $500,000
inventions, designs, formulas, and/or 3-6
ingredients, and devices, years
imprisonment
among others.
Examples of popular trade 3rd and
subsequent
secrets are the formulation of
offenses:
Coca-Cola and Listerine, and P500,000 to
the recipe of Kentucky Fried $1.5M and/or
Chicken (KFC). 6-9 years
imprisonment
Table 4.2 IPR terms of Patent 20 years Not less
protection and penalties as (time- than
stated in R.A. 8293 bound) $100,000 to
not more
than
P300,000
and/or not
less than 6
months to
not more
than 3 years
imprisonment
Trademark 10 years P50,000 to
from the P200,000 and
date of 2 to 5 years
filing of imprisonment
the
application

You might also like