MELC 8 Intellectual Property Copyright and

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 30

INTELLECTUAL PROPERTY,

COPYRIGHT AND
FAIR USE GUIDELINES
INTELLECTUAL
PROPERTY (IP)

-refers to the creations of the


mind, such as inventions;
literary and artistic works,
designs and symbols, names,
and images used in commerce.

-RA 8293 Intellectual Property


Code of the Philippines.
WORLD INTELLECTUAL PROPERTY
ORGANIZATION (WIPO)

refers to creations of the mind, such as


inventions, literary and artistic works, designs and
symbols, names, and images used in commerce.
is the global forum for intellectual property
services, policy, information, and cooperation.
is the UN agency responsible for treaties
involving copyright, patent, and trademark laws.
WIPO can be a force for progressive change,
helping the world consider public interest and
development needs.
WHY ARE INTELLECTUAL PROPERTY
LAWS NECESSARY?

Intellectual laws are necessary. It protects creations; these


laws and protections also boost innovation by ensuring that
those with profitable ideas are properly rewarded.
Intellectual Property: A product of the intellect that has
value. Intellectual property can be intangible - like an idea.
For example, if you came up with a great way of selling
something you could patent your idea.
RA 10175:
CYBERCRIME
LAW
COPYRIGHT

-is the legal device that gives the creator


of a literary, artistic, musical or other
creative work the sole right to publish and
sell that work.
-is the legal right granted to a creator to
make money from what they create. Items
that can be copyrighted are a form of
intellectual property that is in a
TANGIBLE form. For example, if you
create a song, that is intellectual property.
However, before it can be protected by
copyright, it has to be in a tangible form.
(Written down, recorded, etc.)
A copyright is a type of intellectual property protection extended to authors
of original, creative, fixed works that gives the owner exclusive rights to
expressing the idea(s). It protects written and artistic expressions.
Examples include books, web sites, logos, artwork, commercials, pictorial
and sculptural works, photographs, drawings, graphic designs. Copyright
protects literary or artistic works = books, music, art, film, computer
programs, advertisements, maps.
 There are examples of copyright-like art, literary/creative writing,
academic writing, photography, computer-generated images, videos, music.
A. COPYRIGHT OWNER B. REQUIREMENTS FOR
HAS THE RIGHT TO: COPYRIGHT PROTECTION

1. Original: independently created by the


1. Make copies of their work.
author. It can be similar to other works; it
2. Sell, publish, or distribute can be of any quality and created without
copies. copying from someone else.
2. Physical or fixed in a tangible medium:
3. Prepare new works based on digital (computer, DVD, cell phone,
the tablet) paper, magnetic tape (VCR,
original. cassette).
3. Creative: copyright does not protect
facts (historical, biographical, news,
scientific).
C. Examples of Copyright Protection Limits
1. Published after 1977: the life of the author + 70
years.
2. Published between 1922 - 1978: 95 years after
publication date.
3. Unpublished between 1922 - 1978: the life of the
author + 70 years.
VIOLATION OF A
COPYRIGHT IS CALLED
INFRINGEMENT .
R.A. 8293 OR THE INTELLECTUAL
PROPERTY CODE OF THE PHILIPPINES
REPUBLIC ACT NO. 166, AS AMENDED
[AN ACT TO PROVIDE FOR THE REGISTRATION AND
PROTECTION OF TRADEMARKS, TRADE-NAMES, AND SERVICE-
MARKS, DEFINING UNFAIR COMPETITION AND FALSE MARKING
AND PROVIDING REMEDIES AGAINST THE SAME, AND FOR
OTHER PURPOSES]

Under the former, the term granted is 20 years


renewable for 20-year periods; while under the latter,
the term is for 10 years, renewable for 10-year
periods.
PLAGIARISM

-is an instance of using or


closely imitating the language
and thoughts of another author
without authorization; the
representation of that author's
work as one's own, as by not
crediting the original.
ALL OF THE FOLLOWING ARE
CONSIDERED PL AGIARISM:

 turning in someone else's work as your own


copying words or ideas from someone else without giving
credit
failing to put a quotation in quotation marks
giving incorrect information about the source of a
quotation
changing words but copying the sentence structure of a
source without giving credit
copying so many words or ideas from a source that it
makes up the majority of your work, whether you give
credit or not (see our section on "fair use" rules)
PHISHING

-is a cybercrime in which a target or


targets are contacted by email, telephone
or a text message by someone posing as a
legitimate institution to lure individuals
into providing sensitive data such as
personally identifiable information,
banking, and credit card details, and
passwords. The information is then used
to access important accounts and can
result in identity theft and financial loss.
Phishing is a method of trying to
gather personal details or
information using deceptive
e-mails and websites.
SEVERAL WAYS TO AVOID
PHISHING ATTACK:

1. Never complete a request for personal information that comes in an


email.
2. Only enter personal information on a secure website. You will
know a website is secure if the URL begins with ‘https://’ and if a
lock icon appears in the lower right corner of your internet browser.
Click on that lock icon to view the site’s security certificate.
3. Don’t click on links asking for personal information. Instead, you
go directly to the site in question by typing the URL into your
browser manually.
SEVERAL WAYS TO AVOID
PHISHING ATTACK:

4. Make sure your computer’s antivirus suite has phishing


protection.
5. Make sure your web browser, antivirus, and all of
software programs on your computer are always updated
to the latest versions that have latest security patches.
6. Report any suspicious messages to your bank or social
media platform immediately.
COMMON PHISHING ATTACKS AND
HOW TO PROTECT AGAINST THEM

1. DECEPTIVE PHISHING
refers to any attack by which fraudsters impersonate a legitimate
company and attempt to steal people’s personal information or login
credentials.
2. SPEAR PHISHING
Fraudsters customize their attack emails with the target’s name,
position, company, work phone number and other information in an
attempt to trick the recipient into believing that they have a connection
with the sender.
COMMON PHISHING ATTACKS AND
HOW TO PROTECT AGAINST THEM

3. DROPBOX PHISHING
attack emails according to an individual company or
service.
Example: Drop box
To protect against Drop box phishing attacks, users should
consider implementing two-step verification (2SV) on their
accounts. For a step-by-step guide on how to activate this
additional layer of security,
COMMON PHISHING ATTACKS AND
HOW TO PROTECT AGAINST THEM

3. DROPBOX PHISHING
attack emails according to an individual company or
service.
Example: Drop box
To protect against Drop box phishing attacks, users should
consider implementing two-step verification (2SV) on their
accounts. For a step-by-step guide on how to activate this
additional layer of security,
COMMON PHISHING ATTACKS AND
HOW TO PROTECT AGAINST THEM

4. GOOGLE DOCS PHISHING


Phishers can abuse the service to create a web page
that mimics the Google account log-in screen and
harvests user credentials.
Google Drive supports documents, spread sheets,
presentations, photos and even entire websites
FAIR USE

-is a set of legal exceptions to


copyright. Fair use allows certain ways
of using copyrighted material for
educational purposes. Fair use allows
the reproduction of copyrighted works
for criticism, comment, news reporting,
teaching, scholarship, and research. Fair
use supports scientific discovery and
the sharing of culture and ideas.
FOUR FACTORS OF FAIR USE

1. The purpose of reproduction.


2. The nature of the original work.
3. What percentage of the original work
is reproduced.
4. Any effect on the market (sales)
potential of the original.
R.A. 8293 OR THE INTELLECTUAL
PROPERTY CODE OF THE PHILIPPINES
CITIZEN JOURNALISM

Citizen journalism refers to the reporting of news events by


members of the public using the Internet to spread the
information. Citizen journalism can be a simple reporting of
facts and news that is largely ignored by large media
companies.
 “The collection, dissemination, and analysis of news by
the public, by means of cell phones, digital cameras, blogs,
etc.” (Google Dictionary)
BENEFITS OF CITIZEN JOURNALISM

1. Faster access to information


2. Personal Feedback
3. Improved trust and interaction with local media.
DRAWBACKS OF CITIZEN JOURNALISM

1. Reduced Quality of Content


2. Reduced Reliability

You might also like