Professional Documents
Culture Documents
In the Dark Ages and Middle Ages, books were usually only owned by
monasteries, educational institutions or extremely rich people. Most
books were religious in nature. In some cases, a family might be
lucky enough to own a book, in which case it would be a copy of the
Bible.
Louel Bornie S. Baguio
Louel Bornie S. Baguio
Impact of the printing press
Gutenberg’s invention made a dramatic impact when it
reached the public. At first, the noble classes looked down on
it. To them, hand-inked books were a sign of luxury and
grandeur, and it was no match for the cheaper, mass-
produced books.
Thus, press-printed materials were at first more popular with
the lower classes. When word spread about the printing
press, other print shops opened and soon it developed into
an entirely new trade. Printed texts became a new way to
spread information to vast audiences quickly and cheaply.
Academics benefited from this dissemination of scholarly
ideas and even politicians found that they could garner the
public’s interest through printed pamphlets.
Louel Bornie S. Baguio
Impact of the printing press
An important side effect was that people could read and
increase their knowledge more easily now, whereas in the
past it was common for people to be quite uneducated. This
increased the discussion and development of new ideas.
Another significant effect was that the printing press was
largely responsible for Latin’s decline as other regional
languages became the norm in locally printed materials. The
printing press also helped standardize language, grammar,
and spelling.
The printing press played a major role in shaping the
Renaissance, which has interesting correlations to today’s
Information Age.
Scope:
This Act applies to the processing of all types of personal
information and to any natural and juridical person
involved in personal information processing including those
personal information controllers and processors who,
although not found or established in the Philippines, use
equipment that are located in the Philippines, or those who
maintain an office, branch or agency in the Philippines
subject to the immediately succeeding paragraph: Provided,
That the requirements of Section 5 are complied with.
Exclusions:
REPUBLIC ACT 10173 DATA PRIVACY ACT OF 2012 (DPA)
The DPA and its Implementing Rules and Regulations (IRR) apply to all acts
done or practices engaged in and outside of the Philippines if:
•If the person, either an individual or an institution, involved in the
processing of personal data is located in the Philippines;
•The act or practice involves personal data of a Philippine citizen or
Philippine resident;
•The processing of personal data is done in the Philippines; or
•The act, practice or processing of personal data is done by an entity
with links to the Philippines, subject to international law and comity.
“Personal data” refers to all types of personal information.
The National Privacy Commission (NPC)
is in charge of administering and implementing the DPA. It is also tasked to
monitor and ensure compliance of the Philippines with international standar
ds for personal data protection.
The major functions of the NPC are as follows:
1. Rule making
2. Advisory
3. Public education
4. Compliance and monitoring
5. Complaints and investigations
6. Enforcement
General Rights of Data Subjects
1. Right to INFORMATION;
2. Right to ACCESS;
3. Right to CORRECT;
4. Right to REMOVE;
5. Right to DAMAGES;
6. Right to DATA PORTABILITY.
Copyright Infringement
Copyright infringement
✓ is the use or production of copyright-protected material without
the permission of the copyright holder.
✓ Copyright infringement means that the rights afforded to the
copyright holder, such as the exclusive use of a work for a set
period of time, are being breached by a third party.
✓ The most well-known forms of entertainment that suffer from
significant amounts of copyright infringement:
a. Music
b. Movies
✓ Infringement cases may lead to contingent liabilities, which are
amounts set aside in case of a possible lawsuit.
Copyright infringement
There are three elements that must be in place in
order for the infringement to occur.
•The copyright holder must have a valid copyright.
•The person who is allegedly infringing must have
access to the copyrighted work.
•The duplication of the copyrighted work must be
outside the exceptions.
Copyright Infringement Issues
1.Technology
2.International Issues
3.Photography and Visual Assets
4.Noneconomic Rights
5.The Internet
Data confidentiality
Data confidentiality is about protecting data against
unintentional, unlawful, or unauthorized access, disclosure, or
theft.
Confidentiality has to do with the privacy of information,
including authorizations to view, share, and use it. Information
with low confidentiality concerns may be considered "public"
or otherwise not threatening if exposed beyond its intended
audience. Information with high confidentiality concerns is
considered secret and must be kept confidential to prevent
identity theft, compromise of accounts and systems, legal or
reputational damage, and other severe consequences.
Data confidentiality
Examples of data with high confidentiality concerns
include:
https://www1.udel.edu/security/data/confidentiality.html
Proper Citation and Attribution
Avoiding Plagiarism
What is PLAGIARISM?
◼ Use of another person's work without
acknowledgment with the intent to pass it
off as your own
What is PLAGIARISM?
◼ Use of another person's work without
acknowledgment with the intent to pass it off as
your own
◼ Buying, stealing, borrowing, or otherwise
obtaining all or part of a paper; hiring someone
to write a paper
What is PLAGIARISM?
◼ Use of another person's work without
acknowledgment with the intent to pass it off as
your own
◼ Buying, stealing, borrowing, or otherwise
obtaining all or part of a paper; hiring someone
to write a paper
◼ Submitting the same paper for more than one
class
It is a serious offense
It’s easier to track than you think.
◼ Instructors reading your work have a very sound
knowledge of the field of interest you are writing
about, and can recognize the use of other’s work.
◼ It is easier than ever to find the source of plagiarized
material.
When is plagiarism most likely to happen?
◼ When assignments or papers are left to the last
minute….plan ahead and stage your work to avoid last
minute writing….
◼ When students are stressed by multiple life or academic
pressures and try to take short cuts
◼ When students are not careful about their note-taking, or
instead of note-taking, copy and paste actual text into
their electronic notes folder or paper draft….NEVER DO
THIS!
Consequences of
Lack of or Inadequate Attribution
YSN - Policy #33
Disciplinary Procedures of the School of Nursing
◼ http://intranet.nursing.yale.edu/Intranet/Policies/default.aspx?id=33
❑ Hearing
❑ If proven to have plagiarized penalties include
◼ reprimand
◼ probation
◼ suspension
◼ expulsion
◼ In addition YSN may refer students for prosecution
Correct Attribution
Ask yourself
◼ is the language my own, even paraphrasing?
“”
When in doubt
CITE!
Citation Resources in detail!
◼ Dedicated links
❑ Nursing Librarian’s APA site
http://www.med.yale.edu/library/nursing/research/apa.html
❑ APA Style.org
Style help http://www.apastyle.org/apa-style-help.aspx
Tutorials http://www.apastyle.org/learn/tutorials/index.aspx#false
❑ General Counsel Office - Copyright
http://ogc.yale.edu/legal_reference/copyright.html
❑ Copyright Law and Fair Use
http://www.copyright.gov/
Not APA Style??
http://guides.med.yale.edu/images