You are on page 1of 4

Neffe Cleo Del Rosario

Media and Information literacy Lesson 8

Activity 1
1. Fair Use and Creative Commons
2. ©
3. Copyright
4. Piracy
5. Design Patent
6. 50 years
7. Any violation or breach of protected intellectual property rights
8. Creative Common
9. Trademark
10. Direct or verbatim plagiarism

1.Due to the vast development on online world and marketing on online platforms, there has been
reported about Intellectual property infringement according to the Intellectual Property Office of the
Philippines (IPOPHL)

2. In Addition, reports about counterfeit goods also increased.

Of the intellectual property violations this year, 79 were operating online – 53 from Facebook, seven
from Shopee, six from Lazada, three from YouTube, and one each from Carousell, Instagram, and
Vineyard.

Seven other reported violators were caught operating in other online platforms.

The IPOPHL also reported 43 complaints about counterfeit goods.

As the number of complaints on intellectual property infringement this year exceeded the reports for
the past five years, I recommend for the Intellectual Property Rights Enforcement Office (IEO) to update
the  Rules and Regulations on Enforcement specifically to add more disruptive enforcement functions to
the IEO, such as clearly in the coverage of online counterfeiting and Intellectual property infringement.
Neffe Cleo Del Rosario

Media and Information literacy Lesson 9

1. Cybercrime refers to any crime carried out using a computer or an electronic device, primarily via the
Internet. As the Internet has opened a plethora of opportunities and possibilities to consume and access
information, and connect, the impact of Cybercrime has penetrated deeply with cybercriminals gaining
from a broader surface to attack.
As a regular user of the Internet, computers and mobile devices, you are vulnerable to cyberattacks
of every kind. Emails are the most common delivery method for Cybercrime. Sites, forums, social media
sites, e-shops are other ways of accessing information without using search engines. Over these
platforms, a lot of information is exchanged, which can be accessed by cybercriminals. 

Unsafe websites, social media are all vulnerable platforms for cyberattacks and other cybercrimes.

2.Examples of cybercrime are:

a. Malware
b. Phishing
c. Identity theft and fraud
d. Cyber Bullying
e. Cyber Extortion

3. We can combat cybercrime by;

 Uniform implementation of basic security measures like regular software updates and patches.

 Increased international law enforcement cooperation.

 Tougher cybersecurity laws in several countries.

 Penalties for nations that harbor cybercriminals

4. We can protect ourselves from cybercrime by:

● Being careful when opening dodgy emails with undefined links or attachments. (sometimes they may
have funny names, too!).

● Avoid downloading anything from an untrusted or unknown source.

● Make sure you are visiting a legitimate website.

● Make sure to update your computer with software updates.


● Avoid using Wi-Fi in public spaces as they are unsecured and unencrypted. Do not log in to your bank
account in a public space or pay on an eCommerce site.

● Make sure you have strong, unique passwords that are a combination of letters, numerals and
symbols.

● Boost your router security to guard the network at home.

● Always have an antivirus installed that will throw warnings and protect systems from attacks.

CONCLUSION

Cybercrime is the bane of the Internet. It is essential to guard yourself against being a victim of attacks
or crimes of any kind over the Internet.

You might also like