You are on page 1of 4

Adrian V.

Santiago
MIL: Lesson 8

Activity 1
1. Fair Use and Creative Commons
2. ©
3. Copyright
4. Piracy
5. Design Patent
6. 50 years
7. Any violation or breach of protected intellectual property rights
8. Creative Common
9. Trademark
10. Direct or verbatim plagiarism

ACTIVITY 1

1. Base on the Intellectual Property Office of the Philippines (IPOPHL) there has been reported about
Intellectual property infringement and;

2. Piracy violators.

Of the intellectual property violations this year, 79 were operating online – 53 from Facebook, seven
from Shopee, six from Lazada, three from YouTube, and one each from Carousell, Instagram, and
Vineyard.

Seven other reported violators were caught operating in other online platforms.

The IPOPHL also reported 41 complaints about piracy, while 51 were other intellectual property
infringement reports not involving counterfeit and piracy.

As the number of complaints on intellectual property infringement this year exceeded the reports for
the past five years, I recommend for the Intellectual Property Rights Enforcement Office (IEO) to update
the  Rules and Regulations on Enforcement specifically to to add more disruptive enforcement functions
to the IEO, such as clearly including online piracy and Intellectual property infringement in its coverage.
Adrian V. Santiago
MIL: Lesson 9

1. Cybercrime refers to any crime carried out using a computer or an electronic device, primarily via the
Internet. As the Internet has opened a plethora of opportunities and possibilities to consume and access
information, and connect, the impact of Cybercrime has penetrated deeply with cybercriminals gaining
from a broader surface to attack.
As a regular user of the Internet, computers and mobile devices, you are vulnerable to cyberattacks
of every kind. Emails are the most common delivery method for Cybercrime. Sites, forums, social media
sites, e-shops are other ways of accessing information without using search engines. Over these
platforms, a lot of information is exchanged, which can be accessed by cybercriminals. 

Unsafe websites, social media are all vulnerable platforms for cyberattacks and other cybercrimes.

2.Examples of cybercrime are:

a. Malware
b. Phishing
c. Identity theft and fraud
d. Cyber Bullying
e. Cyber Extortion

3. We can combat cybercrime by;

 Uniform implementation of basic security measures like regular software updates and patches.

 Increased international law enforcement cooperation.

 Tougher cybersecurity laws in several countries.

 Penalties for nations that harbor cybercriminals

4. We can protect ourselves from cybercrime by:

● Being careful when opening dodgy emails with undefined links or attachments. (sometimes they may
have funny names, too!).

● Avoid downloading anything from an untrusted or unknown source.

● Make sure you are visiting a legitimate website.

● Make sure to update your computer with software updates.

● Avoid using Wi-Fi in public spaces as they are unsecured and unencrypted. Do not log in to your bank
account in a public space or pay on an eCommerce site.
● Make sure you have strong, unique passwords that are a combination of letters, numerals and
symbols.

● Boost your router security to guard the network at home.

● Always have an antivirus installed that will throw warnings and protect systems from attacks.

CONCLUSION

Cybercrime is the bane of the Internet. It is essential to guard yourself against being a victim of attacks
or crimes of any kind over the Internet.

You might also like