You are on page 1of 15

2nd SEMESTER

A.Y. 2022-2023 I NCM 210


NURSING INFORMATICS

NETIQUETTE message forwarded to the person being


• CODE of INTERNET because the internet gossiped about).
is a NETWORK and ETIQUETTE is a CODE. • As a general rule, focus on one subject or
• Comparable to appropriate manners in topic per e-mail message. Keep your
a professional or academic setting. message brief and specific (a maximum
• Socially and morally accepted guideline is one or two e-mail screens
• The proper behavior when using the worth).
internet • Make the visual layout of your message
• The Do’s and Dont’s of communicating pleasing for the recipient. It should be
online easy to read, watch your spacing, lower
and upper case usage, indentation,
USE OF NETIQUETTE spelling, etc.
• Proper netiquette discourages people • Do not capitalize an entire message: IT
from flooding another person’s email MEANS YOU ARE SHOUITNG IN E-MAIL
inbox with spam mail or forwarded LAND!!! use a combination of upper and
message or misusing social network sites lower case characters, just as you would
by posting personal information if you were writing a pen and paper letter
unrelated to the online course. or memo.
• In addition, especially in an online class, • Always begin an e-mail message with a
netiquette includes using standard fronts descriptive Subject Heading in five words
and font sizes that are readable size. or less. An appropriate subject line allows
recipients to organize their e-mail
RULE OF THUMB messages using keywords or subject
• Be clear and concise when headings.
communicating o Good day Ma’am this is my
• Be respectful of others opinion requirements for Activity 3 & 4.
• Reply to others promptly o It shows how well-mannered you
are
NETIQUETTE GUIDEDLINES • Express emotions gracefully. Use “smileys”
• Always be polite and considerate of to add an indication of your emotional
others. Never send or keep anything that intent.
you would mind seeing broadcasting on o Emoticons help express feelings
the Evening News. o Too many emoticons can be
o Others will just be curious, or may annoying
ignore your post. o Never use acronyms
• Do not send mail or reply to mail when For example
you are “flaming”, in other words angry, From: you@kwantein.net
tired, upset, or irritable. Cool off first. Wait Date: September 6th, 2011
until you calm down or speak to the To: Johndoe@kwantein.net
Cc: monalinsa@kwantein.net
person directly.
Subject: Staff Meeting
• Think before you reply! Do not write
anything online if you would not say the Body of message: Hello everyone, The staff meeting
same thing to the recipient face-to-face. has been scheduled for Monday, January 27th. See
Be professional about what you write to you there :>
others (e-mail can be forwarded, and
many people have ended up having Thanks,
Emgee
2nd SEMESTER
A.Y. 2022-2023 I NCM 210
NURSING INFORMATICS

SMILEYS DATA PRIVACY ACT


• Using existing keyboard characters, you
can create smileys which substitute for DATA PRIVACY ACT OF 2012: REPUBLIC ACT OF
non-verbal cues which would normally 10173
be demonstrated physically and by • The policy of the state to protect the
facial expressions when speaking face- fundamental rights of privacy of us
to-face. people.
• Other country also has this data privacy
CHARACTER DEFINITION which is name differently.
:-) or :^) Happy, Joking • An act protecting individual personal
>;-) or ;^) Winking (to soften a seemingly information in information and
sarcastic sentence) communications systems in the
:^( Frowning, Sad, I’m Upset, Feeling Grim government and the private sectors,
:^( I’m Indifferent creating for this purpose a national
:^() or :^O wow! privacy commission, and for other
>:-, Smirk purposes.
:-II I’m angry!
:-* Oops! RESPONSIBLE AGENCY
:-T I’m keeping a straight face • National Privacy Commission is the
:^D said with a big smile responsible agency which is under the
:-# My lips are sealed Department of Information and
;-& I’m absolutely livid! Communication Technology (DICT)
I-{ Good Grief! • National Privacy Commission are the
:-O Uh-oh! country’s watchdog.
:-& I'm tongue-tied!
8-I Eyes wide in surprise! NATIONAL PRIVACY COMMISSION
A = awareness
BEFORE YOU POST THINK B = breach management
Once you post to the internet, you can’t take it C = compliance
back. Posting is permanent (as someone could D = data protection officer and
take a screen shot of it) S = security measures
• T Is it TRUE? • To administer and implement the
• H Is it HELPFUL? provisions of this Act, and to monitor and
• I Is it INSPIRING? ensure compliance of the country with
• N Is it NECESSARY? international standards set for data
• K Is it KIND? protection.
• In the past this is not well establish, since
PROOFREAD YOUR POSTS from the data protection officer (person
• Like classroom writing, check for: assign must have discrepancy). On the
capitalization, punctuation, proper other hand, security measure also need
grammar and correct spelling improvement since security information
must be well kept and not easy to
hacked.
• The NPC’s function is also the rule making
body, they can alter, add up, or
enhance the rule that they have for data
privacy.
2nd SEMESTER
A.Y. 2022-2023 I NCM 210
NURSING INFORMATICS

• They can also give advises, especially THE JOURNEY OF THE DATA PRIVACY ACT
unwanted cost (scammers, bogus • European Union’s 1995 Data Protection
buyers). Directive
• Public education as they continually give • Electronic commerce Act of 2000 (R.A.
information with regards to this act. To let No. 8792) – recognition and use of
people aware that this kind of law exists. electronic commercial and non-
• Compliance and monitoring. They are commercial transactions and
doing measures so that all company will documents.
follow. • Membership in the Asia-Pacific
• Investigation and complaints, and Economic Cooperation (APEC)- privacy
enforcement. Penalize companies who Framework in 2005
don't have data protection officers and • DTI Administrative Order No. * in 2006 –
security measures. which prescribed guidelines for a local
data protection certification system.
SPEED OF INFORMATION • The DPA was signed into law in 2012, with
the local BPO sector as its most visible
endorser
• Creation of the Dept. Of Information and
Communications Technology (DICT in
2015, R.A. 10844)
• The activation of the National Privacy
Commission (NPC) in 2016
• DPA’s implementing rules and
regulations was put in effect on Sept. 9,
2016.

“Do not collect data if you cannot protect” KEY ROLES IN THE DATA PRIVACY ACT

SOCIAL PLATFORMS: ACTIVE USER ACCOUNTS

DATA SUBJECTS
WHAT IS MORE VALUABLE: DATA OR MONEY? • Refers to an individual whose, sensitive
Data is more valuable, because of someone personal, or privileged information is
takes your money, that’s all they have. Because processed personal.
these are your personal data’s. But if they have • This is YOU.
your data, they can use that and can make
more money out of that.
2nd SEMESTER
A.Y. 2022-2023 I NCM 210
NURSING INFORMATICS

PERSONAL INFROMATION CONTROLLER (PIC) identity of an individual is apparent or


• Controls the processing of personal data, can be reasonably and directly
or instructs another to process personal ascertained by the entity holding the
data on its behalf. information, or when put together with
• Collects/ receives the data. other information would directly and
certainly identify an individual.
PERSONAL INFORMATION PROCESSOR (PIP)
• Organization or individual whom a Sensitive Personal Information
personal information controller may • Refers to personal information about an
outsource or instruct the processing of individual’s:
personal data pertaining to a data • Race, ethnic origin, marital status, age,
subject. color, religious, philosophic or political
• Process the collected data and is also affiliations, health, education, genetics,
responsible for the storage. sexual life, any proceeding for any
offense committed or alleged to have
DATA PROTECTION OFFICER (DPO) been committed, the disposal of such
• Responsible for the overall management proceedings, the sentence of any court
of compliance to DPA in such proceeding;
• Head of data privacy of a company. • Also includes information issued by
government agencies peculiar to an
NATIONAL PRIVACY COMMISION individual which includes, but not limited
• Independent body mandated to to:
implement and administer the DPA of o Social security numbers, previous
2012, and to monitor and ensure or current health records, licenses
compliance of the country with or its denials suspension or
international standards set for personal revocation, and tax returns;
data protection. o And specifically established by an
executive order or an act of
COMMON BRANCHES OR UNREGULATED LAWS Congress to be kept classified.
• Consent form. Before giving information,
consent must be present. (I agree to Privileged Information
have this information..) • Privileged means that which is to be only
• Student transferred by parent without shared between specific parties and not
knowledge. admissible in court, protected from a
• Clinical record. (If you are 18 yrs old and subpoena.
below, all information should be
disclosed to the parents).
• Data’s in stolen phone and laptops.
• Recycled papers with important data.
• Releasing of CCTV videos
• Facebook Hackers

CLASSIFICATION OF PERSONAL DATA


Personal Information
• Personal information refers to any
information whether recorded in a
material form or not, from which the
2nd SEMESTER
A.Y. 2022-2023 I NCM 210
NURSING INFORMATICS

and the extent to which such access is


authorized;
6) The identity and contact details of the
personal information controller or its
representative;
7) The period for which the information will
be stored;
8) The existence of their rights, i.e., to
access, correction, as well as the right to
lodge a complaint before the
Commission.

PRIVACY NOTICE
RIGHTS OF THE DATA SUBJECT • Statements made to a data subject that
• Right to be informed – IRR, Section 34.a describes how organization collects, uses,
• Right to object – IRR, Section 34.b retains, and discloses personal
• Right to access- IRR, Section 34.c information. Sometimes referred to as a
• Right to data portability - IRR, Section 36 privacy statement, a fair processing
• Right to correct (rectification) - IRR, statement.
Section 34. d • Consenting that all information given are
• Right to erasure or blocking- IRR, Section true and correct.
34.e • If these datas are really necessary.
• Right to file a complaint - IRR, Section
34.a.2 COOKIES
• Right to damages- IRR, Section 34.f • Is a block of data that a webserver
• Transmissibility of rights - IRR, Section 35 places on a user’s PC to ease navigation
through the sites. It is also a useful means
RIGHT TO BE INFORMED for the website in identifying the user,
(a) Be informed whether personal information tracking the user’s path through the site,
pertaining to him or her shall be, are being or and identifying repeat visits to the site by
have been processed; same user leading a website owner to
(b) Be furnished the information indicated profile an individuals user’s browsing
hereunder before the entry of his or her personal habits and one without the knowledge
information into the processing system of the and consent of the user.
personal information controller, or at the next
practical opportunity: THE RIGHT TO OBJECT
1) Description of the personal information • The data subject shall have the right to
to be entered into the system; object to the processing of his or her
2) Purposes for which they are being or are personal data, including processing for
to be processed; direct marketing, automated processing
3) Scope and method of the personal or profiling. The data subject shall also be
information processing; notified and given an opportunity to
4) The recipients or classes of recipients to withhold consent to the processing in
whom they are or may be disclosed; case of changes or any amendment to
5) Methods utilized for automated access, the information supplied or declared to
if the same is allowed by the data subject, the data subject in the preceding
paragraph.
2nd SEMESTER
A.Y. 2022-2023 I NCM 210
NURSING INFORMATICS

Exceptions: • Information about automated processes


• When personal data is needed pursuant • Date when the personal data was last
to a subpoena access and modify
• When the processing or purposes is • Designated name and personal
pursuant to a contract information of the computer
• Between the personal information
controller and the data subject. RIGHT TO RECTIFICATION
• When the information is being processed • The data subject has the right to dispute
as a result of a legal obligation the inaccuracy or error in the personal
• And in terms of claiming benefits data and have the personal information
• And of course a third source of a legal controller correct it immediately and
obligation accordingly, unless the request is
vexatious or otherwise unreasonable.
THE RIGHT TO ACCESS
The data subject has the right to reasonable RIGHT TO ERASURE OR BLOCKING
access to, upon demand, the following: •The data subject shall have the right to
1. contents of his or her personal data that suspend, withdraw, or order the blocking,
were processed; removal or destruction of his or her
2. Sources from which personal data were personal data from the personal
obtained; information controller’s filling system.
3. Names and addresses of recipients of the REQUEST TO ERASE OR BLOCK
personal data; • If the data is incomplete
4. Manner by which such data where • Outdated false or unlawfully
processed; • Obtained if it’s being used for another
5. Reasons for the disclosure of the personal • Processes purposes if it’s no longer
data to recipients, if any; necessary
6. Information on automated processes • If the data subject withdraws consent-
where the data will, or is likely to, be objection to processing and there is no
made as the sole basis for any decision other legal ground
that significantly affect or will affect the • The processing is become unlawful and if
data subject; the personal information controller or
7. Date when his or her personal data personal information process or violated
concerning the data subject were last the rights of the data subject.
accessed and modified; and
8. The designation, name or identity, and RIGHT TO DAMAGES
address of the personal information • The data subject shall be indemnified for
controller. any damages sustained due to such
WHAT CAN THE DATA SUBJECT CAN DEMAND inaccurate, incomplete, outdated, false,
ACCESS? unlawfully obtained or unauthorized use
• Personal data of personal data, taking into account
• Contents of my data with the agency any violation of his or her rights and
• Sources of personal data from another freedoms as a data subject.
agency
• Name and address of recipients of your RIGHT TO DATA PORTABILITY
data • Where his or her personal data is
• The manner and methods of processing processed by electronic means and in a
• The reason of the disclosure
2nd SEMESTER
A.Y. 2022-2023 I NCM 210
NURSING INFORMATICS

structures and commonly used format, Avoid this mentality:


the data subject shall have the right to • “just in case we need it”
obtain from the personal information • “this is what we always do”
controller a copy of such data in an
electronic or structured format that is PENALTIES
commonly used and allows for further • Ranging from P100,000 to P5,000,000
use by the data subject. • Imprisonment of 1 year up to 7 years
o Unauthorized processing of
RIGHT TO COMPLAINT personal information and
• Any of the violation of the Rights of the sensitive personal information
Data Subject they can file a complaint to o Accessing personal information
the national privacy commission. and sensitive personal
information due to negligence
TRANSMISSIBILITY OF RIGHTS o Improper Disposal of Personal
Transmissibility of right if someone dies the lawful Information and Sensitive
heirs of that person can continue to invoke the Personal Information
right of the data subject. o Processing of Personal
Information and Sensitive
APPROACH OF GOVERNMENT TO ADHERE THE Personal Information for
PRINCIPLES Unauthorized Purposes
PRINCIPLE OF TRANSPARENCY o Unauthorized access or
• A data subject must be aware of the intentional Breach
nature, purpose, and extent of the o Concealment of Security
processing of his or her personal data, Breaches Involving Sensitive
including the risks and safeguard Personal Information
involved, the identity of personal o Malicious Disclosure
information controller, his or her rights as o Unauthorized Disclosure
a data subject, and how these can be
exercised. Any information to the
processing of personal data should be
easy to access and understand, using
clear and plain language.

PRINCIPLE OF LEGITIMATE PURPOSE


• The processing of information shall be
compatible with a declared and
specified purpose, which must not be
contrary to law, morals or public policy.

PRINCIPLE OF PROPORTIONALITY
• The processing of information shall be
adequate, relevant, suitable, necessary,
and not excessive in relation to a
declared and specified purpose.
Personal data shall be processed only if
the purpose of the processing could not
reasonably be fulfilled by other means.
2nd SEMESTER
A.Y. 2022-2023 I NCM 210
NURSING INFORMATICS

R.A. 10372
• An Act amending certain provisions of
RA 8293
• Effectivity date: March 22, 2013

RA 10372: Amendment to IP Code


• Grant of enforcement powers to the
Director General
• Establishment of Bureau of Copyright
and other related rights
• Requirement of accreditation of
collective management organizations
• Clarification of the concepts:
INTELLECTUAL PROPERTY RIGHTS o (1)copyright infringement
o (2)limitations and exceptions
INTELLECTUAL PROPERTY OFFICE OF THE o (3)digital rights management
PHILIPPINES
• Government agency mandated to
administer and implement State policies FUNCTIONS OF IPOPHL
on INTELLECTUAL PROPERTY (IP) to • DEVELOPMENT - ORIENTED
strengthen the protection of IP rights in • REGULATORY
the country • MAKING OF POLICIES ON IP
• In charge agency in the implementation
of intellectual property code, handling BUREAUS UNDER IPOPHIL
the registration & conflict resolution of IPR. • The Bureau of Patents
• Established under Republic Act No. 8293, • The Bureau of Trademarks
also known as the Intellectual Property • The Bureau of Legal Affairs
Code ( IPC) of the Philippines • The Documentation, Information and
• Effectivity Date: January 1, 1998 Technology Transfer Bureau
• Under the administration of President • The Management Information System
Fidel V. Ramos and EDP Bureau
• The Administrative, Financial and
GOVERNING LAWS Personnel Services Bureau
R.A. 8293 • The Bureau of Copyright and Other
• An Act prescribing the IPC and Related Rights
establishing the IP Office
• intellectual property code of the INTELLECTUAL PROPERTY
Philippines • “CREATIONS OF MINDS”
• An act prescribing the intellectual • “INTELLECTUAL” - RELATING TO INTELLECT
property code and establishing the • “PROPERTY” - A THING OR THINGS
intellectual property office providing for BELONGING TO SOMEONE
its powers and functions and for other • “Original creative work manifested in a
purposes. tangible form that can be legally
• Effectivity Date: January 1, 1998 protected.
IP is everywhere
• inventions
2nd SEMESTER
A.Y. 2022-2023 I NCM 210
NURSING INFORMATICS

• designs • Patents
• symbols, names and images • Copyright
• literary and artistic works
IP is in your meal CATEGORIES OF IP
• TRADE SECRET INDUSTRIAL PROPERTY
o The specific proportion of • inventions (patent)
ingredients or recipe in your • trademarks & service marks
burger and drinks that is • industrial design
confidential • geographical indications
• INDUSTRIAL DESIGN
o The ornamental design of the COPYRIGHT
disposable packaging of your fries • drawings
• UTILITY MODEL • paintings
o The bendable straw in your drinks • performing artists
• TRADEMARK • photographs
o Name/symbol of the restaurant • sculptures
• COPYRIGHT • architectural design
o The creative and original artwork
applied in packaging IP is consist of:
• Copyright and Related Rights
INTELLECTUAL PROPERTY RIGHT • Trademarks and Service Marks
• A moral or legal entitlement to have or • Geographical Indications
do something or prevent others from • Industrial Designs
doing something • Patents
• Sets of exclusive rights is recognized • Lay-out Designs (Topographies) of
• Distinct creation or product of human Integrated Circuits
mind • Protection of Undisclosed Information
• Legal rights which results from intellectual
activity in the industrial, scientific, literary BENEFITS OF IP SYSTEM
and artistic fields IMPROVES OUR DAILY LIVES
• Intangible assets • Makes lives productive, fun and
sustainable
INTANGIBLE ASSETS IPS IS FOR EVERYONE
• Assets which have no physical identity or • Not just for big companies but for all of us
presence MAKES INNOVATION POSSIBLE
• Identifiable and have a long term • Innovators are recognized and
financial value for the organization rewarded
• Can be created and purchase • Provide incentives to create new
Example of Intangible Assets technologies
• Licenses ENSURES QUALITY
• Contracts/ covenant • Provides consumers with confidence in
• Proprietary operating systems the quality of a product
• Business books and records SUPPORTS THE ECONOMY
• Goodwill • Promotes industry, job and innovation
• Brands • Contributes to the GDP
• Knowledge
• Trademarks
2nd SEMESTER
A.Y. 2022-2023 I NCM 210
NURSING INFORMATICS

WHY SHOULD YOU BE MINDFUL OF YOUR IP LEGAL REQUIREMENTS OF PATENT


PREVENT LIMITATION • NOVELTY
• Ownership, remedies and penalties for • INDUSTRIAL APPLICABLE
infringement • INCENTIVE STEP
REDUCE RED COST
• Patent information and industry NON-PATENTABLE SUBJECT MATTERS
database • Discoveries, scientific theories and
CREATE CORPORATE IDENTITY mathematical methods
• Trademark and branding strategy; • Schemes, rules and methods of
Goodwill performing mental acts, playing games
NEGOTIATE LICENSING AGREEMENTS or doing business
• Contains the terms and conditions on • Programs for computers
how the IPR of the franchisor will be used • Methods for treatment of the human or
ACCESS TO FINANCING animal body by surgery or therapy and
• Venture capital and enhance financial diagnostic methods practiced on the
standing human or animal body
• Plant varieties or animal breeds or
THE WORLD’S TOP 10 STRONGEST BRANDS 2022 essentially biological process for the
production of plants or animals
• Aesthetic creations
• Anything which is contrary to public
order, health, welfare or morality.
• Abstract ideas or theories

LIMITATION OF PATENT
GEOGRAPHICAL LIMIT
• Territorial in nature
• Protection is by country
• PCT-International patent system
PATENTS TIME LIMIT
• An exclusive right granted for an • Expires after 20 years from date of filing
invention-a product, process, or SCOPE
improvement- which provides a new • Protected based on the submitted
way of doing something, or that offers a claims
new technical solution to a problem FEE DEPENDENT
Why are PATENTS necessary • Annual dues ( failure to pay may lead to
lapse patent)
FIRST TO FILE SYSTEM
• “FIRST TO FILE and NOT first to invent will
be considered the owner
REMINDER!! “Never show your invention to
companies to see if they’re interested in buying
it, or inventing in it, without first getting patent
advice.” -Darren Heitner
2nd SEMESTER
A.Y. 2022-2023 I NCM 210
NURSING INFORMATICS

WELL KNOWN INVENTORS FIRST TO FILE SYSTEM


• “FIRST TO FILE and NOT first to invent will
be considered the owner

PATENTS VS UTILITY MODEL


PATENTS UTILITY MODEL
Requires incentive No inventive step
step
20 years from filling 7 years from filling
date date

With substantive No substantive


examination examination

Applications Published for 30 days


published with search prior to issuance of
UTILITY MODELS report after 18 certificate
• A protection option, which designed to months
protect innovations that are not Can be enforced Enforcement is
sufficiently inventive to meet the after grant determined by the
inventive threshold required for standard Registrability Report
patents application.
• A utility model system provides
protection of so-called “minor inventions” INDUSTRIAL DESIGNS
through a system similar to the patent • Protects the aesthetic features and visual
system design of an article of manufacture
• It is the physical appearance, form,
LEGAL REQUIREMENTS shape, contour, ornamental and
NOVELTY aesthetic features that are protected
• An invention shall not be considered new Substantive Conditions for Protection
if it forms part of a prior art • New or original creation
INDUSTRIAL APPLICABLE • Article of manufacture
• An invention that can be produced and • Not dictated by technical or funcational
used in any industry shall be industrially considerations
applicable. • Not contrary to public order, health or
morals
LIMITATION OF UTILITY MODEL Term of Protection
GEOGRAPHICAL LIMIT • Five (5) years from filling date of
• Territorial in nature application
• Not all countries have UM protection • Two (2) consecutive periods of 5 years
TIME LIMIT each
• Expires after 7 years from date of filing
SCOPE
• Protected based on the submitted
claims
2nd SEMESTER
A.Y. 2022-2023 I NCM 210
NURSING INFORMATICS

Example of Industrial Design geography, topography, architecture or


science;
• Drawings or plastic works of a scientific or
technical character;
• Photographic works including works
produced by a process analogous to
photography; lantern slides;
• Audiovisual works and cinematographic
works and works produced by a process
analogous to cinematography or any
process for making audiovisual
recordings;
• Pictorial illustrations and advertisements;
COPYRIGHT
• Computer programs;
• The legal protection extended to the
• Other literary, scholarly, scientific and
owner of the rights in an original work
artistic works
that he has created.
• Works are protected by the sole fact of
WHO OWNS THE COPYRIGHT
their creation, irrespective of their mode
OWNERSHIP EXCEPTIONS
or form of expression, as well as of their
content, quality and purpose. Literary and Author
• “Only the expression of an idea is artistic works
protected by copyright, not the idea Work of joint Co- Agreement
itself.” authorship ownership to the
LITERARY AND ARTISTIC WORKS contrary
• Books, pamphlets, articles and other Joint works Each part’s
writings; with separable author
• Periodicals and newspapers; parts
• Lectures, sermons, addresses, Work not part Employee No
dissertations prepared for oral delivery, of regular exception
whether or not reduced in writing or duties (even if the
other material form; employee
• Letters uses the
• Dramatic or dramaticomusical time,
compositions; choreographic works or facilities and
entertainment in dumb shows materials of
• Musical compositions, with or without the
words; employer
• Original ornamental designs or models Work part of Employer Agreement,
for articles of manufacture, whether or regular duties express or
not registrable as an industrial design, implied
and other works of applied art; Commissioned Works Written
• Works of drawing, painting, architecture, work belongs to stipulation to
sculpture, engraving, lithography or the the contrary
other works of art; models or designs for commissioner
works of art; but the
• Illustrations, maps, plans, sketches, charts copyright
and three-dimensional works relative to
2nd SEMESTER
A.Y. 2022-2023 I NCM 210
NURSING INFORMATICS

belongs to
the creator Works not protected by COPYRIGHT
• NO COPYRIGHT shall subsist in any work
TERM OF PROTECTION of the Government of the Philippines
TYPE OF WORK TERM OF PROTECTION • BUT prior approval of the government
Original and Lifetime + 50 years agency/office is necessary for the use of
derivative works PMA such work for profit
Applied art 25 years from date of
creation/making WORKS OF THE GOVERNMENT
Work of joint Lifetime + 50 years • Agency / office may impose conditions
authorship PMA or royalties except for rule, speeches,
Anonymous/ 50 years from lectures, dissertations, addresses
pseudonymous work publication or • The author of speeches, lectures,
making addresses and dissertations shall have
the exclusive right of making a collection
Audio-visual works 50 years from date of of his works
publication or
making ORIGINALITY
Performers (not 50 years from the end • = independent creation + modicum of
included in the sound of the year in which creativity
recordings) the performance • “…information alone without a minimum
took place of original creativity cannot be
Sound or image and 50 years from the end protected by copyright.”
sound recordings and of the year in which • “…copyright rewards originality, not
performances the recording took effort.”
(included) place
Broadcasts 20 years from the What constitute COPYRIGHT violation
• Directly committing an infringement
date the broadcast
• Benefits from the infringing activity of
another person who commits an
infringement if the person benefiting has
What does COPYRIGHT provide?
been given notice of the infringing
ECONOMIC RIGHTS
activity and has the right and ability to
• Reproduce
control the activities of the other person
• Translate
• With knowledge of infringing activity,
• Adapt
induces, causes or materially contributes
• Exhibit/perform the work in public
to the infringing conduct of another
• Distribute
• Broadcast
REMEDIES FOR COPYRIGHT INFRINGEMENT
• Communicate the work to the public
MORAL RIGHTS CIVIL CRIMINAL ADMINISTRATI
• Rights which maintain a personal link OFFENSE OFFENSE VE OFFENSE
between authors and their works: Induction FIRST ✔Cease and
• Be recognized as author of the work Damages OFFENSE: desist order
• Object to any changes to the work, • Actual Imprisonment ✔ Voluntary
which could damage the author’s honor • Moral of between 1 assurance
or reputation • Exemp to 3 years and
lary and a fine of compliance
between
2nd SEMESTER
A.Y. 2022-2023 I NCM 210
NURSING INFORMATICS

• Statut 50,000 to ✔
ory 150,000 pesos Condemnati FACTORS OF FAIR USE
on or seizure PURPOSE AND CHARACTER OF USE
Impounding SECOND of products • Whether such use is of a commercial
Destruction OFFENSE: ✔ Forfeiture nature or is for nonprofit educational
Imprisonment of purposes
of 3 years paraphernali NATURE OF WORK
and 1 day to a • The nature of the copyrighted work
six years plus ✔ PORTION USED
a fine of Administrativ • The amount and substantiality used in
between e fine relation to the copyrighted work as a
150,000 to ✔ whole
500,000 pesos Cancellation MARKET USE
/ withholding • The potential market for or value of the
THIRD of copyrighted work
OFFENSE AND permit/licens
SUBSEQUENT e/registration
OFFENSES: TRADE MARKS
✔ Damages,
Imprisonment • Any visible sign capable of distinguishing
censure,
of 6 years the goods (trademark) or services
other
and 1 day to (service mark) of an enterprise.
analogous
9 years plus a • Marked or stamped container of goods
penalties
fine ranging are also considered “marks”
from 500,000
to 1,500,000 RATIONALE FOR PROTECTION
pesos • Exclusive Right to use a mark for its goods
or services
Subsidiary • Serves two (2) interests:
imprisonment o Interest of the rightholder
in cases of o Interest of the consumer
insolvency
WELL-KNOWN TRADEMARKS
“In case the infringer was not aware and had
no reason to believe that his acts constitute an
infringement of copyright, the court in its
discretion may reduce the award of statutory
damages to a sum of not more than Ten
thousand pesos (Php10,000.00)” — Sec. 22, RA
10372, amending Sec.216

FAIR USE
• Any copying of copyrighted material
done for a limited and “transformative”
purpose, such as to comment upon,
critricize, or parody a copyrighted work.
• Such USES can be done without the
permission from the copyright owner.
2nd SEMESTER
A.Y. 2022-2023 I NCM 210
NURSING INFORMATICS

TYPES OF MARKS GENERIC


TYPES • Jupiter is a gas giant and the biggest
ACCORDING TO WOODMARK planet in the Solar System
COMPOSITION SYMBOL/ DESIGN
COMBINATION FUNCTIONS OF TRADEMARKS
PHRASE/SLOGAN/ • INDICATORS OF ORIGIN
TAGLINE • INDICATORS OF QUALITY
• ADVERTISING FUNCTION
TYPES SPECTRUM OF PROTECTION • DIFFERENTIATOR
DISTINCTIVEN
ESS TRADEMARKS
ACCORDING GENERIC NO • Territorial
TO STRENGTH PROTECTION • 10 years and can be renewed
• Forever use
DESCRIPTIVE MAYBE • The applicant or the registrant shall file a
PROTECTED DECLARATION OD ACTUAL USE of the
mark with evidence to that effect within
SUGGESTIVE IMMEDIATE three (3) Years from filling date of the
PROTECTION application.
• Otherwise, refused or removed from the
ARBITRARY IMMEDIATE register.
PROTECTION
GEOGRAPHICAL INDICATIONS
FANCIFUL IMMEDIATE • a sign used on goods and stating that a
PROTECTION given product originates in a given
geographical area and possesses
qualities or reputation due to that place
SPECTRUM OF DISTINCTIVENESS of origin
FANCIFUL • TERM: 10 years - renewable
• MOST PROTECTED
• Made up terms for the purpose of
functioning as trademarks
• Example: Nike
ARBITRARY
• ALMOST ALWAYS PROTECTED
• Utilizes a device or word having a
meaning that has no relation to the
goods or services being sold
• Example: Apple, Shell
SUGGESTIVE
• GENERALLY PROTECTABLE
• Trademark
DESCRIPTIVE
• Jupiter is a gas giant and the biggest
planet in the Solar System

You might also like