Professional Documents
Culture Documents
(A Catholic Institution)
Malinao, Aklan, Philippines
Chapter 11: What are the Purpose of Copyright? How Can I Use it to Protect My
Work?
Copyright
The Intellectual Property Office of the Philippines (IPO Phil) defines copyright as the “legal
protection extended to the owner of the rights in an original work.” This means that owner
or creator of an idea-expressed through his or her original work---has the sole right to use and
sell it (through publication or reproduction). Copyright protection stays up to at least 50 years (in
the Philippines) after the death of the author/creator.
According to the IPO, the following works are protected by the intellectual property code:
• books, pamphlets, articles, and other writings
• periodicals and newspapers
• lectures, sermons, addresses, and dissertations prepared for oral delivery, whether or
not reduced in writing or other material form
• letters
• dramatic or dramatic-musical compositions, choreographic works, or entertainment in
dumb shows.
• musical compositions, with or without words
• works of drawing, painting, architecture, sculpture, engraving, lithography, or other works
of art; models or designs for works of art
• original ornamental designs or models for articles of manufacture, whether or not
registrable as an industrial design, and other works of applied art
• illustrations, maps, plans, sketches, charts, and three-dimensional works relative to
geography, topography, architecture, or science
• drawings or plastic works of a scientific or technical character photographic works
including works produced by a process analogous to photography; lantern slides
• audiovisual works and cinematographic works and works produced by a process
analogous to cinematography or any process for making audio-visua recordings
• pictorial illustrations and advertisements
• computer programs
• other literary, scholarly, scientific, and artistic works
The IPO code grants creators and originators of ideas two types of rights.
Economic rights and Moral Rights
❖ Economic rights
are meant to ensure that the creator of a work will be paid by other parties if the latter use their
work.
Example:
The song “Happy Birthday” which was copyrighted in the United States before being made
public domain by an American court in June 2016. Until then, people needed to pay its copyright
owners, Warner/Chappell Music, before using it in their movie or work. The song earned
Warner/Chappell Music $2 million a year licensing fees.
These instances are listed under Sec. 5 of Presidential Decree No. 492 known as the Decree in
the Protection of Intellectual Property, issued in 1972.
❖ Moral Rights
They are designed to protect the personal connection between the creator originator and the
work they created.
Attribution, on the other hand is the act of ascribing the work to a person-in this case, the
creator-whenever the work is used.
The IPO code further states that the author of a work shall have the right:
• to require that the authorship of the works be attributed to them, in particular, the right
that their name, as far as practicable, be indicated in a prominent way on the copies, and
in connection with the public use of their work;
• to make any alterations of their work prior to, or to withhold it from, publication;
• to object to any distortion, mutilation, other modification of, or other derogatory action in
relation to their work which would be prejudicial to their honor or reputation; and
• to restrain the use of their name with respect to any work not of their own creation or in a
distorted version of their work. (Sec. 34, P.D. No. 49)
To summarize, the entire purpose of copyright law is to protect the rights of the person who
created a particular work—be it a song, a movie, or a computer program-so that they are
properly compensated financially for their work and so that they are recognized as the person
who made that work.
Plagiarism
Plagiarism, according to the group, is fraud. In addition, based on the dictionary definitions
above, there are three crimes involved in an act of plagiarism: the act of taking someone else's
possession (theft), the act of rewriting and editing to make that work appear as the plagiarist's
(cover-up), and lying about where the idea was obtained (perjury).
There are no specific laws penalizing plagiarism, but copyright infringement laws may be used
to prosecute a plagiarist, assuming that the plagiarized material is registered.
Plagiarism.org also lists some acts which may seem common or trivial but which are, in reality,
illegal:
• copying media (especially images) from other websites and pasting them into your own
papers or websites
• making a video using footage from others' videos or using copyrighted music as part of
the soundtrack
• performing another person's copyrighted music (i.e. playing a cover)
• composing a piece of music that borrows heavily from another composition
• scanning or using a photograph of a copyrighted image (i.e. using a photograph of a
book cover to represent that book on one's website)
• recording audio or video in which copyrighted music or video is playing in the
background
• re-creating a visual work in the same medium (i.e. shooting a photograph that uses the
same composition and subject matter as someone else's photograph)
• re-creating a visual work in a different medium (i.e. making a painting that closely
resembles another person's photograph)
• re-mixing or altering copyrighted images, video, or audio, even if done so in an original
way
There are ways to avoid being sued for plagiarism. First, ask permission from the
author/copyright holders usually by sending them a letter or an email explaining how their works
are to be used. Always be transparent and heed the restrictions that they impose. If they refuse,
look for other materials that you can use.
Fair Use
While authors and artists are given protection for the possible exploitation of their work, the IPO
law also provides for what it calls statutory fair uses.
Below are other acts considered as fair use according to the IPR code:
• reproduction of literary, scientific, or artistic works as part of reports of cure events by
means of photography, cinematography, or broadcasting
• inclusion of a work in a publication, broadcast, or other communication to tr public,
sound recording or film, if such inclusion is made by way of illustration for teaching
purposes
• recording made in schools, universities, or educational institutions of a work included in
a broadcast for the use of such schools, universities, or educational institutions
St. Joseph’s Academy of Malinao, Aklan, Inc.
(A Catholic Institution)
Malinao, Aklan, Philippines
All of these require the prior consent of the work's creator or the assigned copyright holder. The
use of a copyrighted work for criticism, comment, news reporting, teaching (including multiple
copies for classroom use), scholarship, research, and similar purposes is also considered fair
use.
St. Joseph’s Academy of Malinao, Aklan, Inc.
(A Catholic Institution)
Malinao, Aklan, Philippines
Chapter 12: What are Some of the Challenges and Issues that New Media
Present? What is My Role in Overcoming Them?
Digital Divide
Refers to the gap among demographics and regions that is determined by whether or not they
have unlimited access to modern information and communications technology. Digital
responsibility an organization of former Silicon Valley employees, says that a digital divide
between the rich and the poor remains despite the increasing affordability of Internet access.
"The digital divide has especially far-reaching consequences when it comes to education. For
children in low-income school districts, inadequate access to technology can hinder them from
learning the tech skills that are crucial to success in today's economy." "The digital divide has
especially far-reaching consequences when it comes to education. For children in low-income
school districts, inadequate access to technology can hinder them from learning the tech skills
that are crucial to success in today's economy."
Stanford Computer Science says that education and income contribute to the digital divide in
America:
"Widening levels of education seem to magnify the digital divide; households with higher levels
of education are increasingly more likely to use computers and the Internet.
The We Are Social report states that in 2017, half of the world's population already use
smartphones, but despite this staggering amount, it is still difficult to pin down a specific number
of Internet users in a particular country because people's access to connected devices continue
to increase at a high rate.
Information Addiction
is described as the compulsive and excessive used information and communication technology.
The desire to get connected for fear of missing out on the latest news regarding one's family
and friends is such a common thing nowadays that it already interferes with daily functions and
social interactions. Gadgets, once treated only as tools, have now become the center, of a
person's life. Some insist that the symptoms are similar to those of substance abuse, such as
excessive use and withdrawal. It has been suggested that additional research be done to
determine whether too much computer use can be called an ailment or a disease, but there is a
general consensus that the issue should be dealt with, and that those who are deep into it
should be helped.
Cyberbullying
The US Center for Disease Control (CDC) defines bullying as "any unwanted aggressive
behavior(s) by another youth or group of youths, who are not siblings or current dating partners,
involving an observed or perceived power imbalance and is repeated multiple times or is highly
likely to be repeated." If the bullying is done using a computing device, however, it is called
St. Joseph’s Academy of Malinao, Aklan, Inc.
(A Catholic Institution)
Malinao, Aklan, Philippines
According to StopBullying-gov, here are some factors that differentiate cyberbullying from
bullying:
• Cyberbullying can happen 24 hours a day, 7 days a week.
• Cyberbullying messages and images can be posted anonymously and distributed quickly
to a very wide audience. It can be difficult and sometimes impossible to trace the source.
• Deleting inappropriate or harassing messages, texts, and pictures is extremely difficult
after they have been posted or sent.
A bill has been filed at the House of Representatives of the Philippines regarding the definition
and penalization of cyberbullying. It considers the following acts as cyberbullying:
• repeatedly sending offensive, rude, and insulting messages
• distributing derogatory information about the victim
• posting or sending offensive photos of the victim, whether these are digitally altered or
not, or were taken with or without consent, with the intention to humiliate and embarrass
the victim
• breaking into an email, social network, or any electronic account, and using the victim's
virtual identity to send, upload, or distribute embarrassing materials to or about others
• sharing the victim's personal information or any embarrassing information, or tricking the
victim into revealing personal or embarrassing information and sharing to others
• repeatedly sending messages that include threats of harm or engaging in online
activities that cause fear for the victim's safety
Because social media is still a "new" kind of media and cyberbullying is a problem that is still
relatively new to society, strategies for fighting cyberbullying are still in their early stages.
However, as a media and information literate individual, apart from being aware of its existence,
you should also strive to combat it by promoting the ethical use and consumption of media.
St. Joseph’s Academy of Malinao, Aklan, Inc.
(A Catholic Institution)
Malinao, Aklan, Philippines
Netiquette
Rules 1 to 3 are all about reminding netizens that they are conversing with actual people.
According to Shea, the basic question one must answer is: Will you say what you wrote if you
were face-to-face with the person? The first three rules are also about doing what is morally
correct.
In rule 4, Shea reminds netizens that they “are not the center of cyberspace.” You must respect
other people’s time and keep in mind that the bandwidth is a shared one. Online discussion
groups have rules and one should be sure to follow these.
Rules 5, 6 and 7 are all about making sense and being credible. If you are participating in
discussion groups, strive to contribute to the discussion and help in the resolution of conflicts.
Do not add to the confusion by creating discord in discussions. Shea advises netizens to be
pleasant and polite. “Don’t use offensive language, and don’t be confrontational for the sake of
confrontation,” she adds.
Rules 8 and 9 encourages us to respect the privacy of other netizens, expressly admonishing
tech-savvy people who hack into social media accounts and emails just to obtain ammunition
against a fellow netizen.
Netiquette of Sending
Sending Emails
Message Headers
Body
Attachments
Attachments
There are times when you need to attach documents, photos, or videos to your messages.
Know the file size and the file type that you need to send and take note how the recipient will be
able to access the file. Make sure to mention in your message that you have attached a file in
the email.
Netiquette of Replying
Replying on Email
It is good practice to reply to important emails promptly, especially those that need your
attention immediately.
Replies should be brief and concise, unless the original message demands an explanation.
• Remember that your posts are public. They can be read by your partner, your children, your
parents, or your employer.
• Stay on-topic, especially when you're new. Don't post about football in a hair-care forum or
about hair care in a gardening forum!
Netiquette of Confidentiality
Asking Permission
Remember that while messages, data, photos, and videos may have been shared by some
people publicly, this does not mean that you can freely use or share these content. The best
way to know is to ask for permission. Take note of the copyright restrictions that might limit your
use of the work.
Proper netiquette is important in combatting the issues and challenges that have sprung from
the advent of new media, especially social media. As a media and information literate, you must
uphold the concepts discussed in this lesson so that you can help change new media and social
media for the better.
St. Joseph’s Academy of Malinao, Aklan, Inc.
(A Catholic Institution)
Malinao, Aklan, Philippines
A reliable source is one that is trustworthy and creates an impression of correctness and
professionalism.
Information is defined as contextualized data that has the potential to be converted into
knowledge.
According to the Johns Hopkins University Library, fraudulent or unreliable sources can be
classified into three types: propaganda, misinformation, and disinformation.
1. Propaganda is the presentation of facts in a manner that elicits a desired response from its
audience.
Political campaigns and speeches, especially when statements that disparage opposing parties
or political ideologies are made.
A framework for source evaluation was developed by Jan Alexander and Marsha Tate of
Widener University. The framework consists of five criteria that can help consumers of media
and information discern which sources to trust: authority, accuracy, objectivity, currency, and
coverage (AAOCC).
❖ Authority
Refers to the author of the information gathered from a particular source.
Tom Rosenstial classifies news sources into these basic categories:
• Sourceless news - refers to an account that makes no specific mention of where the
information comes from.
• The journalist as eyewitness - refers to an account that is clearly stated to be the
firsthand experience of a journalist.
• Credentialed experts - individuals who have the qualifications that can establish them
as reliable sources.
• Anonymous sources - individuals who have their identity withheld, usually to avoid
potential backlash.
Wikipedia is a free online encyclopedia, the contents of which are built collaboratively by its
users. Considered one of the top 10 most visited websites, it has become a convenient source
of quick information for many. But Wikipedia itself encourages its users to follow these two
simple rules:
(1) Do your research properly and wisely. Remember that any encyclopedia is a starting point
for research, not an ending point.
(2) Use your judgment. Remember that all sources have to be evaluated.
St. Joseph’s Academy of Malinao, Aklan, Inc.
(A Catholic Institution)
Malinao, Aklan, Philippines
❖ Accuracy
a source is considered accurate when its contents are truthful and correct. Publications that are
well-written and free of grammatical errors or misspelled words may be used to gauge the
accuracy of an information source.
❖ Objectivity
a concept closely related to accuracy, objectivity refers to the disinterested, fair, and factual
presentation of information. There may be commercial bias if the news or information seeks to
advertise a product or promote a specific business interest. The question to ask is: Who is
paying for the message?
❖ Currency
Information in certain fields of knowledge is time-sensitive and changes constantly. Science and
technology are good examples of such fields. News on science and technology needs to be
evaluated on the basis of currency because of the constant and rapid developments in this field.
The question to ask is: Is the information old or up-to-date?
❖ Coverage
A source can be considered complete if it is thorough and consistent with prior information on a
particular subject. An information source can also be evaluated on whether it uses other
verifiable sources and reflects knowledge of related literature, with proper attribution.