You are on page 1of 8

Overview Protection of Undisclosed Information (n,

TRIPS).
The health care environment in The term "technology transfer
which advanced practice registered nurses arrangements" refers to contracts or
are currently practicing is a complex setting agreements involving the transfer of
with rapid change underway driven by a systematic knowledge for the manufacture
need to transform the health care delivery of a product, the application of a process, or
system by focusing on improving patient rendering of a service including
safety, quality, and population health, while management contracts; and the transfer,
at the same time decreasing the overall cost assignment or licensing of all forms of
of health care. This module focuses on: intellectual property rights, including
Intellectual Property Law; Copyright Law; licensing of computer software except
Privacy of Personal and Public Domains computer software developed for mass
(Data Privacy Act); and Netiquette Rules market.
and Guidelines.
The term "Office" refers to the Intellectual
Intellectual Property Law Property Office created by this Act.
Intellectual Property (IP) refers to creations
of the mind, such as inventions; literary and The term "IPO Gazette" refers to the gazette
artistic works; designs; and symbols, names published by the Office under this Act.
and images used in commerce.
Copyright Law
IP is protected in law by, for example, What is copyright?
patents, copyright and trademarks, which
enable people to earn recognition or Copyright is a collection of all rights
financial benefit from what they invent or enjoyed by the owner of an artistic or
create. By striking the right balance literary work.
between the interests of innovators and the
wider public interest, the IP system aims to
foster an environment in which creativity What are considered copyrightable works
and innovation can flourish. in the Philippines?

Republic Act no. 8293 – “An act Under Philippine Law, original intellectual
prescribing the intellectual property code creations in the literary and artistic domain
and establishing the intellectual property are copyrightable. These include books,
office, providing for its powers and pamphlets, articles and other writings;
functions, and for other purposes” periodicals and newspapers; lectures,
sermons, addresses, dissertations prepared
Definitions: for oral delivery; letters; dramatic or
dramatico-musical compositions;
The term "intellectual property rights" choreographic works or entertainment in
consists of: dumb shows; musical compositions;
drawing, painting, architecture, sculpture,
Copyright and Related Rights; engraving, lithography; models or designs
Trademarks and Service Marks; for works of art; original ornamental
Geographic Indications; designs or models for articles of
Industrial Designs; manufacture; illustrations, maps, plans,
Patents; sketches, charts and three-dimensional
Layout-Designs (Topographies) of works relative to geography, topography,
Integrated Circuits; and architecture or science; drawings or plastic
works of a scientific or technical character;
photographic works including works
produced by a process analogous to Who are considered owners of the
photography; lantern slides; audio-visual copyrightable works?
works and cinematographic works and
works produced by a process analogous to The owners of original literary and artistic
cinematography or any process for making works are:
audio-visual recordings; pictorial The author of the work;
illustrations and advertisements and If the work is of joint ownership:
computer programs. The co-authors are the original owners and
in the absence of agreement, their rights
shall be governed by the rules on co-
What works are not protected by copyright ownership.
under Philippine Law? The author of each part is the owner of such
part he/she created, if the work consists of
Copyright protection does not cover: parts that can be used separately, and the
Idea, procedure, system method or author of each part can be identified.
operation, concept, principle, discovery or If the work is created in the course of
mere data as such, even if they are employment:
expressed, explained, illustrated or Employee is the owner, if the work created
embodied in a work; is not part of employee’s regular duties even
News of the day and other miscellaneous if he uses the time, facilities and materials
facts having the character of mere items of of the employer;
press information; Employer is the owner, if the work created
Official text of a legislative, administrative is the result of the performance of
or legal nature, as well as any official employee’s regularly assigned duties,
translation thereof; unless otherwise agreed upon.
Work of the Philippine government, unless If the work was commissioned, the one who
there was a prior approval by the commissioned the work jointly owns it with
appropriate government agency; and the author/creator – but the copyright of the
Statutes, rules and regulations, and work remains with author/creator, unless
speeches, lectures, sermons, addresses, and otherwise agreed upon;
dissertations, pronounced, read or rendered In the case of audio-visual work, the
in courts of justice, before administrative copyright belongs to the producer, the
agencies, in deliberative assemblies and in author of the scenario, the music composer,
meetings of public character. the film director, and the author of the work
adapted. However, unless otherwise agreed
upon among the creators, the producer has
Is a copyright registration necessary to the right to exercise copyright to the extent
protect artistic or literary works? required for the exhibition of the work in
any manner, except for the right to collect
No, copyrightable works are protected from license fees for the performance of musical
the moment of their creation. compositions, with or without words, which
are incorporated into the work.
With respect to letters, the copyright
Who can apply for a copyright registration? belongs to the writer subject to the
following:
The owner of the work or his/her assignees Letters and other private communications
or successors-in-interest has the right to in writing are owned by the person to whom
apply for a copyright registration. they are addressed and delivered, but the
same cannot be published or disseminated
without the consent of the writer or his How and what information is collected
heirs. How the collected information will be used;
However, the court may authorize the who will have access to it
publication or dissemination if the public How the collected information can be
goods or the interest of justice so requires. reviewed and, if necessary, corrected
Within the nursing community, concern
Data Privacy Act over data protection has always been
“Data Privacy Act of 2012”. present. The power provided by
technologies such as computers and the
It is the policy of the State to protect the Internet has heightened the concern of
fundamental human right of privacy, of nurses for these reasons.
communication while ensuring free flow of
information to promote innovation and More data and information are available.
growth. The State recognizes the vital role More possibilities exist for errors in the
of information and communications data.
technology in nation-building and its Organizations rely on information systems
inherent obligation to ensure that personal for essential functions.
information in information and More data are shared between disciplines
communications systems in the government and organizations/institutions/facilities.
and in the private sector are secured and Public concern over possible abuse of
protected. information and privacy is strong.

- National Privacy Commission


Data Privacy Act of the Philippines
Data Protection
Implementing rules and regulations of
The issue of privacy is difficult. The Republic Act 10173, known as the “Data
individual has the inherent right to control Privacy Act of 2012”
personal information. However, to provide
the best possible care and service to the Pursuant to the mandate of the national
individual, the public, and private privacy commission to administer and
organizations must know some of that implement the provisions of the data
information. The issue is further privacy act of 2012, and to monitor and
complicated because “privacy” has not ensure compliance of the country with
been defined in a way that is widely and international standards set for data
generally accepted. Actions such as protection, the following rules and
collecting and storing unnecessary personal regulations are hereby promulgated to
data, disclosing data to individuals or effectively implement the provisions of the
organizations that do not have a genuine act:
need for it, or using private information for
something other than the original purpose
could be considered intrusive.
Rule IV. Data Privacy Principles
Since the 1960s, the widespread use of
computers has led to concern about the Section 17. General data privacy principles.
large mass of data collected through The processing of personal data shall be
sophisticated data linkage capabilities. The allowed, subject to compliance with the
following socio-legal concerns are requirements of the act and other laws
widespread among the public. allowing disclosure of information to the
public, and adherence to the principles of Personal data shall be processed fairly and
transparency, legitimate purpose, and lawfully.
proportionality. Processing should ensure data quality.
Personal data shall not be retained longer
than necessary.
Any authorized further processing shall
Section 18. Principles of transparency, have adequate safeguards.
legitimate purpose and proportionality.
Rule VI. Security measures for the
The processing of personal data shall be protection of personal data
allowed subject to adherence to the
principles of transparency, legitimate Section 25. Data privacy and security.
purpose, and proportionality. Personal information controllers and
personal information processors shall
Transparency. The data subject must be implement reasonable and appropriate
aware of the nature, purpose, and extent of organizational, physical, and technical
the processing of his or her personal data, security measures for the protection of
including the risks and safeguards involved, personal data. The personal information
the identity of personal information controller and personal information
controller, his or her rights as a data subject, processor shall take steps to ensure that any
and how these can be exercised. Any natural person acting under their authority
information and communication relating to and who has access to personal data, does
the processing of personal data should be not process them except upon their
easy to access and understand, using clear instructions, or as required by law. The
and plain language. security measures shall aim to maintain the
Legitimate purpose. The processing of availability, integrity, and confidentiality of
information shall be compatible with a personal data and are intended for the
declared and specified purpose which must protection of personal data against any
not be contrary to law, morals, or public accidental or unlawful destruction,
policy. alteration, and disclosure, as well as against
Proportionality. The processing of any other unlawful processing. These
information shall be adequate, relevant, measures shall be implemented to protect
suitable, necessary, and not excessive in personal data against natural dangers such
relation to a declared and specified purpose. as accidental loss or destruction, and human
Personal data shall be processed only if the dangers such as unlawful access, fraudulent
purpose of the processing could not misuse, unlawful destruction, alteration and
reasonably be fulfilled by other means. contamination.

Section 19. General principles in collection,


processing and retention. Section 26. Organizational Security
Measures
The processing of personal data shall
adhere to the following general principles Where appropriate, personal information
in the collection, processing, and retention controllers and personal information
of personal data: processors shall comply with the following
guidelines for organizational security
Collection must be for a declared, specified,
and legitimate purpose. Compliance officers
Data protection policies.
Records of processing activities. Section 34. Rights of the data subject. The
Management of human resources. data subject is entitled to the following
Processing of personal data rights:

Right to be informed.
Section 27. Physical security measures. The data subject has a right to be informed
Where appropriate, personal information whether personal data pertaining to him or
controllers and personal information her shall be, are being, or have been
processors shall comply with the following processed, including the existence of
guidelines for physical security: automated decision-making and profiling.
The data subject shall be notified and
Policies and procedures shall be furnished with information indicated
implemented to monitor and limit access to hereunder before the entry of his or her
and activities in the room, workstation or personal data into the processing system of
facility, including guidelines that specify the personal information controller, or at the
the proper use of and access to electronic next practical opportunity:
media; (A) description of the personal data to be
Design of office space and work stations, entered into the system;
including the physical arrangement of
furniture and equipment, shall provide (B) purposes for which they are being or
privacy to anyone processing personal data, will be processed, including processing for
taking into consideration the environment direct marketing, profiling or historical,
and accessibility to the public; statistical or scientific purpose;
The duties, responsibilities and schedule of
individuals involved in the processing of (C) basis of processing, when processing is
personal data shall be clearly defined to not based on the consent of the data subject;
ensure that only the individuals actually
performing official duties shall be in the (D) scope and method of the personal data
room or work station, at any given time; processing;
Any natural or juridical person or other
body involved in the processing of personal (E) the recipients or classes of recipients to
data shall implement policies and whom the personal data are or may be
procedures regarding the transfer, removal, disclosed;
disposal, and re-use of electronic media, to
ensure appropriate protection of personal (F) methods utilized for automated access,
data; if the same is allowed by the data subject,
Policies and procedures that prevent the and the extent to which such access is
mechanical destruction of files and authorized, including meaningful
equipment shall be established. The room information about the logic involved, as
and workstation used in the processing of well as the significance and the envisaged
personal data shall, as far as practicable, be consequences of such processing for the
secured against natural disasters, power data subject;
disturbances, external access, and other
similar threats. (G) the identity and contact details of the
personal data controller or its
representative;
Rule VIII. Rights of Data Subjects
(H) the period for which the information
will be stored; and
( I ) the existence of their rights as data Names and addresses of recipients of the
subjects, including the right to access, personal data;
correction, and object to the processing, as Manner by which such data were
well as the right to lodge a complaint before processed;
the commission. Reasons for the disclosure of the personal
data to recipients, if any;
Information on automated processes where
the data will, or is likely to, be made as the
Right to object. sole basis for any decision that significantly
The data subject shall have the right to affects or will affect the data subject;
object to the processing of his or her Date when his or her personal data
personal data, including processing for concerning the data subject were last
direct marketing, automated processing or accessed and modified; and
profiling. The data subject shall also be The designation, name or identity, and
notified and given an opportunity to address of the personal information
withhold consent to the processing in case controller.
of changes or any amendment to the
information supplied or declared to the data
subject in the preceding paragraph. Right to rectification.
The data subject has the right to dispute the
inaccuracy or error in the personal data and
have the personal information controller
When a data subject objects or withholds correct it immediately and accordingly,
consent, the personal information controller unless the request is vexatious or otherwise
shall no longer process the personal data, unreasonable. If the personal data has been
unless: corrected, the personal information
controller shall ensure the accessibility of
The personal data is needed pursuant to a both the new and the retracted information
subpoena; and the simultaneous receipt of the new and
The collection and processing are for the retracted information by the intended
obvious purposes, including, when it is recipients thereof: provided, that recipients
necessary for the performance of or in or third parties who have previously
relation to a contract or service to which the received such processed personal data shall
data subject is a party, or when necessary or be informed of its inaccuracy and its
desirable in the context of an employer- rectification, upon reasonable request of the
employee relationship between the data subject.
collector and the data subject; or
The information is being collected and
processed as a result of a legal obligation.
Right to erasure or blocking.
The data subject shall have the right to
Right to access. suspend, withdraw or order the blocking,
The data subject has the right to reasonable removal or destruction of his or her
access to, upon demand, the following: personal data from the personal information
controller’s filing system.
Contents of his or her personal data that
were processed; This right may be exercised upon discovery
Sources from which personal data were and substantial proof of any of the
obtained; following:
(A) the personal data is incomplete, Netiquette Rules and Guidelines
outdated, false, or unlawfully obtained; Netiquette is short for "Internet etiquette."
Just like etiquette is a code of polite
(B) the personal data is being used for behavior in society, netiquette is a code of
purpose not authorized by the data subject; good behavior on the Internet. This includes
several aspects of the Internet, such as
(C) the personal data is no longer email, social media, online chat, web
necessary for the purposes for which they forums, website comments, multiplayer
were collected; gaming, and other types of online
communication.
(D) the data subject withdraws consent or
objects to the processing, and there is no While there is no official list of netiquette
other legal ground or overriding legitimate rules or guidelines, the general idea is to
interest for the processing; respect others online.

(E) the personal data concerns private Examples of rules to follow for good
information that is prejudicial to data netiquette:
subject, unless justified by freedom of
speech, of expression, or of the press or Avoid posting inflammatory or offensive
otherwise authorized; comments online (a.k.a flaming).
Respect others' privacy by not sharing
(F) the processing is unlawful; personal information, photos, or videos that
another person may not want published
(G) the personal information controller or online.
personal information processor violated the Never spam others by sending large
rights of the data subject. amounts of unsolicited email.
No Yelling! There’s a time and a place for
Further details of the Data Privacy Act of everything—BUT IN MOST
2012 https://www.privacy.gov.ph/data- SITUATIONS TYPING IN ALL CAPS IS
privacy-act/Links to an external site. INAPPROPRIATE. Most readers tend to
perceive it as shouting and will have a hard
time taking what you say seriously, no
matter how intelligent your response may
Data Privacy Act as Applied In Nursing be. If you have vision issues, there are ways
Practice to adjust how text displays so you can still
see without coming across as angry.
Nurse’s Guidelines to avoid Data Breach Show good sportsmanship when playing
online games, whether you win or lose.
Never breach a patient’s information (SPI) Don't troll people in web forums or website
If you are unsure about disclosing a comments by repeatedly nagging or
patient’s information, seek guidance from annoying them.
the Hospital’s Data Protection Officer Submit files the right way. Knowing how to
(DPO) properly submit your work online is key to
Know by heart your hospital’s Privacy your success as an online student. Online
Manual without fail. course instructors often establish ground
Never seek information about a patient for rules for file assignment submissions, like
whom you are not providing care. naming conventions that help them keep
Always maintain your patient’s information things organized or acceptable file formats.
confidential. Ignoring these instructions is a common
example of bad netiquette.
Stick to the topic when posting in online
forums or when commenting on photos or
videos, such as YouTube or Facebook
comments.
Don't swear or use offensive language.
Avoid replying to negative comments with
more negative comments. Instead, break the
cycle with a positive post.
If someone asks a question and you know
the answer, offer to help.
Attempt to find your own answer. If you’re
confused or stuck on an assignment, your
first instinct may be to immediately ask a
question. But before you ask, take the time
to try to figure it out on your own. For
questions related to class structure, such as
due dates or policies, refer to your syllabus
and course FAQ. Attempt to find the
answers to any other questions on your own
using a search engine. If your questions
remain unanswered after a bit of effort, feel
free to bring them up with your instructor.
Thank others who help you online.

You might also like