You are on page 1of 30

MODULE 6:

Intellectual Property,
Copyright, and Fair Use
Guidelines
Copyright

A legal device authorizing the creator of literary piece,

artistic work, musicals or other creative compositions the

sole right to publish sell such work.


Copyright owners have the right to control the
reproduction of their work, including the right to receive
payment for that reproduction. An author may grant or sell
those rights to others, including publishers or recording
c o m p a n i e s . Vi o l a t i o n o f s u c h r i g h t i s c a l l e d i n f r i n g e m e n t .
Copyright law gives creators of original material
the exclusive right to further use and duplicate
that material for a given amount of time, at which
point the copyrighted item becomes public
domain. (KENTON, 2020)
Plagiarism
An instance of using or closely imitating the
language and thoughts of another author without
a u t h o r i z a t i o n ; t h e p r e s e n t a t i o n o f t h a t a u t h o r ’s w o r k
a s o n e ’s o w n , a s b y n o t c r e d i t i n g t h e o r i g i n a l
Phishing
A cybercrime in which a target or targets are
contacted by email, telephone or text message
by someone posing as a legitimate institution to
lure individuals into providing sensitive data
such as personally identifiable information,
banking and credit card details, and password.
The information is then used to access important
accounts and can result in identity theft and
financial loss,
The fair use of a copyrighted work of criticism,
comment, news, reporting, teaching including
multiple copies for classroom use, scholarship,
research and similar purposes is not an
infringement of copyright.
Decompilation which is the reproduction of the code and
translation of the forms of the computer programs to
achieve the inter-operability of an independently created
computer program with other programs, may also
constitute fair use.
To determine whether use of a work constitutes fair use, the
following factors are considered:
1. T h e p u r p o s e a n d c h a r a c t e r o f t h e u s e , i n c l u d i n g w h e t h e r
such use is of a commercial nature or is for non profit
educational purposes;
2. T h e n a t u r e o f t h e c o p y r i g h t e d w o r k ;
3. T h e a m o u n t a n d s u b s t a n t i a l i t y o f t h e p o r t i o n u s e d i n
relation to the copyrighted work as a whole; and
4. T h e e f f e c t o f t h e u s e u p o n t h e p o t e n t i a l m a r k e t f o r o r v a l u e
of the copyrighted work.
Republic Act No. 8293 or the Intellectual Property Code of
the Philippines

AN ACT PRESCRIBING THE INTELLECTUAL PROPERTY


CODE AND ESTABLISHING THE INTELLECTUAL PROPERTY
OFFICE, PROVIDING FOR ITS POWERS AND FUNCTIONS,
AND FOR OYHER PURPOSES
MODULE 7:

Digital Divide,
Addiction, and
Bullying
DIGITAL
DIVIDE
(DD)
DIGITAL DIVIDE

Pertains to the social and economic


imbalance of the opportunities to access, use
of or knowledge of information and
communication technology (ICTs)
DIGITAL DIVIDE

It is a term use to refer to the gap between


people who have access to the internet and
those that do not. It can also refer to the
skills people have - the divide between
people who are at ease using technology to
access and analyze information and those
who are not.
DIGITAL DIVIDE

 The unequal opportunity of the internet acquisition is caused by the differences of


skills, motivations and preferences of use based on category such as personal category,
positional category, and the resources category status of a person.

 The divides arise due to lack of knowledge on how to manipulate the technology and
understanding of its benefits as well and some cannot afford the access because the
income is low.
We can be able to overcome
this phenomenon by:

1. Lowering the cost of internet connection in the house.


2. A law should be created to make all public places should have free internet access set by
the government.
3. The different LGUs and NGOs should conduct a forum about the advantages of
technology and how to use the advance technology in rural areas.
4. The parents should be given with trainings related to technology by the schools and
libraries.
COMPUTER
ADDICTION
(CD)
Answer these following questions mentally.

1. Are you absentminded because you are thinking of an online activity?


2. Do you spend more time in the internet before you are satisfied?
3. Have you tried to stop using the internet (like playing online games) chatting but
fail to do it?
4. Is your education, relationships of the family and friends or works affected by
using the internet?
5. Is your behavior becoming moody, irritable or depressed if you cannot use the
internet?
6. Are you escaping meal or sleep late in using the internet?
7. Does internet give you comfort in times of problem or
having bad mood?
What is Computer Addiction?

 The inability to control the desire of using the technology or an extreme use
of the computer which makes the person uneasy or anxiety in the absence of
the gadgets. Wherein the daily routine in life like work, eating or sleep are
affected that could lead to social problem, change in behavior, relationships
and though process.

 The three reason why computer addiction exist are depression, loneliness and
social acceptance where young people commonly experience.
Types of Computer Addiction
• Information Overload- excessive online surfing resulted to
inefficient at work and have less family interconnection

• Compulsion- over time spent in online activities like


gaming, bartering of stocks, gambling which cause a
problem at work

• Cybersex addiction- exceed time spent in surfing porn


s i t e s t h a t c o u l d i n t e r f e r e o n e ’s r e l a t i o n s h i p

• Cyber relationship- excessive time spent in social


networking sites to make relationship online than spending
time to real person like family and friends
Different Symptoms of a computer addict person

1. Emotional Symptoms- feeling of guilt, anxiety,


depression, dishonesty, feeling of great happiness or
excitement (euphoric) in front of the computer,
defensive, distress, escaping of work, isolation and
cannot follow schedule

2. Physical Symptoms- backpain, headache, increase or


decrease of weight, sleep disorder, carpal tunnel
syndrome blurred or strain visions
Computer addiction can be prevented through:

1. Set limit in using computers and doing online


activities.
2. Talk to your family and friends and mingle with them
most of the time.
3. Organize a non-computer related activity like sports.
4. Place your gadgets away from you when not needed.
CYBER
BULLYING
• The term bullying “refers to any severe, or repeated use by
one or more students of a written, verbal or electronic
expression, or a physical act or gesture, or any combination
thereof, directed at another student that has the effect of
actually causing or placing the latter in reasonable fear of
physical or emotional harm or damage to his property;
creating a hostile environment at school for the other
students; infringing on the rights of another students at
school; such as,
but not limited the following:
1. A n y u n w a n t e d p h y s i c a l c o n t a c t b e t w e e n t h e b u l l y a n d t h e v i c t i m l i k e
punching, pushing, shoving, kicking, slapping, tickling, headlocks,
inflicting school pranks, teasing, fighting and the use of available
objects as weapons;

2. A n y a c t t h a t c a u s e s d a m a g e t o a v i c t i m ’ s p s y c h e a n d / o r e m o t i o n a l
well-being;

3. A n y s l a n d e r o u s s t a t e m e n t o r a c c u s a t i o n t h a t c a u s e s t h e v i c t i m u n d u e
emotional distress like directing foul language or profanity at the
target, name-calling, tormenting and commenting negatively on
v i c t i m ’s l o o k s , c l o t h e s a n d b o d y ”

(Republic Act No. 1067-Anti-Bullying Act)


Bullying happens in face to face
while cyber-bullying happens in a
cyberspace.
CYBER BULLYING

a type of bullying done online with the use


of technology that can destroy the physical
and emotional aspect of the victim by the
one who does the act
The different forms of cyberbullying are
posting shameful pictures or videos in social
media, sending threatening or hurtful
messages through chatting or text messages.
Cyber bullying can be prevented by doing the following:

1. B e o p t i m i s t i c p e r s o n .
2. S h a r e t o t h e p e r s o n w h o m y o u c a n t r u s t w i t h .
3. K e e p y o u r p a s s w o r d b y y o u r s e l f . D o n ’ t s h a r e i t .
4. A l w a y s c h e c k t h e c o n t e n t b e f o r e p o s t i n g o r s h a r i n g .
5. A l w a y s l o g o u t y o u r a c c o u n t a f t e r u s i n g .
6. R e s p e c t a n d l o v e o t h e r p e o p l e a n d y o u r s e l f .
Thank you for
listening!

You might also like