Lesson 7
Lesson 7
Topic Outline:
• Fair Use
• Intellectual Property
• Plagiarism
• Netiquette
• Digital Divide
• Virtual Self
Fair Use
• Refers to the copying of a copyrighted material with the purpose of using it for a review,
commentary, or parody, without the need to ask permission from the copyright owner.
PARODY
• Example: taking a screenshot photo from a famous movie and turning it into a meme.
Intellectual Property
Gives the owner exclusive rights Gives the owner exclusive use of Property rights relating to an
to the material. certain images/phrases. invention.
Protects works of authorship, Protects a word, phrase, symbol Has limited duration usually 20
published or unpublished. or design that identifies the years from date of application
source of the product.
Copyright owner decides who Prevents companies from selling Prevents anyone from making,
may financially profit from it. a similar product with the same using or selling the patented
or similar word or symbol. invention.
Only good within the country of A form of protection for a brand Only effective in the country it
origin unless agreed upon by name. was filed.
other countries to honor each
other’s copyright.
MYTHS FACTS
ONCE A WORK IS POSTED You cannot use, copy or post someone else’s photos, images, songs or
ONLINE, IT LOSES COPYRIGHT articles without their permission. The person who created them owns
PROTECTION these works and they have copyright protection from the moment the
works were created and they never lose this ownership protection
I CAN COPY A WORK ONLINE You cannot use other people’s work unless they first give you permission.
PROVIDED I GIVE THE OWNER Some websites say you can use any material from their site provided you
CREDIT OR A LINK BACK. link back and give them credit. But check first and get permission unless it’s
specifically granted on the work.
IF I ALTER THE WORK OR ONLY Derivative works are still covered by Copyright. The only exception is if you
USE PART OF IT, I AM NOT are writing a review or critique and you’re referring to the work. This is
BREACHING COPYRIGHT. considered fair use.
IF THERE IS NO COPYRIGHT There is no requirement to display a copyright symbol or register any work
SYMBOL OR NOTICE, THE to have copyright protection. It is protected from the moment it is created
WORK CAN BE FREELY USED. and the owner does not lose their copyright if they don’t use the copyright
symbol
I CAN USE ANOTHER You are breaching Copyright whether you make money or not. The
PERSON’S WORK AS LONG AS I argument that you are giving the owner free advertising does not count.
DON’T PROFIT FINANCIALLY Any money you make would be taken into account by a court decision
FROM IT against you.
• Yamaha said Racal violated intellectual property rights when the latter incorporated the
design cues of its MD110 under bone and JR125 scooter from the Yamaha Sniper and
Mio Soul, respectively.
• ABS-CBN alleged that each segment of the defunct "Wowowee" was "reproduced" in
"Willing Willie" namely: 1) introduction of the host by one "DJ Coki," 2) dance number of
Revillame, 3) "Biga-ten" segment named as "Bigtime Ka," and 4) "Willie of Fortune" was
repackaged as "Willtime Bigtime."
• ABS-CBN also claimed that "the look and feel of the new show was strikingly similar to
the previous one" from set design, stage, studio viewers' layout, sequencing, blocking,
and camera angles.
Plagiarism
• an act or instance of using or closely imitating the language and thoughts of another author
without authorization; the representation of that author's work as one's own, as by not crediting
the original author.
Netiquette
1. NO YELLING, PLEASE
• There’s a time and a place for everything—BUT IN MOST SITUATIONS TYPING IN ALL CAPS IS
INAPPROPRIATE.
• Sarcasm has been the source of plenty of misguided arguments online, as it can be incredibly
difficult to understand the commenter’s intent. What may seem like an obvious joke to you
could come across as off-putting or rude to those who don’t know you personally.
• Attempt to find the answers to any other questions on your own using a search engine like
Google or Bing. Relatively simple questions can usually be answered within seconds—which
saves everyone time. If your questions remain unanswered after a bit of effort, feel free to bring
them up with your instructor
6. Brevity rules
7. Read first
• Take some time to read through each of the previous discussion post responses before writing
your own response.
• Personal information is valuable to identity thieves, so try not to share more than is necessary.
9. Be kind
Digital Divide
• Refers to the economic, educational, and social inequalities experienced by those who cannot
afford to have computer and internet access.
• Pertain to the gap on the kind of information which can be accessed, and the available form of
communication that is allowed to be distributed
• Disparity between:
• Income
• Race
• Gender
• Age
• Disabilities
Virtual self
means a human characteristic or persona within an avatar most likely in computer games,
videos or any computer related activities.
• Start your security assessment. Ask yourself what you want to protect and from whom,
and estimate the likelihood that the specific parties would compromise your data.
• A good password manager generates, stores, and updates all your passwords with a
button press. The actual passwords are encrypted and accessible solely by you, but the
system is only as good as your master password.
• Ditch Touch ID
• It’s a neat way to quickly unlock your phone, but your fingerprint sensor is also one of
the easier ways for someone to access your device.
• Avoid Cookies
• Cookies are small bits of code that are temporarily installed on your computer when you
visit a website
• Even after you close your browser, cookies continue to track information. This is your
new mantra: Flush the cache, delete the cookies, protect your privacy.
• Browse Safely
• To surf the web is to publicly share your browsing activity with online data collectors.
• You won’t believe what Google knows about you. Seriously. Personal information,
search logs, browsing habits, locations—all of it stored and used for ad targeting, unless
you know how to navigate your privacy settings.
• Go Virtual
• Virtual private networks can be useful for maintaining browser secrecy, but not all can
be trusted. Do your research and only choose a VPN service that doesn’t
Digital Footprint
• one's unique set of digital activities, actions, and communications that leave a data trace on the
Internet or on a computer or other digital device and can identify the particular user or device:
• the quality of habits, actions, and consumption patterns that impact the ecology of digital
content and communities.
Cyber Bullying
• bullying that takes place online, or using electronic technology such as cell phones,
computers, and tablets over communication tools including social media sites, text
messages, chat, and websites.
Types of cyberbullying
2. GOSSIP - posting or sending cruel gossip to damage a person’s reputation and relationships with
friends, family, and acquaintances.
4. NATION – breaking into someone’s e-mail or other online account and sending messages that
will cause embarrassment or damage to the person’s reputation and affect his or her
relationship with other.
5. OUTING AND TRICKERY – tricking someone into revealing secrets or embarrassing information,
which is then shared online.
• the excessive use of computers to the extent that it interferes with daily life.
• This excessive use may for example interfere with work or sleep, result in problems with social
interaction, or affect mood, relationships, and thought processes.
Intellectual Property Rights in the Philippines AKA REPUBLIC ACT NO. 8293
A. Offenses against the confidentiality, integrity and availability of computer data and systems
1. Illegal Access
2. Illegal Interception
3. Data Interference
4. System Interference
5. Misuse of Devices
6. Cyber-Squatting
B. Computer-Related Offenses
1. Computer-Related Forgery
2. Computer-Related Fraud
C. Content-Related Offenses
1. Cybersex
2. Child Pornography
4. Libel
D. Other Offenses
Collaborate on this activity. Choose 4 -5 members by group. You also have an option to work on it alone
in case there are no more groups available. Research about a case that happened in the Philippines
regarding the suggested issues of using unguarded internet. Choose only one issue and answer the
questions provided.
• Do you think technology and the internet have made copyright and plagiarism easier?
• Cyber Bullying
• The effect of such case to the person being bullied and the bully.
• Ado you think technology and the internet has made bullying easier?
This activity must be placed on a word document. Only one needs to submit provided that all the names
of the members are included. Kindly follow the question and answer format. Thanks!