0% found this document useful (0 votes)
57 views49 pages

Ethics in Social Media, Online User Behavior: Ust Senior High School - Stem Track

This document discusses several topics related to intellectual property and online safety, including: 1. The different types of intellectual property such as patents, trademarks, and copyrights. It defines each type and how long protections last. 2. Guidelines for fair use of copyrighted material and tips to avoid infringement. Common internet threats like malware, spam, and phishing are also outlined. 3. Best practices for online safety including using privacy settings, avoiding public WiFi, not sharing passwords or personal information, and installing antivirus software. Computer ethics and sample ethical scenarios are briefly examined.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views49 pages

Ethics in Social Media, Online User Behavior: Ust Senior High School - Stem Track

This document discusses several topics related to intellectual property and online safety, including: 1. The different types of intellectual property such as patents, trademarks, and copyrights. It defines each type and how long protections last. 2. Guidelines for fair use of copyrighted material and tips to avoid infringement. Common internet threats like malware, spam, and phishing are also outlined. 3. Best practices for online safety including using privacy settings, avoiding public WiFi, not sharing passwords or personal information, and installing antivirus software. Computer ethics and sample ethical scenarios are briefly examined.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 49

Philippine Copyright Law,

Ethics in Social Media,


Online User Behavior

UST SENIOR HIGH SCHOOL – STEM Track


Intellectual Property, Patents,
Trademark, Copyright, and Fair Use
Intellectual Property
▪ Intellectual property (IP) refers to creations of the mind, such as inventions;
literary and artistic works; designs; and symbols, names and images (used in
commerce).
Types of Intellectual Property
1. Trademarks
2. Copyright
3. Patents
4. Trade secrets
What is a Patent?
▪ A patent is an exclusive right granted for an
invention, which is a product or a process that
provides, in general, a new way of doing
something, or offers a new technical solution to
a problem.
▪ To get a patent, technical information
about the invention must be disclosed to the
public in a patent application.
▪ Duration: 20 years
What is a Patent?
What is a Trademark?

▪ A trademark is a word, phrase, symbol,


and/or design that identifies and
distinguishes the source of the goods of one
party from those of others.

▪ A service mark is a word, phrase, symbol,


and/or design that identifies and
distinguishes the source of a service rather
than goods.
What is Copyright?

▪ The legal right granted to an


author, composer, playwright,
publisher, or distributor to
exclusive publication, production,
sale, or distribution of a literary,
musical, dramatic, or artistic
work.
Copyright Information

Copyright protects “original works of authorship” that are fixed in “a


tangible form of expression.”

Rights begin at the moment of “fixation.”

Duration in the Philippines: 50 years plus age of the author (after death)
What is protected?

· literary works (all text including computer software)


· musical works
· dramatic works
· pantomimes & choreographic works
· pictorial, graphic, & sculptural works
· motion pictures & other audiovisual works
· sound recordings
· architectural works
What is NOT protected?
· ideas, concepts, or discoveries
· titles, names, short phrases, and slogans
· works that are not fixed in a tangible form of expression such as
improvised speech or dance
· works consisting entirely of information that is commonly available and
contains no originality
· anything written or created by the government
What rights does the owner control?
▪ Rights to:
· make copies of the work
· distribute copies of the work
· perform the work publicly (such as for plays, film, or music)
· display the work publicly (such as for artwork, or any material used on the
internet or television)
· make “derivative works” (including making modifications, adaptations or
other new uses of a work, or translating the work to another media)
What if I use copyrighted work?

▪ If you use copyrighted work and author finds out, he/she must
notify you in writing if he/she wants you to remove it.

▪ You MUST remove it.


When can you use copyrighted material?

o Personal, academic, not-for-profit use


– some authors will let you use
o Give the author credit
> linking to author’s site
o Use under “Fair Use” conditions.
What is Fair Use?

▪ A doctrine (in the copyright law) that allows limited use of copyrighted
material without requiring permission from the rights holders such as for
commentary, criticism, news reporting, research, teaching or scholarship.
What should I do? (If you see something you want to use)

▪ Use your best judgment


▪ Everything on Web is copyrighted property of someone
▪ Academic use does NOT automatically protect you from
being sued for copyright infringement.
Finding Images

▪ Your responsibility to find out if it is free for your use or not.


▪ Law : every image is protected by copyright automatically when
it is created
▪ Question – Does owner care if you use it?
Free Stuff
▪ You can find totally free graphic sites on the Web by entering “free graphics”
into a search engine.
▪ However, images usually are poor quality
Copyright Infringement
“..copyright infringement is a violation of an individual or
organization’s copyright. It describes the unauthorized use of
copyrighted material such as text, photos, videos, music, software,
and other original content. In the computer industry, copyright
violations often refer to software programs and websites..”

Source: https://techterms.com/definition/copyright_infringement
Tips to avoid Copyright Infringement
1. Understand – copyright protects literary works, photographs, paintings,
drawings, films, music (and lyrics), choreography, and sculptures, but it
generally does NOT protect underlying ideas and facts. This means that
you can express something using your own words, but you should give
credit to the source.

2. Be responsible – even if a material does not say that it is copyrighted, it


is not a valid defense against copyright. Be responsible enough to know if
something has a copyright.
Tips to avoid Copyright Infringement
3. Be creative – ask yourself whether what you are making is something that
came from you or something made form somebody else’s creativity. It is
important to add your own creative genius in everything that will be
credited to you.

4. Know the law – there are some limitations to copyright laws and know it.
For instance in the Philippines, copyrights only last a lifetime (of the author)
plus 50 years.
Ethics in Social Media,
Online User Behavior
Dangers of the Internet – Video Demo
A Fact…

As the number of internet users continues to grow worldwide,


internet safety is a growing concern for both
children and adults.
Common Safety Concerns on the Internet

▪ malicious users (spam, phishing, cyberbullying, cyber-stalking)


▪ websites and software (malware, computer viruses, etc.)
▪ various types of obscene or offensive content
▪ crimes can be committed on the Internet such as fraud, identity
theft, cybercrime and more…
Common Internet Threats…
1. Malware
Virus - a malicious program designed to replicate itself by either changing
filename, file types and hides files (mostly infect files, and folders)
Worm - a malicious program that transfers from one computer to another by
any type of means (mostly infects operating system, i.e. slowing down)
Trojan - disguised as a useful program but leaves you unprotected
*Rogue Security software - tricks the user into posing that it is the
security software.
Spyware - program running (in the background) without you knowing it.
*Keyloggers - used to record the keystroke done by users
Common Internet Threats…
2. Spam – these are your unwanted email (mostly from bots
or ads)

3. Phishing - email that will direct the user website and be


asked to update his/her username, password, credit card,
or personal information.
Online Safety
▪ is the knowledge of maximizing the user's personal safety and
security risks to private information and property associated with
using the internet, and the self-protection from computer crime in
general.

Need: Practices to make oneself safe and be safe online


Tips to stay safe online
1. Check out the privacy page of a website to learn how the
website handles the information you share.*
2. Know the security features of the social networking site you use.
3. Do not just accept terms and conditions; READ IT.
4. Avoid logging in to public networks/Wi-Fi. Browsing in “Incognito
(or private) mode,” a feature of the browser, WILL NOT protect
you from hackers.
5. Be mindful of what you share online and what site you share it to.
Tips to stay safe online
6. If you have a Wi-Fi at home, make it a private network by
adding a password.
7. DO NOT SHARE your password to anyone.
8. Do not talk to strangers whether online or face-to-face.
9. Never post anything about a future vacation.
10. Add friends you know in real life
11. Avoid visiting untrusted websites.
Tips to stay safe online
12. Install and update an antivirus software on your computer.
Use only one anti-virus software to avoid conflicts.
13.Avoid downloading anything from untrusted websites. You are
most vulnerable in peer-to-peer downloads (torrents) as the
download is most likely not monitored by the site owner.
14. Buy the software; DO NOT USE pirated ones.
15. Do not reply or click links from suspicious emails.
Computer Ethics

Why study Ethics?


Computer Ethics:
Why study Ethics?

▪ According to Bowyer (2001), through ethics you become a more


ethical person, particularly in your chosen career or field.
▪ It is important to note that as Johnson has proposed (2001), we should
think of computer ethical issues as new species of moral issues.
Sample Ethical Issues..
Scenario 1:
As Network Administrator of this exclusive, top notch IT
company, I have access to all the files, ALL sensitive information of
everyone working in this company. I can get information that I can use
to my advantage.
Scenario 2:
I think my partner is cheating on me. I need to know the
password to my partner’s facebook account so I could check if s/he is
secretly flirting with someone.
Sample Ethical Issues..
Scenario # 3:
I am an artist who uses applications like Photoshop,
Dreamweaver and Illustrator. I do not have licensed products. I have
downloaded the pirated version.
10 Commandments of
Computer Ethics

1. Thou shalt not use computer to harm other people


2. Thou shalt not interfere with other people’s computer
work
3. Thou shalt not snoop around in other people’s files
4. Thou shalt not use a computer to steal
5. Thou shalt not use a computer to bear false witness
10 Commandments of
Computer Ethics

6. Thou shalt not use or copy software for which you have not
paid
7. Thou shalt not use other people’s computer resources without
authorization
8. Thou shalt not appropriate other people’s intellectual output
9. Thou shalt not think about the social consequences of the
program you write
10. Thou shalt use a computer in ways that show consideration
and respect
Online User Behavior

(Online Etiquette)
Online User Behavior (Online Etiquette)

Think before you click!


If you send an email or post a message in anger, it could come
back to haunt you later. The same goes for pictures and videos
you post online. Even when something is deleted from a page,
it may still be out there waiting to be found when you least
expect it.
Online User Behavior (Online Etiquette)

Respect the time and


bandwidth of others.
Don't pass along emails that contain hoaxes (pranks), or send
messages to the entire student body. The same goes for
sending large videos or attachments in an email message. It
wastes everyone's time when they have to wade through
extra information to get to the important stuff.
Online User Behavior (Online Etiquette)

Don't send messages that


could be misinterpreted as
threatening or hurtful.
Be careful about the language you use as well as the
information you pass along about others. Sending messages
that could be seen as threatening may result in disciplinary
action.
Online User Behavior (Online Etiquette)

Follow the conventions of writing


when sending formal emails or
posting comments online.
Unless the message you're sending is informal (such as a text
message to a friend), you should use correct spelling,
grammar, and punctuation. You shouldn't WRITE IN ALL
CAPS! (It's considered shouting)
Online User Behavior (Online Etiquette)

Respect others' right to


privacy.
Don't use technology to pass along rumors or share personal
information about someone without their permission. The
same goes for posting names and photos of others.

You might also like