Intellectual Property PDF
Document Details
Uploaded by BrilliantMercury8793
Tags
Summary
This document provides an overview of intellectual property, focusing on the concepts of copyright, patents, and trademarks. It details the rights of creators and the legal protections surrounding their works.
Full Transcript
Intellectual Property - refers to creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images used in commerce World Intellectual Property Organization (WIPO) is the global forum for intellectual property services, policy, information and coopera...
Intellectual Property - refers to creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images used in commerce World Intellectual Property Organization (WIPO) is the global forum for intellectual property services, policy, information and cooperation The World Intellectual Property Organization (WIPO) is the UN agency responsible for treaties involving copyright, patent, and trademark laws. WIPO can be a force for progressive change, helping the world take into account public interest and development needs. IP is protected in law by, for example, patents, copyright and trademarks, which enable people to earn recognition or financial benefit from what they invent or create. By striking the right balance between the interests of innovators and the wider public interest, the IP system aims to foster an environment in which creativity and innovation can flourish. Types of Intellectual Property 1. Copyright - a legal term used to describe the rights that creators have over their literary and artistic Works. Books, music, paintings, sculpture and films, to computer programs, databases, advertisements, maps and technical drawings LITERARY WORKS - 50 During the lifetime of the author plus 50 years after death ART – 25 years from the date of creation PHOTOGRAPHIC WORK - 50 years from publication AUDIO – VISUAL WORK - 50 years from publication SOUND RECORDING - 50 years from year recording took place BROADCAST RECORDING - 20 years from date of broadcast TRADEMARK - Valid for 10 years and may be renewed for a periods of 10 years INVENTION PATENT - Valid for 20 years from filing date application INVENTION - A new device, method, or process developed from study and experimentation PATENT - an exclusive right granted for an invention. Provides the patent owner with the right to decide how - or whether - the invention can be used by others TRADEMARK - a sign capable of distinguishing the goods or services of one enterprise from those of other enterprises REGISTERED TRADEMARK - The R symbol indicates that this word, phrase, or logo is a registered trademark for the product or service. It must only be used in the case of registered trademarks and by the owner or licensee. It also must only be used in the regions in which you possess a valid trademark registration. TRADEMARK The TM symbol can generally be used by any person or business to indicate that a particular word, phrase, or logo is intended to serve as an identifier for the source of that product or service. You do not have to have registered a trademark to use it and many companies will opt to use the TM symbol for new goods or services in advance of and during the application process. Trademark Infringement - defined as the unauthorized use of a trademark or service mark. INDUSTRIAL DESIGN - constitutes the ornamental or aesthetic aspect of an article. May consist of three-dimensional features, such as the shape or surface of an article, or of two- dimensional features, such as patterns, lines or color DESIGN INFRINGEMENT where a person infringes a registered design during the period of registration. GEOGRAPHICAL INDICATIONS AND APPELLATIONS OF ORIGIN - signs used on goods that have a specific geographical origin and possess qualities, a reputation or characteristics that are essentially attributable to that place of origin - most commonly includes the name of the place of origin of the goods. FAIR USE - Fair use means you can use copyrighted material without a license only for certain purposes. These include: Commentary Criticism Reporting Research Teaching Guidelines for Fair Use A majority of the content you create must be your own. Give credit to the copyright holder. Don't make money off of the copyrighted work. Creative Commons is an American non-profit organization devoted to expanding the range of creative works available for others to build upon legally and to share. The organization has released several copyright-licenses known as Creative Commons licenses free of charge to the public. PLAGIARISM the act of using another person's words or ideas without giving credit to that person The practice of taking someone else's work or ideas and passing them off as one's own. SOURCES NOT CITED The Ghost Writer” The writer turns in another’s work, word-for-word, as his or her own. “The Photocopy” The writer copies significant portions of text straight from a single source, without alteration. “The Potluck Paper” The writer copies from several different sources, tweaking the sentences to make them fit together while retaining most of the original phrasing. “The Poor Disguise” The writer has altered the paper’s appearance slightly by changing key words and phrases. “The Labor of Laziness” The writer takes the time to paraphrase most of the paper from other sources and make it all fit together. “The Self-Stealer” The writer “borrows” generously from his or her previous work. SOURCES CITED (BUT STILL PLAGIARIZED) “The Forgotten Footnote” The writer mentions an author’s name for a source, but neglects to include specific information on the location of the material referenced. “The Misinformer” The writer provides inaccurate information regarding the sources, making it impossible to find them. “The Too-Perfect Paraphrase” The writer properly cites a source, but neglects to put in quotation marks on text that has been copied word-for-word, or close to it. “The Resourceful Citer” The writer properly cites all sources, paraphrasing and using quotations appropriately. The catch? The paper contains almost no original work! “The Perfect Crime” The writer properly quotes and cites sources in some places, but goes on to paraphrase other arguments from those sources without citation. WHAT ABOUT IMAGES, VIDEOS, AND MUSIC? Without receiving proper permission or providing appropriate citation, the following are considered plagiarism: Copying media (especially images) from other websites to paste them into your own papers or websites. Making a video using footage from others’ videos or using copyrighted music as part of the soundtrack. Performing another person’s copyrighted music (i.e., playing a cover). CHALLENGES AND RISKS IN MEDIA Grooming Grooming refers to pedophiles using the Internet as a means to contact children and young people while concealing their adult identity. Bullying: Various types of bullying seem always to be part of people’s lives. Computer addiction: the excessive use of computers to the extent that it interferes with daily life. Digital divide- the economic inequality between groups in terms of access to, use of, or knowledge of ICT. Republic Act 10175 also known as the “Cybercrime Prevention Act of 2012” which aims to address legal issues concerning online interactions and technology related concerns in the country. Cybercrime the use of a computer as an instrument to further illegal ends criminal activity or a crime that involves the Internet, a computer system, or computer technology RA 10175 of 2012, includes the following. Offenses against the confidentiality, integrity, and availability of computer data and systems: 1. Illegal Access. – The access to the whole or any part of a computer system without right. 2. Illegal Interception. – The interception made by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data. 3. Data Interference. — The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses. 4. System Interference. — The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data message, without right or authority, including the introduction or transmission of viruses. 5. Misuse of Devices. (i) The use, production, sale, procurement, importation, distribution, or otherwise making available, without right, of: 6. Cyber-squatting. – The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering the same. Computer-related Offenses: Computer-related Forgery. (i) The input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible; or Computer-related Fraud. The unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent: Provided, That if no damage has yet been caused, the penalty imposable shall be one (1) degree lower. Computer-related Identity Theft. The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical, without right: Provided, That if no damage has yet been caused, the penalty imposable shall be one (1) degree lower. Content-related Offenses: (1) Cybersex. The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration. (2) Child Pornography. The unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed through a computer system: Provided, That the penalty to be imposed shall be (1) one degree higher than that provided for in Republic Act No. 9775. (3) Unsolicited Commercial Communications. — The transmission of commercial electronic communication with the use of computer system which seek to advertise, sell, or offer for sale products and services are prohibited unless: (i) There is prior affirmative consent from the recipient; or (ii) The primary intent of the communication is for service and/or administrative announcements from the sender to its existing users, subscribers or customers; or (4) Libel. The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system or any other similar means which may be devised in the future. Current and Future Trends of Media and Information Wearable Technologies Are gadgets designed to be worn for entertainment , fashion, educational activities, etc. these technologies are made for a better living, easier way of living, and for helping those who are in need of guidance. Google Glass and android-powered pair glasses designed to of make the user’s field of vision its own screen. Oculus Rift A headset with a built-in screen displaying a “virtual reality”. Virtual Reality is a simulation of a three-dimensional environment created by a software. Lechal GPS Shoes A footwear that gives direction to those who wear it. It came from a Hindi word “Lechel” which means ‘bring me there or take me along”. The way this works is the shoe vibrates whether if you are going the wrong way. Its main purpose is to help those who is visually impaired. It was designed by Gaurav Duggal from Ducere Technologies, and was released last 2014. Fin Ring A “gesture-based control” technology that lets you switch, scroll, click, tap or swipe any smart devices connected to it with just the user’s thumb. UP (activity tracker ) A smart wristband designed as a fitness tracker. It is an advance pedometer that records all the users activity’s data received by every step you take. Jawbone was the manufacturer of this piece of technology. Cicret Bracelet A waterproof, smart wristband that makes the user’s arm its own screen. It has its own pico projector, Bluetooth and Wi-Fi connectivity, a USB port, processor, and a proximity sensors. Once it turned on, it will automatically project what the phone’s screen has. The user can move the icons, accept calls, and type a message through it. It was manufactured by a company named Cicret. A waterproof, smart wristband that makes the user’s arm its own screen. It has its own pico projector, Bluetooth and Wi-Fi connectivity, a USB port, processor, and a proximity sensors. Once it turned on, it will automatically project what the phone’s screen has. The user can move the icons, accept calls, and type a message through it. It was manufactured by a company named Cicret. 3D environment is a nature having the three-dimensional properties; length, width, and depth. This provides a perception having a fictional character realistic look 3D Printing Hologram 3D Film 3D Animation Massive Open Online Course (MOOC) Is a free “distance-learning program” that can be taken through the internet by large numbers of people for additive learning. It is an online course that are being offered by private companies and universities for additional knowledge and for new learning experience. Text may be defined as a simple and flexible format of presenting information or conveying ideas whether hand-written, printed or displayed on-screen. It is very powerful in disseminating information, providing direction and giving suggestions. Text is available in different sources, which may be categorized into two: Formal Example of these are news articles, published books, newspapers, magazines, advertisements, research works, etc. Formal text-based materials are created and distributed by established institutions (such as publishing companies, news agencies, etc.) and go through a rigorous process of editing or evaluation and are usually governed by censorship of the state. Informal Examples of these are blogs, personal e-mails, SMS or text messages, online messengers, social media platforms, etc. They come from personal opinions or views on different issues, processes, etc. Text can be as short such as a single sentence or phrase, or they can be as lengthy as news articles or investigative reporting. no matter how brief or lengthy, however, a text is always carefully written with the intent of sending a very specific message to the target audience. As producers of text media and information, we need to review the media and information design framework: Text as Visual Typeface font, font type, or type) is the representation or style of a text. A typeface is usually composed of alphabets, numbers, punctuation marks, symbols and other special characters. Fonts in digital format are installed in forms such as True Type Font (.ttf) Open Type Font (.otf), etc. Fonts convey different emotions and meaning, and you must be very careful in choosing the right font for your content. The table below presents the different types of fonts, their implications, uses, and examples. Design Principles and Elements The principles in designing text elements are emphasis, appropriateness, proximity, alignment, organization, repetition and contrast. Observe how these elements are presented in each text frame.