0% found this document useful (0 votes)
0 views

Intellectual-Property

Uploaded by

rickycasiple70
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views

Intellectual-Property

Uploaded by

rickycasiple70
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Intellectual Property - refers to creations of the mind, such as inventions; literary and artistic works;

designs; and symbols, names and images used in commerce


World Intellectual Property Organization (WIPO) is the global forum for intellectual property services,
policy, information and cooperation
 The World Intellectual Property Organization (WIPO) is the UN agency responsible for treaties
involving copyright, patent, and trademark laws. WIPO can be a force for progressive change,
helping the world take into account public interest and development needs.
IP is protected in law by, for example, patents, copyright and trademarks, which enable people to
earn recognition or financial benefit from what they invent or create.
By striking the right balance between the interests of innovators and the wider public interest, the IP
system aims to foster an environment in which creativity and innovation can flourish.

Types of Intellectual Property


1. Copyright - a legal term used to describe the rights that creators have over their literary and
artistic
Works. Books, music, paintings, sculpture and films, to computer programs, databases,
advertisements, maps and technical drawings

LITERARY WORKS - 50 During the lifetime of the author plus 50 years after death
ART – 25 years from the date of creation
PHOTOGRAPHIC WORK - 50 years from publication
AUDIO – VISUAL WORK - 50 years from publication
SOUND RECORDING - 50 years from year recording took place
BROADCAST RECORDING - 20 years from date of broadcast
TRADEMARK - Valid for 10 years and may be renewed for a periods of 10 years
INVENTION PATENT - Valid for 20 years from filing date application

INVENTION - A new device, method, or process developed from study and experimentation
PATENT - an exclusive right granted for an invention. Provides the patent owner with the right to
decide how - or whether - the invention can be used by others
TRADEMARK - a sign capable of distinguishing the goods or services of one enterprise from those of
other enterprises

REGISTERED TRADEMARK
- The R symbol indicates that this word, phrase, or logo is a registered trademark for the
product or service. It must only be used in the case of registered trademarks and by the
owner or licensee. It also must only be used in the regions in which you possess a valid
trademark registration.
TRADEMARK
The TM symbol can generally be used by any person or business to indicate that a
particular word, phrase, or logo is intended to serve as an identifier for the source of that
product or service. You do not have to have registered a trademark to use it and many
companies will opt to use the TM symbol for new goods or services in advance of and
during the application process.

Trademark Infringement - defined as the unauthorized use of a trademark or service mark.

INDUSTRIAL DESIGN - constitutes the ornamental or aesthetic aspect of an article. May consist of
three-dimensional features, such as the shape or surface of an article, or of two-
dimensional features, such as patterns, lines or color
DESIGN INFRINGEMENT where a person infringes a registered design during the period of registration.
GEOGRAPHICAL INDICATIONS AND APPELLATIONS OF ORIGIN
- signs used on goods that have a specific geographical origin and possess qualities, a
reputation or characteristics that are essentially attributable to that place of origin
- most commonly includes the name of the place of origin of the goods.
FAIR USE - Fair use means you can use copyrighted material without a license only for certain
purposes. These include:

 Commentary
 Criticism
 Reporting
 Research
 Teaching
Guidelines for Fair Use
 A majority of the content you create must be your own.
 Give credit to the copyright holder.
 Don't make money off of the copyrighted work.

Creative Commons
 is an American non-profit organization devoted to expanding the range of creative works
available for others to build upon legally and to share.
 The organization has released several copyright-licenses known as Creative Commons
licenses free of charge to the public.

PLAGIARISM
 the act of using another person's words or ideas without giving credit to that person
 The practice of taking someone else's work or ideas and passing them off as one's own.

SOURCES NOT CITED


The Ghost Writer”
The writer turns in another’s work, word-for-word, as his or her own.
“The Photocopy”
The writer copies significant portions of text straight from a single source, without alteration.
“The Potluck Paper”
The writer copies from several different sources, tweaking the sentences to make them fit
together while retaining most of the original phrasing.
“The Poor Disguise”
The writer has altered the paper’s appearance slightly by changing key words and phrases.
“The Labor of Laziness”
The writer takes the time to paraphrase most of the paper from other sources and make it all
fit together.
“The Self-Stealer”
The writer “borrows” generously from his or her previous work.

SOURCES CITED (BUT STILL PLAGIARIZED)


“The Forgotten Footnote”
The writer mentions an author’s name for a source, but neglects to include specific
information on the location of the material referenced.
“The Misinformer”
The writer provides inaccurate information regarding the sources, making it impossible to find
them.
“The Too-Perfect Paraphrase”
The writer properly cites a source, but neglects to put in quotation marks on text that has
been copied word-for-word, or close to it.
“The Resourceful Citer”
The writer properly cites all sources, paraphrasing and using quotations appropriately. The
catch? The paper contains almost no original work!
“The Perfect Crime”
The writer properly quotes and cites sources in some places, but goes on to paraphrase other
arguments from those sources without citation.
WHAT ABOUT IMAGES, VIDEOS, AND MUSIC?
Without receiving proper permission or providing appropriate citation, the following are
considered plagiarism:
Copying media (especially images) from other websites to paste them into your own papers or
websites.
Making a video using footage from others’ videos or using copyrighted music as part of the
soundtrack.
Performing another person’s copyrighted music (i.e., playing a cover).

CHALLENGES AND RISKS IN MEDIA


Grooming
Grooming refers to pedophiles using the Internet as a means to contact children and young
people while concealing their adult identity.
Bullying:
Various types of bullying seem always to be part of people’s lives.
Computer addiction:
the excessive use of computers to the extent that it interferes with daily life.
Digital divide-
the economic inequality between groups in terms of access to, use of, or knowledge of ICT.
Republic Act 10175
also known as the “Cybercrime Prevention Act of 2012” which aims to address legal issues
concerning online interactions and technology related concerns in the country.
Cybercrime
 the use of a computer as an instrument to further illegal ends
 criminal activity or a crime that involves the Internet, a computer system, or computer
technology
RA 10175 of 2012, includes the following.
Offenses against the confidentiality, integrity, and availability of computer
data and systems:
1. Illegal Access. –
The access to the whole or any part of a computer system without right.
2. Illegal Interception. –
The interception made by technical means without right of any non-public transmission of
computer data to, from, or within a computer system including electromagnetic emissions
from a computer system carrying such computer data.
3. Data Interference. —
The intentional or reckless alteration, damaging, deletion or deterioration of
computer data, electronic document, or electronic data message, without right, including
the introduction or transmission of viruses.
4. System Interference. —
The intentional alteration or reckless hindering or interference
with the functioning of a computer or computer network by inputting, transmitting,
damaging, deleting, deteriorating, altering or suppressing computer data or program,
electronic document, or electronic data message, without right or authority, including the
introduction or transmission of viruses.
5. Misuse of Devices.
(i) The use, production, sale, procurement, importation, distribution, or otherwise making
available, without right, of:
6. Cyber-squatting. –
The acquisition of a domain name over the internet in bad faith to profit, mislead,
destroy reputation, and deprive others from registering the same.

Computer-related Offenses:

Computer-related Forgery.
(i) The input, alteration, or deletion of any computer data without right resulting in inauthentic data
with the intent that it be considered or acted upon for legal purposes as if it were authentic,
regardless whether or not the data is directly readable and intelligible; or
Computer-related Fraud.
The unauthorized input, alteration, or deletion of computer data or program or interference in
the functioning of a computer system, causing damage thereby with fraudulent
intent: Provided, That if no damage has yet been caused, the penalty imposable shall be one (1)
degree lower.
Computer-related Identity Theft.
The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying
information belonging to another, whether natural or juridical, without right: Provided, That if no
damage has yet been caused, the penalty imposable shall be one (1) degree lower.

Content-related Offenses:
(1) Cybersex.
The willful engagement, maintenance, control, or operation, directly or indirectly, of any
lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor
or consideration.
(2) Child Pornography.
The unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti-Child
Pornography Act of 2009, committed through a computer system: Provided, That the penalty to be
imposed shall be (1) one degree higher than that provided for in Republic Act No. 9775.
(3) Unsolicited Commercial Communications. —
The transmission of commercial electronic communication with the use of computer
system which seek to advertise, sell, or offer for sale products and services are prohibited unless:
(i) There is prior affirmative consent from the recipient; or
(ii) The primary intent of the communication is for service and/or administrative announcements
from the sender to its existing users, subscribers or customers; or
(4) Libel.
The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as
amended, committed through a computer system or any other similar means which may be
devised in the future.
Current and Future Trends of Media and Information
Wearable Technologies
Are gadgets designed to be worn for entertainment , fashion, educational activities, etc. these
technologies are made for a better living, easier way of living, and for helping those who are in
need of guidance.
Google Glass and android-powered pair glasses designed to of make the user’s field of vision its
own screen.
Oculus Rift
A headset with a built-in screen displaying a “virtual reality”. Virtual Reality is a simulation of a
three-dimensional environment created by a software.
Lechal GPS Shoes
A footwear that gives direction to those who wear it. It came from a Hindi word “Lechel” which
means ‘bring me there or take me along”.
The way this works is the shoe vibrates whether if you are going the wrong way. Its main purpose is
to help those who is visually impaired.
It was designed by Gaurav Duggal from Ducere Technologies, and was released last 2014.
Fin Ring
A “gesture-based control” technology that lets you switch, scroll, click, tap or swipe any smart
devices connected to it with just the user’s thumb.

 UP (activity tracker )
A smart wristband designed as a fitness tracker.
 It is an advance pedometer that records all the users activity’s data received by every step
you take.
 Jawbone was the manufacturer of this piece of technology.
Cicret Bracelet
A waterproof, smart wristband that makes the user’s arm its own screen. It has its own
pico projector, Bluetooth and Wi-Fi connectivity, a USB port, processor, and a proximity
sensors.
Once it turned on, it will automatically project what the phone’s screen has. The user can
move the icons, accept calls, and type a message through it. It was manufactured by a
company named Cicret.

A waterproof, smart wristband that makes the user’s arm its own screen. It has its own pico
projector, Bluetooth and Wi-Fi connectivity, a USB port, processor, and a proximity sensors.
Once it turned on, it will automatically project what the phone’s screen has. The user can move
the icons, accept calls, and type a message through it. It was manufactured by a company
named Cicret.
3D environment is a nature having the three-dimensional properties; length, width, and depth.
This provides a perception having a fictional character realistic look
3D Printing
Hologram
3D Film
3D Animation
Massive Open Online Course (MOOC)
Is a free “distance-learning program” that can be taken through the internet by
large numbers of people for additive learning.
It is an online course that are being offered by private companies and universities for
additional knowledge and for new learning experience.

Text may be defined as a simple and flexible format of presenting information or conveying ideas
whether hand-written, printed or displayed on-screen. It is very powerful in disseminating
information, providing direction and giving suggestions.

Text is available in different sources, which may be categorized into two:


 Formal Example of these are news articles, published books, newspapers, magazines, advertisements,
research works, etc. Formal text-based materials are created and distributed by established institutions
(such as publishing companies, news agencies, etc.) and go through a rigorous process of editing or
evaluation and are usually governed by censorship of the state.
 Informal Examples of these are blogs, personal e-mails, SMS or text messages, online messengers, social
media platforms, etc. They come from personal opinions or views on different issues, processes, etc.
Text can be as short such as a single sentence or phrase, or they can be as lengthy as
news articles or investigative reporting. no matter how brief or lengthy, however, a text is
always carefully written with the intent of sending a very specific message to the target
audience.
As producers of text media and information, we need to review the media and
information design framework:
Text as Visual
Typeface font, font type, or type) is the representation or style of a text.
A typeface is usually composed of alphabets, numbers, punctuation marks, symbols and other special
characters.
Fonts in digital format are installed in forms such as
 True Type Font (.ttf)
 Open Type Font (.otf), etc.
Fonts convey different emotions and meaning, and you must be very careful in choosing the right font for
your content.

The table below presents the different types of fonts, their implications, uses, and examples.
Design Principles and Elements
The principles in designing text elements are emphasis, appropriateness, proximity, alignment, organization,
repetition and contrast. Observe how these elements are presented in each
text frame.

You might also like