Chapter 6 Intellectual Property 2021 Midterm
Chapter 6 Intellectual Property 2021 Midterm
Social and
Professional Issues
Prepared by:
Engr. FREDERICK VON A. IBASCO, MSIT
[Type text]
Chapter 6: Intellectual Property
Learning Objectives
At the end of the chapter, students will be able to:
• Define intellectual property
• Determine some copyright law and discuss significant cases
• Discuss copying and sharing, search engines and online libraries
• Discuss the different free-speech issues
• Evaluate the ethical issues on the different case scenario presented
• Analyze IP right issues such as Sharing Music: the Napster Case and Reverse Engineering: game machines
• Evaluate the ethical issues on the different case scenario presented
The intellectual property (IP) system relates to rights and obligations, as well as privileges and incentives–all rooted from
the creation and protection of IP, which “refers to creations of the mind: inventions; literary and artistic works; and
symbols, names, and images used in commerce.”
IP rights as basic human rights involve “the right to benefit from the protection of moral and material interests resulting
from authorship of scientific, literary, or artistic productions.” (Art. 27, Universal Declaration of Human Rights).
Meanwhile, the 1987 Philippine Constitution mandates their protection “particularly when beneficial to the people”. (Art.
XIV, Sec. 13) In the midst of these seemingly conflicting interests of the creators and innovators and the public, the
system seeks to strike a balance between them through legal safeguards.
Otherwise put, the system seeks to provide an environment in which everyone benefits from one’s creativity ad
innovation, especially since IP is a tool for economic and socio-cultural development.
In the Philippines
An Act Prescribing the Intellectual Property Code and Establishing the Intellectual Property Office, Providing for its
Powers and Functions
IPO WEBSITE:
www.ipophil.gov.ph
Cybersquatting
Companies that want to establish an online presence know that the best way to capitalize on the strengths of their brand
names and trademarks is to make the names part of the domain names for their Web sites. When Web sites were first
established, there was no procedure for validating the legitimacy of requests for Web site names, which were given out
on a first-come, first-served basis. And in the early days of the Web, many cybersquatters registered domain names for
famous trademarks or company names to which they had no connection, with the hope that the trademark’s owner
would eventually buy the domain name for a large sum of money.
A COPYRIGHT is the exclusive right to distribute, display, perform, or reproduce an original work in copies or to prepare
derivative works based on the work. Copyright protection is granted to the creators of “original works of authorship in
any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or
otherwise communicated, either directly or with the aid of a machine or device.”
Copyright infringement is a violation of the rights secured by the owner of a copyright. Infringement occurs when
someone copies a substantial and material part of another’s copyrighted work without permission.
Eligible Works
The types of work that can be copyrighted include architecture, art, audiovisual works, choreography, drama, graphics,
literature, motion pictures, music, pantomimes, pictures, sculptures, sound recordings, and other intellectual works, as
described in REPUBLIC ACT NO. 8293 also known as the “Intellectual Property Code of the Philippines.” To be eligible for a
copyright, a work must fall within one of the preceding categories, and it must be original. Copyright law has proven to be
extremely flexible in covering new technologies; thus, software, video games, multimedia works, and Web pages can all
be protected.
A bit of history:
• 1790 first copyright law passed
• 1909 Copyright Act of 1909 defined an unauthorized copy as a form that could be seen and read visually
• 1976 and 1980 copyright law revised to include software and databases that exhibit "authorship" (original
expression of ideas), included the "Fair Use Doctrine"
• 1982 high-volume copying became a felony
• 1992 making multiple copies for commercial advantage and private gain became a felony
• 1997 No Electronic Theft Act made it a felony to willfully infringe copyright by reproducing or distributing one or
more copies of copyrighted work with a total value of more than $1,000 within a six-month period
• 1998 Digital Millennium Copyright Act (DMCA) prohibits making, distributing or using tools to circumvent
technological copyright protection systems and included protection from some copyright lawsuits for Web sites
where users post material
• 2005 Congress made it a felony to record a movie in a movie theater
Significant Cases:
• Sony vs. Universal City Studios (1984)
– Supreme Court decided that the makers of a device with legitimate uses should not be penalized
because some people may use it to infringe on copyright
– Supreme Court decided copying movies for later viewing was fair use
– Arguments against fair use
• People copied the entire work
• Movies are creative, not factual
– Arguments for fair use
• The copy was for private, noncommercial use and generally was not kept after viewing
• The movie studios could not demonstrate that they suffered any harm
• The studios had received a substantial fee for broadcasting movies on TV, and the fee depends
on having a large audience who view for free
• Reverse engineering: game machines
• Sega Enterprises Ltd. v. Accolade Inc. (1992)
• Atari Games v. Nintendo (1992)
• Sony Computer Entertainment, Inc. v. Connectix Corporation (2000)
• Courts ruled that reverse engineering does not violate copyright if the intention is to make new creative works
(video games), not copy the original work (the game systems)
• Sharing music: the Napster case
• Was the sharing of music via Napster fair use?
• Napster's arguments for fair use
• The Sony decision allowed for entertainment use to be considered fair use
• Did not hurt industry sales because users sampled the music on Napster and bought the CD if they liked
it RIAA's (Recording Industry Association of America) arguments against fair use
• "Personal" meant very limited use, not trading with thousands of strangers
• Songs and music are creative works and users were copying whole songs
• Claimed Napster severely hurt sales
• Court ruled sharing music via copied MP3 files violated copyright
• Was Napster responsible for the actions of its users?
• Napster's arguments
• It was the same as a search engine, which is protected under the DMCA
• They did not store any of the MP3 files
• Their technology had substantial legitimate uses RIAA's arguments
• Companies are required to make an effort to prevent copyright violations and Napster did not take
sufficient steps
• Napster was not a device or new technology and the RIAA was not seeking to ban the technology
• Court ruled Napster liable because they had the right and ability to supervise the system, including
copyright infringing activities
• File sharing: MGM v. Grokster
• Grokster, Gnutella, Morpheus, Kazaa, and others provided peer-to-peer (P2P) file sharing services
• The companies did not provide a central service or lists of songs
• P2P file transfer programs have legitimate uses
• Lower Courts ruled that P2P does have legitimate uses
• Supreme Court ruled that intellectual property owners could sue the companies for encouraging copyright
infringement
• Search Engines
– Caching and displaying small excerpts is fair use
– Creating and displaying thumbnail images is fair use
– Court ordered Google to remove links to pages that infringe copyright; Google is appealing
• Books Online
– Project Guttenberg digitizes books in the public domain
– Microsoft scanned millions of public domain books in University of California's library
– Google has scanned millions of books that are in the public domain and that are not; they display only
excerpts from those still copyrighted
• Some court rulings favor search engines and information access; some favor content producers
Free-Speech Issues
Domain Names:
• Domain names may be used to criticize or protest (e.g. XYZIsJunk.org)
• Companies sue under trademark violation, but most cases dismissed
• Some companies buy numerous domain names containing their name so others cannot use them
Free Software
• Free software - idea, an ethic, advocated and supported by large, loose-knit group of computer programmers
who allow people to copy, use, and modify their software
• Free means freedom of use, not necessarily lack of cost
• Open source - software distributed or made public in source code (readable and modifiable)
• Proprietary software - (commercial) sold in object code (obscure, not modifiable) (E.g.: Microsoft Office)
• Plagiarism is the act of stealing someone’s ideas or words and passing them off as one’s own. The explosion of
electronic content and the growth of the Web have made it easy to cut and paste paragraphs into term papers
and other documents without proper citation or quotation marks.
• Reverse engineering is the process of taking something apart in order to understand it, build a copy of it, or
improve it. Reverse engineering was originally applied to computer hardware but is now commonly applied to
software as well.
Discussion Question
1. Explain the concept that an idea cannot be copyrighted, but the expression of an idea can be, and why this
distinction is a key to understanding copyright protection.
2. Identify and briefly discuss three key advantages that trade secret law has over the use of patents and copyrights
in protecting intellectual property. Are there any drawbacks with the use of trade secrets to protect intellectual
property?
3. What problems can arise in using nondisclosure and noncompete agreements to protect intellectual property?
4. Outline a multistep approach that a university might take to successfully combat plagiarism among its students.
5. Under what conditions do you think the use of reverse engineering is an acceptable business practice?
6. How might a corporation use reverse engineering to convert to a new database management system? How
might it use reverse engineering to uncover the trade secrets behind a competitor’s software?
7. Why might an organization elect to use open source code instead of proprietary software?
8. What is the nominative use defense? What are the three key elements of this defense?
9. What measures can companies take to combat cybersquatting?
1. You have procrastinated too long and now your final paper for your Programming course is due in just five days
—right in the middle of final exam week. The paper counts for half your grade for the term and would probably
take you at least 20 hours to research and write. Your roommate, and Programming major, has suggested two
options: He will code an original paper for you for P1,000, or he will show you two or three “paper mill” Web
sites, from which you can download a programming code for less than P300. You want to do the right thing, but
writing the paper will take away from the time you have available to study for your final exam in three other
courses. What would you do?
To supplement the lesson in this module, you may download e-books used as reference in this lesson with the following
links:
• http://en.wikibooks.org/wiki/Ethics_for_IT_Professionals/What_Is_Ethics
• http://www.ethicsinpractice.net/Teaching_material/~/media/EthicsinPractice/PDF/
The_Good_The_Right_%20_The_Fair_jan_13.ashx
In this chapter, teaching and learning is through the use of technology like print, audio, video and the internet. Students
interact with their Professor and each other through virtual classrooms, email, and web conferencing. For the online
modality, the Virtual Classroom shall be used for the purpose of delivering a lecture and allowing a synchronous
discussion with the students. For the remote modality, Self-directed (SeDI) a learning management system shall be used
to upload the module and to allow asynchronous discussion with the students. This will also be used as platform for the
submission of the requirements.
References:
www.papt.org.ph/
www.gov.ph/2012/09/12/republic-act-no-10175/
https://www.facebook.com/PilipinasAntiPiracyTeam/
https://www.ipophil.gov.ph/overview-of-the-intellectual-property-system/
REPUBLIC ACT NO. 8293 or the “Intellectual Property Code of the Philippines”
REPUBLIC ACT NO. 9239 or the "Optical Media Act of 2003”
Reynolds, George W., Ethics in Information Technology, 5th Edition, 2015 Cengage Learning
Ethics for IT Professionals/What Is Ethics Retrieved from
http://en.wikibooks.org/wiki/Ethics_for_IT_Professionals/What_Is_Ethics on October 22, 2013
Mickey Gjerri, Morten Ebbe Juul Nielsen and PeterSandoe, The Good, the Right & the Fair – An Introduction to
Ethics. (e-book). Retrieved from http://www.ethicsinpractice.net/Teaching_material/~/media/EthicsinPractice/
PDF/ The_Good_The_Right_%20_The_Fair_jan_13.ashx on October 22, 2013.
Lavina, Charlemagne et al., Ethics for IT Professionals with Legal Aspects in Computing. 2012
Reynolds, George W. Principles of Ethics in Information Technology. Australia: Cencage Learning, 2010
Calvan, Nestor, Computer Ethics, Cybercrimes and Laws, 1st Edition, 2009
Baase, Sara, A Gift of Fire, Social Legal and Ethical Issues for Computing and the Internet. 3rd Edition. Prentice
Hall, 2008