Module 3 - CS0037 (Social Issues & Professional Practice)
Module 3 - CS0037 (Social Issues & Professional Practice)
Module 3
Intellectual Property
Subtopic 1
Intellectual Property
Intended Learning Outcomes
-Understand how to protect Intellectual Property;
-Explain the factors that can be used in deciding whether a use of copyrighted
material is fair; and
- Copyright law protects authored works, such as art, books, film, and music; patent
law protects inventions; and trade secret law helps safeguard information that is
critical to an organization’s success.
Copyrights
- A copyright is the exclusive right to distribute, display, perform, or reproduce an
original work in copies or to prepare derivative works based on the work.
- Copyright law guarantees developers the rights to their works for a certain amount of
time. Since 1960, the term of copyright has been extended 11 times from its original
limit of 28 years.
Eligible Works
- The types of work that can be copyrighted include architecture, art, audiovisual
works, choreography, drama, graphics, literature, motion pictures, music, pantomimes,
pictures, of copyright, fair contracts, and free speech.
- One of its programs, called Computer Hacking and Intellectual Property (CHIP), is a
network of over 150 experienced and specially trained federal prosecutors who focus
on computer and intellectual property crimes.
Intellectual Property Code of the Philippines
(Republic Act No. 8293)
- The Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act of
2008 (Public Law 110-403) does not directly apply to the Philippines.
The Philippines has it’s own similar law which is called Intellectual Property Code of
the Philippines (Republic Act No. 8293). This law outlines the protection of IP rights in
the country, including patents, trademarks, copyrights, and trade secrets. It also
establishes the Intellectual Property Office of the Philippines (IPOPHL) as the primary
agency responsible for the administration and enforcement of IP laws.
Intellectual Property Code of the Philippines
(Republic Act No. 8293)
- The Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act of
2008 (Public Law 110-403) does not directly apply to the Philippines.
The Philippines has it’s own similar law which is called Intellectual Property Code of
the Philippines (Republic Act No. 8293). This law outlines the protection of IP rights in
the country, including patents, trademarks, copyrights, and trade secrets. It also
establishes the Intellectual Property Office of the Philippines (IPOPHL) as the primary
agency responsible for the administration and enforcement of IP laws.
General Agreement on Tariffs and Trade
-The General Agreement on Tariffs and Trade (GATT) was a multilateral agreement
governing international trade.
- GATT however, copyright protection varies greatly from country to country, and an
expert should be consulted when considering international usage of any intellectual
property.
General Agreement on Tariffs and Trade
- The Philippines became a member of GATT on December 27, 1979. GATT was a
multilateral agreement regulating international trade, aiming to reduce tariffs and other
trade barriers.
- In 1995, GATT was replaced by the World Trade Organization (WTO), and the
Philippines became a founding member of the WTO. The WTO now oversees the
implementation of the agreements originally covered under GATT, along with other
trade-related agreements. So, while GATT itself is no longer active, its principles
continue to apply through the WTO agreements, which the Philippines is a party to.
The WTO and the WTO TRIPS Agreement (1994)
- The WTO is a global organization that deals with the rules of international trade
based on WTO agreements that are negotiated and signed by representatives of the
world’s trading nations.
- The goal of the WTO is to help producers of goods and services, exporters, and
importers conduct their business globally.
The World Intellectual Property Organization
Copyright Treaty (1996)
- The World Intellectual Property Organization (WIPO), headquartered in Geneva,
Switzerland, is an agency of the United Nations established in 1967.
- WIPO has strongly advocated for the interests of intellectual property owners. Its
goal is to ensure that intellectual property laws are uniformly administered.
The Digital Millennium Copyright Act (1998)
-The DMCA (Public Law 105-304) was signed into law in 1998 and implements two
1996 WIPO treaties: the WIPO Copyright Treaty and the WIPO Performances and
Phonograms Treaty.
- A utility patent is “issued for the invention of a new and useful process, machine,
manufacturer, or composition of matter, or a new and useful improvement.
- It generally permits its owner to exclude others from making, using, or selling the
invention for a period of up to twenty years from the date of patent application filing,
subject to the payment of maintenance fees.”
Patents
- A design patent, which is “issued for a new, original, and ornamental design
embodied in or applied to an article of manufacture,” permits its owner to exclude
others from making, using, or selling the design in question.
- Patent infringement, or the violation of the rights secured by the owner of a patent,
occurs when someone makes unauthorized use of another’s patent
Patents
Trade secret
- Business Information
- Has required effort or cost to develop,
- Has some degree of uniqueness or novelty, is generally unknown to the public, and is
kept confidential.
- The explosion of electronic content and the growth of the web have made it easy to
cut and paste paragraphs into term papers and other documents without proper
citation or quotation marks.
• Help students understand what constitutes plagiarism and why they need to cite
sources properly.
• Show students how to document web pages and materials from online databases.
• Schedule major writing assignments so that portions are due over the course of the
term, thus reducing the likelihood that students will get into a time crunch and be
tempted to plagiarize to meet the deadline.
Current Intellectual Property Issues
• Make clear to students that instructors are aware of Internet paper mills.
• Ensure that instructors both educate students about plagiarism detection services
and make them aware that they know how to use these services.
- It was originally applied to computer hardware but is now commonly applied to software
as well.
- One frequent use of reverse engineering for software is to modify an application that
ran on one vendor’s database so that it can run on another’s (e.g., from Access to Oracle).
Database management systems use their own programming language for application
development.
- As a result, organizations that want to change database vendors are faced with rewriting
existing applications using the new vendor’s database programming language.
Current Intellectual Property Issues
- Using reverse engineering, a developer can use the code of the current database
programming language to recover the design of the information system application.
- Next, code-generation tools can be used to take the design and produce code (forward
engineer) in the new database programming language. This reverse-engineering and code
generating process greatly reduces the time and cost needed to migrate the organization’s
applications to the new database management system.
Current Intellectual Property Issues
Open Source Code
- Program whose source code is made available for use or modification, as users or other
developers see fit.
- For example, much of the Internet runs on open source code; when you access a web
page, send a text, or post a status update, you are likely using an open source program such
as Linux, Apache HTTP, PHP, Perl, Python, or Ruby.
Current Intellectual Property Issues
- A common use of open source software is to move data from one application to another
and to extract, transform, and load business data into large databases.
- Two frequently cited reasons for using open source software are that it provides a better
solution to a specific business problem and that it costs less.
- Open source software is used in applications developed for Apple’s iPhone, Android
smartphones, and other mobile devices.
Commonly used open source software
Current Intellectual Property Issues
- Reasons that firms or individual developers create open source code, even though they do
not receive money for it, include the following:
• Some people share code to earn respect for solving a common problem in an elegant
way.
• Some people have used open source code that was developed by others and feel the
need to pay back by helping other developers.
• If the firm is paid for the employees’ time spent to develop the software rather than for
the software itself.
• A firm may develop open source code in the hope of earning software maintenance fees
if the end user’s needs change in the future.
• A firm may develop useful code but may be reluctant to license and market it, and so
might donate the code to the general public.
Current Intellectual Property Issues
Competitive Intelligence
- Legally obtained information that is gathered to help a company gain an advantage over its
rivals.
- Competitive intelligence is not the same as industrial espionage, which is the use of illegal
means to obtain business information not available to the general public.
Current Intellectual Property Issues
A wide array of software applications, databases, and social media tools are available for
companies—and individuals—looking for competitive intelligence data, including the
following:
• Rapportive is software that can be added to your email application or web browser to
provide you with rich contact profiles that show you what people look like, where they
are based, and what they do.
• ThomasNet.com is an excellent source for identifying suppliers and sources for products.
- A logo, package design, phrase, sound, or word that enables a consumer to differentiate
one company’s products from another’s.
Cybersquatting
- Registered domain names for famous trademarks or company names to which they had
no connection, with the hope that the trademark’s owner would eventually buy the domain
name for a large sum of money.
References
Blundell, B. (2020). Ethics in Computing, Science, and Engineering: A Student’s Guide to Doing Things Right 1st
ed. 2020 Edition: Springer.
Kizza, J.M. (2019). Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer
Science) 2nd ed.:Springer.
Kizza, J.M (2017).Ethical and Social Issues in the Information Age 6th ed: Springer.
Whitmant, M. Mattord, H. (2017). Principles of Information Security 6th Edition: Cengage Learning.
Laviña, C. (2023). Social, Ethical, Legal and Professional Issues in Computing: with complete explanation of
the PHILIPPINE CYBERCRIME LAWS