Ebay Adan
Ebay Adan
Quizzes 35%
Seat Works 25%
Major Examination 40%
FINAL GRADE =
(Prelim Term Grade + Midterm Grade
+ Final Grade)/3
Course Overview
Prelim Period Topics
❑Lesson 1 - Common Ethical Theories
❑Lesson 2 - Computer Ethics
Prelim Period Exam
Types of IP Protection:
❑Copyright: Protects the original code created by the programmer, granting
them the right to reproduce, distribute, and perform the code.
❑Patents: Can be granted for novel software inventions, algorithms, or
processes, but they are difficult to obtain and require a demonstration of
novelty and utility.
❑Trade Secrets: Source code can also be kept confidential if it provides the
programmer or company with a competitive advantage (e.g., proprietary
software).
Topic 4
The Programmer’s Source Code and
the Intellectual Property Law
Copyright and the Programmer’s Source Code
❑Copyright provides creators with the legal right to control how their works are used,
distributed, and reproduced. In the context of programming, this means that source code is
often protected by copyright, and the programmer or organization who created it has exclusive
rights to its use and distribution.
❑However, the concept of Fair Use allows for certain uses of copyrighted materials without
needing permission from the copyright holder. This is particularly relevant in programming,
where reuse, modification, and incorporation of existing code are often necessary.
❑Fair Use is a legal doctrine that permits limited use of copyrighted works without permission
for specific purposes, such as:
➢Criticism or commentary
➢News reporting
➢Teaching or scholarship
➢Research
➢Parody or satire
The Programmer’s Source Code and Intellectual Property Law
Fair Use of Copyrighted Materials
While fair use allows for certain freedoms, it is essential to consider the ethical
aspects of reusing someone else’s code.
❑Respect for Original Creators: Even if fair use applies, it's important to
give credit to the original creators of the code. Proper attribution is not just a
legal requirement but an ethical one.
❑Avoiding Plagiarism: Even if a reuse is legally permissible under fair use,
claiming someone else’s code as your own without acknowledgment is
unethical and constitutes plagiarism.
❑Potential for Abuse: Programmers should avoid abusing fair use by
justifying excessive or unlicensed copying of code as "fair use" when it
clearly violates the spirit of the law
The Programmer’s Source Code and Intellectual Property Law
Fair Use of Copyrighted Materials
❑Ambiguity of Fair Use: The boundaries of fair use can be unclear, especially
when it comes to complex software and large-scale code reuse. What one
programmer considers transformative might be seen as infringement by another.
❑Rise of Patent Trolls: In some cases, patent trolls (entities that own patents but
do not produce products) target developers for patent infringement over minor
code features. This creates additional complexity and risk for programmers
trying to navigate the boundaries of fair use.
❑Global Variations: Intellectual property laws, including fair use, vary between
countries. A use considered fair in one country might not be permissible in
another, creating challenges for international software developers.
The Programmer’s Source Code and Intellectual Property Law
Fair Use of Copyrighted Materials
Navigating Fair Use in Programming
Objective:
❑This lesson explores the legal and ethical distinctions between copyright
infringement and plagiarism in the context of programming.
❑It will clarify the differences, implications, and how programmers can navigate
these issues in their work, ensuring they respect intellectual property laws while
maintaining ethical coding practices
❑This lesson helps clarify the difference between legal violations (copyright
infringement) and ethical violations (plagiarism) within programming,
equipping programmers with the tools to navigate both successfully.
❑By adhering to best practices, such as reading and respecting software licenses,
properly attributing code, and avoiding misrepresentation, programmers can
contribute to a more ethical and legally compliant industry.
The Programmer’s Source Code and the Intellectual Property Law
Copyright Infringement vs. Plagiarism
Introduction to Copyright and Plagiarism
❑Copyright protects original works of authorship, including software and
source code. This protection gives the creator exclusive rights to use,
reproduce, and distribute their work. In programming, source code is
protected by copyright as soon as it is written, whether or not it is
registered.
❑Plagiarism, on the other hand, is the act of using someone else’s work
(ideas, text, code, etc.) and presenting it as your own without giving proper
credit, regardless of whether the work is copyrighted or not.
❑While both copyright infringement and plagiarism involve the
unauthorized use of someone else’s work, the key difference lies in the legal
implications and the broader ethical considerations.
The Programmer’s Source Code and the Intellectual Property Law
Copyright Infringement vs. Plagiarism
Copyright Infringement in Programming
❑Copyright infringement occurs when someone violates the exclusive rights of the copyright holder. In
programming, this typically involves using copyrighted source code without permission or exceeding the
rights granted by the license.
❑Key Aspects of Copyright Infringement:
➢ Unauthorized Copying: Using someone else’s code in your program without permission, or beyond
what the license allows, is a violation of copyright.
➢ Distributing or Selling Code: Even if a programmer uses open-source code under the assumption that
it is free to use, they may still be infringing if they fail to comply with the license terms, such as
redistributing the code under the same license.
➢ Derivatives and Modifications: If a programmer modifies existing copyrighted code, it may still be
considered a derivative work, which also requires permission from the original copyright holder unless
it falls under fair use or the code is open-source with a permissive license.
❑Example of Copyright Infringement:
➢ If a developer copies a piece of code from an open-source project with a restrictive license (e.g., GPL)
and incorporates it into their proprietary software without adhering to the license terms (like providing
attribution or making the source code available), this would be a clear case of copyright infringement.
The Programmer’s Source Code and the Intellectual Property Law
Copyright Infringement vs. Plagiarism
Copyright Infringement in Programming
❑Copyright infringement occurs when someone violates the exclusive rights of the
copyright holder. In programming, this typically involves using copyrighted source code
without permission or exceeding the rights granted by the license.
❑Key Aspects of Copyright Infringement:
➢Unauthorized Copying: Using someone else’s code in your program without
permission, or beyond what the license allows, is a violation of copyright.
➢Distributing or Selling Code: Even if a programmer uses open-source code under
the assumption that it is free to use, they may still be infringing if they fail to comply
with the license terms, such as redistributing the code under the same license.
➢Derivatives and Modifications: If a programmer modifies existing copyrighted
code, it may still be considered a derivative work, which also requires permission
from the original copyright holder unless it falls under fair use or the code is open-
source with a permissive license.
The Programmer’s Source Code and the Intellectual Property Law
Copyright Infringement vs. Plagiarism
Plagiarism in Programming
❑Example of Plagiarism:
➢If a developer finds an algorithm online and copies it into
their own project without citing the original source, even
though the algorithm is publicly available, this would be
considered plagiarism. This is because the original creator is
not given credit, even though the code might legally be
allowed for use.
The Programmer’s Source Code and the Intellectual Property Law
Copyright Infringement vs. Plagiarism
By adhering to best practices, such as reading and respecting software licenses, properly
attributing code, and avoiding misrepresentation, programmers can contribute to a more
ethical and legally compliant industry.
The Programmer’s Source Code and the Intellectual Property Law
The Intellectual Property Code (RA 8293)
Objective:
❑This lesson outlines the key aspects of the Intellectual Property Code (RA
8293) and its relevance to programmers, helping them navigate the legal
landscape surrounding their source code and software development projects.
❑It provides an in-depth understanding of the Intellectual Property Code of
the Philippines (RA 8293) and how it applies to programmers, particularly
concerning the protection of source code and software.
❑Key provisions of RA 8293, its impact on the programming profession, and
how it relates to issues such as copyright, patenting, and enforcement of
intellectual property rights will be discussed.
The Programmer’s Source Code and the Intellectual Property Law
The Intellectual Property Code (RA 8293)
Introduction to the Intellectual Property Code of the Philippines (RA 8293)
The IP Code of the Philippines covers a wide range of intellectual property matters. For
programmers and software developers, the most relevant provisions pertain to copyright, patents,
and trade secrets.
A. Copyright Protection for Source Code
❑What is Covered by Copyright? Under RA 8293, the source code of software is
protected by copyright as a literary work. This includes the written code and the
structural organization of the program, provided the code is original and fixed in a
tangible medium (e.g., stored on a computer).
❑Exclusive Rights of the Copyright Holder: The copyright holder (typically the
programmer or the entity they work for) has the exclusive rights to:
➢Reproduce the code.
➢Distribute copies of the code.
➢Make derivative works (e.g., modifying or adapting the code).
➢Perform or display the code publicly (e.g., showcasing software in exhibitions).
The Programmer’s Source Code and the Intellectual Property Law
The Intellectual Property Code (RA 8293)
Key Provisions of the Intellectual Property Code (RA 8293)
The IP Code of the Philippines covers a wide range of intellectual property matters. For
programmers and software developers, the most relevant provisions pertain to copyright, patents,
and trade secrets.
B. Patent Protection for Software Inventions
❑Patentable Software Inventions: RA 8293 allows for the patenting of software
inventions if they meet the patentability criteria of novelty, inventiveness, and industrial
applicability. However, algorithms and abstract ideas (including mathematical formulas
or purely abstract software functionality) are generally not patentable in the Philippines.
❑The Philippine Patent Office: Software developers seeking patent protection for novel
software-related inventions can apply to the Intellectual Property Office of the
Philippines (IPOPHL), which evaluates whether the invention qualifies for patent
protection.
❑Duration of Patent: A patent lasts for 20 years from the date of filing, after which the
patent rights expire, and the invention enters the public domain.
The Intellectual Property Code (RA 8293)
The IP Code of the Philippines covers a wide range of intellectual property matters. For
programmers and software developers, the most relevant provisions pertain to copyright,
patents, and trade secrets.
C. Trade Secrets and Confidentiality
❑Protection of Trade Secrets: The IP Code also protects trade secrets, which
include proprietary algorithms, software designs, or business methods that provide
a competitive advantage. This protection is not dependent on registration but on
maintaining the confidentiality of the information.
❑Breach of Trade Secrets: If a programmer shares proprietary code or algorithms
without permission, or if they disclose confidential business processes they worked
on without authorization, it could constitute a breach of trade secrets under RA
8293.
The Intellectual Property Code (RA 8293)
❑RA 8293 provides exceptions for fair use in the case of copyrighted software.
❑Under the law, a programmer can use copyrighted software for the following purposes
without permission:
➢Criticism or commentary:
This could involve analyzing or critiquing the software in a research paper or
academic setting.
➢Research and educational use:
Using software for non-commercial educational purposes, like teaching programming
concepts or creating prototypes.
➢Interoperability:
Fair use may allow for reverse engineering to ensure compatibility with other
software or systems, but this is subject to legal restrictions to prevent abuse.
The Intellectual Property Code (RA 8293)
❑The enforcement of intellectual property rights, especially regarding source code and
software, is a significant concern for developers in the Philippines.
➢Legal Remedies:
If a programmer or company believes their intellectual property rights have been
violated, they can seek remedies from IPOPHL through lawsuits, including seeking
compensation and damages.
➢Challenges in Enforcement:
Despite the presence of RA 8293, enforcement can be difficult, especially with the
rise of online piracy, software counterfeiting, and the rapid spread of pirated software
through digital platforms.
➢Role of the Courts:
Intellectual property disputes can be taken to the courts, where judges apply the
provisions of RA 8293 and determine the appropriate penalties or remedies.
The Intellectual Property Code (RA 8293)
❑The Intellectual Property Code (RA 8293) provides essential legal protection
for software developers and programmers in the Philippines.
❑By understanding how the law applies to source code, patents, and trade
secrets, programmers can ensure they are safeguarding their work while
respecting the rights of others.
❑As the software industry grows and technology evolves, it is important for
developers to remain informed about IP laws and use them to protect their
innovations and creations.
❑At the same time, respecting the intellectual property of others is crucial for
maintaining a fair and competitive industry.
The Programmer’s Source Code and the Intellectual Property Law
Utility Model
Objective
❑This lesson provides insight into the Utility Model system under the
Intellectual Property Code (RA 8293), showing how programmers can protect
their incremental software innovations and technical improvements.
❑It explores the concept of the Utility Model under intellectual property law
and its relevance to the programming industry.
❑The focus is on how utility models differ from patents, how they apply to
software-related inventions, and how programmers can leverage this form of
protection for their innovations in the field of technology.
The Programmer’s Source Code and the Intellectual Property Law
Utility Model
Introduction to Utility Models
❑In the Philippines, the Intellectual Property Code (RA 8293) provides for the registration and
protection of utility models.
❑According to RA 8293, a utility model is a type of intellectual property that offers protection for
a new and useful invention that may not meet the higher threshold required for patents.
➢Utility Model vs. Patent:
While patents require an invention to be novel, non-obvious, and industrially applicable, a
utility model only requires that the invention is novel and capable of industrial
application. The bar for inventiveness is generally lower for utility models than for
patents.
➢Examples of Utility Models in Programming:
In software development, utility models can be used to protect improvements or technical
innovations that enhance the functionality, speed, or efficiency of a system, such as a new
algorithm, a method of optimizing data processing, or a unique user interface design that
provides better usability.
The Programmer’s Source Code and the Intellectual Property Law
Utility Model
To qualify for protection as a utility model under RA 8293, the invention must meet the
following criteria:
B. Industrial Applicability
❑The invention must be capable of being used in some kind of industry, which could
include fields such as software development, manufacturing, agriculture, etc. In the
case of software, the utility model must show a practical application, such as an
improvement in processing speed or efficiency in computing.
C. Technical Nature
❑The invention must solve a technical problem or make a technical improvement.
For software, this could be improvements in algorithms, software architecture, or
coding techniques that provide a functional benefit.
The Programmer’s Source Code and the Intellectual Property Law
Utility Model
Utility Model Process: Registration and Examination
The process for obtaining a utility model in the Philippines involves several steps:
1. Filing the Application:
❑The applicant must submit a detailed application to the Intellectual
Property Office of the Philippines (IPOPHL), including a description of
the invention, claims, and drawings (if applicable).
2. Examination:
❑IPOPHL conducts a formal examination of the application to ensure it
meets the requirements of novelty and industrial applicability.
❑Unlike patents, utility models do not undergo a substantive examination
for inventiveness.
❑The examination focuses primarily on novelty.
The Programmer’s Source Code and the Intellectual Property Law
Utility Model
Utility Model Process: Registration and Examination
The process for obtaining a utility model in the Philippines involves several
steps:
3. Publication:
❑Once an application is approved, it is published in the IP Journal to
allow others to challenge the novelty of the invention. If no opposition
is raised, the utility model is granted.
4. Issuance of Certificate:
❑If the utility model passes the examination and no opposition is filed,
the IPOPHL will issue a Certificate of Utility Model Registration,
which provides the holder exclusive rights to use, make, sell, or license
the invention for the duration of the protection period (7 years).
The Programmer’s Source Code and the Intellectual Property Law
Utility Model
The Protection Granted by a Utility Model
A Utility Model Certificate grants the holder exclusive rights to their invention, which
means that no one else can make, use, or sell the invention without permission. This provides
the owner with a level of control over their creation, offering potential commercial benefits
such as:
❑Licensing: The utility model holder can license their invention to others, allowing
them to receive royalty payments.
❑Commercialization: The holder has the right to use the protected invention for their
own commercial benefit, whether by creating products, offering services, or integrating
the technology into other systems.
❑Enforcement: If someone else uses the utility model without authorization, the holder
can enforce their rights through the court system, seeking injunctions, damages, or
other legal remedies.
The Programmer’s Source Code and the Intellectual Property Law
Utility Model
❑In the Philippines, the protection for a utility model lasts for 7
years from the filing date.
❑Unlike patents, which can last for up to 20 years, utility models
are typically used for innovations that are incremental and are
not expected to have a long lifespan.
❑After the 7-year protection period ends, the invention enters the
public domain, and others may freely use the technology
without seeking permission from the original holder.
The Programmer’s Source Code and the Intellectual Property Law
Utility Model
Utility Models in Software Development
While patents and copyrights are more commonly discussed in the software
industry, utility models can also play a significant role, especially for
incremental innovations in software and technical systems. Here are some
potential examples where utility models could apply to programming:
A. Algorithmic Improvements
❑A programmer may develop a new algorithm that improves the
efficiency of a system, such as reducing processing time or enhancing
the way data is handled.
❑If this algorithm is novel and has industrial applicability, it could be
protected under a utility model.
The Programmer’s Source Code and the Intellectual Property Law
Utility Model
Utility Models in Software Development
While patents and copyrights are more commonly discussed in the software industry, utility
models can also play a significant role, especially for incremental innovations in software and
technical systems. Here are some potential examples where utility models could apply to
programming:
B. Optimized System Designs
❑A software developer might design a new way of structuring databases or processing
data, which leads to better performance or more efficient resource management.
❑This could be eligible for utility model protection if it demonstrates a new and useful
technical solution.
C. Unique Software Features
❑A developer may create a novel user interface or a feature that enhances user interaction
with the software, and if this new feature solves a technical problem or significantly
improves the user experience, it could qualify for utility model protection.
The Programmer’s Source Code and the Intellectual Property Law
Utility Model
❑ChatGPT 4o mini
❑Microsoft Copilot
❑360-Degree View of IoT Technologies
❑https://www.youtube.com/watch?v=8u4M_Ecb_ok
❑https://www.computerhope.com/
❑https://www.computerhope.com/jargon/n/network-media.htm
❑2014, Introduction to Web Development using HTML 5,
Jamsa, Kris, Jones & Bartlett Learning
❑2013, HTML5 and CSS, Shelly, Gary B., Cengage Learning
❑2013, 8th Edition, Discovering Computers Fundamentals, Gary
B. Shelly, Misty E. Vermaat, Jeffrey J. Quasney, Susan L.
Sebok, Steven M. Freund, Cengage Learning
❑2013, An introduction to information systems, Whiteley,
David, Palgrave Macmillan
References