SlideShare ist ein Scribd-Unternehmen logo
1 von 39
What is Educational Technology? ,[object Object]
is often associated with, and encompasses, instructional theory and learning theory. ,[object Object]
Legal, Social and Ethical Issues of Educational Technology and Innovations
Intellectual PROPERTY Is a term used to describe works of the mind- such as art, books, films, formulas, inventions, music and processes which are distinct, owned or created by a single person or group. It is protected through copyright, patent and trade secret laws.
It is designed to help technology leaders gain an understanding of the considerations technological innovations introduce into educational systems.
A. COPYRIGHT It protects authored works such as art, book, film and music. It is the exclusive right to distribute, display perform or reproduce an original work in copies or to prepare derivative works based on the work. It is granted to the creators of ‘original works of authorship in any tangible medium of expression.
Copyrights, patents, trademarks and trade secrets  provide a complex  body of law relating to the ownership of intellectual property which represents a large and valuable asset to most companies. If these assets are not protected other companies can copy or steal them, resulting in significant loss of revenue and competitive advantage.
Copyright law has proven to be extremely flexible in covering new technologies, including software, video games, multimedia works and Web pages. However, evaluating the originality of a work can be difficult and has led to litigation. Violating copyright can result in legal action against the teacher, school, and/or district.
The concept that an idea cannot be copyrighted but the expression of an idea can be Is key to understanding copyright protection.  Ex. An author cannot copy the exact words that someone else used to describe his feelings during the World War II battle, but he cannot convey the sense of the horror that the other person expressed.
Example: In Copyright Act 1976, audiovisual works were added  and computer programs were assigned to the literacy works category. The Copyright Act of 1976 defines circumstances, known as fair use, when educators may permissibly copy works of others for educational use. It provides less protection for software than patents; software that produces the same result in a slightly different way not infringe a copyright if no copying occurred.
Good copyright resources in schools includes; Media specialist School administrators Published district guidelines
COPYRIGHT INFRINGEMENT Is a violation of the rights secured by the owner of a copyright. Infringement occurs when someone copies a substantial and material part of another’s copyrighted work without permission.
COPYRIGHT TERM Copyright laws guarantees developers the rights to their works for a certain amount of time. Since 1960, the term of copyright  has been extended 11 times from its original limit of 28 years. The copyright Term Extension Act, also known as the Sonny Bono Copyright Term Extension Act. Signed into law in 1998, established the ff. time limits:
1. For works created after January 1, 1978, copyright protection endures for the life of the author plus 70 years. 2. For works created but not published or registered before January 1, 1978, the term endures for the life of the author plus 70 years, but in no case expires earlier than Dec. 31,2004.
3. For works created before 1978 that are still in their original or renewable term of copyright, the total term was extended to 9 years from the date the copyright was originally secured. These extensions were primarily championed by movie studios concerned  about retaining rights to their early films.
ELIGIBLE WORKS The type of works that can be copyrighted include; ,[object Object],art,				literature	 audiovisual works 	motion pictures	 recordings sounds	sculptures choreography		music drama			pantomimes  graphics			pictures
To be eligible for a copyright a work must fall within one of the preceding categories and it must be original.
FAIR USE DOCTRINE Fair Use Guidelines determine when a teacher can legally use copyrighted material. Fair Use limitations are specific and teachers must follow them to avoid violation of copyright laws. It was developed over the years as courts worked to maintain the balance between protecting an author’s rights and enabling public access to copyrighted works.
It allows portions of copyrighted materials to be used without permission under certain circumstances. Title 17, section 107, of the U.S. Code established four factors that courts should consider when deciding whether a particular use of copyrighted property is fair and can be allowed without penalty:
1. The purpose of the character of the use (such as commercial use or nonprofit, educational purposes. 2. The nature of the copyrighted work. 3. The portion of the copyrighted work used in relation to the work as a whole. 4. The effect of the use on the value of the copyrighted work.
The Digital Millennium Copyright Act makes it illegal to circumvent a technical protection or develop and provide tools that allow others to access a technologically protected work. The Prioritizing Resources and Organization for Intellectual Property (PRO- IP) Act 2008 increased trademark and copyright enforcement; it also substantially increased penalties for infringement.
The original General Agreement on Tariffs and Trade (GATT) was signed in 1947 by 150 countries. It is created the World Trade Organization (WTO) in Geneva, switzerland to enforce compliance with the agreement. GATT includes a section covering copyrights called the Agreement on Trade- Related Aspects of Intellectual Property Rights (TRIPS)
The WTO deals with the rules of the international trade based on WTO agreements that are negotiated and signed by the members of the world’s trading nations. Its goal is to help producers of goods and services, exporters and importers conduct their business.
PATENTS Is a grant of a property right issued by the United States Patent and Trademark Office (USPTO) to an inventor. It permits its owner to exclude the public from making, using or selling a protected invention and it allows for legal action against violators. Unlike copyright a patent prevents independent creation as well as copying
The main body of law that governs patents is contained in Title 35 of the U.S. Code, which states that an invention must pass the ff. four tests to be eligible for a patent. 1. It must fall into 5 statutory classes of items that can be patented: processes machines manufactures (such as objects made by humans or machines) compositions  of matter (such as chemical compounds) new uses in any of the previous four classes.
2. it must be useful. 3. it must be novel.  4. It must not be obvious to a person having ordinary skill in the same field.
PATENT INFRINGEMENT Patent Infringement, or the violation of the rights secured by the owner of a patent, occurs when someone makes unauthorized use of another’s patent. Unlike copyright infringement there is no specified limit o the monetary penalty if patent infringement is found.
SOFTWARE PATENTS claims as its invention some feature or process embodied in instructions executed by a computer. Applications software, business software, expert systems  and system software have been patented as well as such software processes as compilation routines, editing and control functions and operating systems techniques. Even electronic  font types and icons have been patented.
SUBMARINE PATENT A patented process or invention that is surreptitiously included within a standard without being made public until after the standard is broadly adopted. A devious patent holder might influence a standards organization to make use of its patented item without revealing the existence of the patent. Later the patent holder might demand royalties from all parties that use the standard. This strategy is known as patent farming. Example: A designer and manufacturer of computer memory technology.  
The most common defense against patent infringement is a counterattack on the claim of infringement and the validity of the patent itself. Even if the patent is valid, the plaintiff must still prove that every element of a claim was infringed and that infringement caused some sort of damage.
TRADE SECRETS Was defined as business information that represents something of the economic value, has required effort or cost to develop, has some degree of uniqueness or novelty is generally unknown to the public and kept it confidential. Trade secret laws has three key advantages over the use of patents and copyrights in protecting companies from losing control of their intellectual property.
1. There are no limitations on the protection of the trade secrets , unlike patents and copyrights. 2. There is no need to file any application or otherwise  disclose a trade secret to outsiders to gain protection. 3. There is no risk that a trade secret might be found  invalid in court.
TRADE SECRETS LAW The trade secret protection laws vary greatly from country to country. Ex. The Phils. Provides no legal protection for trade secrets. In some European countries, pharmaceuticals, methods o medical diagnosis and treatment and information technology cannot be patented.
To qualify a trade secret, information must have economic value and must not be readily ascertainable . The trade secret’s owner must have taken steps to maintain its secrecy. Trade secret laws do not prevent someone from using the same idea if it was developed independently or from analyzing  an end product to figure out the trade secret  behind it.
KEY ON INTELLECTUAL PROPERTY ISSUES A. Plagiarism  Is the act of stealing someone’s ideas or words and passing them off as one’s own.  Plagiarism detection systems enable people to check the originality of documents and manuscripts.
B. REVERSE ENGINEERING Is the process of taking something apart in order to understand it, build a copy of it, or improve it.   It was originally applied to computer hardware but is now commonly applied to a software as well.  Reverse engineering software involves analyzing  it to create a new representation of the system in a different form or at higher level of abstraction.  
C. COMPETITVE INTELLIGENCE is legally obtained information that is gathered to help company gain an advantage over its rivals.  It is not the same as industrial espionage, which employs illegal means to obtain business information that is not readily available to the general public.
Competitive Intelligence analyst must take care to avoid unethical or illegal behavior including lying, misrepresentation, theft, bribery, or eavesdropping with illegal devices.
D. CYBERSQUATTERS Register domain names for famous trademark’s owner will eventually buy the domain name for a large sum of money. The main tactic organizations use to circumvent cybersquatting is to protect a trademark by registering numerous domain names and variations as soon as they know they want to develop a Web presence.

Weitere Àhnliche Inhalte

Was ist angesagt?

The roles of technology in delivering the curriculum
The roles of technology in delivering the curriculumThe roles of technology in delivering the curriculum
The roles of technology in delivering the curriculumPhillip Murphy Bonaobra
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
ICT in Teaching
ICT in TeachingICT in Teaching
ICT in TeachingAtifa Aqueel
 
Technology in Teaching and Learning
Technology in Teaching and LearningTechnology in Teaching and Learning
Technology in Teaching and LearningDr.G.Muppudathi Ph.D.
 
Intellectual Property Rights on the Development and Use of Digital Materials
Intellectual Property Rights on the Development and Use of Digital MaterialsIntellectual Property Rights on the Development and Use of Digital Materials
Intellectual Property Rights on the Development and Use of Digital MaterialsIra Sagu
 
ICT in classroom teaching
ICT in classroom teachingICT in classroom teaching
ICT in classroom teachingRati Soni
 
Lesson 6 cone of experience
Lesson 6   cone of experienceLesson 6   cone of experience
Lesson 6 cone of experienceLeeboy Morales
 
Lesson 17: Educational Technology 2 Practicum
Lesson 17: Educational Technology 2 PracticumLesson 17: Educational Technology 2 Practicum
Lesson 17: Educational Technology 2 PracticumRosarah Nemo
 
Legal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomLegal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomjlknight
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computingsappingtonkr
 
Educational Technology 2: The computer as a tutor
Educational Technology 2: The computer as a tutor Educational Technology 2: The computer as a tutor
Educational Technology 2: The computer as a tutor Alyssa Denise Valino
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technologyKobieJones1
 
ASSURE MODEL POWERPOINT
ASSURE MODEL POWERPOINTASSURE MODEL POWERPOINT
ASSURE MODEL POWERPOINTXtine Kurisutein
 
Teaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomTeaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomMrs.Faust
 
Pedagogy and ICT
Pedagogy and ICTPedagogy and ICT
Pedagogy and ICTLenva Shearing
 
Lesson 3 understanding technology learners
Lesson 3 understanding technology learnersLesson 3 understanding technology learners
Lesson 3 understanding technology learnersAngelo Rosalita
 
Importance & roles of educational technology ppt
Importance & roles of educational technology pptImportance & roles of educational technology ppt
Importance & roles of educational technology pptMarilou Jamero
 
Ict - Computer Ethics
Ict - Computer EthicsIct - Computer Ethics
Ict - Computer Ethicsaleeya91
 
Edtech 1 review and edtech 2 overview
Edtech 1 review and edtech 2 overviewEdtech 1 review and edtech 2 overview
Edtech 1 review and edtech 2 overviewAnnafel Nova Macapobre
 

Was ist angesagt? (20)

The roles of technology in delivering the curriculum
The roles of technology in delivering the curriculumThe roles of technology in delivering the curriculum
The roles of technology in delivering the curriculum
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
ICT in Teaching
ICT in TeachingICT in Teaching
ICT in Teaching
 
Technology in Teaching and Learning
Technology in Teaching and LearningTechnology in Teaching and Learning
Technology in Teaching and Learning
 
Intellectual Property Rights on the Development and Use of Digital Materials
Intellectual Property Rights on the Development and Use of Digital MaterialsIntellectual Property Rights on the Development and Use of Digital Materials
Intellectual Property Rights on the Development and Use of Digital Materials
 
ICT in classroom teaching
ICT in classroom teachingICT in classroom teaching
ICT in classroom teaching
 
Lesson 6 cone of experience
Lesson 6   cone of experienceLesson 6   cone of experience
Lesson 6 cone of experience
 
Lesson 17: Educational Technology 2 Practicum
Lesson 17: Educational Technology 2 PracticumLesson 17: Educational Technology 2 Practicum
Lesson 17: Educational Technology 2 Practicum
 
Legal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomLegal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroom
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
 
Educational Technology 2: The computer as a tutor
Educational Technology 2: The computer as a tutor Educational Technology 2: The computer as a tutor
Educational Technology 2: The computer as a tutor
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technology
 
ASSURE MODEL POWERPOINT
ASSURE MODEL POWERPOINTASSURE MODEL POWERPOINT
ASSURE MODEL POWERPOINT
 
Teaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomTeaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the Classroom
 
Pedagogy and ICT
Pedagogy and ICTPedagogy and ICT
Pedagogy and ICT
 
Distance learning
Distance learningDistance learning
Distance learning
 
Lesson 3 understanding technology learners
Lesson 3 understanding technology learnersLesson 3 understanding technology learners
Lesson 3 understanding technology learners
 
Importance & roles of educational technology ppt
Importance & roles of educational technology pptImportance & roles of educational technology ppt
Importance & roles of educational technology ppt
 
Ict - Computer Ethics
Ict - Computer EthicsIct - Computer Ethics
Ict - Computer Ethics
 
Edtech 1 review and edtech 2 overview
Edtech 1 review and edtech 2 overviewEdtech 1 review and edtech 2 overview
Edtech 1 review and edtech 2 overview
 

Andere mochten auch

Mentor acceptance form 525
Mentor acceptance form 525Mentor acceptance form 525
Mentor acceptance form 525Dr. Ernie Walker
 
21st Century Classrooms
21st Century Classrooms21st Century Classrooms
21st Century ClassroomsKary Ulfsax
 
21st century knowledge and skills in educator preparation
21st century knowledge and skills in educator preparation 21st century knowledge and skills in educator preparation
21st century knowledge and skills in educator preparation Paolacastro2310
 
Technology integration
Technology integrationTechnology integration
Technology integrationblhopki
 
Applying the Multimedia & Contiguity Principle
Applying the Multimedia & Contiguity PrincipleApplying the Multimedia & Contiguity Principle
Applying the Multimedia & Contiguity Principleboise state
 
Teaching and learning at a distance
Teaching and learning at a distanceTeaching and learning at a distance
Teaching and learning at a distancegualasxilitla
 
Distance Learning
Distance LearningDistance Learning
Distance Learningthakkar kathan
 
What is Multimedia?.pptx
What is Multimedia?.pptxWhat is Multimedia?.pptx
What is Multimedia?.pptxMisheck Mutuzana
 
Graphic organizers as thinking technology
Graphic organizers as thinking technologyGraphic organizers as thinking technology
Graphic organizers as thinking technologyGene102413
 
Distance Learning / Education
Distance Learning / EducationDistance Learning / Education
Distance Learning / EducationFrancel Gatchalian
 
Evaluation of educational technology and its current application
Evaluation of educational technology and its current applicationEvaluation of educational technology and its current application
Evaluation of educational technology and its current applicationRhoda malazarte
 
Ethical issues in guidance and counselling
Ethical issues in guidance and counsellingEthical issues in guidance and counselling
Ethical issues in guidance and counsellingTanecia Stevens
 
Why Integrate Technology In Teaching
Why Integrate Technology In TeachingWhy Integrate Technology In Teaching
Why Integrate Technology In Teachingmustgo20
 
Using Graphic Organizers To Differentiate Instruction
Using Graphic Organizers To Differentiate InstructionUsing Graphic Organizers To Differentiate Instruction
Using Graphic Organizers To Differentiate Instructionulamb
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systemsProf. Othman Alsalloum
 
Philosophy of philiippine education
Philosophy of philiippine educationPhilosophy of philiippine education
Philosophy of philiippine educationST. JAMES COLLEGE
 
Meaning of education technology
Meaning of education technologyMeaning of education technology
Meaning of education technologyIvy Lontoc Capistrano
 
Integrating Technology into a Classroom
Integrating Technology into a ClassroomIntegrating Technology into a Classroom
Integrating Technology into a Classroomguesta5243d5
 

Andere mochten auch (20)

Mentor acceptance form 525
Mentor acceptance form 525Mentor acceptance form 525
Mentor acceptance form 525
 
21st Century Classrooms
21st Century Classrooms21st Century Classrooms
21st Century Classrooms
 
21st century knowledge and skills in educator preparation
21st century knowledge and skills in educator preparation 21st century knowledge and skills in educator preparation
21st century knowledge and skills in educator preparation
 
Technology integration
Technology integrationTechnology integration
Technology integration
 
Applying the Multimedia & Contiguity Principle
Applying the Multimedia & Contiguity PrincipleApplying the Multimedia & Contiguity Principle
Applying the Multimedia & Contiguity Principle
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Teaching and learning at a distance
Teaching and learning at a distanceTeaching and learning at a distance
Teaching and learning at a distance
 
Distance Learning
Distance LearningDistance Learning
Distance Learning
 
What is Multimedia?.pptx
What is Multimedia?.pptxWhat is Multimedia?.pptx
What is Multimedia?.pptx
 
Graphic organizers as thinking technology
Graphic organizers as thinking technologyGraphic organizers as thinking technology
Graphic organizers as thinking technology
 
Distance Learning / Education
Distance Learning / EducationDistance Learning / Education
Distance Learning / Education
 
Evaluation of educational technology and its current application
Evaluation of educational technology and its current applicationEvaluation of educational technology and its current application
Evaluation of educational technology and its current application
 
distance learning
distance learningdistance learning
distance learning
 
Ethical issues in guidance and counselling
Ethical issues in guidance and counsellingEthical issues in guidance and counselling
Ethical issues in guidance and counselling
 
Why Integrate Technology In Teaching
Why Integrate Technology In TeachingWhy Integrate Technology In Teaching
Why Integrate Technology In Teaching
 
Using Graphic Organizers To Differentiate Instruction
Using Graphic Organizers To Differentiate InstructionUsing Graphic Organizers To Differentiate Instruction
Using Graphic Organizers To Differentiate Instruction
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Philosophy of philiippine education
Philosophy of philiippine educationPhilosophy of philiippine education
Philosophy of philiippine education
 
Meaning of education technology
Meaning of education technologyMeaning of education technology
Meaning of education technology
 
Integrating Technology into a Classroom
Integrating Technology into a ClassroomIntegrating Technology into a Classroom
Integrating Technology into a Classroom
 

Ähnlich wie What is Educational Technology

Intellectual property ats
Intellectual property atsIntellectual property ats
Intellectual property atsDr.Aravind TS
 
Intellectual-Property-Rights (2).pdf
Intellectual-Property-Rights (2).pdfIntellectual-Property-Rights (2).pdf
Intellectual-Property-Rights (2).pdfPradeep Mullangi
 
Patents, Copyrights, Trademarks
Patents, Copyrights, TrademarksPatents, Copyrights, Trademarks
Patents, Copyrights, Trademarksudayjoshi35
 
20CS2024 Ethics in Information Technology
20CS2024 Ethics in Information Technology20CS2024 Ethics in Information Technology
20CS2024 Ethics in Information TechnologyKathirvel Ayyaswamy
 
Legal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptxLegal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptxjameshagwen
 
Intellectual property rights (2)
Intellectual property rights (2)Intellectual property rights (2)
Intellectual property rights (2)Atul Kumar Suryavanshi
 
Copyright
CopyrightCopyright
Copyrightesam123
 
Intellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and CopyrightsIntellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and CopyrightsUpekha Vandebona
 
intellectual copyrights
intellectual copyrightsintellectual copyrights
intellectual copyrightsmariajan8
 
Protecting innovation - PATENTS, TRADEMARKS, AND COPYRIGHTS
Protecting innovation - PATENTS, TRADEMARKS, AND COPYRIGHTS Protecting innovation - PATENTS, TRADEMARKS, AND COPYRIGHTS
Protecting innovation - PATENTS, TRADEMARKS, AND COPYRIGHTS Bagus Anjari
 
Report
ReportReport
Reportdomsr
 
Intellectual Property Rights : Indian Perspective
Intellectual Property Rights : Indian PerspectiveIntellectual Property Rights : Indian Perspective
Intellectual Property Rights : Indian PerspectiveHarsh Kishore Mishra
 
Presentation on intellectual property rights
Presentation on intellectual property rightsPresentation on intellectual property rights
Presentation on intellectual property rightsMedha Shahi
 
Startups- know 4 types of ip protection for businesses
Startups- know 4 types of ip protection for businessesStartups- know 4 types of ip protection for businesses
Startups- know 4 types of ip protection for businesseseTailing India
 
Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)Toshi Mahto
 
BS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptxBS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptxwhoiam36
 
INTELLECTUAL PROPERTY RIGHTS.pdf
INTELLECTUAL PROPERTY RIGHTS.pdfINTELLECTUAL PROPERTY RIGHTS.pdf
INTELLECTUAL PROPERTY RIGHTS.pdfVanangamudiK1
 
Copyright or Copyleft - Creative Commons
Copyright or Copyleft - Creative CommonsCopyright or Copyleft - Creative Commons
Copyright or Copyleft - Creative CommonsMartha Hardy
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rightsiqbal hussain
 

Ähnlich wie What is Educational Technology (20)

Intellectual property ats
Intellectual property atsIntellectual property ats
Intellectual property ats
 
Intellectual-Property-Rights (2).pdf
Intellectual-Property-Rights (2).pdfIntellectual-Property-Rights (2).pdf
Intellectual-Property-Rights (2).pdf
 
An OER Amnesty
An OER AmnestyAn OER Amnesty
An OER Amnesty
 
Patents, Copyrights, Trademarks
Patents, Copyrights, TrademarksPatents, Copyrights, Trademarks
Patents, Copyrights, Trademarks
 
20CS2024 Ethics in Information Technology
20CS2024 Ethics in Information Technology20CS2024 Ethics in Information Technology
20CS2024 Ethics in Information Technology
 
Legal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptxLegal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptx
 
Intellectual property rights (2)
Intellectual property rights (2)Intellectual property rights (2)
Intellectual property rights (2)
 
Copyright
CopyrightCopyright
Copyright
 
Intellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and CopyrightsIntellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and Copyrights
 
intellectual copyrights
intellectual copyrightsintellectual copyrights
intellectual copyrights
 
Protecting innovation - PATENTS, TRADEMARKS, AND COPYRIGHTS
Protecting innovation - PATENTS, TRADEMARKS, AND COPYRIGHTS Protecting innovation - PATENTS, TRADEMARKS, AND COPYRIGHTS
Protecting innovation - PATENTS, TRADEMARKS, AND COPYRIGHTS
 
Report
ReportReport
Report
 
Intellectual Property Rights : Indian Perspective
Intellectual Property Rights : Indian PerspectiveIntellectual Property Rights : Indian Perspective
Intellectual Property Rights : Indian Perspective
 
Presentation on intellectual property rights
Presentation on intellectual property rightsPresentation on intellectual property rights
Presentation on intellectual property rights
 
Startups- know 4 types of ip protection for businesses
Startups- know 4 types of ip protection for businessesStartups- know 4 types of ip protection for businesses
Startups- know 4 types of ip protection for businesses
 
Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)
 
BS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptxBS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptx
 
INTELLECTUAL PROPERTY RIGHTS.pdf
INTELLECTUAL PROPERTY RIGHTS.pdfINTELLECTUAL PROPERTY RIGHTS.pdf
INTELLECTUAL PROPERTY RIGHTS.pdf
 
Copyright or Copyleft - Creative Commons
Copyright or Copyleft - Creative CommonsCopyright or Copyleft - Creative Commons
Copyright or Copyleft - Creative Commons
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
 

KĂŒrzlich hochgeladen

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 

KĂŒrzlich hochgeladen (20)

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 

What is Educational Technology

  • 1.
  • 2.
  • 3. Legal, Social and Ethical Issues of Educational Technology and Innovations
  • 4. Intellectual PROPERTY Is a term used to describe works of the mind- such as art, books, films, formulas, inventions, music and processes which are distinct, owned or created by a single person or group. It is protected through copyright, patent and trade secret laws.
  • 5. It is designed to help technology leaders gain an understanding of the considerations technological innovations introduce into educational systems.
  • 6. A. COPYRIGHT It protects authored works such as art, book, film and music. It is the exclusive right to distribute, display perform or reproduce an original work in copies or to prepare derivative works based on the work. It is granted to the creators of ‘original works of authorship in any tangible medium of expression.
  • 7. Copyrights, patents, trademarks and trade secrets provide a complex body of law relating to the ownership of intellectual property which represents a large and valuable asset to most companies. If these assets are not protected other companies can copy or steal them, resulting in significant loss of revenue and competitive advantage.
  • 8. Copyright law has proven to be extremely flexible in covering new technologies, including software, video games, multimedia works and Web pages. However, evaluating the originality of a work can be difficult and has led to litigation. Violating copyright can result in legal action against the teacher, school, and/or district.
  • 9. The concept that an idea cannot be copyrighted but the expression of an idea can be Is key to understanding copyright protection. Ex. An author cannot copy the exact words that someone else used to describe his feelings during the World War II battle, but he cannot convey the sense of the horror that the other person expressed.
  • 10. Example: In Copyright Act 1976, audiovisual works were added and computer programs were assigned to the literacy works category. The Copyright Act of 1976 defines circumstances, known as fair use, when educators may permissibly copy works of others for educational use. It provides less protection for software than patents; software that produces the same result in a slightly different way not infringe a copyright if no copying occurred.
  • 11. Good copyright resources in schools includes; Media specialist School administrators Published district guidelines
  • 12. COPYRIGHT INFRINGEMENT Is a violation of the rights secured by the owner of a copyright. Infringement occurs when someone copies a substantial and material part of another’s copyrighted work without permission.
  • 13. COPYRIGHT TERM Copyright laws guarantees developers the rights to their works for a certain amount of time. Since 1960, the term of copyright has been extended 11 times from its original limit of 28 years. The copyright Term Extension Act, also known as the Sonny Bono Copyright Term Extension Act. Signed into law in 1998, established the ff. time limits:
  • 14. 1. For works created after January 1, 1978, copyright protection endures for the life of the author plus 70 years. 2. For works created but not published or registered before January 1, 1978, the term endures for the life of the author plus 70 years, but in no case expires earlier than Dec. 31,2004.
  • 15. 3. For works created before 1978 that are still in their original or renewable term of copyright, the total term was extended to 9 years from the date the copyright was originally secured. These extensions were primarily championed by movie studios concerned about retaining rights to their early films.
  • 16.
  • 17. To be eligible for a copyright a work must fall within one of the preceding categories and it must be original.
  • 18. FAIR USE DOCTRINE Fair Use Guidelines determine when a teacher can legally use copyrighted material. Fair Use limitations are specific and teachers must follow them to avoid violation of copyright laws. It was developed over the years as courts worked to maintain the balance between protecting an author’s rights and enabling public access to copyrighted works.
  • 19. It allows portions of copyrighted materials to be used without permission under certain circumstances. Title 17, section 107, of the U.S. Code established four factors that courts should consider when deciding whether a particular use of copyrighted property is fair and can be allowed without penalty:
  • 20. 1. The purpose of the character of the use (such as commercial use or nonprofit, educational purposes. 2. The nature of the copyrighted work. 3. The portion of the copyrighted work used in relation to the work as a whole. 4. The effect of the use on the value of the copyrighted work.
  • 21. The Digital Millennium Copyright Act makes it illegal to circumvent a technical protection or develop and provide tools that allow others to access a technologically protected work. The Prioritizing Resources and Organization for Intellectual Property (PRO- IP) Act 2008 increased trademark and copyright enforcement; it also substantially increased penalties for infringement.
  • 22. The original General Agreement on Tariffs and Trade (GATT) was signed in 1947 by 150 countries. It is created the World Trade Organization (WTO) in Geneva, switzerland to enforce compliance with the agreement. GATT includes a section covering copyrights called the Agreement on Trade- Related Aspects of Intellectual Property Rights (TRIPS)
  • 23. The WTO deals with the rules of the international trade based on WTO agreements that are negotiated and signed by the members of the world’s trading nations. Its goal is to help producers of goods and services, exporters and importers conduct their business.
  • 24. PATENTS Is a grant of a property right issued by the United States Patent and Trademark Office (USPTO) to an inventor. It permits its owner to exclude the public from making, using or selling a protected invention and it allows for legal action against violators. Unlike copyright a patent prevents independent creation as well as copying
  • 25. The main body of law that governs patents is contained in Title 35 of the U.S. Code, which states that an invention must pass the ff. four tests to be eligible for a patent. 1. It must fall into 5 statutory classes of items that can be patented: processes machines manufactures (such as objects made by humans or machines) compositions of matter (such as chemical compounds) new uses in any of the previous four classes.
  • 26. 2. it must be useful. 3. it must be novel. 4. It must not be obvious to a person having ordinary skill in the same field.
  • 27. PATENT INFRINGEMENT Patent Infringement, or the violation of the rights secured by the owner of a patent, occurs when someone makes unauthorized use of another’s patent. Unlike copyright infringement there is no specified limit o the monetary penalty if patent infringement is found.
  • 28. SOFTWARE PATENTS claims as its invention some feature or process embodied in instructions executed by a computer. Applications software, business software, expert systems and system software have been patented as well as such software processes as compilation routines, editing and control functions and operating systems techniques. Even electronic font types and icons have been patented.
  • 29. SUBMARINE PATENT A patented process or invention that is surreptitiously included within a standard without being made public until after the standard is broadly adopted. A devious patent holder might influence a standards organization to make use of its patented item without revealing the existence of the patent. Later the patent holder might demand royalties from all parties that use the standard. This strategy is known as patent farming. Example: A designer and manufacturer of computer memory technology.  
  • 30. The most common defense against patent infringement is a counterattack on the claim of infringement and the validity of the patent itself. Even if the patent is valid, the plaintiff must still prove that every element of a claim was infringed and that infringement caused some sort of damage.
  • 31. TRADE SECRETS Was defined as business information that represents something of the economic value, has required effort or cost to develop, has some degree of uniqueness or novelty is generally unknown to the public and kept it confidential. Trade secret laws has three key advantages over the use of patents and copyrights in protecting companies from losing control of their intellectual property.
  • 32. 1. There are no limitations on the protection of the trade secrets , unlike patents and copyrights. 2. There is no need to file any application or otherwise disclose a trade secret to outsiders to gain protection. 3. There is no risk that a trade secret might be found invalid in court.
  • 33. TRADE SECRETS LAW The trade secret protection laws vary greatly from country to country. Ex. The Phils. Provides no legal protection for trade secrets. In some European countries, pharmaceuticals, methods o medical diagnosis and treatment and information technology cannot be patented.
  • 34. To qualify a trade secret, information must have economic value and must not be readily ascertainable . The trade secret’s owner must have taken steps to maintain its secrecy. Trade secret laws do not prevent someone from using the same idea if it was developed independently or from analyzing an end product to figure out the trade secret behind it.
  • 35. KEY ON INTELLECTUAL PROPERTY ISSUES A. Plagiarism Is the act of stealing someone’s ideas or words and passing them off as one’s own. Plagiarism detection systems enable people to check the originality of documents and manuscripts.
  • 36. B. REVERSE ENGINEERING Is the process of taking something apart in order to understand it, build a copy of it, or improve it. It was originally applied to computer hardware but is now commonly applied to a software as well. Reverse engineering software involves analyzing it to create a new representation of the system in a different form or at higher level of abstraction.  
  • 37. C. COMPETITVE INTELLIGENCE is legally obtained information that is gathered to help company gain an advantage over its rivals. It is not the same as industrial espionage, which employs illegal means to obtain business information that is not readily available to the general public.
  • 38. Competitive Intelligence analyst must take care to avoid unethical or illegal behavior including lying, misrepresentation, theft, bribery, or eavesdropping with illegal devices.
  • 39. D. CYBERSQUATTERS Register domain names for famous trademark’s owner will eventually buy the domain name for a large sum of money. The main tactic organizations use to circumvent cybersquatting is to protect a trademark by registering numerous domain names and variations as soon as they know they want to develop a Web presence.