SlideShare ist ein Scribd-Unternehmen logo
1 von 39
What is Educational Technology? ,[object Object]
is often associated with, and encompasses, instructional theory and learning theory. ,[object Object]
Legal, Social and Ethical Issues of Educational Technology and Innovations
Intellectual PROPERTY Is a term used to describe works of the mind- such as art, books, films, formulas, inventions, music and processes which are distinct, owned or created by a single person or group. It is protected through copyright, patent and trade secret laws.
It is designed to help technology leaders gain an understanding of the considerations technological innovations introduce into educational systems.
A. COPYRIGHT It protects authored works such as art, book, film and music. It is the exclusive right to distribute, display perform or reproduce an original work in copies or to prepare derivative works based on the work. It is granted to the creators of ‘original works of authorship in any tangible medium of expression.
Copyrights, patents, trademarks and trade secrets  provide a complex  body of law relating to the ownership of intellectual property which represents a large and valuable asset to most companies. If these assets are not protected other companies can copy or steal them, resulting in significant loss of revenue and competitive advantage.
Copyright law has proven to be extremely flexible in covering new technologies, including software, video games, multimedia works and Web pages. However, evaluating the originality of a work can be difficult and has led to litigation. Violating copyright can result in legal action against the teacher, school, and/or district.
The concept that an idea cannot be copyrighted but the expression of an idea can be Is key to understanding copyright protection.  Ex. An author cannot copy the exact words that someone else used to describe his feelings during the World War II battle, but he cannot convey the sense of the horror that the other person expressed.
Example: In Copyright Act 1976, audiovisual works were added  and computer programs were assigned to the literacy works category. The Copyright Act of 1976 defines circumstances, known as fair use, when educators may permissibly copy works of others for educational use. It provides less protection for software than patents; software that produces the same result in a slightly different way not infringe a copyright if no copying occurred.
Good copyright resources in schools includes; Media specialist School administrators Published district guidelines
COPYRIGHT INFRINGEMENT Is a violation of the rights secured by the owner of a copyright. Infringement occurs when someone copies a substantial and material part of another’s copyrighted work without permission.
COPYRIGHT TERM Copyright laws guarantees developers the rights to their works for a certain amount of time. Since 1960, the term of copyright  has been extended 11 times from its original limit of 28 years. The copyright Term Extension Act, also known as the Sonny Bono Copyright Term Extension Act. Signed into law in 1998, established the ff. time limits:
1. For works created after January 1, 1978, copyright protection endures for the life of the author plus 70 years. 2. For works created but not published or registered before January 1, 1978, the term endures for the life of the author plus 70 years, but in no case expires earlier than Dec. 31,2004.
3. For works created before 1978 that are still in their original or renewable term of copyright, the total term was extended to 9 years from the date the copyright was originally secured. These extensions were primarily championed by movie studios concerned  about retaining rights to their early films.
ELIGIBLE WORKS The type of works that can be copyrighted include; ,[object Object],art,				literature	 audiovisual works 	motion pictures	 recordings sounds	sculptures choreography		music drama			pantomimes  graphics			pictures
To be eligible for a copyright a work must fall within one of the preceding categories and it must be original.
FAIR USE DOCTRINE Fair Use Guidelines determine when a teacher can legally use copyrighted material. Fair Use limitations are specific and teachers must follow them to avoid violation of copyright laws. It was developed over the years as courts worked to maintain the balance between protecting an author’s rights and enabling public access to copyrighted works.
It allows portions of copyrighted materials to be used without permission under certain circumstances. Title 17, section 107, of the U.S. Code established four factors that courts should consider when deciding whether a particular use of copyrighted property is fair and can be allowed without penalty:
1. The purpose of the character of the use (such as commercial use or nonprofit, educational purposes. 2. The nature of the copyrighted work. 3. The portion of the copyrighted work used in relation to the work as a whole. 4. The effect of the use on the value of the copyrighted work.
The Digital Millennium Copyright Act makes it illegal to circumvent a technical protection or develop and provide tools that allow others to access a technologically protected work. The Prioritizing Resources and Organization for Intellectual Property (PRO- IP) Act 2008 increased trademark and copyright enforcement; it also substantially increased penalties for infringement.
The original General Agreement on Tariffs and Trade (GATT) was signed in 1947 by 150 countries. It is created the World Trade Organization (WTO) in Geneva, switzerland to enforce compliance with the agreement. GATT includes a section covering copyrights called the Agreement on Trade- Related Aspects of Intellectual Property Rights (TRIPS)
The WTO deals with the rules of the international trade based on WTO agreements that are negotiated and signed by the members of the world’s trading nations. Its goal is to help producers of goods and services, exporters and importers conduct their business.
PATENTS Is a grant of a property right issued by the United States Patent and Trademark Office (USPTO) to an inventor. It permits its owner to exclude the public from making, using or selling a protected invention and it allows for legal action against violators. Unlike copyright a patent prevents independent creation as well as copying
The main body of law that governs patents is contained in Title 35 of the U.S. Code, which states that an invention must pass the ff. four tests to be eligible for a patent. 1. It must fall into 5 statutory classes of items that can be patented: processes machines manufactures (such as objects made by humans or machines) compositions  of matter (such as chemical compounds) new uses in any of the previous four classes.
2. it must be useful. 3. it must be novel.  4. It must not be obvious to a person having ordinary skill in the same field.
PATENT INFRINGEMENT Patent Infringement, or the violation of the rights secured by the owner of a patent, occurs when someone makes unauthorized use of another’s patent. Unlike copyright infringement there is no specified limit o the monetary penalty if patent infringement is found.
SOFTWARE PATENTS claims as its invention some feature or process embodied in instructions executed by a computer. Applications software, business software, expert systems  and system software have been patented as well as such software processes as compilation routines, editing and control functions and operating systems techniques. Even electronic  font types and icons have been patented.
SUBMARINE PATENT A patented process or invention that is surreptitiously included within a standard without being made public until after the standard is broadly adopted. A devious patent holder might influence a standards organization to make use of its patented item without revealing the existence of the patent. Later the patent holder might demand royalties from all parties that use the standard. This strategy is known as patent farming. Example: A designer and manufacturer of computer memory technology.  
The most common defense against patent infringement is a counterattack on the claim of infringement and the validity of the patent itself. Even if the patent is valid, the plaintiff must still prove that every element of a claim was infringed and that infringement caused some sort of damage.
TRADE SECRETS Was defined as business information that represents something of the economic value, has required effort or cost to develop, has some degree of uniqueness or novelty is generally unknown to the public and kept it confidential. Trade secret laws has three key advantages over the use of patents and copyrights in protecting companies from losing control of their intellectual property.
1. There are no limitations on the protection of the trade secrets , unlike patents and copyrights. 2. There is no need to file any application or otherwise  disclose a trade secret to outsiders to gain protection. 3. There is no risk that a trade secret might be found  invalid in court.
TRADE SECRETS LAW The trade secret protection laws vary greatly from country to country. Ex. The Phils. Provides no legal protection for trade secrets. In some European countries, pharmaceuticals, methods o medical diagnosis and treatment and information technology cannot be patented.
To qualify a trade secret, information must have economic value and must not be readily ascertainable . The trade secret’s owner must have taken steps to maintain its secrecy. Trade secret laws do not prevent someone from using the same idea if it was developed independently or from analyzing  an end product to figure out the trade secret  behind it.
KEY ON INTELLECTUAL PROPERTY ISSUES A. Plagiarism  Is the act of stealing someone’s ideas or words and passing them off as one’s own.  Plagiarism detection systems enable people to check the originality of documents and manuscripts.
B. REVERSE ENGINEERING Is the process of taking something apart in order to understand it, build a copy of it, or improve it.   It was originally applied to computer hardware but is now commonly applied to a software as well.  Reverse engineering software involves analyzing  it to create a new representation of the system in a different form or at higher level of abstraction.  
C. COMPETITVE INTELLIGENCE is legally obtained information that is gathered to help company gain an advantage over its rivals.  It is not the same as industrial espionage, which employs illegal means to obtain business information that is not readily available to the general public.
Competitive Intelligence analyst must take care to avoid unethical or illegal behavior including lying, misrepresentation, theft, bribery, or eavesdropping with illegal devices.
D. CYBERSQUATTERS Register domain names for famous trademark’s owner will eventually buy the domain name for a large sum of money. The main tactic organizations use to circumvent cybersquatting is to protect a trademark by registering numerous domain names and variations as soon as they know they want to develop a Web presence.

Weitere ähnliche Inhalte

Was ist angesagt?

Legal & ethical issues when implementing technology
Legal & ethical issues when implementing technologyLegal & ethical issues when implementing technology
Legal & ethical issues when implementing technology
peav1n0
 
Legal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomLegal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroom
jlknight
 
The legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomThe legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroom
Gabriella Maree Wheeler
 

Was ist angesagt? (20)

Legal & ethical issues when implementing technology
Legal & ethical issues when implementing technologyLegal & ethical issues when implementing technology
Legal & ethical issues when implementing technology
 
Legal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomLegal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroom
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Ict ppt
Ict pptIct ppt
Ict ppt
 
gee-ie-living-in-the-it-era-syllabuspdf.docx
gee-ie-living-in-the-it-era-syllabuspdf.docxgee-ie-living-in-the-it-era-syllabuspdf.docx
gee-ie-living-in-the-it-era-syllabuspdf.docx
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Living in the IT Era - Lesson 9.pptx
Living in the IT Era - Lesson 9.pptxLiving in the IT Era - Lesson 9.pptx
Living in the IT Era - Lesson 9.pptx
 
Digital Literacy
Digital LiteracyDigital Literacy
Digital Literacy
 
Living in the IT Era - Lesson 7.pptx
Living in the IT Era - Lesson 7.pptxLiving in the IT Era - Lesson 7.pptx
Living in the IT Era - Lesson 7.pptx
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
What is digital literacy(joseph)
What is digital literacy(joseph)What is digital literacy(joseph)
What is digital literacy(joseph)
 
The legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomThe legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroom
 
Ethics of technology
Ethics of technologyEthics of technology
Ethics of technology
 
Introduction to ict
Introduction to ictIntroduction to ict
Introduction to ict
 
Ethics in it
Ethics in itEthics in it
Ethics in it
 
What is technology ?
What is technology ?What is technology ?
What is technology ?
 
computer application in education
computer application in educationcomputer application in education
computer application in education
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
introduction of ict
introduction of ictintroduction of ict
introduction of ict
 

Ähnlich wie Social, Legal and Ethical Issues in Educational Technology and Innovations

Intellectual-Property-Rights (2).pdf
Intellectual-Property-Rights (2).pdfIntellectual-Property-Rights (2).pdf
Intellectual-Property-Rights (2).pdf
Pradeep Mullangi
 
Legal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptxLegal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptx
jameshagwen
 
Report
ReportReport
Report
domsr
 
BS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptxBS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptx
whoiam36
 

Ähnlich wie Social, Legal and Ethical Issues in Educational Technology and Innovations (20)

Intellectual property ats
Intellectual property atsIntellectual property ats
Intellectual property ats
 
Intellectual-Property-Rights (2).pdf
Intellectual-Property-Rights (2).pdfIntellectual-Property-Rights (2).pdf
Intellectual-Property-Rights (2).pdf
 
An OER Amnesty
An OER AmnestyAn OER Amnesty
An OER Amnesty
 
Patents, Copyrights, Trademarks
Patents, Copyrights, TrademarksPatents, Copyrights, Trademarks
Patents, Copyrights, Trademarks
 
20CS2024 Ethics in Information Technology
20CS2024 Ethics in Information Technology20CS2024 Ethics in Information Technology
20CS2024 Ethics in Information Technology
 
Legal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptxLegal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptx
 
Intellectual property rights (2)
Intellectual property rights (2)Intellectual property rights (2)
Intellectual property rights (2)
 
Copyright
CopyrightCopyright
Copyright
 
Intellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and CopyrightsIntellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and Copyrights
 
intellectual copyrights
intellectual copyrightsintellectual copyrights
intellectual copyrights
 
Protecting innovation - PATENTS, TRADEMARKS, AND COPYRIGHTS
Protecting innovation - PATENTS, TRADEMARKS, AND COPYRIGHTS Protecting innovation - PATENTS, TRADEMARKS, AND COPYRIGHTS
Protecting innovation - PATENTS, TRADEMARKS, AND COPYRIGHTS
 
Report
ReportReport
Report
 
Intellectual Property Rights : Indian Perspective
Intellectual Property Rights : Indian PerspectiveIntellectual Property Rights : Indian Perspective
Intellectual Property Rights : Indian Perspective
 
Presentation on intellectual property rights
Presentation on intellectual property rightsPresentation on intellectual property rights
Presentation on intellectual property rights
 
Startups- know 4 types of ip protection for businesses
Startups- know 4 types of ip protection for businessesStartups- know 4 types of ip protection for businesses
Startups- know 4 types of ip protection for businesses
 
Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)
 
BS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptxBS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptx
 
INTELLECTUAL PROPERTY RIGHTS.pdf
INTELLECTUAL PROPERTY RIGHTS.pdfINTELLECTUAL PROPERTY RIGHTS.pdf
INTELLECTUAL PROPERTY RIGHTS.pdf
 
Copyright or Copyleft - Creative Commons
Copyright or Copyleft - Creative CommonsCopyright or Copyleft - Creative Commons
Copyright or Copyleft - Creative Commons
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
 

Kürzlich hochgeladen

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 

Social, Legal and Ethical Issues in Educational Technology and Innovations

  • 1.
  • 2.
  • 3. Legal, Social and Ethical Issues of Educational Technology and Innovations
  • 4. Intellectual PROPERTY Is a term used to describe works of the mind- such as art, books, films, formulas, inventions, music and processes which are distinct, owned or created by a single person or group. It is protected through copyright, patent and trade secret laws.
  • 5. It is designed to help technology leaders gain an understanding of the considerations technological innovations introduce into educational systems.
  • 6. A. COPYRIGHT It protects authored works such as art, book, film and music. It is the exclusive right to distribute, display perform or reproduce an original work in copies or to prepare derivative works based on the work. It is granted to the creators of ‘original works of authorship in any tangible medium of expression.
  • 7. Copyrights, patents, trademarks and trade secrets provide a complex body of law relating to the ownership of intellectual property which represents a large and valuable asset to most companies. If these assets are not protected other companies can copy or steal them, resulting in significant loss of revenue and competitive advantage.
  • 8. Copyright law has proven to be extremely flexible in covering new technologies, including software, video games, multimedia works and Web pages. However, evaluating the originality of a work can be difficult and has led to litigation. Violating copyright can result in legal action against the teacher, school, and/or district.
  • 9. The concept that an idea cannot be copyrighted but the expression of an idea can be Is key to understanding copyright protection. Ex. An author cannot copy the exact words that someone else used to describe his feelings during the World War II battle, but he cannot convey the sense of the horror that the other person expressed.
  • 10. Example: In Copyright Act 1976, audiovisual works were added and computer programs were assigned to the literacy works category. The Copyright Act of 1976 defines circumstances, known as fair use, when educators may permissibly copy works of others for educational use. It provides less protection for software than patents; software that produces the same result in a slightly different way not infringe a copyright if no copying occurred.
  • 11. Good copyright resources in schools includes; Media specialist School administrators Published district guidelines
  • 12. COPYRIGHT INFRINGEMENT Is a violation of the rights secured by the owner of a copyright. Infringement occurs when someone copies a substantial and material part of another’s copyrighted work without permission.
  • 13. COPYRIGHT TERM Copyright laws guarantees developers the rights to their works for a certain amount of time. Since 1960, the term of copyright has been extended 11 times from its original limit of 28 years. The copyright Term Extension Act, also known as the Sonny Bono Copyright Term Extension Act. Signed into law in 1998, established the ff. time limits:
  • 14. 1. For works created after January 1, 1978, copyright protection endures for the life of the author plus 70 years. 2. For works created but not published or registered before January 1, 1978, the term endures for the life of the author plus 70 years, but in no case expires earlier than Dec. 31,2004.
  • 15. 3. For works created before 1978 that are still in their original or renewable term of copyright, the total term was extended to 9 years from the date the copyright was originally secured. These extensions were primarily championed by movie studios concerned about retaining rights to their early films.
  • 16.
  • 17. To be eligible for a copyright a work must fall within one of the preceding categories and it must be original.
  • 18. FAIR USE DOCTRINE Fair Use Guidelines determine when a teacher can legally use copyrighted material. Fair Use limitations are specific and teachers must follow them to avoid violation of copyright laws. It was developed over the years as courts worked to maintain the balance between protecting an author’s rights and enabling public access to copyrighted works.
  • 19. It allows portions of copyrighted materials to be used without permission under certain circumstances. Title 17, section 107, of the U.S. Code established four factors that courts should consider when deciding whether a particular use of copyrighted property is fair and can be allowed without penalty:
  • 20. 1. The purpose of the character of the use (such as commercial use or nonprofit, educational purposes. 2. The nature of the copyrighted work. 3. The portion of the copyrighted work used in relation to the work as a whole. 4. The effect of the use on the value of the copyrighted work.
  • 21. The Digital Millennium Copyright Act makes it illegal to circumvent a technical protection or develop and provide tools that allow others to access a technologically protected work. The Prioritizing Resources and Organization for Intellectual Property (PRO- IP) Act 2008 increased trademark and copyright enforcement; it also substantially increased penalties for infringement.
  • 22. The original General Agreement on Tariffs and Trade (GATT) was signed in 1947 by 150 countries. It is created the World Trade Organization (WTO) in Geneva, switzerland to enforce compliance with the agreement. GATT includes a section covering copyrights called the Agreement on Trade- Related Aspects of Intellectual Property Rights (TRIPS)
  • 23. The WTO deals with the rules of the international trade based on WTO agreements that are negotiated and signed by the members of the world’s trading nations. Its goal is to help producers of goods and services, exporters and importers conduct their business.
  • 24. PATENTS Is a grant of a property right issued by the United States Patent and Trademark Office (USPTO) to an inventor. It permits its owner to exclude the public from making, using or selling a protected invention and it allows for legal action against violators. Unlike copyright a patent prevents independent creation as well as copying
  • 25. The main body of law that governs patents is contained in Title 35 of the U.S. Code, which states that an invention must pass the ff. four tests to be eligible for a patent. 1. It must fall into 5 statutory classes of items that can be patented: processes machines manufactures (such as objects made by humans or machines) compositions of matter (such as chemical compounds) new uses in any of the previous four classes.
  • 26. 2. it must be useful. 3. it must be novel. 4. It must not be obvious to a person having ordinary skill in the same field.
  • 27. PATENT INFRINGEMENT Patent Infringement, or the violation of the rights secured by the owner of a patent, occurs when someone makes unauthorized use of another’s patent. Unlike copyright infringement there is no specified limit o the monetary penalty if patent infringement is found.
  • 28. SOFTWARE PATENTS claims as its invention some feature or process embodied in instructions executed by a computer. Applications software, business software, expert systems and system software have been patented as well as such software processes as compilation routines, editing and control functions and operating systems techniques. Even electronic font types and icons have been patented.
  • 29. SUBMARINE PATENT A patented process or invention that is surreptitiously included within a standard without being made public until after the standard is broadly adopted. A devious patent holder might influence a standards organization to make use of its patented item without revealing the existence of the patent. Later the patent holder might demand royalties from all parties that use the standard. This strategy is known as patent farming. Example: A designer and manufacturer of computer memory technology.  
  • 30. The most common defense against patent infringement is a counterattack on the claim of infringement and the validity of the patent itself. Even if the patent is valid, the plaintiff must still prove that every element of a claim was infringed and that infringement caused some sort of damage.
  • 31. TRADE SECRETS Was defined as business information that represents something of the economic value, has required effort or cost to develop, has some degree of uniqueness or novelty is generally unknown to the public and kept it confidential. Trade secret laws has three key advantages over the use of patents and copyrights in protecting companies from losing control of their intellectual property.
  • 32. 1. There are no limitations on the protection of the trade secrets , unlike patents and copyrights. 2. There is no need to file any application or otherwise disclose a trade secret to outsiders to gain protection. 3. There is no risk that a trade secret might be found invalid in court.
  • 33. TRADE SECRETS LAW The trade secret protection laws vary greatly from country to country. Ex. The Phils. Provides no legal protection for trade secrets. In some European countries, pharmaceuticals, methods o medical diagnosis and treatment and information technology cannot be patented.
  • 34. To qualify a trade secret, information must have economic value and must not be readily ascertainable . The trade secret’s owner must have taken steps to maintain its secrecy. Trade secret laws do not prevent someone from using the same idea if it was developed independently or from analyzing an end product to figure out the trade secret behind it.
  • 35. KEY ON INTELLECTUAL PROPERTY ISSUES A. Plagiarism Is the act of stealing someone’s ideas or words and passing them off as one’s own. Plagiarism detection systems enable people to check the originality of documents and manuscripts.
  • 36. B. REVERSE ENGINEERING Is the process of taking something apart in order to understand it, build a copy of it, or improve it. It was originally applied to computer hardware but is now commonly applied to a software as well. Reverse engineering software involves analyzing it to create a new representation of the system in a different form or at higher level of abstraction.  
  • 37. C. COMPETITVE INTELLIGENCE is legally obtained information that is gathered to help company gain an advantage over its rivals. It is not the same as industrial espionage, which employs illegal means to obtain business information that is not readily available to the general public.
  • 38. Competitive Intelligence analyst must take care to avoid unethical or illegal behavior including lying, misrepresentation, theft, bribery, or eavesdropping with illegal devices.
  • 39. D. CYBERSQUATTERS Register domain names for famous trademark’s owner will eventually buy the domain name for a large sum of money. The main tactic organizations use to circumvent cybersquatting is to protect a trademark by registering numerous domain names and variations as soon as they know they want to develop a Web presence.