It Era Reviewer Final
It Era Reviewer Final
Intellectual Property (Republic Act No. 8293)- Intellectual property (IP) is a legal concept that
refers to creations of the mind for which exclusive rights are recognized. It is An Act Prescribing
the Intellectual Property Code and Establishing “The Intellectual Property Office, Providing for
Its Powers and Functions, and for Other Purposes. Section 1 of this Act state that this act shall be
known as the "Intellectual Property Code of the Philippines."
According to the World Intellectual Property Organization (WIPO), intellectual property (IP) is
divided into two categories: industrial property and copyright.
The term "intellectual property rights" consists of:
• Copyright and Related Rights
• Trademarks and Service Marks
• Geographic Indications
• Industrial Designs
• Patents
• Layout-Designs (Topographies) of Integrated Circuits
• Protection of Undisclosed Information
The Intellectual Property Office of the Philippines (IP Philippines) is the government agency in
charge of the implementation of the law protecting intellectual property rights in the Philippines
as provided for under RA 8293 or the Intellectual Property Code of the Philippines and the
revised IP Code of the Philippines known as RA 10372.
Copyright is a collection of rights that automatically vest to someone who creates an original
work of authorship – like a literary work, song, movie, or software.
Terms of Protection: Generally, throughout the author's life plus 50 years after his or her death.
Penalty: 1st offensePhp 50,000.00 to Php 150,000.00 and/ or 1-3 years imprisonment; 2nd
offense- Php 150,000.00 to Php 500,000.00 and/ or 3-6 years imprisonment. 3rd offense- Php
500,000.00 to 1.5 M and/or 6-9 years of imprisonment.
A trademark is a word, phrase, symbol, and/or design that identifies and distinguishes the source
of the goods of one party from those of others. While a service mark is a word, phrase, symbol,
and/or design that identifies and distinguishes the source of a service rather than goods.
A geographical indication (GI) is a sign used on products with a specific geographical origin and
possesses qualities or a reputation due to that origin—for example, Mangoes of Cebu, Cashew
nuts of Palawan, etc.
An industrial design may consist of three-dimensional features, such as the shape of an article, or
two-dimensional features, such as patterns, lines, or color. For example, coca-cola bottle design,
iPod/iPhone/iPad, etc.
A patent is a grant of a right to the inventor by the government.
Terms of Protection: 20 years (time-bound). Penalty: not less than Php 100,000.00 to not
more than Php 300,000.00 and/ or not less than six months to not more than three years
imprisonment.
Layout designs (topographies) of integrated circuits are a threedimensional arrangement of
elements forming an integrated circuit intended for manufacturing.
Undisclosed information refers to information that is secret and has commercial value because it
is secret.
Digital Rights Management (DRM)- It is used to describe the processes by which the author or
publisher of work exerts their rights to control what the purchaser of the work is entitled to do.
Encryption- It is converting data or information so that only authorized parties can understand.
Serial keys- Also known as a product or software key, it is a series of alphanumeric characters
acting as a key to denote that the product or software is original.
Scrambling- Data scrambling is done to hide sensitive information from authorized users.
Tag embedding- Similar to how pictures can include watermarks to denote information on the
owner of the picture, tag embedding does the same to information content.
Information Privacy DATA PRIVACY ACT OF 2012 (Republic Act 10173)
This act aims to safeguard every individual's right to privacy while ensuring the free flow of
information for innovation, growth, and national development.
Personal Information -It refers to any information from which an individual's identity is apparent
or can be ascertained by the entity holding the information or when put together with other
information that would directly and certainly identify an individual.
Department of Information and Communications Technology Act of 2015 (Republic Act
No. 10844)
Another law that is closely related to the management of information and communication
technology is RA 10844, or the Department of Information and Communications Technology Act
of 2015.
4. I’m experiencing cyberbullying but I am afraid to talk to my parents about it. How
can I approach them? UNICEF:
If someone is experiencing cyberbullying, speaking to a trusted adult – someone they
feel safe talking to – is one of the most important first steps.
Talking to parents is not easy for everyone. But some things could help. Choose a
time to talk. Explain how serious the problem is. Remember, they might not be as
familiar with technology, so there must be extra assistance and explanation to help
them to understand what is happening.
They might not have instant answers, but they will likely want to help and find a
solution together. Two heads are always better than one! If it is still unsure what to
do, consider contacting other trusted people. There are often more people who care
and are willing to help.
5. How can I help my friends report a case of cyberbullying, especially if they do not
want to do it? UNICEF:
Anyone can become a victim of cyberbullying. If it is happening to someone, try to
offer support.
It is important to listen to a friend. Let them know they do not have to report
anything formally, but talking to someone who can help is crucial.
Remember, a friend may feel fragile, so be kind to them. Help them think through
what they might say and to whom. Offer to go with them if they decide to report.
Most importantly, remind them that they are never alone.
If a victim still does not want to report the incident, support them in finding a trusted
adult to help them deal with the situation. Remember that in certain situations, the
consequences of cyberbullying can be life-threatening.
Doing nothing can leave the person feeling that everyone is against them or that
nobody cares. Words can make a difference.
6. How do we stop cyberbullying without giving up access to the Internet? UNICEF:
Being online has so many benefits. However, like many things in life, it comes
with risks that one needs to protect against.
If the users experience cyberbullying, they may want to delete certain apps or stay offline to
give themselves time to recover. But getting off the Internet is not a longterm solution. The
victims did nothing wrong, so why should they be disadvantaged? It may even send the bullies a
bad signal — encouraging their unacceptable behavior.
We all want cyberbullying to stop, which is one of the reasons reporting cyberbullying is so
important. But creating the Internet, we want goes beyond calling out bullying. We must be
thoughtful about what we share or say that may hurt others. We need to be kind to one another
online and in real life. It always depends on us.
7. How do users prevent their personal information from being used to manipulate or
humiliate on social media? UNICEF:
Think twice before posting or sharing anything online – it may stay forever and be
used to harm later. Do not give personal details such as an address, telephone number,
or school name.
Learn about the privacy settings of social media apps.
• Adjust the account privacy settings by deciding who can see the profile, send direct
messages, or comment on posts.
• Report hurtful comments, messages, and photos and request that they be removed.
• Besides ‘unfriending,’ users can block people to stop them from seeing or
contacting their profile.
• Choose to have comments by certain people appear only to them without completely
blocking them.
• Delete posts on the profile or hide them from specific people. • Most social media,
people aren't notified when they are blocked, restricted, or reported.
8. Is there a punishment for cyberbullying?
UNICEF:
Most schools take bullying seriously and will take action against it. If other students
are cyberbullying users, report it to the school they are enrolled in or connected to.
Victims of any form of violence, including bullying and cyberbullying, have a right
to justice and to have the offender held accountable.
In countries with specific laws on cyberbullying, online behavior that deliberately
causes severe emotional distress is seen as criminal activity. In some of these
countries, victims of cyberbullying can seek protection, prohibit communication
from a specified person and restrict the use of electronic devices used by that
person for cyberbullying, temporarily or permanently.
However, it is essential to remember that punishment is not always the most
effective way to change the behavior of bullies. It is often better to focus on
repairing the harm and mending the relationship.
9. Internet companies don’t seem to care about online bullying and harassment. Are they
being held responsible?
UNICEF:
Internet companies are increasingly paying attention to the issue of online bullying.
Many are introducing ways to address it and better protect their users with new
tools, guidance, and ways to report online abuse.
Technology companies are responsible for protecting their users, especially children and young
people.
10. Are there any online anti-bullying tools for children or young people? UNICEF:
Each social platform offers different tools that allow the user to restrict who can comment on or
view their posts or who can connect automatically as a friend and report cases of bullying. Many
involve simple steps to block, mute, or report cyberbullying.
Social media companies also provide educational tools and guidance for children, parents, and
teachers to learn about risks and ways to stay safe online.
Also, the first line of defense against cyberbullying could be the user itself. Think about where
cyberbullying happens in the community and how the user could help – by using their voices,
calling out bullies, reaching out to trusted adults, or creating awareness of the issue. Even a
simple act of kindness can go a long way.
Anti-Bullying Act of the Philippines (R.A. no. 10627)- It is an act requiring all elementary and
secondary schools to adopt policies to prevent and address the acts of bullying in their
institutions.
Netiquette
Netiquette is short for "Internet etiquette."
Etiquette is a code of polite behavior in society.
Netiquette is a code of good conduct on the Internet that includes email, social media, online
chat, web forums, website comments, multiplayer gaming, and other types of online
communication.
Lesson 16. IT Trends, Issues, and Challenges
Internet of Things -is a set-up of devices and objects connected in a given network. Their
connection, often wirelessly, is possible using both hardware and software.
Capabilities of IoT:
1. Integration across technology and business
2. Data analysis and synchronization
3. Security and service
4. Applications of IoT
Augmented reality (AR) adds digital elements to a live view, often by using the camera on a
smartphone.
Virtual reality (VR)-It is fully immersive that tricks the senses into thinking in a different
environment or world apart from the real world.
In a Mixed Reality (MR) experience, which combines elements of both AR and VR, real-world
and digital objects interact.
Extended Reality (XR) is an umbrella term covering all of the various technologies that
enhance our senses, whether providing additional information about the actual world or creating
unreal, simulated worlds for us to experience.
MachineLearning- It is a branch of artificial intelligence (AI) that focuses on building
applications that learn from data and improve their accuracy over time without being
programmed to do so.
Automation -is the creation and application of technology to monitor and control the production
and delivery of products and services.
Two Common Methods in Implementing IT Automation:
1. Robotic Process Automation (RPA) The Institute of Robotic Process Automation and
Artificial Intelligence (IRPAAI) defined robotic process automation (RPA) as the application
of technology that allows employees in a company to configure computer software or a
"robot" to capture and interpret existing applications for processing a transaction,
manipulating data, triggering responses and communicating with another digital system." 2.
Sensors These are hardware devices that can measure an event, object, or any physical
quality that is happening. Examples include a person's heart rate, temperature, brightness,
etc.
Classification of Sensors
1. Temperature Sensor
2. Infrared Sensor
3. Ultrasonic Sensor
4. Touch Sensor
5. Proximity Sensor
6. Pressure Sensor
7. Level Sensor
8. Smoke/ Gas Sensor, etc.
Big Data is a collection of data that is huge in volume yet growing exponentially with time.
Characteristics of Big Data
The following characteristics can describe big data:
1. Volume 2. Variety 3. Velocity 4. Variability
Volume – The name Big Data itself is related to its enormous size.
Variety – The next aspect of Big Data is its variety.
Velocity – The term 'velocity' refers to the speed of data generation.
Variability – This refers to the inconsistency which can be shown by the data at times, thus
hampering the process of handling and managing the data effectively.
TYPES OF BIG DATA
The following are the types of Big Data:
Structured- Any data that can be stored, accessed, and processed in a fixed format is termed
'structured' data.
Unstructured -Any data with an unknown form or structure is classified as unstructured data.
Semi-structured - data can contain both forms of data.
IT Issues
Truth issues—manipulation of sound and images in digital data
• Security issues—accidents, natural hazards, terrorism hazards, and crime
• Quality-of-life issues—environment, mental health, child protection, the workplace
• Economic and political issues—employment and the haves/have-nots
TRUTH ISSUES
The ability to manipulate digitized output—images and sounds—has brought a wonderful new
tool to art.
Manipulation of Sound
Pop music vocals have been sounding “note- and pitch-perfect,"
Manipulation of Photos
There are many apps/applications nowadays that can manipulate a photo. Perhaps, for some
people, outputs from these editing apps could make them say these are cool because their face
could be enhanced, such as acne would be erased.
Manipulation of Video & Television
Films and videotapes are widely thought to represent real scenes accurately.
Security issues go right to the heart of the workability of computer and communications systems.
The following are the threats:
• Errors and accidents • Natural hazards • Computer crimes • Computer criminals
Natural Hazards
Whatever is harmful to property (and people) is harmful to computers and communications
systems.
IT Challenges
Workload -Because of the increasing demand in production that is also caused by the anticipation
that with the use of technology, the work may be exceeded the usual number of outputs, the IT
professionals/ workers become exhausted.
Cybersecurity -Technologies brought too many opportunities and instant access to information. It
could be positive on the other side however a negative on the other.
Skills gaps/ Digital transformation/ Hiring/ Career Growth Practicing -IT skills is not that easy; it
involves time, effort, a cracking mind, and money.
Cloud computing/ Analytics and data management- The opportunities for cloud computing are
high. It is the ultimate enabler, opening new revenue channels by leveraging technologies like
artificial intelligence (AI) and the Internet of Things (IoT).
Budget -A lack of budget and resources is another major concern for both IT staff and decision-
makers.
Automation - Since workload is the biggest challenge for IT professionals, finding ways to
automate more mundane and time-consuming tasks such as email send and social media posting
is crucial.