E-Tech 1.4

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 24

ONLINE SAFETY, SECURITY,

ETHICS, AND ETIQUETTE:


NETIQUETTE AND INTELLECTUAL
PROPERTY
EMPOWERMENT AND TECHNOLOGY
REVIEW:

Before we proceed on how to avoid the Internet threats, as


well as we won’t be a threat to anyone online, let’s review
the past lesson. Classify the following terms by writing
malware or cybercrime.
1. Virus
2. Hacking
3. Trojan
4. Copyright Infringement
5. Cyberbullying
OBJECTIVES:
At the end of the lesson the student should be able to:
1. understood the concept of digital citizenship, netiquette,
intellectual property and fair use;
2. assessed and applied appropriate actions in the real-life
situations or conflict regarding online usage or interaction;
and
3. done a self-evaluation regarding yourself as a digital
citizen.
DIGITAL CITIZENSHIP - is the way we think, act and be
online (Common Sense Org. n.d.).
NETIQUETTE - a certain set of standards that we must
follow when we’re online.
- This term created by compounding "net“ and
"etiquette" (from the Internet).
Virginia Shea - referred to as "Ms. Manners” of the
Internet, wrote the 10 core Netiquette rules (Albion.com.n.d.):
10 core Netiquette rules
• Remember the human on the other side of the electronic
communication.
• Adhere to the same standards of behavior online that you follow in
real life.
• Know where you are in cyberspace.
• Respect other people’s time and bandwidth.
• Make yourself look good online.
• Share expert knowledge.
• Keep flame wars under control.
• Respect other people’s privacy.
• Don’t abuse your power.
• Be forgiving of other people’s mistakes
10 core Netiquette rules
Rule 1: While conversing online, remember always that there
is a vulnerable human like you behind the screen of our
device. Let's be mindful toward others about our words and
apply the golden rule. We might think what we’re saying is
a joke, though other people might take it differently.
Rule 2: Whatever laws or values we follow in real life, they also
apply in digital space, and we must follow them as a
responsible user.
Rule 3: Know first on what platform you are and who are your
audiences before interacting with others on any platform.
Netiquette varies according to which platform you are.
Rule 4: Remember you 're not the only cyberspace user.
When posting or uploading something online, make sure it
is worth the other people's time. Respect the bandwidth,
the cables and channels' information-carrying capacity, as
everybody in cyberspace attempts to connect online.
Rule 5: It's a cliché but it's safe to say, "Think before you
click." Don't post anything you might soon regret like a
wild party night photo. Always remember that it leaves a
digital footprint whatever you posted and/or deleted
online. Your cyber avatar is an extension of your real-life
self, so make it look good for not just everyone, but your
future self as well. You may encounter someone from the
Human Resource office in the future, who scrolls your
online profile account meticulously.
Rule 6: Avoid sharing the fake news and believing it. Just
because it does have lots of likes and shares, it doesn't
mean it's genuine. Do critical thinking. Don't settle for
one single source. Look for more and trust worthier
sources. Fake news can victimize everyone, your parents
included.
Rule 7: Flame or an act of expressing mean or insulting
online messages and aims to humiliate others. Often,
they use ALL CAPS (shouting). It is popular among the
youth now, and they do it in an exclusive community
chat "Rambulan.” If you have entered these wars of
flame, you have already broken Rule No. 1. Avoid getting
involved in this.
Rule 8: As the old saying goes, “do not touch what is not yours.” This
saying is not only applicable in our lunch boxes or packages; it is
also applied in our personal accounts and messages; whether it is
written or electronic. The privacy of others must be respected
regardless of whether you are in a relationship or married couple.
Note to yourself: offering your partner password for the social
networking site does not mean loyalty. Confidence, honesty and
respect remain the foundation of a strong relationship.
Rule 9: Were you aware that hacking can be a respectable work? White
hat hacker, also known as ethical hacker, who has the same features
as black hat hackers, except they are paying workers also company
contractors and they do it legally. No matter what strength or
information you have, do not misuse it like them (US Norton n.d.).
Note also that a great power comes with a great responsibility.
Rule 10: Whether it's a spelling error, a senseless question or an
unnecessary long answer, it's normal for us, human, to commit a
mistake. Let's forgive the error of another user.
Republic Act No. 8293
- recognized as the Philippines Intellectual Property Code.
Copyright Infringement
- is one of the cybercrimes
- This is usually done by students when they copy-paste
a sentence or paragraph from a website and place it in their
procrastinated essay without proper attribution or reference to
the source, and make it like their own concept, in short,
plagiarism.
- Another way to violate it, when the student took pictures of
the content of the thesis or a book without the consent of the
author.
Not only are we the recipient of information; we are also a
producer and provider. Any original creation — an invention,
a form of literary work, or a research — has what we call
intellectual property (IP).

Intellectual property has 6 forms based on the World


Intellectual Property Organization (WIPO), namely:
• Copyright • Industrial
Design
• Patent •
Geographical Indication
• Trademark • Trade Secret
6 FORM OF INTELLECTUAL PROPERTY
According to WIPO

1. Copyright – It is the owner's legal right to literary or


creative work and has a logo C or © attached on it.
2. Patent – A creator's exclusive right on his invention.
With that the owner can decide how the invention will be
used by others.
3. Trademark – It is a sign used to distinguish good or
service within a company and it used this ™ logo.
4. Industrial Design – This is a distinct aesthetic (visual)
feature of a company, such as the curved bottle shape,
the black check mark on the rubber shoes, etc.
5. Geographical Indication – The manufacturer of the
products used if they have distinct qualities and a
reputation or identity characteristics, such as yema cake
made in Quezon Province, footwear from Marikina, etc.
6. Trade Secret – This is an intellectual property right on
any sensitive or confidential information which may be
available for sale.
However, integrated circuit layout designs
(topographies) are an added type of intellectual property in
Republic Law No. 8293. It also protects the placement of
integrated circuits (or known as chips) to produce digital
devices that have more and advance functions. Since it
needs a large amount of money and time from highly
qualified specialists, it is considered as another form of
intellectual property by the Philippine Government.
Tips To Avoid Copyright Infringement
1. Understand. Typically, students commit copyright
infringement when they copied a sentence or paragraph
from a book, when they used it, but failed to cite it or
include it in their reference list, and when they
photocopied a portion of it. When you see this passage,
the content is protected by copyright:

“All rights reserved. No part of this material may be


reproduced or transmitted in any form or by any means—
electronic or mechanical including photocopying—”
2. Be responsible. Although you have not noticed a
copyright page, or the author has written that you can
use it freely and for a variety of purposes, it is still our
responsibility to know more about whether something is
protected by copyright and to ask the author's
permission. It is a form of respect to the original creator.

3. Be creative. Include your creativity particularly if it is


attributed to you in each of your work or outputs.
4. Know the law. How well do you know the copyright law?
Did you know there's a loophole in the Philippine
Intellectual Code? As written in Section 185 of Chapter
VIII, you may use copyrighted work under the Fair Use
provisions. Fair use is permission to use works that are
protected by copyright, such as books, music and lyrics,
etc. for the following purposes: teaching, news reporting,
criticizing or commenting, and comedy or parody
(Common Sense Education 2014).
Besides that, there are 4 fair use points which must be
followed:
1. Small cropped part of the work can be used.
2. You must add your imagination to make it original
by giving it a new sense.
3. The job must be done in a totally different way.
4. You are prohibited from using it for any profitable
purpose.
Whether or not your work falls within the policy
of fair use, giving credit to the creator as a respect and using
it responsibly is still a good thing.
MULTIPLE CHOICE.
Directions: Choose the letter of the best answer. Write the
chosen letter and the word on a separate sheet of paper.

1. Innovation is a common thing in the ICT industry. The


_______________ media is a non-profit service designed to
help the people who have visual and reading impairments.
A. Assistive C. Blogging
B. Folksonomy D. Social
2. Developed by Google, Android is an open source operating
system that is being used by several mobile phone companies.
Which device uses iOs?
A. Nokia devices C. smart TVs
B. Blackberry devices D. Apple devices

3. Social Media is a website, application, or online channel that


enables web users to create, co-create, discuss, modify, and
exchange user-generated content. Which one of the options is
NOT an example of social media?
A. Social Networks C. Both A and B
B. Media Sharing D. None among the
option
4. Currently, this is the fastest mobile network.
A. 2G B. 3G C.
4G D. 5G

5. TikTok is a social media application that can be


classified as:
A. Bookmarking site C. Microblogging
B. Media sharing D. Blogs and
forums
ANSWER KEY
1. A
2. D
3. D
4. D
5. B

You might also like