TVL Empowerment Technologies q3 m4
TVL Empowerment Technologies q3 m4
Technologies
QUARTER 1
MODULE Online Safety, Security, Ethics, and
4 Etiquette: Netiquette and Intellectual Property
Republic Act 8293, Section 176 states that no copyright shall subsist in any
work of the Government of the Philippines. However, prior approval of the
government agency or office wherein the work is created shall be necessary for
exploitation of such work for profit. Such agency or office may, among other things,
impose as a condition the payment of royalties.
QUARTER 1
MODULE
Online Safety, Security,
4 Ethics, and Etiquette:
Netiquette and Intellectual Property
Introductory Message
This learning material hopes to engage the learners in guided and independent
learning activities at their own pace and time. Further, this also aims to help learners
acquire the needed 21st century skills especially the 5 Cs, namely: Communication,
Collaboration, Creativity, Critical Thinking, and Character while taking into
consideration their needs and circumstances.
In addition to the material in the main text, you will also see this box in the
body of the module:
As a facilitator you are expected to orient the learners on how to use this
module. You also need to keep track of the learners' progress while allowing them to
manage their own learning. Moreover, you are expected to encourage and assist the
learners as they do the tasks included in the module.
For the Learner:
This module was designed to provide you with fun and meaningful
opportunities for guided and independent learning at your own pace and time. You
will be enabled to process the contents of the learning material while being an active
learner.
Posttest - This measure how much you have learned from the
entire module.
EXPECTATIONS
PRETEST
A B
DIGITAL 1. _______________
FOOTPRINT a type of hacker who do hacking legally
2. _______________
FAKE NEWS an act of saying mean things online, usually in ALL
CAPS, and more often in public forums (or group chats)
3. _______________
INTELLECTUAL
fabricated stories, news or information that was made to
PROPERTY
deceive people
4. _______________
FLAME
a recorded online activities and upload files of the users
5. _______________
WHITE HAT it can be protected by patents, copyright, and
trademarks.
RECAP
LESSON
Digital citizenship is the way we think, act and be online (Common Sense
Org. n.d.). There's a certain set of standards that we must follow when we're
online and that's called netiquette. This term created by compounding "net"
and "etiquette" (from the Internet). Virginia Shea, referred to as "Ms. Manners”
of the Internet, wrote the 10 core Netiquette rules (Albion.com.n.d.):
In addition to these core rules which we will apply, we must also abide by the
provisions of Republic Act No. 8293 or recognized as the Philippines
Intellectual Property Code. Copyright infringement is one of the cybercrimes
mentioned in the previous class. This is usually done by students when they
copy-paste a sentence or paragraph from a website and place it in their
procrastinated essay without proper attribution or reference to the source,
and make it like their own concept, in short, plagiarism. Another way to
violate it, when the student took pictures of the content of the thesis or a book
without the consent of the author. It seems an easy move, but we are already
committing a major crime.
Not only are we the recipient of information; we are also a producer and
provider. Any original creation—an invention, a form of literary work, or a
research—has what we call intellectual property (IP). Intellectual property
has 6 forms based on the World Intellectual Property Organization (WIPO),
namely:
1. Copyright – It is the owner's legal right to literary or creative work and has
a logo C or © attached on it.
2. Patent – A creator's exclusive right on his invention. With that the owner
can decide how the invention will be used by others.
3. Trademark – It is a sign used to distinguish good or service within a
company and it used this ™ logo.
4. Industrial Design – This is a distinct aesthetic (visual) feature of a
company, such as the curved bottle shape, the black check mark on the
rubber shoes, etc.
5. Geographical Indication – The manufacturer of the products used if they
have distinct qualities and a reputation or identity characteristics, such as
yema cake made in Quezon Province, footwear from Marikina, etc.
6. Trade Secret – This is an intellectual property right on any sensitive or
confidential information which may be available for sale.
These are the tips that might help you avoid copyright infringement:
4. Know the law. How well do you know the copyright law? Did you know
there's a loophole in the Philippine Intellectual Code? As
written in Section 185 of Chapter VIII, you may use
copyrighted work under the Fair Use provisions. Fair use is
permission to use works that are protected by copyright, such
as books, music and lyrics, etc. for the following purposes:
teaching, news reporting, Image credit: Commons Wikimedia
Besides that, there are 4 fair use points which must be followed:
Whether or not your work falls within the policy of fair use, giving credit to
the creator as a respect and using it responsibly is still a good thing.
ACTIVITIES
I. ON THE SCENE: Read the situation carefully and encircle the best answer.
1. If you get an embarrassing picture from someone you know you should
never ______.
a. tell you parents or a teacher b. talk to the person again
c. send it on to other friends d. discourage the person from sending
pictures like that
II. WHAT’S YOUR STAND: Compare the two photos. Based on the
intellectual property lesson, identify which image follows the Fair Use
provisions, and which is not. Justify your answer.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
WRAP-UP
This lesson also reminds us that we are information provided, not just a
receiver. Since everything can be access through Internet, our intellectual
property can still be protected through Republic Act no. __________ or known
as ____________________________________. Through this law, you have the right
over your work, and how people should use it. If you wish to use someone’s
work, just follow the provisions of ___________. These topics are important for
us to be safe and secured in the digital space.
VALUING
The concept of good moral and right conduct (or GRMC) are not only
applicable at home and in school. Also, it is applied in the cyberspace. Being
a digital citizen, it is our privilege, however it also a responsibility. We must
follow the 10 core rules of netiquette to avoid threat and avoid becoming a
threat to others. At this point, ask your how do you do as a digital citizen.
Evaluate each category
below by coloring the Protect private information for yourself and
box before each others.
statement. Stay safe online.
Color Meaning Balance the time you spend online and
Red Keep working on it. using media.
Yellow Almost there!
Green I AM AWESOME!
Carefully manage your digital footprint.
POSTTEST
I. Directions: Read the definitions below the scrambled words. Spell out the
words correctly.
Your answer: Definitions:
1. EETTTUQIEN
a set of rules on how to think, act, and being online
2. ESU RIAF
with its provisions, IP can be used in commentaries, criticisms,
reporting, researching, and teaching
3. SWEN EKFA
fabricated stories, news or information that was made to deceive
people
4. LATIGID TNIRPTOOF
a recorded online activities and upload files of the users
5. INTEELLTCAUL TYERPROP
it can be protected by patents, copyright, and trademarks.
KEY TO CORRECTION
To check your progress, here are the answers for the following activities:
References
• Yuvienco, Joel. Empowerment Technologies (Student Reader). 1st ed. Pasig
City: Department of Education, 2016.
• Innovative Training Works, Inc. Empowerment Technologies. 1st ed. Manila:
Rex Bookstore (2016).
• Common Sense Organization. n.d. “What is Digital Citizenship?.” Accessed
on June 15, 2020. https://www.commonsense.org/education/videos/what-is-digital-
citizenship
• Albion.com. n.d. “The Core Rules of Netiquette.” Accessed on June 15, 2020
http://www.albion.com/netiquette/corerules.html
• US.Norton. n.d. “What is the Difference Between Black, White, and Grey Hat
Hackers.” Accessed on June 18, 2020 https://us.norton.com/internetsecurity-
emerging-threats-what-is-the-difference-between-black-white-and-grey-hat-
hackers.html
• World Intellectual Property Organization. “What is Intellectual Property.”
Accessed on June 18, 2020 https://www.wipo.int/about-ip/en/
• Government of the Philippines, The Intellectual Property Office. 1997.
Intellectual Property Code of the Philippines. Accessed on June 21, 2020
https://www.officialgazette.gov.ph/1997/06/06/republic-act-no-8293/
• Common Sense Education. “Copyright and Fair Use Animation” September 6,
2014. Youtube video. 2:45. Accessed on June 21, 2020
https://www.youtube.com/watch?v=suMza6Q8J08
Photo credits:
• https://www.gmanetwork.com/news/video/24oras/534219/thinktok-watawat-
ng-pilipinas-122-years-old-na/video/
• https://www.bloombergquint.com/opinion/the-camcording-piracy-bill-is-a-shot-
in-the-dark
• https://commons.wikimedia.org/wiki/File:Fair_use_logo.svg