Presentation is loading. Please wait.

Presentation is loading. Please wait.

Mary Kathryn C. Metillo BEEd-3. Intellectual Property Rights (Pirating) Piracy, or theft, of trademarks and copyrighted material is a growing concern.

Similar presentations


Presentation on theme: "Mary Kathryn C. Metillo BEEd-3. Intellectual Property Rights (Pirating) Piracy, or theft, of trademarks and copyrighted material is a growing concern."— Presentation transcript:

1 Mary Kathryn C. Metillo BEEd-3

2 Intellectual Property Rights (Pirating) Piracy, or theft, of trademarks and copyrighted material is a growing concern. As improved communication methods simplify sending data across international boundaries, theft of intellectual property has become a global affair. Cases that involve the piracy or theft of intellectual property are complex. If you are involved in such a case, consult an attorney with experience in the area.

3 Intellectual Property Rights (Pirating) Piracy and counterfeiting describe the sale of copies of products without the permission of the owner of the rights to those products. Piracy usually refers to the sale of unauthorized copies, without necessarily claiming that it is an authorized copy. For example, selling a recording of a movie made by someone sitting in a theater with a video camera is a type of piracy. Counterfeiting means selling a copy that looks like an authorized copy and falsely claiming that it was authorized or licensed, such as selling unauthorized or unlicensed copies of software in a package that looks exactly like a legitimate package. Some counterfeit copies of products may be so accurate that it is difficult to tell them from legitimate products.

4 Example Photos

5 Pornography using the internet Internet porn is sexually explicit content made available online in various formats including images, video files, video games and streaming video. The legitimacy of pornography is a controversial issue. In the corporate world, however, Internet porn is unquestionably problematic. According to M. J. McMahon, publisher of AVN magazine, a trade publication that tracks the adult video industry, porn sites receive more hits during business hours than at other times of the day. Nielsen reported that 25% of employees access porn during business hours.

6 Example Article Title : Pornography as one of the high risk behavior of using the Internet and propose some strategies to prevent it Authors: Seyyed Salman Alavi-Fereshteh Jannatifard Abstract Introduction: Since the communication age is an appropriate term for the world today, mass media, especially Internet and its consequences(internet addiction, addiction to pornography sites and etc) can affect the religious, national & personal identity and mental health. The present study examines pornography as one of the high risk behaviors of using the Internet based on different literature and propose some strategies to prevent it. Materials and Methods: The research methods has been done by descriptive and content analysis.

7 Cont. At first internet pornography of different perspectives in the field of addiction to the internet and addiction to pornography from the scientific literature during the years 2000-2009 was obtained by the relevant educated specialist, then the data was coded and categorized and the subjects were discussed and the more emphasized issues, were extracted Results: Researcher show that 80 percent of Internet searches among internet users and specially in Iranian users is immoral and sexual sites because "pornography" is very common and attractive field in internet,the great number of porn sites with free membership increases the opportunity for youth to access and visit the immoral and ugly websites almost every day and every where.

8 Cont. Also Internet may affect users by chatroom,and increases Internet suicide, internet robbery,the distance between the imaginary real world and virtual spaces,browsing in anti religious sites,apathy,aggression,sexual corruption they cause disturbances in mental health and youth’s identification inmoral,sexual and religious dimensions. Conclusion : 1-Parents should tell their children the negative consequences of the Internet and its moral deviations. 2-Parents should monitor their children while using internet and teach them the useful and correct methods of internet using 3-Authorities.

9 Cont. And cultural institutions have a duty of healthy and proper usage of the Internet to individuals, especially adolescents who are most vulnerable, by mass media education and training so the most important step in this field is education and information 4-We should know, however, filtering is necessary and can limit abuse of internet. But it is temporary. In the current situation,government must invest on immunization,strengthening of religious beliefs and improve the sprit.It seems that in such way the correct usage of the internet in the community will be naturalized. Keywords internet, pornography,high-risk behavior Download PDF

10 Pyramiding scam using the internet Be wary of messages that read: "How to Make Big Money From Your Home Computer!!!" One online promoter claimed that investors could "turn $5 into $60,000 in just three to six weeks." In reality, this program is nothing more than a classic "pyramid" scheme. A pyramid scheme is a scheme in which a hierarchy is created by people joining under others who joined previously, where those who join, make payments to those above them in the hierarchy, with the expectation of being able to collect payments from those who join below. All pyramid schemes rely on increasing numbers of unsuspecting investors to buy into the bottom of the chain in hopes of taking money out once they reach the top. Because e-mail is practically instantaneous, relatively anonymous and incredibly cheap, it is an almost ideal vehicle for this type of scam.

11 Pyramiding scam using the internet Like other scams, a pyramid scam may promise rates of return that seem just too good to be true for little or no effort on your part, or it may initially be vague about what your initial investment will go toward. What happens in a pyramid scheme is that existing investors are paid a return based on the promoters’ ability to raise new funds; once the fund raising stops, later investors cannot be repaid and the pyramid collapses.

12 Example Photo

13 Gaming or lottery The Gaming and Lotteries Acts 1956–2003 allow some limited forms of gambling. This is in order to provide a controlled outlet for people who wish to gamble. It also provides a method of fund-raising for charitable, philanthropic and other socially desirable purposes. The forms of gambling permitted under the 1956 Act are: lotteries (excluding lotteries covered by the National Lottery Act 1986, which is under the auspices of the Department of Finance) a very limited form of gaming ('gaming' means playing a game (either of skill or chance) for money.)

14 Cont. Typically, to run a lottery, you need a Garda Superintendent’s permit or a District Court licence and to keep to the terms of the permit or licence. Gaming can be carried out at an amusement hall or a funfair licensed for the purpose and must be conducted in accordance with the licence. The stake and prize limits are set down in law. The law in relation to betting is contained in the Betting Act 1931 (which is the responsibility of the Department of Finance). This includes betting on horse and dog racing and other sporting events. Horse Racing Ireland and the Irish Greyhound Board (Bord na gCon) are now responsible for the control of horse and greyhound racing respectively.

15 Example Photo

16 GOD Bless


Download ppt "Mary Kathryn C. Metillo BEEd-3. Intellectual Property Rights (Pirating) Piracy, or theft, of trademarks and copyrighted material is a growing concern."

Similar presentations


Ads by Google