SlideShare a Scribd company logo
2
Most read
4
Most read
10
Most read
A CASE STUDY ON ISSUES OR COMMON
VIOLATIONS ON INTELLECTUAL PROPERTY
AND INFORMATION TECHNOLOGY:
PLAGIARISM, REVERSE ENGINEERING,
OPEN SOURCE CODE,
AND CYBERSQUATTING IN THE PHILIPPINES
by: For-Ian V. Sandoval
× Fredrik Felix P. Nogales, Giancarlo P. Nogales,
Rogelio P. Nogales, Melinda P. Nogales, Priscila
B. Cabrera, Phil-Pacific Outsourcing Services
Corporation and 3x8 Internet, represented by its
proprietor Michael Christopher A. Nogales,
Petitioners, Versus, People of the Philippines
and President Judge Tita Bughao Alisuag,
Branch 1, Regional Trial Court (RTC), Manila,
Respondent.
× [G.R. No. 191080. November 21, 2011]
TITLE
× Violation of the Electronic Commerce Act of 2000 or
Republic Act 8792
× Phil-Pacific Outsourcing
Services Corporation
represented by its
proprietor charged with
possession or controls of
various materials used
in the creation and selling of
pornographic internet website.
DESCRIPTION
Source: http://bit.ly/2D9S63m
DESCRIPTION
× The petitioners filed a series of motions for
reconsideration to reclaim the seized properties
under the custody of the NBI.
× The Regional Trial Court repeatedly denied the
motion but partially granted to release the
seized properties.
× The Court of Appeals denied the petition.
× However, affirmed the assailed order of Judge
Alisuag.
× The CPUs and software which were ordered to
be retained by the NBI shall be released in favor
of the petitioners with the condition that the
hard disk is removed from the CPUs and be
destroyed.
DECISION
× The software shall be destroyed if determined to
be unlicensed or pirated copies as mandated by
law.
× Due to lack of substantial evidence the
proprietors or occupants were acquitted.
DECISION
× Private sectors or
establishments
providing technology-
related services play a
vital role in nation-
building to create and
develop information-
friendly environment
with legal and ethical
aspects;
REFLECTION
Source: http://bit.ly/2EzPgkH
× The search warrant must be properly executed, and the
evidence must be properly documented;
REFLECTION
Source: http://bit.ly/2Dqxxga Sources: http://bit.ly/2ECT3Of
× The law practitioners should have extensive knowledge
of the ICT concepts;
REFLECTION
Source: http://bit.ly/2D6XIf0
× Every action or decision made can be used against us
REFLECTION
Source: http://bit.ly/2r3lkLW
× The law is clear that unlicensed or pirated
software shall be forfeited and destroy;
× Computer shops or establishments are
prohibited from promoting and circulating
pornographic sites;
× The issue of returned seized properties has been
settled;
MERITS
× The case was dismissed due to insufficiency of
the substantial evidence;
× Violators of the decree are acquitted;
× The judge grave abuse of discretion amounting
to lack or excess of jurisdiction;
× The only sanction given to the violators were the
confiscation and destruction of the
pornographic materials;
DEMERITS
Thanks!
Any questions?
You can find me at
@ http://www.slideshare.net/fvsandoval

More Related Content

PPTX
Ethical Issues and Relevant Laws on Computing
PPTX
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
PPTX
Digital law powerpoint
PPTX
Digital law
PPTX
Digital Law Powerpoint
PPTX
Digital law
PPTX
Intellectual Property in Cyberspace
PPT
Digital law
Ethical Issues and Relevant Laws on Computing
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
Digital law powerpoint
Digital law
Digital Law Powerpoint
Digital law
Intellectual Property in Cyberspace
Digital law

What's hot (20)

PPTX
Privacy and Freedom of Expression
PPT
digital law
PDF
Information security fundamentals topic 2: Evolution of Information security
PDF
Computer forensics and Investigation
PPTX
Legal issues in technology
PDF
Chp 05 anonymity, security, privacy and civil liberties (shared)
PPTX
Digital law
PDF
Privacy, Drones, and IoT
PPTX
Digital law
PPT
Chapter 3 ethics and privacy
PPT
Software Legal Issues
PPTX
cybercrime landscape for moldova
PPTX
Hacking
PDF
Individual and Technology
PPTX
Cyberlaws
PPTX
Information privacy and Security
PPTX
what is cyber crime and how it started
PPTX
Krishna kumar singh
PPT
Etical and professional issues of computer
PPTX
Cyer crimes and cyber laws b.v.raghunandan
Privacy and Freedom of Expression
digital law
Information security fundamentals topic 2: Evolution of Information security
Computer forensics and Investigation
Legal issues in technology
Chp 05 anonymity, security, privacy and civil liberties (shared)
Digital law
Privacy, Drones, and IoT
Digital law
Chapter 3 ethics and privacy
Software Legal Issues
cybercrime landscape for moldova
Hacking
Individual and Technology
Cyberlaws
Information privacy and Security
what is cyber crime and how it started
Krishna kumar singh
Etical and professional issues of computer
Cyer crimes and cyber laws b.v.raghunandan
Ad

Similar to A Case Study on Issues and Violations on Information Technology (20)

PPTX
Chapter 2 - Computer Engineering and IT Laws.pptx
PPT
Sookman federal circuit_internet_and_copyright_
DOCX
CHAPTER GOALS AND OBJECTIVES2➢ What is the key fu
PPTX
Impact of Trade Agreements on IP
PPTX
Lesson-13_IT-REPORT.pptx. Information technology
PDF
170105 d link-complaint_and_exhibits
PDF
RA8293.asAmended_2015.pdf for researchmm
PPTX
Em505 report(pecha kucha video)
PPT
Presentation ict3992
PPT
Presentation Ict
DOCX
Berkley Law Writing Competition
PDF
The Anticybersquatting Consumer Protection Act and the Uniform Domain Name Di...
PDF
State of Encryption in Kenya
PDF
File000167
PDF
Tape vaulting audit and encryption usage analysis
PDF
Taiwan Internet Intermediaries and Cyber Norms
PDF
6.bocconi rights
PPTX
UN-GGIM Legal and Policy Issues
PPTX
UN-GGIM Legal and Policy Issues
PDF
Cyber crime (prohibition,prevention,etc)_act,_2015
Chapter 2 - Computer Engineering and IT Laws.pptx
Sookman federal circuit_internet_and_copyright_
CHAPTER GOALS AND OBJECTIVES2➢ What is the key fu
Impact of Trade Agreements on IP
Lesson-13_IT-REPORT.pptx. Information technology
170105 d link-complaint_and_exhibits
RA8293.asAmended_2015.pdf for researchmm
Em505 report(pecha kucha video)
Presentation ict3992
Presentation Ict
Berkley Law Writing Competition
The Anticybersquatting Consumer Protection Act and the Uniform Domain Name Di...
State of Encryption in Kenya
File000167
Tape vaulting audit and encryption usage analysis
Taiwan Internet Intermediaries and Cyber Norms
6.bocconi rights
UN-GGIM Legal and Policy Issues
UN-GGIM Legal and Policy Issues
Cyber crime (prohibition,prevention,etc)_act,_2015
Ad

More from Laguna State Polytechnic University (20)

PDF
Number Theory - Lesson 1 - Introduction to Number Theory
PDF
Formal Logic - Lesson 8 - Predicates and Quantifiers
PDF
Machine Learning Algorithms (Part 1)
PDF
Artificial Intelligence Algorithms
PDF
Formal Logic - Lesson 7 - Rules of Inference
PDF
Formal Logic - Lesson 6 - Switching Circuits
PDF
Formal Logic - Lesson 5 - Logical Equivalence
PDF
Formal Logic - Lesson 4 - Tautology, Contradiction and Contingency
PDF
Formal Logic - Lesson 3 - Truth Tables
PDF
Formal Logic - Lesson 2 - Logical Connectives
PDF
Formal Logic - Lesson 1 - Introduction to Logic
PPTX
Number Systems Basic Concepts
PDF
Number Systems Basic Concepts
PPTX
Exploring the Difference Between Information Technology and Information System
PPTX
Introduction to Data Science
PPTX
Introduction to Computers
PPTX
Introduction to Computing Logic Formulation
PDF
Oasis of Sparkling and Refreshing Truisms
PDF
My Teacher Got IT v2.0 - Software Installation Track
PPTX
Centralized Learning and Assessment Tool
Number Theory - Lesson 1 - Introduction to Number Theory
Formal Logic - Lesson 8 - Predicates and Quantifiers
Machine Learning Algorithms (Part 1)
Artificial Intelligence Algorithms
Formal Logic - Lesson 7 - Rules of Inference
Formal Logic - Lesson 6 - Switching Circuits
Formal Logic - Lesson 5 - Logical Equivalence
Formal Logic - Lesson 4 - Tautology, Contradiction and Contingency
Formal Logic - Lesson 3 - Truth Tables
Formal Logic - Lesson 2 - Logical Connectives
Formal Logic - Lesson 1 - Introduction to Logic
Number Systems Basic Concepts
Number Systems Basic Concepts
Exploring the Difference Between Information Technology and Information System
Introduction to Data Science
Introduction to Computers
Introduction to Computing Logic Formulation
Oasis of Sparkling and Refreshing Truisms
My Teacher Got IT v2.0 - Software Installation Track
Centralized Learning and Assessment Tool

Recently uploaded (20)

PPTX
Peter Maatouk Is Redefining What It Means To Be A Local Lawyer Who Truly List...
PPT
looking_into_the_crystal_ball - Merger Control .ppt
PPT
Cyber-Crime-in- India at Present day and Laws
PPTX
RULE_4_Out_of_Court_or_Informal_Restructuring_Agreement_or_Rehabilitation.pptx
PDF
A SEP and FRAND Overview 13 Aug 2024.pdf
PDF
Constitution of India and fundamental rights pdf
PDF
SUMMARY CASES-42-47.pdf tax -1 257++/ hsknsnd
PPTX
BUSINESS LAW AND IT IN CONTRACT SIGNING AND MANAGEMENT
PPTX
Ethiopian Tort Law Short Note by Mikiyas.pptx
PDF
Plausibility - A Review of the English and EPO cases
PDF
The Advocate, Vol. 34 No. 1 Fall 2024
PDF
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
PPT
Understanding the Impact of the Cyber Act
PDF
APPELLANT'S AMENDED BRIEF – DPW ENTERPRISES LLC & MOUNTAIN PRIME 2018 LLC v. ...
PDF
AHRP LB - Quick Look of the Newly-initiated Koperasi Merah Putih (KMP).pdf
PPTX
4-D...Preparation of Research Design.pptx
PDF
NRL_Legal Regulation of Forests and Wildlife.pdf
PPTX
UDHR & OTHER INTERNATIONAL CONVENTIONS.pptx
PPT
3. INDUTRIAL RELATIONS INTRODUCTION AND CONCEPTS.ppt
PPTX
Lecture Notes on Family Law - Knowledge Area 5
Peter Maatouk Is Redefining What It Means To Be A Local Lawyer Who Truly List...
looking_into_the_crystal_ball - Merger Control .ppt
Cyber-Crime-in- India at Present day and Laws
RULE_4_Out_of_Court_or_Informal_Restructuring_Agreement_or_Rehabilitation.pptx
A SEP and FRAND Overview 13 Aug 2024.pdf
Constitution of India and fundamental rights pdf
SUMMARY CASES-42-47.pdf tax -1 257++/ hsknsnd
BUSINESS LAW AND IT IN CONTRACT SIGNING AND MANAGEMENT
Ethiopian Tort Law Short Note by Mikiyas.pptx
Plausibility - A Review of the English and EPO cases
The Advocate, Vol. 34 No. 1 Fall 2024
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
Understanding the Impact of the Cyber Act
APPELLANT'S AMENDED BRIEF – DPW ENTERPRISES LLC & MOUNTAIN PRIME 2018 LLC v. ...
AHRP LB - Quick Look of the Newly-initiated Koperasi Merah Putih (KMP).pdf
4-D...Preparation of Research Design.pptx
NRL_Legal Regulation of Forests and Wildlife.pdf
UDHR & OTHER INTERNATIONAL CONVENTIONS.pptx
3. INDUTRIAL RELATIONS INTRODUCTION AND CONCEPTS.ppt
Lecture Notes on Family Law - Knowledge Area 5

A Case Study on Issues and Violations on Information Technology

  • 1. A CASE STUDY ON ISSUES OR COMMON VIOLATIONS ON INTELLECTUAL PROPERTY AND INFORMATION TECHNOLOGY: PLAGIARISM, REVERSE ENGINEERING, OPEN SOURCE CODE, AND CYBERSQUATTING IN THE PHILIPPINES by: For-Ian V. Sandoval
  • 2. × Fredrik Felix P. Nogales, Giancarlo P. Nogales, Rogelio P. Nogales, Melinda P. Nogales, Priscila B. Cabrera, Phil-Pacific Outsourcing Services Corporation and 3x8 Internet, represented by its proprietor Michael Christopher A. Nogales, Petitioners, Versus, People of the Philippines and President Judge Tita Bughao Alisuag, Branch 1, Regional Trial Court (RTC), Manila, Respondent. × [G.R. No. 191080. November 21, 2011] TITLE
  • 3. × Violation of the Electronic Commerce Act of 2000 or Republic Act 8792 × Phil-Pacific Outsourcing Services Corporation represented by its proprietor charged with possession or controls of various materials used in the creation and selling of pornographic internet website. DESCRIPTION Source: http://bit.ly/2D9S63m
  • 4. DESCRIPTION × The petitioners filed a series of motions for reconsideration to reclaim the seized properties under the custody of the NBI. × The Regional Trial Court repeatedly denied the motion but partially granted to release the seized properties.
  • 5. × The Court of Appeals denied the petition. × However, affirmed the assailed order of Judge Alisuag. × The CPUs and software which were ordered to be retained by the NBI shall be released in favor of the petitioners with the condition that the hard disk is removed from the CPUs and be destroyed. DECISION
  • 6. × The software shall be destroyed if determined to be unlicensed or pirated copies as mandated by law. × Due to lack of substantial evidence the proprietors or occupants were acquitted. DECISION
  • 7. × Private sectors or establishments providing technology- related services play a vital role in nation- building to create and develop information- friendly environment with legal and ethical aspects; REFLECTION Source: http://bit.ly/2EzPgkH
  • 8. × The search warrant must be properly executed, and the evidence must be properly documented; REFLECTION Source: http://bit.ly/2Dqxxga Sources: http://bit.ly/2ECT3Of
  • 9. × The law practitioners should have extensive knowledge of the ICT concepts; REFLECTION Source: http://bit.ly/2D6XIf0
  • 10. × Every action or decision made can be used against us REFLECTION Source: http://bit.ly/2r3lkLW
  • 11. × The law is clear that unlicensed or pirated software shall be forfeited and destroy; × Computer shops or establishments are prohibited from promoting and circulating pornographic sites; × The issue of returned seized properties has been settled; MERITS
  • 12. × The case was dismissed due to insufficiency of the substantial evidence; × Violators of the decree are acquitted; × The judge grave abuse of discretion amounting to lack or excess of jurisdiction; × The only sanction given to the violators were the confiscation and destruction of the pornographic materials; DEMERITS
  • 13. Thanks! Any questions? You can find me at @ http://www.slideshare.net/fvsandoval

Editor's Notes

  • #4: (the act providing for the recognition and use of electronic commercial and non-commercial transactions and documents, penalties for unlawful use thereof, and for other purposes)
  • #5: (the act providing for the recognition and use of electronic commercial and non-commercial transactions and documents, penalties for unlawful use thereof, and for other purposes)