Module 7: Key IP Issues Flashcards

1
Q

To steal and pass off (the ideas or words of another) as one’s own, to use (another production) without crediting the source, to commit literary theft or to present as new and original an idea or product derived from an existing source.

A

Plagiarism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Supreme Court Resolution on Plagiarism

A

There is no commonly-used dictionary that embraces in the meaning of plagiarism errors in attribution by mere accident or in good faith.

Plagiarism is identified not through intent but through the act itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The process of taking something apart in order to understand it, build a copy of it, or improve it.

Originally applied to computer hardware but is now commonly applied to software.

A

Reverse Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A type of reverse engineering that involves analyzing it to create a new representation of the system in a different form or at a higher level of abstraction.

A

Software Reverse Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Reverse engineering software usually begins by doing what?

A

Extracting design-stage details from program code, which are more conceptual and less defined than the program code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The process that takes the design of an existing software and produce code in a new database programming language using code-generation tools.

A

Forward Engineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Issues on Reverse Engineering

A

Reverse engineering on a purchased software application developed and licensed by outside parties.

Use of Decompilers and other reverse-engineering techniques to reveal a competitor’s program code, which can then be used to develop a new program that either duplicates the original or interfaces with the program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Any program whose source code is made available for use or modification, as users or other developers see fit.

The basic premise behind this is that when many programmers can read, redistribute, and modify a program’s code, the software improves

A

Open source code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Two frequently cited reasons for using open source software

A

It provides a better solution to a specific business problem

It costs less

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can a software developer attempt to make a program open source?

A

By putting a program into the public domain with no copyright.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Legally obtained information that is gathered to help a company gain an advantage over its rivals

Requires the continual gathering, analysis, and evaluation of data with controlled dissemination of useful information to decision makers

A

Competitive intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The use of illegal means to obtain business information not available to the general public.

A

Industrial espionage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Almost all the data needed for competitive intelligence can be collected from what?

A

Examining published information

Analytical tools and industry expertise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The unauthorized use in commerce of a registered trademark or a copy or colorable imitation thereof, which results in the likelihood of confusion among the consuming public.

A

Trademark infringement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The elements of trademark infringement

A

1.) A registered trademark in the Philippines

2.) Plaintiff’s ownership of said mark

3.) Use of the trademark or imitation thereof by a third person, which results in likelihood of confusion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A form of copying and making false statements by one who passes off his own goods for those of another that has an established goodwill

A

Unfair competition

17
Q

The elements of unfair competition

A

1.) Confusing similarity in the appearance of the goods involved

2.) Intent to deceive the public and defraud a competitor

18
Q

The Philippines applies what kind of trade mark registration system?

A

First-to-file

19
Q

What enforcement actions are available to intellectual property owners whose rights are being infringed in the Philippine market?

A

The IP owner may work with government agencies to conduct a raid action pursuant to a valid search warrant or a visit/inspection pursuant to some of the government agencies’ visitorial powers.

Raid action should be done if the owner wants to seize a huge inventory of counterfeit items

A visit/inspection by the IP Enforcement Office or Optical Media Board should be done if the aim is to deter continuing infringing acts done in a small scale.

20
Q

Registering domain names for famous trademarks or company names to which a third-party had no connection, with the hope that the trademark’s owner would eventually buy the domain name for a large sum of money.

A

Cybersquatting

21
Q

Exist where a third party (not the legitimate owner of the mark) first registers the mark in the Philippines, thereby preventing the legitimate owner from registering it in the country.

A

Bad-faith registration