Information Security and Ethics
18 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is considered 'personal information' according to the Act?

  • Any information that can be used to identify an individual indirectly, but only if it is recorded in a material form.
  • Any information that can be used to identify an individual only when put together with other information that is publicly available.
  • Any information that is shared publicly by the individual.
  • Any information that can be used to identify an individual directly. (correct)
  • What is necessary for the collection of personal data?

  • The customer's explicit consent.
  • Both the customer's proper consent and the company's legitimate reason for collection. (correct)
  • The company's legitimate reason for collection.
  • Neither the customer's consent nor the company's legitimate reason for collection.
  • What is the responsibility of companies in protecting customer information?

  • To protect customer information only during the collection process.
  • To protect customer information from collection to disposal, regardless of the customer's request. (correct)
  • To protect customer information from collection to disposal, but only if the customer requests it.
  • To protect customer information only during the disposal process.
  • What is required for the data subject's consent to be considered valid?

    <p>The consent must be freely given, specific, and informed.</p> Signup and view all the answers

    What is the scope of the Act's application?

    <p>The Act applies to any process of personal data by anyone in government or private sectors.</p> Signup and view all the answers

    What is the purpose of the Act's requirement for personal data to be relevant and used solely for its intended purpose?

    <p>To ensure that personal data is used for its intended purpose and not for any other purpose.</p> Signup and view all the answers

    What does authentication primarily deal with?

    <p>Ensuring an individual's identity</p> Signup and view all the answers

    What is the primary focus of information ethics?

    <p>Agreeing on standards for right and wrong behavior in IT</p> Signup and view all the answers

    What is a unique attribute of information systems addressed by information ethics?

    <p>Separation of act from consequences</p> Signup and view all the answers

    What is the primary purpose of the Fair Credit Reporting Act of 1970?

    <p>Controlling the operations of credit-reporting bureaus</p> Signup and view all the answers

    What is a key aspect of business ethics in the context of information systems?

    <p>Developing a code of morals for a particular profession</p> Signup and view all the answers

    What is a challenge to information ethics in the context of computer crime?

    <p>Would-be criminals often need help to misbehave</p> Signup and view all the answers

    What information must be provided to the data subject according to the Data Privacy Act?

    <p>Method of access, identity and contact details of the personal information controller, duration of storage, reason for use, and their rights</p> Signup and view all the answers

    What is the penalty for non-compliance with the Data Privacy Act?

    <p>Imprisonment up to six years and a fine of not less than Five hundred thousand pesos (PHP 500,000)</p> Signup and view all the answers

    What is one of the requirements for compliance with the Data Privacy Act?

    <p>Appointing a Data Protection Officer, conducting a privacy impact assessment, and exercising a breach reporting procedure</p> Signup and view all the answers

    Which of the following is a right of the data subject under the 1987 Constitution of the Republic of the Philippines?

    <p>Right to freedom of expression and privacy of communication and correspondence</p> Signup and view all the answers

    What is the purpose of the 'Great Firewall of China'?

    <p>To control the access to the Internet</p> Signup and view all the answers

    What happens to evidence obtained in violation of the right to privacy of communication and correspondence?

    <p>It is inadmissible for any purpose in any proceeding</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser