Podcast
Questions and Answers
What is the consequence of willfully causing damage to another person?
What is the consequence of willfully causing damage to another person?
What is the penalty for revealing the contents of seized papers or letters?
What is the penalty for revealing the contents of seized papers or letters?
What is the general principle stated in Article 19 of the New Civil Code?
What is the general principle stated in Article 19 of the New Civil Code?
What is the consequence of causing loss or injury to another in a manner that is contrary to morals, good customs or public policy?
What is the consequence of causing loss or injury to another in a manner that is contrary to morals, good customs or public policy?
Signup and view all the answers
What is the result of prying into the privacy of another's residence?
What is the result of prying into the privacy of another's residence?
Signup and view all the answers
What is the result of meddling with or disturbing the private life or family relations of another?
What is the result of meddling with or disturbing the private life or family relations of another?
Signup and view all the answers
What type of information related to government officers or employees is exempt from the Data Privacy Act?
What type of information related to government officers or employees is exempt from the Data Privacy Act?
Signup and view all the answers
What is the exception to the exemption from the Data Privacy Act?
What is the exception to the exemption from the Data Privacy Act?
Signup and view all the answers
Who is not exempt from the requirements of the Data Privacy Act?
Who is not exempt from the requirements of the Data Privacy Act?
Signup and view all the answers
What is the purpose of the exemption from the Data Privacy Act?
What is the purpose of the exemption from the Data Privacy Act?
Signup and view all the answers
Who establishes the National Privacy Commission?
Who establishes the National Privacy Commission?
Signup and view all the answers
Who are the individuals whose personal, sensitive personal, or privileged information is processed?
Who are the individuals whose personal, sensitive personal, or privileged information is processed?
Signup and view all the answers
What type of personal information is issued by government agencies?
What type of personal information is issued by government agencies?
Signup and view all the answers
What is a general principle of the Data Privacy Act that requires the data subject to be informed?
What is a general principle of the Data Privacy Act that requires the data subject to be informed?
Signup and view all the answers
What is a type of privileged information that is rooted in the separation of powers of the branches of the government?
What is a type of privileged information that is rooted in the separation of powers of the branches of the government?
Signup and view all the answers
What is a general principle of the Data Privacy Act that requires the processing of information to be compatible with a declared purpose?
What is a general principle of the Data Privacy Act that requires the processing of information to be compatible with a declared purpose?
Signup and view all the answers
What type of information is classified by an Executive Order or an act of Congress?
What type of information is classified by an Executive Order or an act of Congress?
Signup and view all the answers
What is a type of privileged communication under the Rules of Court?
What is a type of privileged communication under the Rules of Court?
Signup and view all the answers
What is the primary principle of processing information according to the text?
What is the primary principle of processing information according to the text?
Signup and view all the answers
What is the purpose of the Data Life Cycle?
What is the purpose of the Data Life Cycle?
Signup and view all the answers
What is the significance of appointing a Data Protection Officer according to the Five Pillars of Compliance?
What is the significance of appointing a Data Protection Officer according to the Five Pillars of Compliance?
Signup and view all the answers
What is the consequence of non-compliance with data protection regulations according to the text?
What is the consequence of non-compliance with data protection regulations according to the text?
Signup and view all the answers
What is the purpose of conducting a Privacy Impact Assessment according to the Five Pillars of Compliance?
What is the purpose of conducting a Privacy Impact Assessment according to the Five Pillars of Compliance?
Signup and view all the answers
What is the significance of the case of the Russian cyber hacker in the context of data protection?
What is the significance of the case of the Russian cyber hacker in the context of data protection?
Signup and view all the answers
Who is responsible for controlling the processing of personal data, even if outsourcing is involved?
Who is responsible for controlling the processing of personal data, even if outsourcing is involved?
Signup and view all the answers
What type of information can directly identify an individual when combined with other information?
What type of information can directly identify an individual when combined with other information?
Signup and view all the answers
Which of the following is an example of Sensitive Personal Information?
Which of the following is an example of Sensitive Personal Information?
Signup and view all the answers
What is the role of a Personal Information Processor (PIP)?
What is the role of a Personal Information Processor (PIP)?
Signup and view all the answers
What is personal information, according to the classification?
What is personal information, according to the classification?
Signup and view all the answers
Which of the following is NOT an example of Sensitive Personal Information?
Which of the following is NOT an example of Sensitive Personal Information?
Signup and view all the answers
Study Notes
Key Concepts in Data Privacy
- Personal Information: any information from which the identity of an individual is apparent or can be reasonably and directly ascertained.
Classification of Personal Information
- Privileged Information: includes marital privilege, lawyer-client privilege, doctor-patient privilege, priest-penitent privilege, state secret rule, and newsman shield rule.
- Public Information: includes information about government officials, individuals performing a service under contract for a government institution, and information related to benefits conferred by the government.
General Principles of the Data Privacy Act
- Transparency: the data subject must be aware of the nature, purpose, and extent of the processing, risks and safeguards involved, and their rights.
- Legitimate Purpose: processing of information must be compatible with a declared and specified purpose, which must not be contrary to law, morals, or public policy.
Scope of the Data Privacy Act
- Exemptions: DPA does not apply to personal information processed for public access to information that falls within matters of public concern.
Key Roles in the Data Privacy Act
- Data Subject: an individual whose personal, sensitive personal, or privileged information is processed.
- National Privacy Commission: established by the Data Privacy Act of 2012 to implement the Act's provisions.
Data Life Cycle
- Refers to the proper and secure disposal of personal data that have already served its purpose.
Prohibited Acts and Penalties
- Prohibited acts include prying into another's privacy, meddling with or disturbing private life, and vexing or humiliating another.
- Penalties include damages, prevention, and other relief.
Obligation: Five Pillars of Compliance
- Commit to comply: appoint a Data Protection Officer.
- Know your risks: conduct a Privacy Impact Assessment.
- Be Accountable: write your Privacy Management Program and Privacy Manual.
- Demonstrate your Compliance: implement Privacy and Data Protection Measures.
- Be Prepared for Breach: regularly exercise your Breach Reporting Process.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
This quiz covers invasions of privacy, meddling with private life, and humiliation based on personal characteristics.