Privacy Chapter 6
45 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which condition must be met for data about an individual to be shared with other organizations?

  • It must be publicly available.
  • It must be old and outdated.
  • It must involve a legal representative.
  • It must have prior consent from the individual. (correct)

What is a primary disadvantage of using privacy-focused products?

  • They often cost more money. (correct)
  • They frequently collect more data.
  • They are difficult to use.
  • They are always completely private.

What should happen to data when it is no longer needed for its stated purpose?

  • It should be shared with affiliates.
  • It should be archived indefinitely.
  • It should be securely deleted. (correct)
  • It should be updated regularly.

Which statement accurately describes the role of the National Privacy Commission (NPC) in the Philippines?

<p>It has advisory and compliance monitoring functions. (A)</p> Signup and view all the answers

What type of data is considered too sensitive to be collected unless under severe circumstances?

<p>Religious beliefs. (C)</p> Signup and view all the answers

What is NOT an advantage of privacy protection?

<p>Ensuring data is always private. (A)</p> Signup and view all the answers

Which of the following must be true for the Data Privacy Act to apply?

<p>The person involved must be a local citizen or resident. (D)</p> Signup and view all the answers

What instrument should individuals have to check the accuracy of their data?

<p>Access to periodic reporting. (B)</p> Signup and view all the answers

What is considered defamatory according to the given definition?

<p>Words that damage another's reputation or livelihood (D)</p> Signup and view all the answers

Which type of advertising engages a user's network of friends directly?

<p>Advertising Using an Individual's Network of Friends (A)</p> Signup and view all the answers

How does viral marketing primarily function?

<p>By encouraging individuals to spread a marketing message (A)</p> Signup and view all the answers

What is the main purpose of groups formed on social networking sites by businesses?

<p>To create a marketing tool for brand awareness (B)</p> Signup and view all the answers

Which of the following best describes direct advertising on social networking sites?

<p>ads displayed to every website visitor or targeted users (D)</p> Signup and view all the answers

What characterizes a company-owned social networking site?

<p>It is intended for customers to discuss products and developments (A)</p> Signup and view all the answers

Which advertising method spreads information exponentially as individuals share it?

<p>Viral Marketing (D)</p> Signup and view all the answers

What type of speech involves prejudicing someone’s reputation or livelihood?

<p>Defamatory Speech (D)</p> Signup and view all the answers

Which of the following is a requirement for an act to be considered defamation?

<p>It must be malicious. (A)</p> Signup and view all the answers

Which statement best differentiates between libel and slander?

<p>Libel refers to written defamation, while slander refers to spoken defamation. (A)</p> Signup and view all the answers

What is one method to comply with the Data Privacy Act regarding electronic discovery?

<p>Instantly evaluate large volumes of electronically stored information (ESI). (B)</p> Signup and view all the answers

Which of the following is NOT a characteristic of defamation?

<p>It must be delivered through electronic means. (A)</p> Signup and view all the answers

Which of the following parts is essential for an imputation to qualify as defamation?

<p>The offended party must be clearly identified. (D)</p> Signup and view all the answers

Which of the following would NOT be an example of advanced surveillance technology?

<p>Written notes from personal observations. (D)</p> Signup and view all the answers

Which of these is a primary concern in consumer profiling?

<p>Collection of personal data for targeted advertising. (A)</p> Signup and view all the answers

Which requirement is NOT part of identifying a defamation case?

<p>It must be communicated in a non-digital format. (C)</p> Signup and view all the answers

What is the primary way avatars can earn virtual world money?

<p>By completing specific tasks in the virtual world (D)</p> Signup and view all the answers

What distinguishes MOBA games from MMOs?

<p>The number of players involved in one game session (A)</p> Signup and view all the answers

How long do typical MOBA matches last?

<p>30 minutes to 1 hour (C)</p> Signup and view all the answers

What is the significance of the Dota 2 championship in 2017 for the industry?

<p>It distributed nearly $25 million in prizes (D)</p> Signup and view all the answers

Which of the following is NOT a characteristic of MOBA games?

<p>Matches occurring in an open-world environment (B)</p> Signup and view all the answers

What genre does MOBA combine with action and RPG elements?

<p>Strategy video games (C)</p> Signup and view all the answers

What is the impact of information technology on the healthcare industry?

<p>It has led to a considerable transition in industry practices (A)</p> Signup and view all the answers

What is one of the initiatives aimed at enhancing ICT literacy in the Philippines?

<p>E-Government Harmonization (A)</p> Signup and view all the answers

What distinguishes cyberstalking from cyberbullying?

<p>Cyberstalking includes threatening behavior towards adults. (B)</p> Signup and view all the answers

How does information technology support healthcare communication?

<p>By enhancing communication between patients and healthcare professionals (A)</p> Signup and view all the answers

What action should minors take if they experience cyberbullying?

<p>Notify their parents or guardians. (B)</p> Signup and view all the answers

What type of content is typically prohibited on most social networking platforms?

<p>Any material depicting violence or obscenity. (B)</p> Signup and view all the answers

Which of the following best describes a major benefit of IT in healthcare?

<p>Delivers more accurate and accessible health information (B)</p> Signup and view all the answers

What impact does information technology have on decision-making in healthcare?

<p>Enhances the ability to identify health risks quickly (C)</p> Signup and view all the answers

What is the primary function of avatars in MMORPGs?

<p>To interact with other players in the game. (A)</p> Signup and view all the answers

Which of the following is a characteristic of massively multiplayer online games (MMOGs)?

<p>They support hundreds or thousands of concurrent players. (A)</p> Signup and view all the answers

What is a significant effect of ICT on patient awareness?

<p>Improves awareness of health-related issues (D)</p> Signup and view all the answers

What significant action did MySpace take regarding user safety?

<p>Purged the accounts of 90,000 registered sex offenders. (A)</p> Signup and view all the answers

In what way does IT contribute to business processes?

<p>Facilitates automation of business operations (D)</p> Signup and view all the answers

Which guideline is typically found in social networking websites’ terms of service?

<p>There are restrictions on uploading inappropriate material. (D)</p> Signup and view all the answers

What is a common challenge with identifying cyberbullying?

<p>It can take on various forms and methods. (A)</p> Signup and view all the answers

Flashcards

Information Privacy

Rules for collecting, using, and protecting personal information.

Data Purpose Limitation

Collected data must have a clear, specified reason for use.

Data Integrity

Collected data should be accurate and up-to-date.

Data Subject Access

Individuals' right to review and correct their personal data.

Signup and view all the flashcards

Data Minimization

Data should be removed when it's no longer needed.

Signup and view all the flashcards

Privacy Protection Advantages

Benefits of protecting personal information like protecting personal data, stopping unwanted solicitations, and securing email addresses.

Signup and view all the flashcards

Data Privacy Act (Philippines)

Philippine law that controls how personal information is handled for Filipinos.

Signup and view all the flashcards

Personal Data Controller

The entity responsible for protecting personal information in the Philippines (under Data Privacy Act).

Signup and view all the flashcards

Data Breaches

Security incidents where confidential data is leaked, stolen, or compromised.

Signup and view all the flashcards

Electronic Discovery (ESI)

Quickly evaluating and collecting large volumes of digital evidence to support legal cases or investigations.

Signup and view all the flashcards

Libel

A published false statement that harms someone's reputation.

Signup and view all the flashcards

Cyber Libel

Libel committed through digital means, such as social media or online forums.

Signup and view all the flashcards

Slander

Oral defamation; spoken false statement that harms someone's reputation.

Signup and view all the flashcards

Defamation Elements

Requirements for a successful defamation claim: false statement, publication, harm, and fault.

Signup and view all the flashcards

Freedom of Expression

The right to communicate one's ideas and opinions.

Signup and view all the flashcards

Limitations of Freedom of Expression

Restrictions on freedom of expression, such as defamation laws.

Signup and view all the flashcards

ICT in Healthcare: Accurate Information

Information technology helps provide precise, useful, and personalized health information to meet individual needs.

Signup and view all the flashcards

ICT in Healthcare: Faster Decisions

Information technology aids in making quick and informed judgments regarding health risks for individuals and the public.

Signup and view all the flashcards

ICT in Healthcare: Improved Communication

Information technology facilitates communication between patients and healthcare providers, enabling better decision-making.

Signup and view all the flashcards

ICT in Healthcare: Support Networks

Information technology builds social support for patients and healthcare professionals.

Signup and view all the flashcards

ICT in Healthcare: Raising Awareness

Information technology educates patients and the public about health issues, leading to better health outcomes.

Signup and view all the flashcards

Defamation

Speaking false, harmful words that damage another's reputation, job, trade, or livelihood.

Signup and view all the flashcards

Social Networking Advertising

Using social networks to promote products and services.

Signup and view all the flashcards

Direct Advertising

Placing ads on social media directly.

Signup and view all the flashcards

Network-based Advertising

Using social connections to target ads.

Signup and view all the flashcards

Group Advertising

Marketing through user groups / interest groups on social media.

Signup and view all the flashcards

Company-Owned Social Network

A social media platform owned by a company for customer interaction.

Signup and view all the flashcards

Viral Marketing

Encouraging users to share marketing content rapidly.

Signup and view all the flashcards

Hate Speech

Language intended to insult or promote hatred towards groups.

Signup and view all the flashcards

Cyberbullying

Harassment, torment, or threats directed at a minor using the internet.

Signup and view all the flashcards

Cyberstalking

Threatening behavior or unwanted advances targeted at an adult online.

Signup and view all the flashcards

Sexual Predators Online

Adults using social media to prey on minors.

Signup and view all the flashcards

Inappropriate Content Online

Sharing violent or obscene videos on social media.

Signup and view all the flashcards

MMORPG

A type of online game where players control characters in a virtual world.

Signup and view all the flashcards

Avatars in MMORPGs

The virtual representations of players in online games.

Signup and view all the flashcards

Virtual World Economy

The system of buying and selling virtual items in online games.

Signup and view all the flashcards

Value of Virtual Items

Determined by their usefulness and how hard they are to get.

Signup and view all the flashcards

MOBA Genre

A type of video game where two teams compete using unique characters on a pre-defined battlefield.

Signup and view all the flashcards

MOBA vs. MMO

While both involve online play, MOBAs have limited maps and focus on team battles, while MMORPGs offer vast open worlds for exploration and character development.

Signup and view all the flashcards

eSports Revenue

Competitive gaming tournaments generate significant revenue, with MOBA games leading the way, awarding millions of dollars in prize pools.

Signup and view all the flashcards

Virtual World Money

Avatars in virtual worlds can earn in-game currency by completing tasks or their owners can purchase it with real-world cash.

Signup and view all the flashcards

Healthcare IT Impact

Technology has transformed healthcare by improving processes, patient care, and communication through electronic records, remote monitoring, and telemedicine.

Signup and view all the flashcards

e-Filipino Program

A Philippine government initiative to improve ICT literacy and access for citizens, empowering them through digital skills.

Signup and view all the flashcards

National Connectivity

A program promoting widespread internet access and infrastructure development across the Philippines, creating a more connected nation.

Signup and view all the flashcards

e-Government Harmonization

A strategy to streamline government services and processes through technology, making government more efficient and accessible.

Signup and view all the flashcards

Study Notes

Chapter 6 – Privacy

  • Privacy involves control over the sharing and revealing of personal data
  • Information privacy considers the relationship between data collection, technology, public expectation of privacy, and legal/political issues
  • Data privacy is the securing of a person's privacy preferences and typical information, using computer security, data security, and knowledge security, with software, hardware, and human resources.
  • Data privacy laws provide a legal framework for collecting, using, and storing personal data.
  • All data collection must have a stated purpose
  • Information should not be shared with other organizations without explicit consent or legal authorization.
  • Data must be accurate and up to date
  • Data should be removed when no longer needed for its purpose
  • Transferring personal data to entities where equivalent protections cannot be confirmed is prohibited.
  • Sensitive data (e.g., sexual orientation, religion) should only be collected under exceptional circumstances.
  • Privacy protection safeguards personal information from unauthorized parties like companies, hackers, and government entities

Chapter 7 – Freedom of Expression

  • Freedom of expression is a fundamental human right
  • It is important for personal growth, fulfillment, pursuit of truth
  • Enables open debate between political parties, and allowing individuals to express concerns to authorities.
  • Free speech improves the quality of government
  • Article 19 of the Universal Declaration of Human Rights states everyone has the right to freedom of opinion and expression
  • Freedom includes holding opinions, seeking, receiving, and imparting information and ideas

Chapter 8– Social Networking

  • Social networking sites create online communities for users, enabling interaction regardless of time, distance, or culture
  • Members can share thoughts, insights, information, hobbies, and experiences with colleagues, family, and friends
  • Social networking sites facilitate both personal and professional relationships
  • Examples of social networking sites include Facebook, Tumblr, Twitter, LinkedIn, Pinterest, and Instagram (with corresponding, approximate subscriber numbers)

Chapter 9– Impact of IT on Productivity & Quality of Life

  • The standard of living varies between individuals within a country and between nations.
  • Gross Domestic Product (GDP) per capita is a commonly-used indicator of the material standard of living (in developed vs developing countries).
  • Information technology (IT) has significantly influenced productivity gains & increased the standard of living.

Chapter 10 – e-Government Harmonization & ICT Enabled Startup

  • e-Government (eGov) is critical to modernization, enhancing efficiency, and improving delivery of public services
  • The ICT Office is tasked with administering and managing ICT competency-based programs within the Philippines
  • ICT-enabled startups are promoted through programs that encourage entrepreneurship and leverage ICT to solve societal challenges.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

GEE1-LITE-v2 (1) PDF

Description

Explore the essential concepts of privacy in this Chapter 6 quiz. Understand the relationship between data collection, technology, and legal frameworks surrounding information privacy. Test your knowledge on data privacy laws and the importance of safeguarding personal information.

More Like This

Data Privacy Fundamentals
30 questions
Data Privacy and Confidentiality
18 questions
Data Privacy Overview and Importance
32 questions
Use Quizgecko on...
Browser
Browser