Privacy Chapter 6
45 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which condition must be met for data about an individual to be shared with other organizations?

  • It must be publicly available.
  • It must be old and outdated.
  • It must involve a legal representative.
  • It must have prior consent from the individual. (correct)
  • What is a primary disadvantage of using privacy-focused products?

  • They often cost more money. (correct)
  • They frequently collect more data.
  • They are difficult to use.
  • They are always completely private.
  • What should happen to data when it is no longer needed for its stated purpose?

  • It should be shared with affiliates.
  • It should be archived indefinitely.
  • It should be securely deleted. (correct)
  • It should be updated regularly.
  • Which statement accurately describes the role of the National Privacy Commission (NPC) in the Philippines?

    <p>It has advisory and compliance monitoring functions.</p> Signup and view all the answers

    What type of data is considered too sensitive to be collected unless under severe circumstances?

    <p>Religious beliefs.</p> Signup and view all the answers

    What is NOT an advantage of privacy protection?

    <p>Ensuring data is always private.</p> Signup and view all the answers

    Which of the following must be true for the Data Privacy Act to apply?

    <p>The person involved must be a local citizen or resident.</p> Signup and view all the answers

    What instrument should individuals have to check the accuracy of their data?

    <p>Access to periodic reporting.</p> Signup and view all the answers

    What is considered defamatory according to the given definition?

    <p>Words that damage another's reputation or livelihood</p> Signup and view all the answers

    Which type of advertising engages a user's network of friends directly?

    <p>Advertising Using an Individual's Network of Friends</p> Signup and view all the answers

    How does viral marketing primarily function?

    <p>By encouraging individuals to spread a marketing message</p> Signup and view all the answers

    What is the main purpose of groups formed on social networking sites by businesses?

    <p>To create a marketing tool for brand awareness</p> Signup and view all the answers

    Which of the following best describes direct advertising on social networking sites?

    <p>ads displayed to every website visitor or targeted users</p> Signup and view all the answers

    What characterizes a company-owned social networking site?

    <p>It is intended for customers to discuss products and developments</p> Signup and view all the answers

    Which advertising method spreads information exponentially as individuals share it?

    <p>Viral Marketing</p> Signup and view all the answers

    What type of speech involves prejudicing someone’s reputation or livelihood?

    <p>Defamatory Speech</p> Signup and view all the answers

    Which of the following is a requirement for an act to be considered defamation?

    <p>It must be malicious.</p> Signup and view all the answers

    Which statement best differentiates between libel and slander?

    <p>Libel refers to written defamation, while slander refers to spoken defamation.</p> Signup and view all the answers

    What is one method to comply with the Data Privacy Act regarding electronic discovery?

    <p>Instantly evaluate large volumes of electronically stored information (ESI).</p> Signup and view all the answers

    Which of the following is NOT a characteristic of defamation?

    <p>It must be delivered through electronic means.</p> Signup and view all the answers

    Which of the following parts is essential for an imputation to qualify as defamation?

    <p>The offended party must be clearly identified.</p> Signup and view all the answers

    Which of the following would NOT be an example of advanced surveillance technology?

    <p>Written notes from personal observations.</p> Signup and view all the answers

    Which of these is a primary concern in consumer profiling?

    <p>Collection of personal data for targeted advertising.</p> Signup and view all the answers

    Which requirement is NOT part of identifying a defamation case?

    <p>It must be communicated in a non-digital format.</p> Signup and view all the answers

    What is the primary way avatars can earn virtual world money?

    <p>By completing specific tasks in the virtual world</p> Signup and view all the answers

    What distinguishes MOBA games from MMOs?

    <p>The number of players involved in one game session</p> Signup and view all the answers

    How long do typical MOBA matches last?

    <p>30 minutes to 1 hour</p> Signup and view all the answers

    What is the significance of the Dota 2 championship in 2017 for the industry?

    <p>It distributed nearly $25 million in prizes</p> Signup and view all the answers

    Which of the following is NOT a characteristic of MOBA games?

    <p>Matches occurring in an open-world environment</p> Signup and view all the answers

    What genre does MOBA combine with action and RPG elements?

    <p>Strategy video games</p> Signup and view all the answers

    What is the impact of information technology on the healthcare industry?

    <p>It has led to a considerable transition in industry practices</p> Signup and view all the answers

    What is one of the initiatives aimed at enhancing ICT literacy in the Philippines?

    <p>E-Government Harmonization</p> Signup and view all the answers

    What distinguishes cyberstalking from cyberbullying?

    <p>Cyberstalking includes threatening behavior towards adults.</p> Signup and view all the answers

    How does information technology support healthcare communication?

    <p>By enhancing communication between patients and healthcare professionals</p> Signup and view all the answers

    What action should minors take if they experience cyberbullying?

    <p>Notify their parents or guardians.</p> Signup and view all the answers

    What type of content is typically prohibited on most social networking platforms?

    <p>Any material depicting violence or obscenity.</p> Signup and view all the answers

    Which of the following best describes a major benefit of IT in healthcare?

    <p>Delivers more accurate and accessible health information</p> Signup and view all the answers

    What impact does information technology have on decision-making in healthcare?

    <p>Enhances the ability to identify health risks quickly</p> Signup and view all the answers

    What is the primary function of avatars in MMORPGs?

    <p>To interact with other players in the game.</p> Signup and view all the answers

    Which of the following is a characteristic of massively multiplayer online games (MMOGs)?

    <p>They support hundreds or thousands of concurrent players.</p> Signup and view all the answers

    What is a significant effect of ICT on patient awareness?

    <p>Improves awareness of health-related issues</p> Signup and view all the answers

    What significant action did MySpace take regarding user safety?

    <p>Purged the accounts of 90,000 registered sex offenders.</p> Signup and view all the answers

    In what way does IT contribute to business processes?

    <p>Facilitates automation of business operations</p> Signup and view all the answers

    Which guideline is typically found in social networking websites’ terms of service?

    <p>There are restrictions on uploading inappropriate material.</p> Signup and view all the answers

    What is a common challenge with identifying cyberbullying?

    <p>It can take on various forms and methods.</p> Signup and view all the answers

    Study Notes

    Chapter 6 – Privacy

    • Privacy involves control over the sharing and revealing of personal data
    • Information privacy considers the relationship between data collection, technology, public expectation of privacy, and legal/political issues
    • Data privacy is the securing of a person's privacy preferences and typical information, using computer security, data security, and knowledge security, with software, hardware, and human resources.
    • Data privacy laws provide a legal framework for collecting, using, and storing personal data.
    • All data collection must have a stated purpose
    • Information should not be shared with other organizations without explicit consent or legal authorization.
    • Data must be accurate and up to date
    • Data should be removed when no longer needed for its purpose
    • Transferring personal data to entities where equivalent protections cannot be confirmed is prohibited.
    • Sensitive data (e.g., sexual orientation, religion) should only be collected under exceptional circumstances.
    • Privacy protection safeguards personal information from unauthorized parties like companies, hackers, and government entities

    Chapter 7 – Freedom of Expression

    • Freedom of expression is a fundamental human right
    • It is important for personal growth, fulfillment, pursuit of truth
    • Enables open debate between political parties, and allowing individuals to express concerns to authorities.
    • Free speech improves the quality of government
    • Article 19 of the Universal Declaration of Human Rights states everyone has the right to freedom of opinion and expression
    • Freedom includes holding opinions, seeking, receiving, and imparting information and ideas

    Chapter 8– Social Networking

    • Social networking sites create online communities for users, enabling interaction regardless of time, distance, or culture
    • Members can share thoughts, insights, information, hobbies, and experiences with colleagues, family, and friends
    • Social networking sites facilitate both personal and professional relationships
    • Examples of social networking sites include Facebook, Tumblr, Twitter, LinkedIn, Pinterest, and Instagram (with corresponding, approximate subscriber numbers)

    Chapter 9– Impact of IT on Productivity & Quality of Life

    • The standard of living varies between individuals within a country and between nations.
    • Gross Domestic Product (GDP) per capita is a commonly-used indicator of the material standard of living (in developed vs developing countries).
    • Information technology (IT) has significantly influenced productivity gains & increased the standard of living.

    Chapter 10 – e-Government Harmonization & ICT Enabled Startup

    • e-Government (eGov) is critical to modernization, enhancing efficiency, and improving delivery of public services
    • The ICT Office is tasked with administering and managing ICT competency-based programs within the Philippines
    • ICT-enabled startups are promoted through programs that encourage entrepreneurship and leverage ICT to solve societal challenges.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    GEE1-LITE-v2 (1) PDF

    Description

    Explore the essential concepts of privacy in this Chapter 6 quiz. Understand the relationship between data collection, technology, and legal frameworks surrounding information privacy. Test your knowledge on data privacy laws and the importance of safeguarding personal information.

    More Like This

    Data Privacy Fundamentals
    30 questions
    Data Privacy and Confidentiality
    18 questions
    Data Privacy Overview and Importance
    32 questions
    Use Quizgecko on...
    Browser
    Browser