Chapter 6-7 Study Guide PDF

Summary

This study guide covers the concepts of privacy and privacy-related issues in the digital age. It explores the definitions, implications, and protection strategies surrounding data privacy, highlighting the importance of control and regulation over personal information in the digital sphere.

Full Transcript

Chapter 6 - Privacy STUDY GUIDE FOR MODULE NO. 6 MODULE OVERVIEW Privacy can be described as imposing constraints on access to and/or use of personal information. Privacy refers to the usage of information collected about individuals and stored in databases. This modul...

Chapter 6 - Privacy STUDY GUIDE FOR MODULE NO. 6 MODULE OVERVIEW Privacy can be described as imposing constraints on access to and/or use of personal information. Privacy refers to the usage of information collected about individuals and stored in databases. This module will discuss the difference between privacy and security, explain various risks to Internet privacy, and identify and understand the different key privacy and anonymity issues. MODULE LEARNING OBJECTIVES At the end of this, students are expected to: 1. Difference between privacy and security. 2. Explain various risks to Internet privacy. 3. Identify and understand the different key privacy and anonymity issues. LEARNING CONTENTS (Privacy Protection and the Law) WHAT IS PRIVACY? Privacy focuses on having control and regulation over the sharing or revealing of certain data about yourself or your behavior. Privacy is often hard to return by lately because we are so connected and open with our information. Two decades ago, internet privacy would have meant ensuring your computer’s network connection was secure. Now a days, we use more internet- connected devices during a single day, including your smartphone, smart home device, smartwatch, tablet, and laptop. Much of the web today is being employed by big companies like Google, Facebook, and Amazon trying to gather people’s data for monetization and marketing purposes. Another problem experience is that not only our privacy being captured, but it’s also being given in a privacy- focused products. In many cases, when we’re given access to a free product, we pay with our data information. If we don’t want to be tracked, we often need to prefer to use paid, privacy- friendly options. INFORMATION PRIVACY Information privacy is that the relationship among the gathering and circulation of information, technology, the public expectation of privacy, and therefore the legal and political issues surrounding them. It is also best-known as data privacy or data protection. Data privacy is difficult since it try to use data while securing a person's privacy preferences and personally typical information. The fields of computer security, data security, and knowledge security all design and use software, hardware, and human resources to deal with this issue. Information privacy, data privacy or data protection laws render a legal structure on the way to get, use and store data of natural persons. The various laws all over the world describe the interest of natural persons to regulate who is using its data. This includes usually the proper to urge details on which data is stored, for what intention and to request the deletion just in case the aim isn't given anymore. ✓ For all data gathered, there should be a stated purpose. ✓ Information collected from a private can't be expose to other organizations or individuals unless clearly authorized by law or by consent of the individual. ✓ Records kept on an individual should be authentic and up to date. ✓ There should be instrument for individuals to review data about them, to check accuracy. This may include periodic reporting. ✓ Data should be removed when it's not needed for the stated purpose. ✓ Transmission of private information to determine where "equivalent" personal data protection can't be confirmed is prohibited. ✓ Some data is just too sensitive to be collected, unless there are severe circumstances (e.g., sexual orientation, religion). What is Privacy Protection? Privacy protection is keeping the information you’d like to secure to yourself from getting into the custody of companies, hackers, government organizations, and some other groups. The explanation of privacy protection changes from person to person. Each person has various assumptions of privacy, therefore the level of security they want to feel that their privacy is really secure limit importantly. Advantages of Privacy Protection Protect Your Personal Data Privacy protection keeps your personal data secure from people that might want to take advantage of it. Minimizing your digital trace makes it harder for people to make advantage of your data. Stop Unwanted Solicitations Without privacy, marketers can target advertisements and other messaging at once to you. If these sorts of ads bother you, the simplest way to avoid them is to stop the marketers from getting your data. Privacy-intrusive data collection runs the web advertising industry. If you'll end the flow of information you give to the marketers, they’ll not be ready to target you with ads. Protect Your Email Address If you'll keep third-parties from acquiring your email address, you'll avoid getting plenty of unwanted spam email. Willingly giving out your email leads to an intense flow of advertising messages in your inbox. Disadvantages to Privacy Protection Privacy-Focused Products Cost Money Keeping your personally distinctive data secure isn’t free. Because more mainstream services gather and exchange your data to form money, private alternatives need to adopt various business models. Free tools often collect your information, so you don’t need to pay. Privacy-friendly business models often use a subscription-based payment model. Is it Really Private? You can take all recommended step towards privacy and as to one deficiency, leak your information. It’s our viewpoint that any privacy protection is best than none, but it could be overwhelming. If you sense like your efforts aren’t being honor, it might be difficult to continue using privacy-focused products and services. Your Information Might Still Be Public If you need privacy products your data should be private. Forgetting only one aspect of protecting your privacy could let your personal information slip into an enormous database and within the hands of an online advertiser. Your Reputation May Be In Question There are some spots surrounding privacy on the web. Some people feel that the merely reason that somebody would want to hide their tracks online is because they’re performing something illegal. While this isn’t the case, it’s an hopeless condition for anyone who sees the benefits of keeping your internet activity hidden from prying eyes. PHILIPPINES – THE DATA PRIVACY ACT OR RA NO. 10173 In 2012, the Philippines passed Republic Act No. 10173 or the Data Privacy Act of 2012 (DPA) “to protect the fundamental human right to privacy of communication while ensuring free flow of information to promote innovation and growth. The State recognizes the vital role of information and communications technology in nation-building and its inherent obligation to ensure that personal information in information and communications systems in government and in the private sector are secured and protected”. The DPA was passed in accordance with the Philippines agreements under ASEAN Vision 2020 and at the urging of the growing business process outsourcing industry. The law was modeled after the Data Protection Directive (95/46/EC) with many of its terminologies and provisions like privacy laws in other jurisdictions. What acts are covered by the DPA? The DPA and its Implementing Rules and Regulations (IRR) apply to all acts done or practices engaged in and outside of the Philippines if: If the person, either an individual or an institution, involved in the processing of personal data is in the Philippines; The act or practice involves personal data of a Philippine citizen or Philippine resident; The processing of personal data is done in the Philippines; or The act, practice or processing of personal data is done by an entity with links to the Philippines, subject to international law and comity. “Personal data” refers to all types of personal information. “Processing” is any operation/s performed upon personal data. These operations include, but are not limited to the collection, recording, organization, storage, updating or modification, retrieval, consultation, use, consolidation, blocking, erasure, or destruction of data. Who implements the DPA? The National Privacy Commission (NPC) oversees administering and implementing the DPA. It is also tasked to monitor and ensure compliance of the Philippines with international standards for personal data protection. The major functions of the NPC are as follows: Rulemaking. Advisory. The NPC is the advisory body on matters related to personal data protection. Public education. The NPC shall launch initiatives to educate the public about data privacy, data protection and fair information rights and responsibilities. Compliance and monitoring. The body has compliance and monitoring functions to ensure personal information controllers comply with the law. It is also tasked to manage the registration of personal data processing systems. Complaints and investigations. Enforcement. “Personal information controller” is an individual or institution, or any other body who controls the processing of personal data, or instructs another to process personal data on its behalf. How to comply with the Data Privacy Act? If you are a personal information controller, you must follow the following by the law: Registration of data processing systems (DPS). An individual or institution employing fewer than 250 employees need not register unless its data processing operations: involves sensitive personal information of at least 1,000 individuals; likely to pose a risk to the rights and freedoms of data subjects; or the processing is not occasional. Notification of automated processing operations where the processing becomes the sole basis of making decisions about a data subject and when the decisions would significantly affect the data subject. A “data subject” is an individual whose personal, sensitive personal or privileged information is process. NOTE: No decision with legal effects concerning a data subject shall be made solely based on automated processing without the consent of the data subject. The consent may be in written, electronic or recorded form. It may be given by a lawful representative or agent. Appointment of a Data Protection Officer in charge of ensuring compliance with the DPA; Creation of a data breach response team that will at once address security incidents or personal data breach; Adoption of data protection policies that support data security measures and security incident management; Annual report of the summary of documented security incidents and personal data breaches; and Compliance with other requirements as may be provided by the NPC. LEARNING CONTENTS (Key Privacy and Anonymity Issues) PRIVACY AND ANONYMITY ISSUES Data Breaches Data breaches involving big databases of personal information have resulted in a tremendous number of identity theft occurrences. Data breaches are occasionally the result of hackers hacking into a database, but often, they are the result of negligence or a failure to follow adequate security standards. Organizations are hesitant to reveal data breaches for fear of negative publicity and consumer litigation. Victims whose personal information was compromised because of a data breach, on the other hand, need to be informed so that they can take precautionary steps. The cost of a data breach to a business is sometimes expensive. Approximately half of the value is often a result of missed business potential relating to clients whose patronage has been lost because of the occurrence. Other expenses include public-relations charges to protect the firm's reputation, as well as higher customer-service fees for information hotlines and credit monitoring services for victims. Electronic Discovery The compilation, preparation, examination, and production of electronically stored material for use in criminal and civil actions and procedures is known as electronic discovery (e-discovery). Electronically stored information (ESI) is any type of digital data, such as electronic mails, drawings, graphs, Web sites, pictures, word-processing files, sound/audio recordings, and databases, that is saved on any type of electronic storage device, such as hard drives, CDs, and flash drives. Several types of ESI of a private or personal nature (e.g., personal emails) are extremely likely to be exposed throughout the e-discovery process. Traditional software increase firms as well as legal organizations have established the growing need for enhanced processes to speed up and lessen the costs associated with e- discovery. As a result, lots of companies offer e- discovery software that cater the ability to do the following: Evaluate large volumes of ESI instantly to perform early case assessments. Simplify and assign data collection from across all relevant data sources in various data formats. Choose large amounts of ESI to lessen the include documents that need to processed and reviewed. Identify all participants in an investigation to figure out who knew what and when. E-discovery increase many ethical issues: Should an organization ever plan to destroy or hide incriminating evidence that would rather be revealed during discovery? To what degree must an organization be proactive and careful in supplying evidence needed through the discovery process? Should an organization plan to hide incriminating evidence during a mountain of trivial, routine ESI? Consumer Profiling When people register on websites, take surveys, fill out forms, or take part in online competitions, companies fully collect personal information about them. Various firms also collect information on Web surfers using cookies, which are text files that are transferred to the hard disks of users who visit a website so that the website can recognize visitors on later visits. Tracking software is frequently used by businesses to allow their websites to examine surfing behavior and deduce personal interests and preferences. The use of cookies and tracking software is dubious since corporations may obtain information about customers without their knowledge. Cookies, once saved on your computer, allow a website to customize the advertising and promotions that are displayed to you. The marketer is aware of which advertisements are being seen the least and ensures that they are not shown again unless the advertiser has chosen to promote utilizing repetition. Some cookies may also monitor which other websites a person has visited, allowing advertisers to use that information to make informed estimates about the types of advertising that would be almost fascinating to the user. Consumer data privacy has evolved into a key marketing concern. Companies that are unable to safeguard or respect consumer information frequently lose business, and some become defendants in class action lawsuits arising from privacy violations. Consumer profiling opponents are also worried that confidential information is being gathered and shared with other parties without the consent of the customers who supply the information. Consumers have no means of knowing how or who is using the information once it has been gathered. Workplace Monitoring There is enough data to support the idea that many workers squander significant amounts of time doing non-work-related activities. According to one recent survey, between 60% and 80% of workers' internet time is spent on non-work-related activities. According to another research, workers spend roughly four or five hours each week on personal problems on average. According to a recent poll conducted by an IT staffing business, 54% of firms reported restricting the usage of social networking to help reduce waste at work. The actual for decreased productivity and increased legal liabilities has led many employers to watch workers to make sure that corporate IT usage policies are being followed. Many firms find it necessary to record and review employee communications and activities on the job, along with phone calls, email, and Web surfing. Some are even videotaping employees on the work. In addition, some companies use random drug testing and psychological testing. With some exceptions, these progressively common (and many would say intrusive) practices are perfectly legal. Advanced Surveillance Technology Several breakthroughs in information technology, such as surveillance cameras and satellite- based systems that can detect a person's actual position, provide incredible new data-gathering capabilities. However, these advancements have the potential to reduce individual privacy and simplify the problem of how much information about people's private lives should be kept protected. Camera Surveillance Surveillance cameras are employed in major cities across the world to deter crime and terrorist activity. Critics claim that such inspection violates civil rights and are concerned about the cost of the equipment and additional persons needed to view the video feeds. Supporters of surveillance cameras provide report data indicating that the cameras are effective in preventing crime and terrorism. They can provide examples of how cameras aided in the resolution of crimes by verifying witness testimony and aiding in the identification of criminals. Vehicle Event Data Recorders A vehicle event data recorder (EDR) is a device that collects vehicle and occupant data for a few seconds before, during, and after any vehicle incident severe enough to cause the air bags to deploy. Sensors located throughout the vehicle collect and record data such as vehicle speed and acceleration, seat belt use, air bag formation, activation of any automated collision notification system, and driver actions such as brake, accelerator, and turn signal usage. The EDR cannot collect any information that might be used to identify the vehicle's driver. It also cannot identify if the motorist was under the influence of drugs or alcohol while operating the car. The fact that most automobiles now come equipped with an EDR, and that the information from this device might be used as evidence in a court of law, is unknown to the public. The future capability of EDRs, as well as the extent to which their data will be used in court proceedings, remains to be seen. Stalking Apps Technology has made it possible for one individual to track the locations of another person in the shortest amount of time possible, without ever having to follow the person. Cellphone spy software, also known as a stalking application, is frequently downloaded and installed on someone's cellphone or smartphone in minutes, allowing the user to perform location tracking, record calls, view every text message or picture sent or received, and record the URLs of any internet site visited on the phone. Even when the phone is switched off, the built-in microphone is frequently triggered remotely to be used as a listening device. All information gathered by such applications is frequently transferred to the user's email account, where it may be read in real time or at a later date. Some of the most popular spy software consist of Mobile Spy, ePhone Tracker, Flexi SPY, and Mobile Nanny. There is no law that prevents a company from developing an app whose primary aim is to let one person track another, and this software is available for purchase on the internet. (Some users have said that they got virus after installing stalker applications or that the program did not work as described.) However, it is unlawful to install the software on a phone without the owner's permission. It is also unlawful to listen in on another person's phone calls without their knowledge and consent. These legal nuances, however, are not a deterrent to a persistent stalker. LEARNING ACTIVITY 7 1. How much do you value your privacy? 2. Why does having knowledge about Privacy is so important? 3. Do you think the web increases privacy or takes away privacy? 4. What is the best idea to protect a personal privacy while not disrupt future innovation? 5. How is privacy perceive in your culture? SUMMARY Privacy is the ability to regulate the sharing or exposing of certain facts about oneself or one's activity. Because we are so connected and open with our information, privacy is often difficult to regain. The link between the collecting and dissemination of information, technology, and the public expectation of privacy is referred to as information privacy. Data privacy is challenging since it aims to use data while safeguarding a person's privacy choices and personally identifiable information. Privacy protection is the process of preventing information that you want to keep private from falling into the hands of corporations, hackers, government agencies, and other organizations. REFERENCES BOOKS/E-BOOKS: Reynolds, G.W.(2015). Ethics in Information Technology Fifth Edition. Boston: Cengage Learning. Lavina, C.G. (2015). Social, Ethical, Legal and Professional Issues in Computing with complete explanation of the Philippine. Manila: Cybercrime Laws.Mindshapers Co., Inc. E-SOURCES: Definition of privacy. (n.d.). Dictionary by Merriam-Webster: America's most-trusted online dictionary. https://www.merriam-webster.com/dictionary/privacy Know your rights. (2018, September 25). National Privacy Commission. https://www.privacy.gov.ph/know-your-rights/ (n.d.). notitle. https://www.officialgazette.gov.ph/ Privacy and human rights - Overview. (n.d.). Global Internet Liberty Campaign. https://gilc.org/privacy/survey/intro.html Privacy and information technology (Stanford encyclopedia of philosophy). (n.d.). Stanford Encyclopedia of Philosophy. https://plato.stanford.edu/entries/it- privacy/#ImpInfTecPri Privacy English definition and meaning | Lexico.com. (n.d.). Lexico Dictionaries | English. https://www.lexico.com/en/definition/privacy A summary of RA No. 10173 or the data Privacy Act of 2012. (2020, January 16). ECC International. https://eccinternational.com/ra-10173-data-privacy-summary/ What is privacy protection? [Updated for 2021]. (2021, March 25). Choose To Encrypt. https://choosetoencrypt.com/privacy/what-is-privacy-protection/ ChapterSTUDY 7 - Freedom of Expression GUIDE FOR MODULE NO. 7 MODULE OVERVIEW Everyone has their right to freedom of speech and expression. This right includes freedom to express his opinions, and to share and receive information and ideas without interference from public authority. This module discusses terminologies and concepts about one’s freedom of speech and expression. It aims to equip the students with relevant knowledge to determine whether their claim to the right to speak and express is within the scope guaranteed by the Constitution. This module will contain discussions on freedom of expression and how the internet has changed the way individuals share and receive information. MODULE LEARNING OUTCOMES At the end of this module, students are expected to: a. Defend their rights to freedom of expression b. Understand the limitation underlying the freedom of expression c. Determine the existing laws and acts concerning freedom of expression LEARNING CONTENT (Scope of Freedom of Expression) What is freedom of expression? Freedom of expression is a fundamental human right; this is protected by international law and every constitutional bill of rights in the world. It is essential for human growth, dignity, personal fulfillment, and the pursuit of truth. It is also a necessary requirement for democracy and effective administration of governing bodies. Freedom of expression allows for open debate about and between opposing political parties, allows individuals to express their concerns to authorities, and guarantees that new policies and laws are scrutinized. Free speech improves the quality of government because it helps to ensure that officials are competent and honest, and it allows citizens to express their concerns about and discuss government action. To put it another way, democratic principles are jeopardized when information and ideas are restricted to flow freely. As a result, there is freedom to express one's views without fear of censorship, reprisal, or legal repercussions. Freedom of speech, free speech, and freedom of expression are often used interchangeably. In a legal manner, freedom of expression includes any activity that imparts and seeks ideas, regardless of the medium used (peaceful assemblies, rallies, etc.). Article 19 of the Universal Declaration of Human Rights states that: Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive, and impart information and ideas through any media regardless of frontiers. The following statements from the European Convention on Human Rights (ECHR) focus on freedom of expression (Article 10 – Freedom of Expression): 1. Everyone has the right to freedom of expression. This right shall include freedom to hold opinions and to receive and impart information and ideas without interference by public authority and regardless of frontiers. This Article shall not prevent States from requiring the licensing of broadcasting, television, or cinema enterprises. 2. The exercise of these freedoms, since it carries with it duties and responsibilities, may be subject to such formalities, conditions, restrictions, or penalties as are prescribed by law and are necessary in a democratic society, in the interests of national security, territorial integrity or public safety, for the prevention of disorder or crime, for the protection of health or morals, for the protection of the reputation or rights of others, for preventing the disclosure of information received in confidence, or for maintaining the authority and impartiality of the judiciary. Article 10 of the ECHR also enumerate the three components of the right to freedom of expression: (1) freedom to hold opinions; (2) freedom to receive information and ideas; and (3) freedom to impart information and ideas. Meanwhile, The Philippine Constitution provides the following notions on freedom of expression: Article III Section 4. “No law shall be passed abridging the freedom of speech, of expression, or of the press, or the right of the people peaceably to assemble and petition the government for redress of grievances.” Article III Section 18. “No person shall be detained solely by reason of his political beliefs and aspirations.” Limitations of Freedom of Expression The exercise of freedom of expression includes duties and responsibilities, as well as the possibility of being subject to legal limitations, limits, and fines. This is required for national security, territorial disturbance, or crime, moral protection, the preservation of one's reputation and the rights of others, the prevention of exposure of secret information obtained, and the maintenance of the judiciary's authority and impartiality. While the Philippine Constitution protects people’s rights to free speech and expression, this does not give them free license to write to the detriment of others. This means that the right to freedom of expression is not absolute and has limitations. Defamation Defamation is the act of providing a false statement about another individual/groups of individuals which unjustly harms their reputation. Elements of Defamation 1. There must be an imputation of a crime, or of a vice or defect, real or imaginary, or any act, omission, condition, status, or circumstance. 2. The imputation must be made publicly. 3. It must be malicious. 4. The imputation must be directed at a natural or juridical person, or one who is dead. Here the identity of the offended party must be clearly identified. 5. The imputation must tend to cause the dishonor, discredit, or contempt of the person defamed. 6. It must be in writing (for cyber libel; writing must be done through a computer system or any other similar means which may be devised in the future). Types of Defamation 1. Libel – defamatory statement made in writing, printed words, or images. Libel is “a public and malicious imputation of a crime, or of a vice or defect, real or imaginary, or any act, omission, condition, status, or circumstance tending to cause the dishonor, discredit, or contempt of a natural or juridical person, or to blacken the memory of one who is dead,” based on Article 353 of the Philippine Revised Penal Code. Note: How do we differentiate libel and cyber-libel? As to the manner of commission, ordinary libel is committed by means of writing, printing, lithography, engraving, radio, phonograph, painting, theatrical exhibition, cinematographic exhibition, or any similar means; cyber libel is committed through a computer system, or other similar digital means. As to the venue of filing the complaint, ordinary libel is filed with the RTC of the province or city where the libelous article is printed and first printed or at the place where one of the offended parties reside at the time of the commission of the offense (Art. 360, RPC). As regards cyber libel, it is filed only with the RTC at the place where one of the offended parties reside at the time of the commission of the offense. As to the penalty imposed, ordinary libel shall be punished by prison correccional in its minimum and medium periods or a fine ranging from 200 to 6, 000 pesos, or goth, in addition to the civil action which may be brought by the offended party. A cyber shall be punished by one degree higher. 2. Slander – defamatory statement that is spoken, oral defamation. In De Leon v. People, slander is “libel committed by oral (spoken) means, instead of in writing. It is defined as "the speaking of base and defamatory words which tend to prejudice another in his reputation, office, trade, business or means of livelihood."” Obscene Speech Obscenity refers to any act the strongly offends the public sense of decency. Obscene speech and conduct portray sexual conduct in an offensive manner; it also lacks literary, artistic, political, or scientific value. Interpretations of obscene speech are culturally and politically relative. Hate Speech There are some statements and views that are illegal to express because of its harmful, offensive, and obscene content that may harm others. Inflammatory speech, or speech that advocates violence and harm unto others, may incite lawless actions against an individual or a group of people. LEARNING CONTENT (Key Issues on Freedom of Expression) The Internet allows the worldwide exchange of news, ideas, opinions, rumors, and information. Its wide accessibility, open discussions, and anonymity make it an effective communication tool. People must frequently make ethical considerations about how to exercise such extraordinary freedom and power. Controlling Access to Information on the Internet Internet safety or e-safety promotes the physical and psychological well-being of internet users, most especially children and adolescents on the internet. Young people are more susceptible to online risk. Applications and internet features for e-safety are made available, such as parental control softwares that limits and monitors children’s internet activity. Anonymity on the Internet Anonymous expression refers to the expression of opinions who do not identify their name. The freedom to express oneself without fear of repercussions is a fundamental principle in a democratic society. Anonymity is much more vital in countries where free expression is prohibited. However, in the wrong hands, anonymous communication may be used to engage in unlawful or immoral behavior. Through the freedom and anonymity that the internet offers, one may use it to hurt other by spreading hateful speech. Cyberbullying denotes cruel and aggressive acts carried towards an individual or a group of people through the internet. The use of social media has severely highlighted the effects of cyberbullying. Hate Speech Persistent or deliberate harassment directed at a specific person constitutes hate speech, which is punishable by law, but general, broad statements expressing hatred of an ethnic, racial, or religious group cannot. A threatening private communication delivered to a person over the Internet, a public remark placed on a Web site stating intent to conduct acts of hatred motivated violence against specific persons, and libel directed at a specific person are all crimes that can be punished. Pornography The Internet has aided the pornography business by offering quick, affordable, and simple access to a vast assortment of pornographic Web sites. Consumers of pornography can avoid upsetting others or being humiliated by others watching their purchases thanks to Internet access. Establishing a computer usage policy that restricts access to pornographic sites, identifying individuals who breach the policy, and acting against those users—regardless of how humiliating it is for the users or how bad it may be for the company—are all reasonable procedures. LEARNING ACTIVITY 7 Answer the following questions: 1. Identify ways in which speech can be regulated or limited in the classroom. Does this limit your freedom of expression? 2. Fake news is rampant on social media. How do we differ misinformation and disinformation? How does fake news affect one’s freedom of expression? SUMMARY Freedom of expression is defined as the right to express one’s opinions, and to share and receive information and ideas without interference from public authority. The right to freedom of expression is not absolute; it has its limitations, such as defamation, hate speech, and obscene speech. Defamation is the act of providing false statement about an individual. Libel is a defamatory statement made in writing; slander is oral defamation. Internet safety is necessary to protect individuals, most especially children and the youth, from online risks.

Use Quizgecko on...
Browser
Browser