Summary

This document discusses privacy, focusing on information privacy, privacy protection, and the advantages and disadvantages of privacy protection. It also covers the different aspects of privacy protection and the legal structure for data privacy in the Philippines. Includes discussion of freedom of expression. The document also briefly mentions issues like cyberbullying, and the use of information technology in education and business.

Full Transcript

Chapter 6 -- Privacy ==================== ###### WHAT IS PRIVACY? ##### ##### INFORMATION PRIVACY - For all data gathered, there should be a stated purpose. - Information collected from a private can\'t be expose to other organizations or individuals unless clearly authorized by law or...

Chapter 6 -- Privacy ==================== ###### WHAT IS PRIVACY? ##### ##### INFORMATION PRIVACY - For all data gathered, there should be a stated purpose. - Information collected from a private can\'t be expose to other organizations or individuals unless clearly authorized by law or by consent of the individual. - Records kept on an individual should be authentic and up to date. - There should be instrument for individuals to review data about them, to check accuracy. This may include periodic reporting. - Data should be removed when it\'s not needed for the stated purpose. - Transmission of private information to determine where \"equivalent\" personal data protection can\'t be confirmed is prohibited. - Some data is just too sensitive to be collected, unless there are severe circumstances (e.g., sexual orientation, religion). ###### What is Privacy Protection? ###### Advantages of Privacy Protection - ###### Protect Your Personal Data - ###### Stop Unwanted Solicitations - ###### Protect Your Email Address ###### Disadvantages to Privacy Protection - ###### Privacy-Focused Products Cost Money - ###### Is it Really Private? - ###### Your Information Might Still Be Public - ###### Your Reputation May Be In Question ##### PHILIPPINES -- THE DATA PRIVACY ACT OR RA NO. 10173 ###### What acts are covered by the DPA? - If the person, either an individual or an institution, involved in the processing of personal data is in the Philippines; - The act or practice involves personal data of a Philippine citizen or Philippine resident; - The processing of personal data is done in the Philippines; or - The act, practice or processing of personal data is done by an entity with links to the Philippines, subject to international law and comity. ###### Who implements the DPA? - *Rulemaking.* - *Advisory.* The NPC is the advisory body on matters related to personal data protection. - *Public education.* The NPC shall launch initiatives to educate the public about data privacy, data protection and fair information rights and responsibilities. - **Compliance and monitoring.** The body has compliance and monitoring functions to ensure personal information controllers comply with the law. It is also tasked to manage the registration of personal data processing systems. - ###### Complaints and investigations. - ###### Enforcement. ###### How to comply with the Data Privacy Act? ###### LEARNING CONTENTS (Key Privacy and Anonymity Issues) PRIVACY AND ANONYMITY ISSUES ###### Data Breaches ###### Electronic Discovery - Evaluate large volumes of ESI instantly to perform early case assessments. - Simplify and assign data collection from across all relevant data sources in various data formats. - Choose large amounts of ESI to lessen the include documents that need to processed and reviewed. - Identify all participants in an investigation to figure out who knew what and when. ###### Consumer Profiling ###### Workplace Monitoring ###### Advanced Surveillance Technology - ###### Camera Surveillance - ###### Vehicle Event Data Recorders - ###### Stalking Apps Chapter 7 - Freedom of Expression ================================= ###### ###### What is freedom of expression? ###### Limitations of Freedom of Expression ###### Defamation 1. There must be an imputation of a crime, or of a vice or defect, real or imaginary, or any act, omission, condition, status, or circumstance. 2. The imputation must be made publicly. 3. It must be malicious. 4. The imputation must be directed at a natural or juridical person, or one who is dead. Here the identity of the offended party must be clearly identified. 5. The imputation must tend to cause the dishonor, discredit, or contempt of the person defamed. 6. It must be in writing (for cyber libel; writing must be done through a computer system or any other similar means which may be devised in the future). 1. Libel -- defamatory statement made in writing, printed words, or images. Libel is "a public and malicious imputation of a crime, or of a vice or defect, real or imaginary, or any act, omission, condition, status, or circumstance tending to cause the dishonor, discredit, or contempt of a natural or juridical person, or to blacken the memory of one who is dead," based on Article 353 of the Philippine Revised Penal Code. ###### Note: How do we differentiate libel and cyber-libel? 2. Slander -- defamatory statement that is spoken, oral defamation. In *De Leon v. People*, slander is "libel committed by oral (spoken) means, instead of in writing. It is defined as \"the speaking of base and defamatory words which tend to prejudice another in his reputation, office, trade, business or means of livelihood.\"" ###### Obscene Speech ###### Hate Speech ###### LEARNING CONTENT (Key Issues on Freedom of Expression) ###### Controlling Access to Information on the Internet ###### Anonymity on the Internet ###### Hate Speech Chapter 8 -- Social Networking ============================== ----------------------- -- -- ![](media/image6.png) ----------------------- -- -- ###### LEARNING CONTENTS (Uses of Social Networking Sites) ###### Social Network Advertising - **Direct Adve**rtising. Placing banner ads on a social networking site is an example of direct advertising. An ad can be shown to every visitor to the website, or it can be aimed toward those members who are most likely to be interested in the product based on information in user profiles. - **Advertising Using an Individual's Network of Friends.** Companies can use social networking sites to advertise to any individual's network of contacts. - **Indirect Advertising Through Groups**. Innovative businesses are also using a marketing technique by forming groups on social networking Web sites that interested users can join by becoming \"fans,\" and these groups can quickly grow in terms of fan count to become a marketing tool for a company looking to market contests, promote new products, or simply increase brand awareness. - **Company-Owned Social Networking Web Site.** Companies can form their own social networking sites. As an example, Dell created IdeaStorm, a social networking sites for their customers and users, in February 2007. This is used for its millions of customers to talk about the company's new products, and the developments they want to see. - **Viral Marketing.** Viral marketing encourages individuals to spread a marketing message to others, potentially increasing the message\'s visibility and effect exponentially when one person informs two people, each of those two people tells two or three more people, and so on. A viral marketing campaign\'s purpose is to create a buzz about a product or idea that spreads quickly and widely. ###### The Use of Social Networks in the Hiring Process ###### Social Shopping Web Sites ###### LEARNING CONTENTS (Social Networking Ethical Issues) ###### Cyberbullying - Cyberbullying is defined as the harassment, torment, humiliation, or threatening of one minor by another minor or group of minors using the internet. - Cyberbullying can be difficult to identify and stop since it can take many forms. Minors should notify their parents if they become a victim of cyberbullying, but this does not happen very often. ###### Cyberstalking - Cyberstalking is defined as threatening behavior or unwanted advances directed at an adult via the Internet or other kinds of online and electronic communication; it is the adult equivalent of cyberbullying. **Encounters with Sexual Predators** - Some social networking Web sites have been criticized for not doing enough to protect minors from encounters with sexual predators. - MySpace spent two years purging potential problem members from its site, including 90,000 registered sex offenders banned from the site in early 2009. ###### Uploading of Inappropriate Material - Most social networking platforms prohibit the sharing of videos portraying violence or obscenity. The majority of other social networking websites have terms of service agreements, privacy policies, or a content code of conduct that describe essential legal aspects of the website\'s use. 1. ###### Massively Online Role-Playing Games (MORPG) - One type of online virtual world, a massively multiplayer online game (MMOG), is a multiplayer video game capable of supporting hundreds and even thousands of concurrent players. - The games are accessible via the Internet, with players using personal computers, game consoles, and even smartphones. Massive multiplayer online role-playing games (MMORPG) is a subcategory of MMOG that provides a huge online world in which players take on the role of a character and control that character's action. Characters can interact with one another to compete in online games and challenges that unfold according to the online world's rules and storyline. - Avatars use the virtual world's currency to purchase goods and services in the virtual world. The value of objects in a virtual world is usually related to their usefulness and the difficulty of obtaining them. - Avatars can also earn virtual world money by performing tasks in the virtual world, or their owners can purchase virtual world money for them using real world cash. 2. ###### Multiplayer Online Battle Arena (MOBA) - This is a subgenre of strategy video games where two teams of players compete on a predefined battlefield. Each player controls a single character with a set of unique abilities that level up during the course of a game and contributes to the team\'s overall strategy. - MOBA is a genre of electronic games that mixes elements of action, strategy and RPG (Role *Playing Game). The* acronym MOBA comes from the English" Multiplayer *Online Battle Arena*" in which players divide into teams and play matches that last on average between 30 minutes to 1 hour. - Despite having some similarities, the MOBA genre should not be confused with *massive multiplayer online* (MMO), in which thousands of players interact simultaneously in an open online world, controlling a single character during an indeterminate campaign. - MOBA games have become extremely popular all over the world and are already trading millions of dollars a year in the *eSports* industry. MOBA game competitions have the highest awards in the industry and have even distributed nearly \$ 25 million in a single Dota 2 championship in 2017. ###### Crime in Virtual Worlds ###### Educational and Business Uses of Virtual Worlds Chapter 9 --The Impact of IT on Productivity and Quality of Life ================================================================ ###### IT Investment and Productivity ###### The Digital Divide ###### High-low Internet penetration by country within region -- -- -- -- -- -- -- -- -- -- ###### How Philippines catch up? ###### Government Initiatives and Programs to enhance the ICT Literacy of the Citizens ###### e-Filipino ###### National Connectivity ###### e-Government Harmonization ###### e- Civil Servants ###### ICT Enabled Startup ###### LEARNING CONTENTS (The Impact of IT on Different Aspects of Human Life) Healthcare Information Technology (HIT) The healthcare industry has seen a considerable transition as a result of information technology. Information technology is rapidly revolutionizing the healthcare business, from electronically checking in patients and updating their medical records to digitally transmitting blood test results to patients. - Helps in delivering more accurate, actionable, and accessible information related to a patient's health that can be customized to meet the individual's needs. - Allows better and faster decisions related to health risks that affect an individual as well as the public. - Supports communication between patients and healthcare professionals and helps in decision-making. - Helps build networks of social support for both patients as well as healthcare professionals. - Improves awareness among patients as well as the general public about health-related matters that can lead to positive outcomes. ###### Impacts of ICT on Mobility ###### Transport substitution ###### Navigation and tracking ###### Mobility as service markets ###### Transport asset management ###### Impact of Information Technology on Education ###### Changes to learning ###### Changes to teaching ###### Information Technology and the purpose of education ###### Information Technology and the potential of education ###### Changing the educational institution ###### Impact of Information Technology on Business ###### Automation of Business Processes. ###### Remote Work. ###### Protecting Information. ###### Providing Customer Satisfaction. ###### Management of Resources ###### Open-Source Software

Use Quizgecko on...
Browser
Browser