Living In The IT Era Midterm Coverage (ELEC111 PDF)

Summary

This document provides an overview of internet and world wide web. It discusses the types of information, telecommunication companies, and the internet's history.

Full Transcript

LIVING IN THE IT ERA (ELEC111) MIDTERM COVERAGE WEEK 7 – INTERNET AND WORLD WIDE WEB INTERNET - it defines as a worldwide network connecting to a million of computers via dedicated routes and servers. when computers are connected to the internet, end-users...

LIVING IN THE IT ERA (ELEC111) MIDTERM COVERAGE WEEK 7 – INTERNET AND WORLD WIDE WEB INTERNET - it defines as a worldwide network connecting to a million of computers via dedicated routes and servers. when computers are connected to the internet, end-users can could start sending and receiving deferent types of information Types of Information via: e-mails text videos conferencing computer program among others TELECOMMUNICATIONS Telephone companies that function as internet service providers: PLDT INC. [Philippine Long Distance Telephone Company] - the largest network company Smart Communication Inc. and Digitel Mobile Philippines, Inc. (known as Sun Cellular) – collaborating with PLDT Globe Telecom has acquired Bayan Telecommunication (BayanTel or Bayan) Companies use high-speed fiber-optic cables to transmit data 1960 the internet was started from the Advanced Research Projects Agency’s Wide Area Network (ARPANET). established by the U.S. Department of Defense so that the military’s research unit could collaborate or partner with business and government laboratory ARPANET attained the name of “Internet” World Wide Web (WWW) / Web Hypertext-based technology It has provided the channels for displaying text, graphics, animations, etc. enabling easy search and offering navigation tools Internet2 It is a not-profit networking consortium founded in 1996 by 34 universities research institution in the U.S. It provides a collaborative environment where U.S. research and education organization work together and develop advance technologies and innovative solution Manages the Internet2 Network Maintains a secure network testing and research environment Began operating the Internet2 DCN Internet2 Network - a next-generation optical and internet protocol network that is capable of delivering enhanced network services and is better, faster, and more efficient than the typical internet or broadband connections PREGINET (Philippine Research, Education and Government Information Network) TEIN (Trans-Eurasia Information) DOST-ASTI (Department of Science and Technology-Advanced Science and Technology Institute Internet Today: Still Growing Nowadays the internet connects thousands of networks and billions of users and subscribers around the world. The number of users as of January 2018 is 4.021 billion. Internet: Jobs to move, transfer, or assign a computerized information from one place to another Data - information can be in the form of text documents, images, audio, video, and software programs How Data Travels the Internet Data and information are transferred around the world through wired or wireless transmission media. Data is transferred from one network to another until it reaches its final destination. Much of internet runs on the ordinary public telephone. TWO (2) Modes of Data Transmission 1. Circuit Switching method of linking telephones together allowing the circuit to remain open as long as the two friends are over the telephone is a common communication network scheme used for telephone calls Pros: It offers a dedicated transmission channel that is reserved until is disconnected. Cons: Dedicated channels can cause delays because a channel is unavailable until one side disconnects. - It uses a dedicated physical link between the sending and receiving devices. Key Features: It offers the capability of storing messages temporarily to reduce network congestion. 2. Packet Switching method of linking telephones together allowing the circuit to remain open as long as the two friends are over the telephone is a common communication network scheme used for telephone calls Pros: Packets can be routed around network congestion. - It makes efficient use of network bandwidth. Cons: It can get lost while taking alternative routes to the destination. - Messages are divided into packets that contain source and destination information. Key Features: The two types of packet switching are datagram and virtual circuit. 1. Datagram packets – independently sent and can take different paths throughout the network. 2. Virtual circuit – uses a logical connection between the source and the destination device. Computers Do on the Internet SERVERS - computers work like electronic filing cabinets that store information and send it when clients request. - a computer that is designed to process any requests for data and delivers data to other client computers over a local network - computer with a special software CLIENTS - computer that gets information from a server AD DS (Active Directory Domain Services) – a computer that holds the user accounts, computer accounts, organizational units, application services DNS (Domain Name System) - machine that helps Dynamic Host Configuration Protocol (DHCP) server - a server that configures IPv4 and IPv6 addresses FILE SERVER - machine that holds and manages documents WEB SERVER II – machine that holds users mail services and web services PRINT SERVER – a device that connects printers to client computers through the internet - it accepts print jobs from the computers, queues these jobs, and sends them to the appropriate printers ROUTER – the internet is made up of a hardware device designed to receive, analyze, and send incoming packets to another network - it can be compared to a simple mailbox placed at the corner of a street and which represents a single point of entry to the worldwide network World Wide Web (WWW) - the collection of public websites that are connected to the internet worldwide, together with client computers - considered to be one of the applications in the internet and computer networks THREE (3) FUNDAMENTAL TECHNOLOGIES 1. HTML 2. HTTP 3. WEB SERVERS and WEB BROWSERS Hypertext Markup Language (HTML) - a standard markup language used for creating web pages - classified as the set of markup symbols or codes appended in a file intended for presentation on a WWW browser page Hypertext Transfer Protocol (HTTP) - classified as the set of standards allowing users of the WWW to interchange information seen on the web pages - PORT 80 – standard port for HTTP connections - directs to hypertext document accessible through the internet Web Servers and Web Browsers - a software application for recovering, presenting, and navigating information resources on the WWW Uniform Resource Locator (URLs) - sorted as the internet address - address and to the electronic locality of a specific web site - standard used to identity web resources Protocol - identifies the means of access Server- contains the domain name of the Web server Path - identifies the location of the document Resource - specifies the filename of the resource INFORMATION, CONTROL AND PRIVACY (PART 1) INTRODUCTION TO RESOURCES Organizations treat company assets, such as buildings, equipment, and their manpower as important resources. Resources are the total means available to a company for increasing production or profit, including land, labor, capital, and raw materials. Without resources, organizations would cease to exist. Imagine a bank without money, a manufacturing plant without forklifts, or a school without teachers. These resources are known as physical resources. They are tangible and can be easily identified. Physical resources usually start from acquisition and are then assembled to be available for use when needed. Very often, the assembly process entails converting an essentially raw material into a refined form, such as wood, cement, and steel for building construction. Once these resources have been assembled, A manager strives to maximize their use; this includes allocating space for office use and identifying key areas in the building plans. Finally, the manager asks for replacement or repairs and maintenance of these resources at a critical time before they inefficient or obsolete. Conceptual resources are non-tangible and are considered valuable for what they represent rather than their physical make- up. Money is considered a conceptual resource as each paper bill represents a specific monetary value as opposed to the paper where it is printed. Managers use conceptual resources to manage physical resources or vice versa. One such example is the use of computers in organizations. A computer unit, by itself, may cost thousands of pesos. However, once used, the content saved in those computer units become even more valuable resources, making the computer unit irreplaceable. The integrity of the saved files may be compromised, so security checks are often identified on the computer units-e.g., firewalls, anti-virus, biometric access, etc. INFORMATION AS A RESOURCE Information can be simply defined as "facts about something or someone that are provided or learned," Facts are considered relevant truths which have been validated and identified. Data are considered facts; therefore, processed data are considered as information as they are organized in such a way that they have additional value beyond the value of the facts themselves. Unlike other organizational resources, information is considered: ✓ Expandable - Information can be expanded without compromising its integrity. In fact, by having additional information, much more can be understood from it. An example is a person's personal information. While knowing his or her name, contact details and current work may be useful, having the person's full curriculum vitae becomes more useful for those in, for example, the HR Department. ✓ Compressible - Although expanded information can give a more detailed explanation, it may not always be needed. An example of this is in news sites. Instead of a barrage of details, news sites would often give one-liner headlines that provide enough information about the news. Another example is research abstracts. An abstract is normally a half- or a one-page summary of the entire research. ✓ Transportable - Information, especially digital information, is easily transportable. With the use of the internet and various technologies, information can be sent though any of the following: send via email share via Facebook copy onto a flash drive upload on YouTube ✓ Diffusive - Gossip or rumors tend to spread easily. Unfortunately, the same applies to any kind of information-be it true or not. ✓ Sharable - Since information can be easily spread, it is considered sharable as well. Information can be kept calling it a secret. However, once a person decides to tell it to someone, then he or she will no longer have control over it. In some cases, certain parts of the secret can be kept. One such example is the secret recipe of KFC. It is known that there are 11 secret herbs and spices, but as to what these herbs and spices are, people can only guess. VALUABLE INFORMATION ▪ Accurate - Accurate information is error-free. In some cases, inaccurate information is generated because inaccurate data was processed. Analysts call this as "garbage-in-garbage- out." By typing "parts of a computer" in the search bar, Google gives you a list of several websites which contain the information you are looking for. ▪ Complete - Complete information contains all the important facts. This is especially important in the field of medicine. Missing information could spell disaster, or worse, lead to death. If the information regarding allergies has been left out, doctors might inadvertently give wrong medication that could cause severe allergic reactions to the patient. ▪ Reliable - Reliable information can be depended on. In many cases, the reliability of information depends on the validity of the data collection method. In other cases, reliability depends on the source of information, which brings us back to valuable information being economical. ▪ Torrent sites offer pirated software, music, and movies for free. However, the resolution of the movie downloaded, for example, might not be clear and might even contain malware and virus that could infect the computer system. ▪ Flexible - Flexible information can be used for different purposes. Depending on the situation, personal information can be used for a variety of ways. A school ID can be used to enter the school premises. The same ID can be used to transact business with the registrar's office during enrolment. It can be used to open a bank account or to apply for a student driver's permit. ▪ Relevant - Relevant information is important to the decision-maker. For example, your assignment calls for searching "parts of a computer" online. You do not visit sites that tackle "parts of the human body" because they are irrelevant to your research topic. ▪ Simple - Information should also be simple, not overly complex. Sophisticated and detailed information may not be needed. Complex information may sometimes lead to confusion which could result in inaccuracy of details. ▪ Timely - Timely information is delivered when it is needed. This is true in the case of weather predictions, stock market forecasts, and traffic management. ▪ Verifiable - This means that information can be checked for correctness and authenticity. Most authors include references, bibliography, or citations in their works to enable readers to verify the content. ▪ Accessible - Information should be easily accessible by authorized users to be obtained in the right format at the right time to meet their needs. In Korea, the U.S., the U.K., and China, a mobile phone can be used to pay for day-to-day transactions. A mobile pay app can be downloaded on the smartphone in which the user's credit card or debit card is enrolled. ▪ Samsung Pay, Apple Pay, and Google Pay all use near-field communications (NFC) technology so instead of swiping the physical card for payment, the mobile phone is simply tapped on the card reader or terminal and payment is immediately recorded ▪ Secure - Information should be secure from access by unauthorized users. Mobile pay systems such as Samsung Pay and Apple Pay use biometric authentication, typically a fingerprint scan, before a transaction is made. This ensures that only the owner of the phone can use the app for payments. VALUE OF INFORMATION ▪ Information is considered valuable mainly for business purposes as businesses depend on it to produce quality products and services. This helps organizations become globally competitive and be up to date with the latest trends and technology. ▪ With businesses gearing towards IT automation, the strategy now is to come up with business activities that shorten time frames while increasing productivity. All of this is possible if companies have access to valuable information. ▪ Information, as a resource, has four characteristics, namely it (1) has zero marginal cost; (2) is non- rivalrous; (3) is non-exclusive; and (4) does not exhibit high degrees of transparency ▪ Zero-marginal cost The cost of producing the first copy of an information good may be substantial, but the cost of producing (or reproducing) additional copies is negligible. Avengers: Age of Ultron released in 2015 is one of the most expensive Hollywood movies ever made with an estimated budget of US$250,000,000. However, buying a DVD copy of the said movie today would cost about $20 in Amazon.com. ▪ Non-rivalrous Simultaneous consumption of information by consumers is possible. Movies nowadays are sold not only as DVD copies. There are also digital formats which anyone can watch online or download on their mobile devices, either as a rental or paid subscription. ▪ Non-exclusive Exclusion is not a natural property of information goods, though it is possible to construct exclusion artificially. However, the nature of information is that if it is known, it is difficult to exclude others from its use. Through emails and SMS, one can identify only intended recipients of the message through a specific email address or a phone number. However, emails and SMS have the capability of forwarding the exact information to other recipients, without the original sender knowing it. This is much more evident in social media such as Facebook, in which a "share" automatically means sending to everyone else. ▪ No transparency To evaluate the information, the information must be known, so one has to invest in learning how to evaluate it. A programmer undergoing boot camp training to learn a new programming language needs to invest time, money, and effort. The more complicated the training, the more expensive the cost and the longer the time needed to learn it. INFORMATION ECONOMICS ▪ Since people have widely different values for a particular piece of information, value-based pricing leads naturally to differential pricing. In economics, a good is considered to be an experience good if consumers must experience it to value it. Virtually any new product is an experience good, and marketers have developed strategies such as free samples, promotional pricing, and testimonials to help consumers learn about new goods. ▪ The tension between giving away your information to let people know what you have to offer-and charging them for it to recover your costs, is a fundamental problem in the information economy. These strategies include browsing previews, branding, and reputation. ▪ Browsing previews An example of this strategy is movie trailers. Movie trailers that normally run from 1 to 3 minutes give viewers a glimpse of what the film is all about. Trailers normally include highlights from the film which can leave the audience excited to watch the entire film later on. Another example is music downloaded from iTunes. A 5- to 15-second preview of the song can be listened to prior to buying it. This gives the user an idea of the song he or she wants to download if it is worth the amount to be paid. ▪ Branding Big names such as Microsoft and Apple have no issues when it comes to launching new products as people have already established their trust on these brands. According to American telecommunications (telco) company, Sprint, when Apple introduced iPhone 7 in September 2016, pre-order sales shot up by 375% compared to the launch of iPhone 6. ▪ Reputation When a movie is announced, people would often be skeptical if it would be good enough. However, the reputation of directors and the cast of actors and actresses normally remove this skepticism. For example, Michael Bay is known for successfully directing the Transformers movie franchise. This reputation has made his movies blockbuster hits as people have made a connection that if it is a Michael Bay film, it must be good. INFORMATION OVERLOAD ▪ Information is now available so quickly, ubiquitously, and inexpensively. ▪ Cisco conducted a study that by the end of 2016, global internet traffic will have reached 1.1 zettabytes per year. ▪ In 2019, global traffic is expected to hit 2 zettabytes per year ▪ 1 zettabytes = 1,000,000,000 terabytes Reasons why information is produced at rapid-increasing rate ▪ Easy duplication and transmission of info A picture posted on Facebook which is also posted on Instagram and Twitter means that the same picture has been posted on 3 different sites Ex: If you post a picture on Facebook, you can also share it on Instagram and Twitter. This means that one picture becomes available across three different platforms, so the same information spreads quickly to multiple sites. Another example is viral videos that get shared repeatedly across various social media platforms. ▪ Increase in communication methods Smartphones can do what mobile phone for SMS and computers for emails can also do. Through Mobile apps such as Viber and Messenger, people can now send private messages (PM) or direct messages (DM) Ex: In the past, we only had SMS on mobile phones and email on computers. Now, on smartphones, you can send PMs (Private Messages) or DMs (Direct Messages) through mobile apps like Messenger and Viber. For example, if you want to chat with a friend, you don’t need multiple devices—you can text, call, video call, and chat all on one device: your smartphone. ▪ Growth archives of historical information Print or hardcopies are now being replaced by digital ones. The digital copies are stored on cloud servers that offer maximum storage capacity to end users. Ex: In libraries, you’ll no longer just see physical books; there are also computers and mobile devices for accessing e-books, e-journals, and other online resources. For students, this means they no longer have to visit a library in person, they can access the materials they need online. 2018 Global Digital Suite of reports from We are Social and Hootsuite This data highlights that a significant portion of the world is online and engaged with social media, especially through mobile devices. Digital reach continues to expand across various aspects of life. MOBILE SOCIAL MEDIA AND MOBILE COMMERCE The abundance of mobile devices has greatly changed the way people manage their day-to-day activities -From brick-and mortal setup to online operation -Uses of computers and smartphones to access information Examples: 1. Online Shopping- Instead of going to the mall, you can now shop using apps like Shopee or Lazada, just a click, and your order gets delivered. 2. Food Delivery Apps - No need to cook or go out; with GrabFood or Foodpanda, you can order food and have it delivered right to your doorstep. 3. Social media for Small Businesses - Sellers post their products on Facebook or Instagram and take orders through Messenger, making it easier for them to reach customers. 4. Online Banking and E-Wallets - Using GCash or Maya, you can send money, pay bills, and buy load from anywhere, no need to go to the bank. MOBILE SOCIAL MEDIA -is accessing social media sites, such as Facebook and Snapchat, using mobile device. -A study conducted by ComScore in 2016 shows that nearly 80% of individual browse their social media accounts using their mobile phones. -Mobile has grown so fast that it is now the leading digital platforms, with a total activity of 62% of digital media time spent. Examples: 1. Social media Browsing During Commutes - People check social media on their mobile phones while commuting to stay updated. 2. Posting Travel Stories and Updates- Travelers share their experiences instantly by posting stories and updates on social media. 3. Product Search on social media - Users browse and shop for products on platforms like Instagram directly from their mobile devices. 4. Instant News and Updates- Important news, like weather alerts, is quickly accessible on social media through mobile. 5. Online Selling and Buying - Sellers use mobile social media platforms like Facebook Marketplace to promote and sell products. M-COMMERCE -A.K.A Mobile Commerce -Term used during 1997 Global Mobile Commerce Forum by Kebin Duffey -He described it as the delivery of e-commerce capabilities directly into the consumer’s hand, anywhere, via wireless technology. -Companies are now using digital platforms to market their products and services -Industries that are now embracing m-commerce include: Examples: 1. Financial Services - People use mobile banking apps like GCash or PayMaya for money transfers, bill payments, and mobile reloading without visiting the bank. 2. Mobile Ticketing - Apps like Ticket2Me and Klook allow users to purchase tickets for events or transportation online and use a QR code for entry. 3. Service/Retail - Retail apps such as Zalora and Lazada let customers browse and buy products, like clothing and gadgets, with access to promotions and discounts through mobile notifications. 4. Information Services - News apps like ABS-CBN News and Rappler provide real-time news and weather updates, allowing users to access information anytime, anywhere. INFORMATION CONTROL -is about allowing those who have appropriate authority access to and use of information on the basis of the authority that they hold. Copyright - is a set of exclusive rights granted by the state to the creator of an original work. Intellectual Property Rights (IPR) - refers to the legal rights given to the inventor or creator to protect his invention or creation for a certain period of time Software Piracy - is the unauthorized copying and distribution of copyrighted software... can be done through copying, downloading, sharing, selling, or installing multiple copies of software onto personal or work computers. (The Software Alliance, 2018) Examples: 1. Illegal Downloading - Downloading cracked or pirated software without a license. 2. File Sharing - Sharing software on peer-to-peer networks, violating copyright laws. 3. Multiple Installations - Installing a single licensed software on multiple computers without the correct licenses. 4. Buying from Unauthorized Sellers - Purchasing software at a low price from unauthorized sellers, often pirated copies. FOUR ISSUES WHICH FURTHER COMPLICATE THE PROBLEM OF I.C. Convergence Technological advancements and social media have paved the way for media content such as music and movies to be distributed from their “traditional” distribution platforms What consumers used to buy on CDs or DVDs, media content can now be searched, accessed, and consumed using multiple devices and even through different distribution networks. Example: Instead of buying CDs or DVDs, people can now stream music and movies on platforms like Spotify and Netflix. Scale BEFORE: Subtitles from the movies and TV Series are translated in over days and weeks. These are going to be translated, edited, and embedded by the fans. TODAY: With the use of technology, viewers will no longer wait for a long time. Often, subtitles are now available within an hour of the Movie or the TV Series being aired because the internet has given everyone access to anything. Example: ubtitles for shows are now available almost immediately after airing, unlike before when fans took days or weeks to create them. Unprecedented individual empowerment The popularity of social media has made it possible for individuals to post anything they want. This also includes the creation of blogs which have become the mainstream media for individuals to showcase their talents, skills, and hobbies. This creates issues when it comes to content restrictions as most people are doing this using their private accounts. Unless reported, the said content will be difficult to control. Example: People can freely post content on social media, such as reviews and tutorials, which can be challenging to regulate. Intellectual Property refers to a number of distinct types of intangible assets for which a set of exclusive rights are recognized. Example: Artists have rights over their creations, like music labels protecting songs from illegal downloads. INTELLECTUAL PROPERTY RIGHTS (IPR) CONSISTS OF THE FOLLOWING: Copyright and related rights (Example: A songwriter has rights to all copies and sales of their new song. Downloading it without permission violates copyright. Trademarks and service marks (Example: McDonald’s "Golden Arches" logo is a trademark. If another restaurant uses a similar logo, McDonald’s can sue for trademark infringement.) Geographic indications (Example: Only sparkling wine from the Champagne region in France can be called "Champagne." Using this term elsewhere is an IPR violation.) Industrial design (Example: The unique shape of an iPhone is protected. Another company cannot make a phone with the same design.) Patents (Example: Pharmaceutical companies hold patents for new drugs, protecting them from competitors making identical drugs without permission.) Layouts designs (topography) of Integrated Circuits (ICs) (Example: A company’s design for a computer chip layout is protected from being copied by competitors.) Protection of undisclosed information (Example: Coca-Cola’s recipe is a trade secret, safeguarded so other companies can’t replicate its unique formula.) DIGITAL RIGHTS MANAGEMENT DRM is used to describe the process by which the author or publisher of a work exerts his or her rights to control what the purchaser of the work is entitled to do. This includes the prevention on copying, printing, editing, or otherwise making privileged information available to other people. Examples: 1. E-book - Text from an e-book cannot be copied and pasted into a document. 2. Streaming Services - Shows on Netflix cannot be downloaded for offline viewing without an internet connection. 3. Software - License keys are required to activate software and cannot be shared with others. TECHNIQUES TO CONTROL ACCESS AND REPRODUCTION OF ONLINE INFORMATION Encryption is the process of converting data or informational such a way that only authorized parties can understand. Its primary purpose is to protect the confidentiality of digital data stored in a computer system or transmitted via internet or other computer networks. Examples: 1. Online Banking - Encrypts information for money transactions. 2. Messaging Apps - Uses encryption for messages, as seen in apps like WhatsApp and Signal. 3. Email Services - Encrypts emails to maintain the privacy of their contents. 4. File Storage - Cloud storage services, such as Google Drive, encrypt files for security. Serial Keys A.K.A. Product Key or Software key. It is a series of alphanumeric characters acting as a key to denote that the product or software is original. Online Activation helps maintain software authenticity by making sure no one else has the same product key. Examples: 1. Microsoft Office - Requires a unique serial key for activation to access all features. 2. Games - New game purchases come with a product key to verify legitimacy and prevent piracy. 3. Antivirus Software - A serial key is necessary to ensure the antivirus is legitimate and to receive updates. Scrambling Data Scrambling is done to hide sensitive information from unauthorized users. Scrambling is accomplished by the additional components to the original signal or changing of some important components of the original signal to make the extraction of the original signal difficult. Examples: 1. Encryption - Scrambling passwords to prevent unauthorized access. 2. PIN Obfuscation - Masking the PIN when typing at ATMs. 3. Secure Messaging - Using encrypted messages in chat apps like Signal or WhatsApp. Tag embedding Similar to how pictures can include watermarks to denote the information on the owner of the picture, tag embedding does the same to the information content Metadate is included to identify the owner’s name, author, and date of purchase, among other pertinent information. Examples: 1. Ebooks - Embedded with the buyer's name to identify ownership. 2. Music files - Contains the artist's name and album information, along with the buyer's details for tracking purposes. 3. Online photos - Includes the photographer's information to prevent unauthorized use by others. PATENTS AND TRADEMARKS Patent - is a set of exclusive rights granted by a state to an inventor for a limited period of time in exchange for public disclosure of an invention. Example: A new drug for COVID-19 Trademark - is a distinctive sign used by an individual, business organization, or other legal entity to identify the products or services to consumers. Example: The Nike logo PROTECTION OF UNDISCLOSED INFORMATION Trade Secrets - is the term used for any methods, formula, device, process, or any information that gives business a unique competitive advantage over its competition. Example: The Coca-Cola recipe is a trade secret that they do not share. Non-Disclosure Agreement (NDA) - Contract to be signed by a company’s employees. Example: Google employees sign an NDA to keep the company’s new projects confidential from the public. OATH’S PRIVACY POLICY Cookie - is a small file that is stored in the computer’s directory, often a temporary folder. -this contains addresses of websites visited, login credentials, and even credit card numbers. Examples: 1. Auto-login - When you open Facebook, you are already logged in because of cookies. 2. Ad tracking - After searching for shoes online, you immediately see ads for shoes on other websites. 3. Saved items - On shopping sites, the items you placed in your cart are remembered even if you haven't checked out yet. DATA PRIVACY ACT 10173 The Law defines sensitive personal information as being: about an individual’s race, ethnic origin, marital status, age, color, and religious, philosophical, or political affiliations individual’s health, education, genetic or sexual life, or to any proceeding or any offense committed or alleged to have committed. issued by government agencies “peculiar” (unique) to an individual, such as social security number marked as classified by an Executive Order or an act of Congress Examples: 1. Race and Ethnic Origin - "Filipino" – Used in census data to understand the country’s demographics. 2. Health-"HIV Status" – Required in hospitals but not to be shared publicly. 3. Marital Status - "Single" or "Married" – Collected in job application forms. 4. Government-Issued ID - "SSS Number" – Used for benefits but should not be shared with others. 5. Genetic Information - "Family history of illness" – Helpful for health screenings but sensitive. 6. Political Affiliation - "Member of a political party" – Important information that should be kept private. These examples illustrate the need to protect such information from misuse or abuse. All proceedings of sensitive and personal information is prohibited except in the circumstances. The exceptions are: consent of the data subject pursuant to law that does not require consent necessity to protect the life and health of a person necessity for medical treatment necessity to protect the lawful rights of data subjects in court proceedings, legal proceedings, or regulation Examples: 1. Consent of the data subject - Signing up for an app and allowing them to use your data. 2. Pursuant to law that does not require consent - Reporting business income to the tax authority. 3. Necessity to protect the life and health of a person - Sharing medical history in an emergency room for treatment. 4. Necessity for medical treatment - Providing previous health records to a new doctor for accurate treatment. 5. Necessity to protect the lawful rights of data subjects in court proceedings - Providing CCTV footage as evidence in a court case. Security Incident - is an event or occurrence that affects or tends to affect data protection, or may compromise availability, integrity, or confidentiality. This definition includes incidents that would result in a data breach, if not for safeguards that have been put in place. Examples: Phishing attack: Emails that collect information improperly. Malware infection: Software that can damage or leak data. Personal Data Breach -is a subset of a security breach that actually leads to “accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored, or otherwise processed.” Examples: - Hacking of a bank's database: Personal details of account holders are compromised. - Unauthorized access to patient records: Health data accessed without permission.

Use Quizgecko on...
Browser
Browser