Privacy, Cybercrime, and Surveillance Review PDF

Summary

This document reviews privacy, cybercrime, and surveillance, including definitions, legal frameworks, and advanced surveillance technologies. It covers data subject rights, data mining, and cybercrime law. It is a study of topics relating to privacy and data.

Full Transcript

Reviewer: Privacy, Cybercrime, and Surveillance =============================================== Privacy and Anonymity --------------------- ### Privacy Defined as freedom from surveillance and control over personal information. ### Anonymity The ability to act without revealing one\'s identity....

Reviewer: Privacy, Cybercrime, and Surveillance =============================================== Privacy and Anonymity --------------------- ### Privacy Defined as freedom from surveillance and control over personal information. ### Anonymity The ability to act without revealing one\'s identity. Notification Timeline and Obligations ------------------------------------- ### Obligation Data controllers must notify the National Privacy Commission and affected individuals within 72 hours of detecting a personal data breach. Data Subjects\' Rights ---------------------- ### Notice Right to be informed about data collection. ### Choice Right to consent to data processing. ### Access Right to access personal data. ### Accuracy & Integrity Right to ensure data accuracy. ### Right to Erasure Request removal of personal data (with proof). ### Right to Action Seek damages for misuse of data. ### Right to Data Portability Transfer personal data to another entity. Cybercrime ---------- ### Definition Encompasses illegal activities such as cybersex, child pornography, identity theft, and unsolicited electronic communication. ### Cybercrime Law (R.A. 10175) Signed into law: September 12, 2012.Penalties: Fine of ₱1M--₱6M and imprisonment of 1--6 years. Data Privacy Act (R.A. 10173) ----------------------------- ### Purpose Protects digital personal data in both private and public sectors. ### Timeline Signed into law: August 15, 2012.Implementing Rules: Effective September 9, 2016. ### Penalties Fine of ₱100K--₱5M and imprisonment of 3--6 years. ### Key Provisions Establishes the National Privacy Commission.Balances innovation with privacy protection. Advanced Surveillance Technology -------------------------------- ### Surveillance Definition Monitoring of individuals or groups. ### Types Computer Surveillance: Tracks web traffic and communications (e.g., Carnivore, ECHELON).Telephone Surveillance: Tapping calls and real-time tracking.CCTV & Cameras: Observes public and private spaces.Social Network Analysis: Examines connections on platforms like Facebook.Biometric Surveillance: Tracks physical/behavioral patterns (e.g., fingerprints).Aerial Surveillance: Uses drones/aircraft for wide-area monitoring.Other Techniques: Includes RFID tags, GPS tracking, and satellite imagery. ### Ethical Oversight Reviewed by Ethics Committees to address privacy concerns. Data Profiling -------------- ### Definition Collecting and analyzing personal data to create detailed profiles of individuals or groups, revealing behavior patterns. ### Key Concepts Electronic Records: Economic and social activities create an \'electronic trail\' for tracking and analysis.Business Applications: Uses data from purchases, surveys, and public records for targeted marketing and CRM. Workplace Monitoring -------------------- ### Overview Employee Monitoring: Tracks activities like calls, emails, internet use, and surveillance. ### Technologies Used Digital footprints, behavior modeling, and tracking software. ### Legal Aspects Few laws regulate workplace privacy, and some employer policies may lack legal binding. ### Advantages Ensures workplace productivity.Protects confidential company data.Secures investments in equipment.Enhances business reputation.Assists in law enforcement investigations. ### Disadvantages May foster distrust and resentment among employees. Privacy Protection in the Philippines ------------------------------------- ### Legal Framework Processing private data requires transparency, legitimate purpose, and proportionality. ### Core Principles of Privacy Protection Notice/Awareness: Entities must inform individuals about data practices before collection.Choice/Consent: Individuals control their data, especially for secondary purposes like marketing. ### Data Controller Responsible for managing data. Data Mining and Profiling ------------------------- ### Data Mining Uses statistical techniques and algorithms to uncover patterns and relationships. ### Data Profiling Analyzes personal data to create detailed profiles and reveal behavior patterns. Mandatory Personal Information Breach Notification -------------------------------------------------- ### Definitions Security Incident: Events impacting data protection.Personal Data Breach: Unauthorized destruction, loss, alteration, or disclosure of data. Privacy Protection and the Law ------------------------------ ### The Right to Privacy \"The right to be left alone\" (Hill, n.d.).\"The right to control the collection and use of personal information\" (Solesi, n.d.). ### Legal Protections Against unreasonable intrusion into personal space.Against unauthorized use of personal information.Against false representations in public. Structure of the Data Privacy Act --------------------------------- - Sections 1-6: Definitions and General Provisions. - Sections 7-10: The National Privacy Commission. - Sections 11-21: Rights of Data Subjects and Obligations of Controllers/Processors. - Sections 22-24: Provisions Specific to Government. - Sections 25-37: Penalties.

Use Quizgecko on...
Browser
Browser