Privacy, Cybercrime, and Surveillance Review PDF
Document Details
Uploaded by StupendousDryad
Holy Cross of Davao College
Tags
Related
- digital society : privacy on the internet and cybercrimes PDF
- Digital Society: Online Privacy and Cybercrimes PDF
- Digital Society: Privacy Online and Cybercrime (PDF)
- Ethical & Legal Issues in ICT PDF
- Digital Security, Ethics, and Privacy: Avoiding and Recognizing Threats PDF
- Cybersecurity Part 1 PDF
Summary
This document reviews privacy, cybercrime, and surveillance, including definitions, legal frameworks, and advanced surveillance technologies. It covers data subject rights, data mining, and cybercrime law. It is a study of topics relating to privacy and data.
Full Transcript
Reviewer: Privacy, Cybercrime, and Surveillance =============================================== Privacy and Anonymity --------------------- ### Privacy Defined as freedom from surveillance and control over personal information. ### Anonymity The ability to act without revealing one\'s identity....
Reviewer: Privacy, Cybercrime, and Surveillance =============================================== Privacy and Anonymity --------------------- ### Privacy Defined as freedom from surveillance and control over personal information. ### Anonymity The ability to act without revealing one\'s identity. Notification Timeline and Obligations ------------------------------------- ### Obligation Data controllers must notify the National Privacy Commission and affected individuals within 72 hours of detecting a personal data breach. Data Subjects\' Rights ---------------------- ### Notice Right to be informed about data collection. ### Choice Right to consent to data processing. ### Access Right to access personal data. ### Accuracy & Integrity Right to ensure data accuracy. ### Right to Erasure Request removal of personal data (with proof). ### Right to Action Seek damages for misuse of data. ### Right to Data Portability Transfer personal data to another entity. Cybercrime ---------- ### Definition Encompasses illegal activities such as cybersex, child pornography, identity theft, and unsolicited electronic communication. ### Cybercrime Law (R.A. 10175) Signed into law: September 12, 2012.Penalties: Fine of ₱1M--₱6M and imprisonment of 1--6 years. Data Privacy Act (R.A. 10173) ----------------------------- ### Purpose Protects digital personal data in both private and public sectors. ### Timeline Signed into law: August 15, 2012.Implementing Rules: Effective September 9, 2016. ### Penalties Fine of ₱100K--₱5M and imprisonment of 3--6 years. ### Key Provisions Establishes the National Privacy Commission.Balances innovation with privacy protection. Advanced Surveillance Technology -------------------------------- ### Surveillance Definition Monitoring of individuals or groups. ### Types Computer Surveillance: Tracks web traffic and communications (e.g., Carnivore, ECHELON).Telephone Surveillance: Tapping calls and real-time tracking.CCTV & Cameras: Observes public and private spaces.Social Network Analysis: Examines connections on platforms like Facebook.Biometric Surveillance: Tracks physical/behavioral patterns (e.g., fingerprints).Aerial Surveillance: Uses drones/aircraft for wide-area monitoring.Other Techniques: Includes RFID tags, GPS tracking, and satellite imagery. ### Ethical Oversight Reviewed by Ethics Committees to address privacy concerns. Data Profiling -------------- ### Definition Collecting and analyzing personal data to create detailed profiles of individuals or groups, revealing behavior patterns. ### Key Concepts Electronic Records: Economic and social activities create an \'electronic trail\' for tracking and analysis.Business Applications: Uses data from purchases, surveys, and public records for targeted marketing and CRM. Workplace Monitoring -------------------- ### Overview Employee Monitoring: Tracks activities like calls, emails, internet use, and surveillance. ### Technologies Used Digital footprints, behavior modeling, and tracking software. ### Legal Aspects Few laws regulate workplace privacy, and some employer policies may lack legal binding. ### Advantages Ensures workplace productivity.Protects confidential company data.Secures investments in equipment.Enhances business reputation.Assists in law enforcement investigations. ### Disadvantages May foster distrust and resentment among employees. Privacy Protection in the Philippines ------------------------------------- ### Legal Framework Processing private data requires transparency, legitimate purpose, and proportionality. ### Core Principles of Privacy Protection Notice/Awareness: Entities must inform individuals about data practices before collection.Choice/Consent: Individuals control their data, especially for secondary purposes like marketing. ### Data Controller Responsible for managing data. Data Mining and Profiling ------------------------- ### Data Mining Uses statistical techniques and algorithms to uncover patterns and relationships. ### Data Profiling Analyzes personal data to create detailed profiles and reveal behavior patterns. Mandatory Personal Information Breach Notification -------------------------------------------------- ### Definitions Security Incident: Events impacting data protection.Personal Data Breach: Unauthorized destruction, loss, alteration, or disclosure of data. Privacy Protection and the Law ------------------------------ ### The Right to Privacy \"The right to be left alone\" (Hill, n.d.).\"The right to control the collection and use of personal information\" (Solesi, n.d.). ### Legal Protections Against unreasonable intrusion into personal space.Against unauthorized use of personal information.Against false representations in public. Structure of the Data Privacy Act --------------------------------- - Sections 1-6: Definitions and General Provisions. - Sections 7-10: The National Privacy Commission. - Sections 11-21: Rights of Data Subjects and Obligations of Controllers/Processors. - Sections 22-24: Provisions Specific to Government. - Sections 25-37: Penalties.