data privacy act Flashcards

1
Q

examples of breaches

A
  1. COMELeak
  2. Log-in procedure
  3. List of top students/passers
  4. Unsecure storage of patient
    records
  5. Online Lending
  6. Raffle
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Impact of a Problematic Data Action
on Business

A

• Loss of reputation
• Loss of market share
• Legal liabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A n individual w h o s e P E R S O N A L
INFORMATION, SENSITIVE PERSONAL
INFORMATION, or PRIVILEGED
INFORMATION is being p r o c e s s e d

A

Data subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Any o p e r a t i o n of a n y s e t of o p e r a t i o n s p e r f o r m e d
upon personal data including, but not limited to, the collection, recording, organization, storage,updating or modification, retrieval, consultation, use, consolidation, blocking, erasure or destruction o f d a t a .

A

Processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

R e f e r s t o a n a t u r a l or juridical
person, or a n y o t h e r b o d y w h o
controls t h e p r o c e s s i n g of
personal data, or instructs
a n o t h e r t o p r o c e s s p e r s o n a l d a t a
o n its behalf.

A

personal information control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Refers to a n y natural o r juridical
p e r s o n or any other b o d y to
w h o m a personal information
c o n t r o l l e r m a y o u t s o u r c e o r
instruct the processing of
p e r s o n a l d a t a pertaining t o a
d a t a subject.

it should not make use of personal
data for its own purpose.

A

P e r s o n a l i n f o r m a t i o n p r o c e s s o r

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Any information from which the
identity of a n individual is a p p a r e n t
Any information that can be put
together with other information to
reasonably a n d directly identify a n
i n d i v i d u a l

A

personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

• refers to a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or
access to, personal data transmitted, stored, or otherwise processed.

A

Data Breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An act protecting
individual personal information in information and communications systems in the
government and the private sector, creating for this purpose a National Privacy Commission, and for other purposes

A

Data privacy act of 2012

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

rights of data subject

A
  1. Right to INFORMATION
  2. Right to OBJECT
  3. Right to ACCESS
  4. Right to CORRECT
  5. Right to ERASE
  6. Right to DAMAGES
  7. Right to DATA PORTABILITY
  8. Right to FILE A COMPLAINT
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data privacy principle

A

TRANSPARENCY
LEGITIMATE PURPOSE
PROPORTIONALITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A data subject must be aware of the nature, purpose, and extent of the processing of his or her personal data, including the risks and safeguards involved, the identity of personal information controller, his or her rights as a data subject, and how these can be exercised.
Any information and communication relating to the processing of personal data should be easy to access and understand, using clear and plain language.

A

principle of transparency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The processing of information shall be compatible with a declared and specified purpose, which must not be contrary to law, morals, or public policy.

A

principle of legitimate purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The processing of information shall be adequate, relevant, suitable, necessary, and not excessive in relation to a declared and specified purpose.
Personal data shall be processed only if the purpose of the processing could not reasonably be fulfilled by other means.

A

principle of proportionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

resulting from loss, accidental or unlawful destruction of personal data;

A

availability breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

resulting from an alteration of personal data

A

integrity breach

17
Q

resulting from the unauthorized disclosure of or access to personal data.

A

confidentiality breach

18
Q

functions of data privacy act

A

• Rule Making
• Advisory
• Public Education
• Compliance & monitoring
• Complaints & investigation
• Enforcement

19
Q

5 pillars of compliance

A

Commit to Comply:

Know Your Risks:

Be Accountable:

Demonstrate Your Compliance:

Be Prepared for Breach: