SOCI TECHNOLOGIES’ IMPACT ON PRIVACY Flashcards
Technology’s Biggest Improvement/Impact on Our Lives
- Increase their productivity
- Improve their physical and mental
health - Facilitate the way they connect
with people that they work with
The survey also revealed some of the
concerns held by youth around the
increasingly digital world. Among their top
three concerns are:
- Security and privacy (28%)
- Relationships becoming too
impersonal (25%) - Potential loss of jobs (19%)
The state or condition of being free from
being observed or disturbed by other
people
Privacy
The expectation of privacy does
not disappear just because someone is
famous
TRUE
An aspect of data protection that
addresses the proper storage, access,
retention, immutability and security of
sensitive data
Data Privacy
Under Section 11 of the data privacy law,
personal information must, be:
a. Collected for specified and
legitimate purposes
b. Processed fairly and lawfully
c. Accurate, relevant and, where
necessary for purposes
d. Adequate and not excessive
e. Retained only for as long as
necessary
“To protect the fundamental human right
to privacy of communication while
ensuring free flow of information to
promote innovation and growth [and] the
[State’s] inherent obligation to ensure that
personal information in information and
communications systems in government
and in the private sector are secured and
protected”
Data Privacy Act of 2012/Republic Act No. 10173 in 2012
A subset of data privacy and a
fundamental human right. It refers to the personal privacy that you’re entitled to when you display, store, or provide information regarding yourself on the Internet
Internet Privacy
When you visit a website or app, data is
collected from your device and web
browser and used to tailor your experience
or collect information on how and what
you browse
Website Tracking
most common
online tracking technologies and how they
track behavior online
● IP tracking
● Cookies
Some governments spy on their citizens
online to supposedly assist law
enforcement agencies
Surveillance
act of stealing digital
information stored on computers,
servers, or electronic devices to obtain
confidential information or compromise
privacy
Data Theft
occurs when sensitive data is
accidentally exposed, either on the
internet or through lost hard drives or
devices.
Data Leak
occur as a result of a
intentional cyber attack or hacker attack,
an inside job by individuals currently or
previously employed by an organization, or
unintentional loss or exposure of data
Data Breach
Hackers trade your personal information
and financial data that they stole from
your computer or a third-party computer
that stored your data
Trading
How to Protect Oneself Online
- Create Strong Passwords
- Never Use the Same Password on Multiple
Accounts - Lock Your Device
- Always Log Out of Browsers or Use
Incognito When Browsing - Make Sure that the Website You’re Visiting
is Secured - Do Not Log In Your Personal Accounts on
Free or Public Wi-Fi - Install an Anti-Malware and Update It
Frequently - Don’t click on pop-ups or virus warnings
(adware and scareware) - Install an Ad-blocker to lessen pop-ups
- Check if your accounts had been
compromised - Clean up your Facebook Third-Party Apps
- Clean up your Facebook Groups
- Set up your Facebook Privacy Settings
- Unfriend Facebook friends that you don’t
know personally - Check and clean up your Spam folder
- Be wary of Phishing emails
- Unsubscribe from unwanted newsletters
- Keep your software up-to-date
- Store personal and financial documents
securely
also known as the
Filipino Identification System Act
House Bill No. 5060
seeks to establish a single
reference card that will be considered as
valid identification for transactions with
both government and private offices
The bill
government can track
every transaction made using the PhilID.
TRUE
exposed the personal
data of about 55 million voters in 2016
COMELEak
The SIM Registration Act, officially
designated as__ and
commonly referred to as the SIM card law,
is a Philippine law mandating the
registration of SIM cards before
activation.
Republic Act No. 11934
“a law
which hears before it condemns”
due process of law
Sec. 1. It shall be unlawful for any person,
not being authorized by all the parties to
any private communication or spoken
word, to tap any wire or cable
RA 4200 Anti-Wiretapping Act