UNIT 3: IT Laws, Data Control, and Privacy Flashcards

1
Q

______ refers to the methods and policies that regulate who has access to data, how it is used, and how it is shared. This control is essential to protect sensitive information from unauthorized access and misuse.

A

Information control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Challenges of Information Control:

A

Data Misuse
Censorship
Surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Challenges of Information Control:

______: This occurs when data is accessed or used without proper authorization, often leading to financial loss, identity theft, or reputational damage.
For instance, unauthorized employees accessing sensitive customer information can lead to breaches.

A

Data Misuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Challenges of Information Control:

______: This is a form of information control where authorities limit or eliminate access to specific information. This can happen through various means, such as blocking websites, censoring media content, or restricting publications.

A

Censorship

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Challenges of Information Control:

______ refers to the monitoring of individuals’ online activities by governments, corporations, or other entities. This practice is often justified for purposes such as national security or enhancing services, but it raises significant ethical and privacy concerns.

A

Surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3 Types of Data Misuse:

A

Commingling
Personal Benefit
Ambiguity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

3 Types of Data Misuse:

______ happens when data collected for one purpose is used for something else without permission.

A

Commingling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

3 Types of Data Misuse:

Data misuse for ______ happens when someone with access to personal data uses it for their own advantage.

A

personal benefit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3 Types of Data Misuse:

______ happens when organizations are unclear about how they collect and use your data. They might not clearly explain what they do with the data, making it hard for you to understand their actual practices.

A

Ambiguity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Government or institutions might impose censorship to:
• ______: Prevent criticism of their policies or actions.
• ______: Influence or manipulate how people think about certain issues or events.
• ______: Protect sensitive information that could threaten security if disclosed.

A

Suppress Dissent
Control Public Opinion
Maintain National Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

______ is the right of individuals to control the collection, use, and dissemination of their personal information. It is a fundamental human right, particularly in the digital age, where vast amounts of personal data are collected and stored.

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Key Issues of Privacy:

A

Data Breaches
Consent
Transparency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Key Issues of Privacy:

A ______ is when unauthorized people gain access to sensitive, private, or confidential information, like passwords, credit card numbers, or personal details, without permission.

A

data breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Key Issues of Privacy:

______ means that individuals should clearly understand and agree to how their data will be used. However, many consent forms are complicated, and sometimes people are automatically opted in without realizing it. This makes it hard for people to truly understand or control what happens to their data.

A

Informed consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Key Issues of Privacy:

Organizations must be ______ about their data collection practices, including how data is stored, shared, and used. Transparency helps build trust and ensures that individuals understand how their
information is being managed.

A

transparent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

______ refers to creations of the mind, like inventions, artistic works, designs, symbols, names, and images used in commerce.

A

Intellectual property (IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

______: “idea, invention, or process that derives from the work of the mind or intellect.”

A

Intellectual Property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

______ are the exclusive rights which are legally granted to authors of intangible assets, such as artistic works and inventions.
The application of this rights takes such forms as copyrights, patents and trademarks, as well as industrial design rights.

A

Intellectual Property rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

______ (______): It provides comprehensive protection for intellectual property (IP) rights, covering copyrights, patents, trademarks, and trade secrets. This law is crucial in fostering innovation and creativity, as it ensures that creators can benefit from their work.

A

Intellectual Property Code of the Philippines, Republic Act No. 8293

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Key Provisions of Intellectual Property Code of the Philippines:

A
  1. Copyright Protection
  2. Patent Rights
  3. Trademark Protection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Key Provisions of Intellectual Property Code of the Philippines:

______ laws grant creators exclusive rights to their original works, such as books, music, films, and software. These rights allow creators to control how their works are used and distributed, thereby protecting their economic interests.

A

Copyright

22
Q

Key Provisions of Intellectual Property Code of the Philippines:

______ are legal protections for new inventions. When someone invents something new, like a unique gadget or a new type of medicine, a ______ gives them the exclusive right to use, sell, and license that invention for a certain number of years.

A

Patents, patent

23
Q

Key Provisions of Intellectual Property Code of the Philippines:

______ protect brand names, logos, and other symbols that distinguish goods and services. This protection helps businesses build brand identity and prevents consumer confusion.

A

Trademarks

24
Q

Violations of intellectual property rights can result in severe penalties, including fines and imprisonment.
For example, copyright infringement can lead to fines of up to PHP ______ and imprisonment for up to ______ years. The severity of the penalty depends on the nature and extent of the infringement.

A

500,000, six

25
Q

______ (______): the primary law governing data protection in the Philippines.
It aims to protect personal data in both public and private sectors and to ensure that the rights of data subjects are respected.

A

Data Privacy Act of 2012, Republic Act No. 10173

26
Q

Key Provisions of Data Privacy Act of 2012:

A
  1. Consent Requirement
  2. Rights of Data Subjects
  3. Data Breach Notification
27
Q

Violations of the Data Privacy Act can result in severe penalties, including fines ranging from PHP ______ to PHP ______, and imprisonment for up to ______ years.
Specific violations include unauthorized processing, accessing personal data due to negligence, improper disposal of personal data, and malicious disclosure of sensitive information.

A

500,000, 5,000,000, six

28
Q

______ (______): A law in the Philippines approved on September 12, 2012 which aims to address legal issues concerning online interactions and internet.

A

Cybercrime Prevention Act of 2012, Republic Act No. 10175

29
Q

Common Forms of Cybercrimes:

A

Copyright
Plagiarism
Computer Addiction

30
Q

Common Forms of Cybercrimes:

______: The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.

A

Copyright

31
Q

Common Forms of Cybercrimes:

______: An act or instance of using or closely imitating the language and thoughts of another author without authorization.

A

Plagiarism

32
Q

Common Forms of Cybercrimes:

Computer Addiction
• ______: generally used when speaking about excessive gaming behavior, which can be practiced both offline and online.

A

Offline

33
Q

Common Forms of Cybercrimes:

Computer Addiction
• ______: Also known as “Internet Addiction”, gets more attention in general from scientific research than offline computer addiction, mainly because most cases of computer addiction are related to the excessive use of the Internet.

A

Online

34
Q

______ -The persona you create about yourself virtually.

A

Virtual Self

35
Q

Criminal Activities:

A

Hacking
Electronic Theft
Cybersex
Child Pornography
Cyber Defamation

36
Q

Criminal Activities:

______
• Unauthorized access of or interference with computer systems, servers, or other information and communication systems.

A

Hacking

37
Q

Criminal Activities:

______
• Unauthorized access to corrupt, alter, steal, or destroy electronic data using computers or other information and communication systems without the computer or system owner’s knowledge and consent.

A

Hacking

38
Q

Criminal Activities:

______
• Illegal Downloading

A

Electronic Theft

39
Q

Criminal Activities:

______
• Obtaining files that you do not have the right to use from the internet.

A

Electronic Theft

40
Q

Criminal Activities:

______
• Practice of illegally copying and selling digital music, video, computer software, etc.

A

Electronic Theft

41
Q

Criminal Activities:

______
• Penalty of Php 50,000 - 500, 000

A

Electronic Theft

42
Q

Criminal Activities:

______
• is when people use computers or the internet to participate in or share sexual content. This could be through videos, live chats, or images.

A

Cybersex

43
Q

Criminal Activities:

______
• Penalty at least Php 200,000

A

Cybersex

44
Q

Criminal Activities:

______
• is when images or videos that show sexual abuse or exploitation of children are made, shared, or viewed.

A

Child Pornography

45
Q

Criminal Activities:

______
• Penalty of 12-20 years of imprisonment

A

Child Pornography

46
Q

Criminal Activities:

______
• Is an unprivileged false statement of fact which tends to harm the reputation of a
person or company.

A

Cyber Defamation

47
Q

Criminal Activities:

______
• Penalty of 6-12 years of imprisonment

A

Cyber Defamation

48
Q

Common Ethical Issues:

A

Privacy Invasion
Intellectual Property Infringement
Digital Divide
Artificial Intelligence/ Automation

49
Q

Common Ethical Issues:

______ happens when personal information is accessed or used without permission. This can occur through hacking, phishing scams, or even through data collection practices that aren’t clear about how the information will be used.

A

Privacy invasion

50
Q

Common Ethical Issues:

______ happens when people copy and share things like music, movies, or software without permission. In the digital age, it’s easy to do this, which can hurt creators by taking away their earnings.

A

Intellectual property infringement

51
Q

Common Ethical Issues:

The ______ refers to the gap between those who have access to modern information and communication technology (ICT) and those who do not.
This divide can lead to social inequality, as access to technology is increasingly linked to economic opportunities and quality of life.

A

digital divide

52
Q

Common Ethical Issues:

The rise of ______ has raised ethical concerns about job displacement,
decision-making, and accountability.
For instance, AI systems used in hiring or law enforcement can perpetuate biases if not carefully designed and monitored.

A

artificial intelligence (AI) and automation