UNIT 3: IT Laws, Data Control, and Privacy Flashcards
______ refers to the methods and policies that regulate who has access to data, how it is used, and how it is shared. This control is essential to protect sensitive information from unauthorized access and misuse.
Information control
Challenges of Information Control:
Data Misuse
Censorship
Surveillance
Challenges of Information Control:
______: This occurs when data is accessed or used without proper authorization, often leading to financial loss, identity theft, or reputational damage.
For instance, unauthorized employees accessing sensitive customer information can lead to breaches.
Data Misuse
Challenges of Information Control:
______: This is a form of information control where authorities limit or eliminate access to specific information. This can happen through various means, such as blocking websites, censoring media content, or restricting publications.
Censorship
Challenges of Information Control:
______ refers to the monitoring of individuals’ online activities by governments, corporations, or other entities. This practice is often justified for purposes such as national security or enhancing services, but it raises significant ethical and privacy concerns.
Surveillance
3 Types of Data Misuse:
Commingling
Personal Benefit
Ambiguity
3 Types of Data Misuse:
______ happens when data collected for one purpose is used for something else without permission.
Commingling
3 Types of Data Misuse:
Data misuse for ______ happens when someone with access to personal data uses it for their own advantage.
personal benefit
3 Types of Data Misuse:
______ happens when organizations are unclear about how they collect and use your data. They might not clearly explain what they do with the data, making it hard for you to understand their actual practices.
Ambiguity
Government or institutions might impose censorship to:
• ______: Prevent criticism of their policies or actions.
• ______: Influence or manipulate how people think about certain issues or events.
• ______: Protect sensitive information that could threaten security if disclosed.
Suppress Dissent
Control Public Opinion
Maintain National Security
______ is the right of individuals to control the collection, use, and dissemination of their personal information. It is a fundamental human right, particularly in the digital age, where vast amounts of personal data are collected and stored.
Privacy
Key Issues of Privacy:
Data Breaches
Consent
Transparency
Key Issues of Privacy:
A ______ is when unauthorized people gain access to sensitive, private, or confidential information, like passwords, credit card numbers, or personal details, without permission.
data breach
Key Issues of Privacy:
______ means that individuals should clearly understand and agree to how their data will be used. However, many consent forms are complicated, and sometimes people are automatically opted in without realizing it. This makes it hard for people to truly understand or control what happens to their data.
Informed consent
Key Issues of Privacy:
Organizations must be ______ about their data collection practices, including how data is stored, shared, and used. Transparency helps build trust and ensures that individuals understand how their
information is being managed.
transparent
______ refers to creations of the mind, like inventions, artistic works, designs, symbols, names, and images used in commerce.
Intellectual property (IP)
______: “idea, invention, or process that derives from the work of the mind or intellect.”
Intellectual Property
______ are the exclusive rights which are legally granted to authors of intangible assets, such as artistic works and inventions.
The application of this rights takes such forms as copyrights, patents and trademarks, as well as industrial design rights.
Intellectual Property rights
______ (______): It provides comprehensive protection for intellectual property (IP) rights, covering copyrights, patents, trademarks, and trade secrets. This law is crucial in fostering innovation and creativity, as it ensures that creators can benefit from their work.
Intellectual Property Code of the Philippines, Republic Act No. 8293
Key Provisions of Intellectual Property Code of the Philippines:
- Copyright Protection
- Patent Rights
- Trademark Protection
Key Provisions of Intellectual Property Code of the Philippines:
______ laws grant creators exclusive rights to their original works, such as books, music, films, and software. These rights allow creators to control how their works are used and distributed, thereby protecting their economic interests.
Copyright
Key Provisions of Intellectual Property Code of the Philippines:
______ are legal protections for new inventions. When someone invents something new, like a unique gadget or a new type of medicine, a ______ gives them the exclusive right to use, sell, and license that invention for a certain number of years.
Patents, patent
Key Provisions of Intellectual Property Code of the Philippines:
______ protect brand names, logos, and other symbols that distinguish goods and services. This protection helps businesses build brand identity and prevents consumer confusion.
Trademarks
Violations of intellectual property rights can result in severe penalties, including fines and imprisonment.
For example, copyright infringement can lead to fines of up to PHP ______ and imprisonment for up to ______ years. The severity of the penalty depends on the nature and extent of the infringement.
500,000, six
______ (______): the primary law governing data protection in the Philippines.
It aims to protect personal data in both public and private sectors and to ensure that the rights of data subjects are respected.
Data Privacy Act of 2012, Republic Act No. 10173
Key Provisions of Data Privacy Act of 2012:
- Consent Requirement
- Rights of Data Subjects
- Data Breach Notification
Violations of the Data Privacy Act can result in severe penalties, including fines ranging from PHP ______ to PHP ______, and imprisonment for up to ______ years.
Specific violations include unauthorized processing, accessing personal data due to negligence, improper disposal of personal data, and malicious disclosure of sensitive information.
500,000, 5,000,000, six
______ (______): A law in the Philippines approved on September 12, 2012 which aims to address legal issues concerning online interactions and internet.
Cybercrime Prevention Act of 2012, Republic Act No. 10175
Common Forms of Cybercrimes:
Copyright
Plagiarism
Computer Addiction
Common Forms of Cybercrimes:
______: The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
Copyright
Common Forms of Cybercrimes:
______: An act or instance of using or closely imitating the language and thoughts of another author without authorization.
Plagiarism
Common Forms of Cybercrimes:
Computer Addiction
• ______: generally used when speaking about excessive gaming behavior, which can be practiced both offline and online.
Offline
Common Forms of Cybercrimes:
Computer Addiction
• ______: Also known as “Internet Addiction”, gets more attention in general from scientific research than offline computer addiction, mainly because most cases of computer addiction are related to the excessive use of the Internet.
Online
______ -The persona you create about yourself virtually.
Virtual Self
Criminal Activities:
Hacking
Electronic Theft
Cybersex
Child Pornography
Cyber Defamation
Criminal Activities:
______
• Unauthorized access of or interference with computer systems, servers, or other information and communication systems.
Hacking
Criminal Activities:
______
• Unauthorized access to corrupt, alter, steal, or destroy electronic data using computers or other information and communication systems without the computer or system owner’s knowledge and consent.
Hacking
Criminal Activities:
______
• Illegal Downloading
Electronic Theft
Criminal Activities:
______
• Obtaining files that you do not have the right to use from the internet.
Electronic Theft
Criminal Activities:
______
• Practice of illegally copying and selling digital music, video, computer software, etc.
Electronic Theft
Criminal Activities:
______
• Penalty of Php 50,000 - 500, 000
Electronic Theft
Criminal Activities:
______
• is when people use computers or the internet to participate in or share sexual content. This could be through videos, live chats, or images.
Cybersex
Criminal Activities:
______
• Penalty at least Php 200,000
Cybersex
Criminal Activities:
______
• is when images or videos that show sexual abuse or exploitation of children are made, shared, or viewed.
Child Pornography
Criminal Activities:
______
• Penalty of 12-20 years of imprisonment
Child Pornography
Criminal Activities:
______
• Is an unprivileged false statement of fact which tends to harm the reputation of a
person or company.
Cyber Defamation
Criminal Activities:
______
• Penalty of 6-12 years of imprisonment
Cyber Defamation
Common Ethical Issues:
Privacy Invasion
Intellectual Property Infringement
Digital Divide
Artificial Intelligence/ Automation
Common Ethical Issues:
______ happens when personal information is accessed or used without permission. This can occur through hacking, phishing scams, or even through data collection practices that aren’t clear about how the information will be used.
Privacy invasion
Common Ethical Issues:
______ happens when people copy and share things like music, movies, or software without permission. In the digital age, it’s easy to do this, which can hurt creators by taking away their earnings.
Intellectual property infringement
Common Ethical Issues:
The ______ refers to the gap between those who have access to modern information and communication technology (ICT) and those who do not.
This divide can lead to social inequality, as access to technology is increasingly linked to economic opportunities and quality of life.
digital divide
Common Ethical Issues:
The rise of ______ has raised ethical concerns about job displacement,
decision-making, and accountability.
For instance, AI systems used in hiring or law enforcement can perpetuate biases if not carefully designed and monitored.
artificial intelligence (AI) and automation