Week 11-12 Unit 6 - Information and Control and Privacy
Week 11-12 Unit 6 - Information and Control and Privacy
ERA
A period that has a particular quality or character. We are living in an era in which technology is
developing very rapidly.....
Prepared by
Prof. SIDNEY BUENAVENTURA
Prof. RENZ BALDERAMA
Prof. KT. V. FORTUNY
Prof. ROBINSON E. JOAQUIN
Prof. ANN CAMILLE M. MAUPAY
Prof. MARK ANTHONY S. MERCADO
Prof. CHARITO M. MOLINA
Prof. ANTWAUN SISON
Prof. SHERLY DELA MERCED
Prof. SHE PAMINTUAN
UNIT VI: Information and Control
and Privacy
Introduction/Overview
Week 11 to Week 12 Unit VI: Information and Control and Privacy will give an overview about control and privacy,
Define the different characteristics of information, Discuss why information security and privacy a contemporary
issue and Explain what is privacy and the data privacy and protection regulation.
Learning Goals/objectives
•
Understand the characteristics of information in terms of Availability, Accuracy, Authenticity, Confidentiality, Integrity,
Utility and Possession. ;
•
Explain why information security and privacy a contemporary issue in terms if Fraud, Hoaxes, Identity Theft, System
Hacking, Disclosure and Privacy Breach;
over its entire lifecycle. Data must not be changed in transit, and steps must be taken
to ensure data cannot be altered by unauthorized people (for example, in a breach of
confidentiality).
These measures include file permissions and user access controls. Version control
Possession means to hold occupancy with or without rights
of ownership. This exactly describes possession in the psych
ic sense. It is the possession of the physical body with—
though frequently without—the permission of the owner.
Why is information security and
privacy a contemporary issue?
Fraud
Fraud is commonly understood as dishonesty calculated for advantage. A person who
is dishonest may be called a fraud.
Fraud is most common in the buying or selling of property, including real estate,
Personal Property, and intangible property, such as stocks, bonds, and copyrights.
Fraud must be proved by showing that the defendant's actions involved five separate
elements:
(1) a false statement of a material fact,
(2) knowledge on the part of the defendant that the statement is untrue,
(3) intent on the part of the defendant to deceive the alleged victim,
(4) justifiable reliance by the alleged victim on the statement, and
(5) injury to the alleged victim as a result.
Hoaxes
KEY TAKEAWAYS
There are various forms of identity theft, but the most common is
financial.
Disclosure of information is
any release of information from one party to another. Usually it refers to
release of management information relevant to
COLLECTIVE BARGAINING
and potentially useful to trade union negotiators.
Privacy Breach
intentionally or accidentally:
information.
their personal information due to, for example, their account being
hacked.
What is Privacy?
Privacy
The rules that protect privacy give us the ability to assert our rights
The Data Privacy Act is broadly applicable to individuals and legal entities that
process personal information, with some exceptions. The law has extraterritorial
application, applying not only to businesses with offices in the Philippines, but when
equipment based in the Philippines is used for processing. The act further applies to
the processing of the personal information of Philippines citizens regardless of
where they reside.
One exception in the act provides that the law does not apply to the processing of
personal information in the Philippines that was lawfully collected from residents of
foreign jurisdictions — an exception helpful for Philippines companies that offer
cloud services.
Approach
The act states that the collection of personal data “must be a declared, specified, and
legitimate purpose” and further provides that consent is required prior to the
collection of all personal data. It requires that when obtaining consent, the data
subject be informed about the extent and purpose of processing, and it specifically
mentions the “automated processing of his or her personal data for profiling, or
processing for direct marketing, and data sharing.” Consent is further required for
sharing information with affiliates or even mother companies.
Consent must be “freely given, specific, informed,” and the definition further requires
that consent to collection and processing be evidenced by recorded means.
However, processing does not always require consent.
Consent is not required for processing where the data subject is party to a
Careful consideration about which data are collected and how they are stored and shared.
Collecting data should be responsible enough to be transparent in how they collect and use personal data.
Security measures and policies that protect and uphold an individual's dignity and privacy should be in place and made known to the
individual.
Data privacy, also called information privacy, is the aspect of information technology (IT) that deals with the ability an organization or
individual has to determine what data in a computer system can be shared with third parties.
https://www.privacy.gov.ph/30-ways/