0% found this document useful (0 votes)
80 views

The Understanding and Perception of Data Privacy Act in Barangay Tagaran

The document is a chapter from a research paper on understanding and perceptions of the Data Privacy Act in Barangay Tagaran, Philippines. It provides background context on data privacy, including definitions of key terms like personal data. It also reviews related literature on data privacy from foreign and local sources. The literature discusses how data privacy is important to protect individuals' information and maintain trust, as well as ensuring privacy as technology becomes more advanced and data is more widely shared.

Uploaded by

Karl Butac
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
80 views

The Understanding and Perception of Data Privacy Act in Barangay Tagaran

The document is a chapter from a research paper on understanding and perceptions of the Data Privacy Act in Barangay Tagaran, Philippines. It provides background context on data privacy, including definitions of key terms like personal data. It also reviews related literature on data privacy from foreign and local sources. The literature discusses how data privacy is important to protect individuals' information and maintain trust, as well as ensuring privacy as technology becomes more advanced and data is more widely shared.

Uploaded by

Karl Butac
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Commission on Higher Education

Isabela State Univesity - Cauayan Campus


Cauayan City, Isabela

The Understanding and Perception of Data Privacy Act in Barangay Tagaran

In partial fulfillment in Purposive Communication for the First Semester for the School
Year 2019 to be submitted to Mr. Jeizen Mark Colcol.

RESEARCHER

GERICKSON ABAD

JOHNPAUL ACOBA

KARL BONHOEFFER BUTAC

JEFFERSON GALIZA

DYNO P LABBUANAN

GABRIEL PANGILINAN

A.Y 2019
CHAPTER 1

THE PROBLEM AND ITS BACKGROUND

This chapter presents the problem and the background of this research. It discusses the

statement of the problem, significance of the study, definition of terms and the scope and

delimitation of the research.

Introduction

According to RA 10173 “an act or law that seeks to protect all forms of information, be it

private, personal, or sensitive. It is meant to cover both natural and juridical persons involved in

the processing personal information.

The 21st century law to address 21st century crimes and concerns. It (1) protects the

privacy of individuals while ensuring free flow of information to promote innovation and

growth; (2) regulates the collection, recording, organization, storage, updating or modification,

retrieval, consultation, use, consolidation, blocking, erasure or destruction of personal data; and

(3) ensures that the Philippines complies with international standards set for data protection

through National Privacy Commission (NPC)

Data is one of the most important assets a company has. With the rise of the data

economy, companies find enormous value in collecting, sharing and using data. Companies such

as Google, Facebook, and Amazon have all built empires atop the data economy. Transparency

in how businesses request consent, abide by their privacy policies, and manage the data that

they’ve collected is vital to building trust and accountability with customers and partners who
expect privacy. Many companies have learned the importance of privacy the hard way, through

highly publicized privacy fails

Second, privacy is the right of an individual to be free from uninvited surveillance To

safely exist in one’s space and freely express one’s opinion behind closed doors is critical to

living in a democratic society.

“Privacy forms the basis of our freedom. You have to have moments of reserve,

reflection, intimacy, and solitude,” says Dr. Ann Cavoukian, former Information & Privacy

Commissioner of Ontario, Canada.

Dr. Cavoukian knows a thing or two about data privacy. She is best known for her

leadership in the development of Privacy by Design (PbD), and now it serves as a cornerstone

for the many data protection regulations including the most recent one that became law, the EU

General Data Protection Regulation.

Statement of the Problem

The researchers aimed is to know the understanding and perception about data

privacy act of Barangay Tagaran residents. Specially, it sought to answer the following sub

problems:

1. What are the demographics of the respondents in terms of:

1.1. Gender

1.2. Age

1.3. Socio economic class


2. What are their understanding and perception about data privacy act?

Significance of Study

This study aims to determine about The Understanding and Perception of Data Privacy

Act in Barangay Tagaran. The result will be useful for the resident in the said barangay to

understand the purpose of this study.

Definition of Terms

Barangay Officials- the beneficiary of this study are the barangay officials because it

can help them.to be associated with their people in helping them understanding data privacy act

and to make them motivate and inform about this matter.

Community- the study will benefit the barangay residents because it can help them to be

informed and better understand the significance of knowing what is data privacy act.

Future researchers- the study also benefit the future researchers because they will

continue to improve this study for better.

Scope and delimitation

The study is focused on The Understanding and Perception of Data Privacy Act in

Barangay Tagaran. Where the respondents are barangay official who authorize in the said
barangay. The purpose of the study is to inform and giving on what will be their right as a

person/human.

Chapter 2

Review of Related Literature

This chapter review about The Understanding and Perception of Data Privacy Act in

Barangay Tagaran. A review of this literature was made to provide a substantial background to

the research topic.

Foreign

Privacy, trust and security are closely intertwined, as are law and ethics. Privacy

preservation and security provisions rely on trust. Violation of privacy constitutes a risk, thus, a

threat to security. Law provides a resolution when ethics cannot. Privacy breaches disturb trust

and run the risk of diluting or losing security; it is a show of disrespect to the law and a violation

of ethical principles. Protecting data privacy is urgent and complex. This protection is necessary

because of the ubiquity of the technology-driven and information-intensive environment.

Technology-driven and information-intensive business operations are typical in contemporary

corporations. The benefits of this trend are that, among other things, the marketplace is more

transparent, consumers are better informed and trade practices are more fair. The downsides

include socio-techno risk, which originates with technology and human users such as identity

theft, information warfare, phishing scams, cyberterrorism, extortion. And also the creation of

more opportunities for organized and sophisticated cybercriminals to exploit. This risk results in

information protection being propelled to the top of the corporate management agenda.

(Lee,et.al., Isaca journal Volume 6, 2016)


Issues surrounding data protection and security exist everywhere and working in the

humanitarian sector is no exception. It can be easy to jump to technology as a solution, but data

protection is essentially a people issue. It involves the data of people, collected by people,

through processes managed by people. Personally Identifiable Information data about an

individual’s vulnerabilities, and sensitive data have been collected by the NGO community for

decades and often haven’t been properly stored and vigilantly shared. Now that an increasing

volume of data is being captured digitally, the risk of exposure is increasing exponentially.

(Kehl, et. Al., 2017)

Personal data is any information relating to you, whether it relates to your private,

professional, or public life. In the online environment, where vast amounts of personal data are

shared and transferred around the globe instantaneously, it is increasingly difficult for people to

maintain control of their personal information. This is where data protection comes in. Data

protection refers to the practices, safeguards, and binding rules put in place to protect your

personal information and ensure that you remain in control of it. In short, you should be able to

decide whether or not you want to share some information, who has access to it, for how long,

for what reason, and be able to modify some of this information, and more. Sharing data may

bring benefits, and it has often also become necessary for us to do everyday tasks and engage

with other people in today’s society. But it is not without risks. Your personal data reveals a lot

about you, your thoughts, and your life. These data can easily be exploited to harm you, and

that’s especially dangerous for vulnerable individuals and communities, such as journalists,

activists, human rights defenders, and members of oppressed and marginalized groups. That is

why these data must be strictly protected. (Masse, 2018)


The Data Privacy Act is the recognition that even as the law protects the right to privacy,

it also articulates that free flow of information should be ensured. It should never be considered

as catering primarily to interests of the business sector or government agencies because at its

core is the obligation to protect the data privacy rights of individuals whose personal data are

collected, used, stored, or otherwise processed. The right to privacy is at the crucible of the Bill

of Rights, supporting the right of persons to life, liberty and property, due process, the right of

the people to be secure in their persons, houses, papers, and effects and the right against self-

incrimination. Disregard for privacy can also be discriminating. Privacy shields people from the

awesome powers of the state, affords individuals the freedom to make decisions about

themselves, and guarantees that there will be accountability when the right is violated. To this

end, government, private sector and individuals should exert efforts towards protection of

personal data. zones of privacy should be zealously guarded. (Rellosa et. Al., 2016)

Local

Although over 100 countries have developed data privacy laws, there is a lack of expert

guidance on these laws. This text examines the fundamental aims and principles of data privacy

law, along with the mechanisms for its enforcement in an international context. The book

analyses relevant law from around the globe, paying particular attention to international

instruments and using these as a foundation for examining national law. It also places data

privacy law within a broader legal and political framework, focusing upon its interrelation with

related fields, such as human rights, administrative law, and intellectual property rights.
In the first quarter of 2012, the ASEAN region (Association of South East Asian Nations)

has become the most active region in the world for new privacy developments. None of the Bills

in Malaysia, the Philippines or Singapore is yet a law, but they all could be within 2012. They

have very different strengths and weaknesses in the protections they give to data subjects, and

present differing compliance challenges for businesses.

The Philippine Data Privacy Act (DPA) of 2012 was enacted to protect the personal

information of its citizens from being disclosed without its consent. The National Privacy

Commission (NPC) was established in 2015 to promote, regulate, and monitor data privacy

compliance of both Government and Private Institutions. This study sought to explore and

explain how and why do the Philippine Government agencies comply with the DPA 2012.

Additionally, it also tried to determine and understand the determinants of compliance as

perceived by the government agencies. The Commission on Higher Education (CHED) and the

Commission on Elections (COMELEC) were the focus of the interviews conducted by the

researchers. The NPC was also included in the study to determine the status of the government’s

compliance with the law. The study was a form of a qualitative case study following the context

of (R. K. Yin, Case Study Research (2014)) study of research designs and methods. The case

study is the recommended approach as the main question starts with how and why. As a result of

the study, it was found out that there are three factors that somehow influence government

agencies from hampering their compliance to the DPA 2012. These are (1) lack of awareness, (2)

budget, and (3) time constraints. With regards to the determinants of compliance, (1) deterrence,

and (2) legitimacy were the concluded causal factors on why they will comply with the DPA

2012. For future works, it is recommended that a follow-up study be conducted after the

compliance deadline.
… Singapore says it will introduce legislation in 2011; the Philippines and Thailand have

bills for comprehensive laws before their legislatures … India is the only Asian country which is

not an APEC member but does have a data privacy law (Macao SAR has such a law but is not a

Chapter 3

METHODOLOGY AND PROCEDURES

This chapter discusses the general methodology and procedures used in this research. It

describes the research design, the instruments used, the data collection used and the procedures

for data analysis.

Research Design

The study is a Qualitative research. According to several qualitative scholars (Creswell

2002; Pope & Mays 1995; Denzin & Lincoln, 1994) Qualitative Research is intended to deeply

explore, understand and interpret social phenomena within its natural setting. By using a

qualitative researcher methodology, researchers want to collect richer information and get more

detailed picture of issues, cases or events (Arora and Stoner 2009). They want to explore the why

and how of a situation, not only what, where, when.

This type of research is the appropriate method to use in this study.

Respondents
The respondents of this research are the resident of Barangay tagaran Cauayan

City Isabela .There are limited respondents of barangay tagaran Cauayan city that will answer

the checklist and survey. There were only selected resident in barangay tagaran will be

interviewed.

Research Instrument

A. Unstructured Interview

The unstructured interview was utilized for it does not constrict the researcher as well as

the subject, having a lighter conversation and easing up the environment between both.

B. Check List

It was utilized to see whether the research meets certain requirements and use it as an

evaluation form.

C. Survey

It was utilized to know the socio-demographics of the resident in barangay tagaran.

Procedure

Identifying and Reviewing of


Delimiting the Related
problem Literature
Specifying Selecting the
Methods to Research
Collect the design
Research
Data

You might also like