0% found this document useful (0 votes)
51 views25 pages

Gee-1 Privacy

Uploaded by

alondz0109
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views25 pages

Gee-1 Privacy

Uploaded by

alondz0109
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

GEE 1 LIVING IN THE IT ERA

PRIVACY

Presented by: Group 5


OVERVIEW

Privacy can be described as imposing constraints on access to


and/or use of personal information. Privacy refers to the usage of
information collected about individuals and stored in databases.
This module will discuss the difference between privacy and
security, explain various risks to Internet privacy, and identify and
understand the different key privacy and anonymity issues.
Learning Objectives
At the end of this, students are expected to:

1. Difference between privacy and security.

2. Explain various risks to Internet privacy.

3. Identify and understand the different key


privacy and anonymity issues.
What is PRIVACY?
Privacy is the ability to control the sharing of personal data and
behavior. In today's connected world, it's increasingly difficult
to maintain privacy due to the proliferation of internet-
connected devices. Companies like Google, Facebook, and
Amazon often gather data for marketing purposes, making it
challenging to protect our privacy. Even products marketed as
privacy-focused may still collect and use our data. Opting for
paid, privacy-friendly options is often necessary to avoid being
tracked.
INFORMATION PRIVACY
INFORMATION PRIVACY

What is Information Privacy?


Information privacy is that the relationship among the
gathering and circulation of information, technology, the
general public expectation of privacy, and therefore the
legal and political issues surrounding them. It is also best-
known as data privacy or data protection.
INFORMATION PRIVACY

What is Data Privacy?


Data privacy is difficult since it try to use data while
securing a person's privacy preferences and personally
typical information. The fields of computer security, data
security, and knowledge security all design and use
software, hardware, and human resources to deal with this
issue.
Information privacy, data privacy or data protection laws render a legal
structure on the way to get, use and store data of natural persons. The
various laws all over the world describe the interest of natural persons to
regulate who is using its data.

Examples:
• For all data gathered, there should be a stated purpose.
• Information collected from a private can't be expose to other organizations or
individuals unless clearly authorized by law or by consent of the individual.
•Records kept on an individual should be authentic and up to date.
•There should be instrument for individuals to review data about them, to check
accuracy. This may include periodic reporting.
• Data should be removed when it's not needed for the stated purpose.
What is Privacy Protection?
Privacy protection is keeping the information you’d like to
secure to yourself from getting into the custody of
companies, hackers, government organizations, and some
other groups. The explanation of privacy protection change
from person to person. Each person has various
assumptions of privacy, therefore the level of security they
want to feel that their privacy is really secure limit
importantly.
Privacy Protection

ADVANTAGES
Protect your personal data
Stop unwanted solicitations
Protect your email address

DISADVANTAGES
Privacy-Focused Products Cost Money
Your Information Might Still Be Public
Your Reputation May Be In Question
PHILIPPINES – THE DATA PRIVACY
ACT OR RA NO. 10173 In 2012,
The Philippines passed Republic Act No. 10173 or
the Data Privacy Act of 2012 (DPA) “to protect the
fundamental human right to privacy of
communication while ensuring free flow of
information to promote innovation and growth.

The State recognizes the vital role of information


and communications technology in nation-building
and its inherent obligation to ensure that personal
information in information and communications
systems in government and in the private sector are
secured and protected
DATA PRIVACY ACT

What acts are covered by the DPA?


If the person, either an individual or an institution, involved in the
processing of personal data is located in the Philippines;

The act or practice involves personal data of a Philippine citizen or


Philippine resident;

The processing of personal data is done in the Philippines; or

The act, practice or processing of personal data is done by an entity


with links to the Philippines, subject to international law and comity
Who implement the DPA?
The National Privacy Commission (NPC) is in charge of
administering and implementing the DPA. It is also
tasked to monitor and ensure compliance of the
Philippines with international standards for personal
data protection.
PRIVACY AND ANONYMITY ISSUES
DATA BREACHES
Where personal information is exposed, are often caused by
hackers or negligence in security measures. Organizations
may hesitate to disclose breaches due to fear of negative
publicity and lawsuits. However, victims need to be informed
to protect themselves. The cost of a data breach to a company
can be significant, estimated at around $200 per lost record.
This includes lost business opportunities, PR expenses, and
increased customer support costs for services like credit
monitoring.
ELECTONIC DISCOVERY
(e-discovery)

It involves gathering, examining, and presenting


electronically stored information (ESI) for legal purposes.
ESI includes various digital data like emails, documents,
and recordings stored on devices such as hard drives and
flash drives. This process may reveal personal
information, like private emails.
WORKPLACE MONITORING
Enough of data exists to support the conclusion that a lot of workers
waste large portions of their time period doing non-work- related
activity. One recent study discovered that between 60 to 80 percent
of workers’ time online has nothing to do with work. Another source
estimates that, on average, workers consume about four or five
hours per week on private matters. In a recent survey by an IT
staffing firm, 54 percent of companies reported they were restrict
the utilization of social networking sites like Facebook, Twitter,
MySpace, and LinkedIn to help lessen waste at work.
ADVANCED SURVEILLANCE TECHNOLOGY
A number of advances in information technology—such as
surveillance cameras and satellite-based systems which will
spot a person’s physical location—bring awesome new data-
gathering capabilities. However, these advances also can
diminish individual privacy and simplify the issue of what
proportion information should be secure about people’s
private lives.
CAMERA SURVEILLANCE
Cameras are utilized in major cities around the world in an
attempt to discourage crime and terrorist activities. Critics
believe that such scrutiny may be a violation of civil liberties and
are concerned about the value of the equipment and other people
required to watch the video feeds. Surveillance camera
supporters offer report data that means the cameras are effective
in preventing crime and terrorism. They can give examples during
which cameras helped solve crimes by validate the testimony of
witnesses and helping to trace suspects.
VEHICLE EVENT DATA RECORDERS
A vehicle event data recorder (EDR)is a tool that records vehicle
and occupant data for a couple of seconds before, during, and
after any vehicle crash that's terrible enough to deploy the
vehicle’s air bags. Sensors located around the vehicle take and
register information about vehicle speed and acceleration; seat
belt use; air bag formation; activation of any automatic collision
notification system, and driver inputs like brake, accelerator, and
turn signal usage. The EDR cannot take any data that could
determine the driver of the vehicle. Nor can it tell if the driver was
managing the vehicle under the effect of drugs or alcohol.
STALKING APP TECHNOLOGY
has made it easy for an individual to trace the whereabouts of
somebody else in the least times, without ever having to follow the
person. Cellphone spy software called a stalking application are
often loaded onto someone’s cellphone or smartphone within
minutes, making it feasible for the user to perform location tracking,
record calls, view every text message or picture sent or received,
and record the URLs of any internet site visited on the phone. Some
of the most popular spy software consist of Mobile Spy, ePhone
Tracker, Flexi SPY, and Mobile Nanny
CONCLUSION

Privacy protection is crucial in today's digital age, and compliance with data privacy
laws is essential to safeguard personal information. Awareness of privacy issues
and ethical considerations is important for individuals and organizations to navigate
the complexities of data privacy. This includes understanding the implications of
data collection, storage, and sharing practices, implementing robust security
measures, and empowering individuals to make informed choices about their data
privacy. By staying informed and proactive, we can ensure the responsible use of
personal data and uphold privacy rights in an increasingly interconnected world.
THANK YOU!
Meet Our Team

ARVIN JOHN CARLO JOHN CARL


Reporter Reporter Reporter
REFERENCES:
Information Campaign: https://www.youtube.com/watch?v=KjX7CT6M1x8
TED Talk: Data Privacy and Consent by Fred Cate https://www.youtube.com/watch?v=2iPDpV8ojHA
https://eccinternational.com/ra-10173-data-privacy-summary/
http://choosetoencrypt.com/privacy/what-is-privacy-protection/ www.officialgazette.gov.ph
https://www.lexico.com/en/definition/privacy https://www.merriam-webster.com/dictionary/privacy
http://gilc.org/privacy/survey/intro.html https://www.officialgazette.gov.ph/constitutions/1987-
constitution/ https://www.privacy.gov.ph/know-your-rights/
https://www.upr-info.org/sites/default/files/document/philippines/session_27_-
_may_2017/js22_upr27_phl
_e_main.pdf https://plato.stanford.edu/entries/it-privacy/#ImpInfTecPri

You might also like