0% found this document useful (0 votes)
13 views

LITE-IT-Politics-and-Issues

It era

Uploaded by

Ler
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

LITE-IT-Politics-and-Issues

It era

Uploaded by

Ler
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 34

IT POLITICS AND ISSUES

Prepared by: Ms. Irish Lejarde


IT POLITICS

IT Politics refers to the intersection of technology, public


policy, and ethical concerns, impacting how information is
accessed, controlled, and used in society.
DATA PRIVACY AND SECURITY
CYBERSECURITY

Cybersecurity is the application of technologies,


processes, and controls to protect systems,
networks, programs, devices, and data from
cyber-attacks. It aims to reduce the risk of cyber-
attacks and protect against the unauthorized
exploitation of systems, networks, and
technologies.
DATA PRIVACY AND SECURITY
PRIVACY REGULATIONS
EXAMPLES
1. The General Data Protection Regulation
(GDPR) is a legal framework implemented by
the European Union (EU) to regulate how
personal data is collected, stored, processed,
and shared. It aims to protect the privacy
rights of individuals within the EU, regardless of
where the data processing occurs globally.
DATA PRIVACY AND SECURITY
PRIVACY REGULATIONS
EXAMPLES
2. The Philippine Data Privacy Act of 2012 (RA
10173) is a law designed to protect the personal
data of individuals in the Philippines. It regulates
the collection, use, storage, and disposal of
personal information by public and private entities
to safeguard data privacy and security.
DATA PRIVACY AND SECURITY
PRIVACY REGULATIONS
EXAMPLES
3. The Data Protection Regulations in the Philippines for
Telecommunication and Media encompass rules and
guidelines, primarily derived from the Philippine Data Privacy
Act of 2012 (RA 10173), that ensure the secure and lawful
handling of personal data by telecommunication and media
providers.
CYBERSECURITY THREATS AND MITIGATION
COMMON EXAMPLES

Malware is a type of software that is designed to


harm a computer or network.
CYBERSECURITY THREATS AND MITIGATION
COMMON EXAMPLES

Phishing is a type of online scam that uses social


engineering to trick people into revealing sensitive
information or installing malware
CYBERSECURITY THREATS AND MITIGATION
COMMON EXAMPLES

Ransomware is a malware designed to deny a


user or organization access to files on their
computer.
NET NEUTRALITY AND ACCESS TO INFORMATION
NET NEUTRALITY

Net neutrality is the principle that Internet


Service Providers (ISPs) must treat all data on the
internet equally. This means ISPs should not block,
slow down, or prioritize access to certain websites
or services based on their content, source, or
payment agreements.
NET NEUTRALITY AND ACCESS TO INFORMATION
NET NEUTRALITY
NET NEUTRALITY AND ACCESS TO INFORMATION
DIGITAL DIVIDE

The digital divide refers to the gap between


individuals or communities who have access to
modern information and communication
technology (ICT)—such as the internet,
smartphones, and computers—and those who do
not, often due to socioeconomic, geographic, or
educational disparities.
NET NEUTRALITY AND ACCESS TO INFORMATION
IMPACT ON SOCIETY
Education
Students with internet access can access online courses, educational
resources, and virtual classrooms. Those without it may fall behind.

Economic Opportunities
Access to the internet allows individuals to apply for jobs, freelance,
or start businesses online.

Health and Welfare


Telemedicine and online government services are crucial for rural or
underserved populations.
ENVIRONMENTAL IMPACT OF TECHNOLOGY
E-WASTE

E-waste, or electronic waste, refers to discarded


electronic devices and components, including
phones, computers, appliances, and batteries.
ENVIRONMENTAL IMPACT OF TECHNOLOGY
E-WASTE
ENVIRONMENTAL IMPACT OF TECHNOLOGY
E-WASTE
ENVIRONMENTAL IMPACT OF TECHNOLOGY
ENERGY CONSUMPTION IN
TECHNOLOGY

Modern technologies, particularly data centers


and high-performance computing systems,
require vast amounts of electricity to operate.
This contributes to high energy consumption and,
if sourced from non-renewable energy, can
significantly increase carbon emissions.
ENVIRONMENTAL IMPACT OF TECHNOLOGY
POLICIES AND REGULATIONS

Policies and regulations aim to reduce the


environmental impact of technology by
promoting responsible disposal, energy efficiency,
and sustainable practices in the tech industry.
ENVIRONMENTAL IMPACT OF TECHNOLOGY
POLICIES AND REGULATIONS
E-WASTE MANAGEMENT LAWS:

1. The Ecological Solid Waste Management Act (RA 9003) promotes


proper e-waste disposal and recycling programs.

2. The WEEE Directive (Waste Electrical and Electronic Equipment)


mandates manufacturers to manage the disposal and recycling of
their products.
ENVIRONMENTAL IMPACT OF TECHNOLOGY
POLICIES AND REGULATIONS
Energy Efficiency Standards:

1. The ENERGY STAR Program certifies energy-efficient devices,


encouraging manufacturers to adopt sustainable designs.

1. Google powers its data centers with renewable energy, aiming for
carbon-free operations by 2030.
ENVIRONMENTAL IMPACT OF TECHNOLOGY
POLICIES AND REGULATIONS

Corporate Sustainability Initiatives:

1. Apple has committed to using 100% recycled materials in its


products and reducing its carbon footprint across its entire supply
chain.
AI AND AUTOMATION IN INDUSTRY

Automation refers to the use of technology, such as software, robots,


and artificial intelligence (AI), to perform tasks with minimal or no human
intervention. Automation is commonly applied in manufacturing,
logistics, customer service, and other industries to enhance efficiency
and reduce costs.
AI AND AUTOMATION IN INDUSTRY
ETHICAL CONCERNS

1. Job Displacement

The concern that automation and AI may replace human workers,


especially in repetitive or low-skill jobs, leading to unemployment in
affected industries.
AI AND AUTOMATION IN INDUSTRY
ETHICAL CONCERNS

2. Bias in AI

AI systems can unintentionally reflect biases present in the data they are
trained on, leading to unfair or discriminatory decision-making.

Example:
AI tools used by companies like Amazon were found to favor male candidates over
females due to biased training data.
GOVERNMENT SURVEILLANCE AND CENSORSHIP
SURVEILLANCE

Government surveillance refers to the monitoring of individuals'


behavior, activities, or communications to ensure public safety, detect
crimes, or prevent threats.
GOVERNMENT SURVEILLANCE AND CENSORSHIP
CENSORSHIP

Censorship involves suppressing or restricting access to certain


information, speech, or content, often enforced by governments or
organizations to control public narratives.
GOVERNMENT SURVEILLANCE AND CENSORSHIP

Implications for Data Privacy and Freedom:

1. Concerns: Excessive surveillance and censorship can lead to loss of


personal privacy and hinder freedom of expression.
GOVERNMENT SURVEILLANCE AND CENSORSHIP
DIGITAL RIGHTS AND FREEDOM OF EXPRESSION
DIGITAL RIGHTS

Digital rights refer to the rights to privacy, freedom of expression, and


access to information in online environments. These rights ensure fair
and ethical treatment in the digital world.
DIGITAL RIGHTS AND FREEDOM OF EXPRESSION
FREEDOM OF SPEECH

The right to express opinions online without fear of censorship, suppression, or


retaliation, as long as it aligns with community standards and laws.
DIGITAL RIGHTS AND FREEDOM OF EXPRESSION
CYBERBULLYING AND ONLINE
HARASSMENT

Cyberbullying refers to the use of digital platforms to harass or demean individuals,


often causing emotional harm.
ETHICS OF EMERGING TECHNOLOGIES
EMERGING TECHNOLOGIES
1. Internet of Things (IoT)
A network of interconnected devices (e.g., smart home systems) that
communicate and share data.
2. Quantum Computing
A type of computing that uses quantum mechanics to process
information at speeds exponentially faster than classical computers.
3. Autonomous Systems
Technologies that operate without human intervention, such as self-
driving cars or drones.
ETHICS OF EMERGING TECHNOLOGIES
ETHICAL QUESTIONS

Ethical Questions
1.Transparency
2.Accountability
3.Potential for Misuse
THANK YOU

You might also like