IT-TRENDS-FINALTERM understanding the self.pptx

PaulJohnMadrigal 1 views 73 slides Oct 08, 2025
Slide 1
Slide 1 of 73
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68
Slide 69
69
Slide 70
70
Slide 71
71
Slide 72
72
Slide 73
73

About This Presentation

under


Slide Content

FINAL TERM

Write your Name, Address and Mobile number in a piece of paper and throw it in the trash bin/can TASK #1 TIME LIMIT: 30 SECONDS

Tell secret/s into someone TASK #2 TIME LIMIT: 30 SECONDS

NOW IMAGINE

GOODBYE CLASSMATES

FINAL TERM INFORMATION PRIVACY, CONTROL AND PROTECTION

Primer on the Data Privacy Act (DPA) of 2012

EVERYDAY YOUR ARE DEALING WITH A LOT OF INFORMATION SPECIALLY IN SOCIAL MEDIA

DO YOU COLLECT INFORMATIONS YOU SEE OR GATHER?

HOW WILL YOU HANDLE THE INFORMATIONS YOU HAVE?

Do not COLLECT if you cannot PROTECT

Who stores data about you?

SPEED OF INFORMATION

Which is more valuable?

“Data is more valuable than Money. If someone takes your money, that's all they have. If you let someone take your data, they may eventually take your money too !“ from: Deputy Privacy Commissioner Dondi Mapa

What is the Data Privacy Act of 2012? SECTION 1. Short Title. – This Act shall be known as the “Data Privacy Act of 2012”. Republic Act 10173, the Data Privacy Act of 2012 AN ACT PROTECTING INDIVIDUAL PERSONAL INFORMATION IN INFORMATION AND COMMUNICATIONS SYSTEMS IN THE GOVERNMENT AND THE PRIVATE SECTOR, CREATING FOR THIS PURPOSE A NATIONAL PRIVACY COMMISSION, AND FOR OTHER PURPOSES

KEY ROLES IN THE DATA PRIVACY ACT Data Subjects Refers to an individual whose, sensitive personal, or privileged information is processed personal Personal Information Controller (PIC) Controls the processing of personal data, or instructs another to process personal data on its behalf. Personal Information Processor (PIP) Organization or individual whom a personal information controller may outsource or instruct the processing of personal data pertaining to a data subject Data Protection Officer (DPO) Responsible for the overall management of compliance to DPA National Privacy Commission Independent body mandated to administer and implement the DPA of 2012, and to monitor and ensure compliance of the country with international standards set for personal data protection

Examples of Breaches and Live Cases COMELeak BPI – consent form Hospital – unsecure storage records Student transferred by her parent without her knowledge Clinical record of a student to disclose with her parents List of top students/passers Known Fastfood delivery – disclosing personal info of clients No Data sharing agreement (DSA) between and among Schools and Universities Security issues in buildings – logbook Profiling of customers from a mall 11. Personal laptop stolen 12. Lost a CD in transit 13. Use of re-cycled papers 14. Raffle stubs 16. Personal Records stolen from home of an employee Release of CCTV Footage Password hacked/revealed

DPA Section Punishable Act For Personal Information For Sensitive Personal Information Fine (Pesos) JAIL TERM 25 Unauthorized processing 1-3 years 3-6 years 500 k – 4 million 26 Access due to negligence 1-3 years 3-6 years 500 k – 4 million 27 Improper disposal 6 months – 2 years 3-6 years 100 k – 1 million 28 Unauthorized purposes 18 months – 5 years 2-7 years 500 k – 2 million 29 Intentional breach 1-3 years 500 k – 2 million 30 Concealment of breach 18 months – 5 years 500 k – 1 million 31 Malicious disclosure 18 month – 5 years 500 k – 1 million 32 Unauthorized disclosure 1-3 years 3-5 years 500 k – 2 million 33 Combination of acts 1-3 years 1 million – 5 million Potential Penalties listed in the Data Privacy Act

Rights of the Data Subject Right to be informed - IRR, Section 34.a Right to object - IRR, Section 34.b Right to access - IRR, Section 34.c Right to data portability - IRR, Section 36 Right to correct (rectification) - IRR, Section 34.d Right to erasure or blocking - IRR, Section 34.e Right to file a complaint - IRR, Section 34.a.2 Right to damages - IRR, Section 34.f Transmissibility of Rights - IRR, Section 35

CLASSIFICATION OF PERSONAL DATA Personal Information: Personal information refers to any information whether recorded in a material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual.

Sensitive Personal Information. Refers to personal information about an individual’s: race, ethnic origin, marital status, age, color, religious, philosophical or political affiliations, health, education, genetics, sexual life, any proceeding for any offense committed or alleged to have been committed, the disposal of such proceedings, the sentence of any court in such proceedings; Also includes information issued by government agencies peculiar to an individual which includes, but not limited to: social security numbers, previous or current health records, licenses or its denials, suspension or revocation, and tax returns; and specifically established by an executive order or an act of Congress to be kept classified.

TRANSPARENCY – “the CONSENT Regime” Principle of Transparency A data subject must be aware of the nature, purpose, and extent of the processing of his or her personal data, including the risks and safeguards involved, the identity of personal information controller, his or her rights as a data subject, and how these can be exercised. Any information and communication relating to the processing of personal data should be easy to access and understand, using clear and plain language.

LEGITIMATE PURPOSE Principle of Legitimate Purpose The processing of information shall be compatible with a declared and specified purpose, which must not be contrary to law, morals, or public policy.

The Data Privacy Principles Personal data shall be: processed fairly and lawfully processed only for specified, lawful and compatible purposes adequate , relevant and not excessive accurate and up to date kept for no longer than necessary processed in accordance with the rights of data subjects kept secure

“Compliance to Data Privacy Act is not a one-shot initiative. It is a discipline and culture that must be embedded on a continuous basis within the organization.” CULTURE OF PRIVACY in the PHILIPPINES

Thank you! Any questions? [email protected]

INFORMATION AS A RESOURCE EXPANDABLE Information can be expandable without compromising its integrity. (ex. Curriculum Vitae) COMPRESSIBLE Expanded information may not always needed. ( ex. News site “Headliners”) TRANSPORTABLE Send via E-mail Share via Facebook Copy onto flash drive Upload in YouTube DIFFUSIVE Spread easily to any kinds of information (whether gossip or rumor) SHARABLE It can be shared! You don’t have any control after that. (ex. Secret recipe)

INFORMATION AS A RESOURCE C OMPLETE Contains all important facts, missing could mean disaster (introduction of speaker) ECONOMICAL It should be economical to produce RELIABLE How data is collected Where it is collected RELEVANT SIMPLE AND TIMELY Not complex in its form and on time when its needed

INFORMATION AS A RESOURCE VERIFIABLE Can be checked its correctness ACCESSIBLE SECURE Free from access from an unauthorized persons

INFORMATION OVERLOAD INFORMATION IS NOW AVAILABLE QUICKLY Duplication and Transmission of information's is getting easier A picture posted in FB will also be posted in Instagram and Twitter – means same picture has been posted three times Communication methods are multiplying Mobile phones, Viber , Email, Text or SMS, PM, etc. Archives of historical information are exponentially growing

INTELLECTUAL PROPERTY Basically refers to any creation or product of the human mind and may be expressed in form of original ideas, expressions and processes.

INTELLECTUAL PROPERTY Copyright - r efers to the legal right of the owner of intellectual property Trademarks -   is a recognizable insignia, phrase or symbol that denotes a specific product or service and legally differentiates it from all other products Patent - gives its owner the right to exclude others from making, using, selling, and importing an invention for a limited period of time, usually twenty years.

INFORMATION CONTROL IS ABOUT ALLOWING THOSE WHO HAVE APPROPRIATE AUTHORITY ACCESS TO AND USE OF INFORMATION ON THE BASIS OF THE AUTHORITY THAT THEY HOLD

COMPUTER SECURITY

THREATS AND COUNTERMEASURES THREAT – anything that can cause harm to our computer resources. threat against VIRUS and HACKER VIRUS VS ANTI VIRUS HACKER VS FIREWALL

THREATS AND COUNTERMEASURES IDENTITY THEFT – technology term used when someone impersonates you. using your name, ID, SSS number or other personal HOW ??? Shoulder surfing – watching someone who withdraws on the ATM and get his/her PIN Wire Tapping or Snagging – thru conversation over telephone line. Dumpster Diving Technique – digging your garbage or trash bins to get your cancelled or deleted checks, bank accounts or credit cards number. Social Engineering –the most predominant source of identity theft where the victim ticks unsuspectedly and provides vital information under pretext of something in authority

COMPUTER VIRUSES VIRUS - A computer virus is a program or piece of  code  that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves . it is designed to destroy and make troubles to our computing task. Some type of viruses Trojans (Trojan horses) – it performs useful task however carries out destructive motive and cruel intentions. Usually a game name or utilities. Worms – it has the ability to reproduce on its own. It travels from computer to computer over a network and find files that are not affected and will occupy it. Logic Bombs – it will perform the task on the programmed date.

Some type of viruses Malware – Malicious software - is software used or programmed by attackers to disrupt computer operation , gather sensitive information, or gain access to private computer systems . Malicious BHO (Browsers Helper Objects) Browser Hijackers - transfer you to another web page (or the page is an error) Ransomware – a malware and usually ask for ransom from the creator to remove the restrictions. Rootkits – it will hide other virus like worms and Trojans. Technically it is not harmful but the hidden virus is. Dialers – unauthorized dialing a call Adware – same as malware but it uses Ads as a medium of infection COMPUTER VIRUSES

Anti virus programs is  software  used to prevent, detect and remove malware (of all descriptions), such as:  Computer viruses, malicious, hijackers ,  ransomware ,  keyloggers , backdoors, rootkits,  trojan horses,  worms,malicious  LSPs, dialers,  fraudtools ,  adware  and spyware.  Computer security, including protection from social engineering techniques, is commonly offered in products and services of antivirus software companies.

ONLINE SPYING TOOLS Cookies – it stores pertinent details like log-in name, password, e-mail address, etc. Spy ware – it collects and record secretly your email, password, etc. Spam – just simple a junk mail (from someone who you doesn’t know and usually carries a virus. Cybercrime – stealing of hardware and software. Hacking – illegal accessing the computer resources of some people without their knowledge Cyberterrorism – attacking the information technology infrastructure and government network system. The goal is to gain control and monitor.

COMPUTER ETHICS Computer ethics deals with the procedures, values and practices that govern the process of consuming computing technology and its related disciplines without damaging or violating the moral values and beliefs of any individual, organization or entity.

TEN COMMANDMENTS OF COMPUTER ETHICS THOU SHALT NOT USE A COMPUTER TO HARM OTHER PEOPLE . THOU SHALT NOT INTERFERE WITH OTHER PEOPLE'S COMPUTER WORK. 3. THOU SHALT NOT SNOOP AROUND IN OTHER PEOPLE'S COMPUTER FILES. 4. THOU SHALT NOT USE A COMPUTER TO STEAL. 5. THOU SHALT NOT USE A COMPUTER TO BEAR FALSE WITNESS. 6 . THOU SHALT NOT COPY OR USE PROPRIETARY SOFTWARE FOR WHICH YOU HAVE NOT PAID. THOU SHALT NOT USE OTHER PEOPLE'S COMPUTER RESOURCES WITHOUT AUTHORIZATION OR PROPER COMPENSATION. 8 . THOU SHALT NOT APPROPRIATE OTHER PEOPLE'S INTELLECTUAL OUTPUT. THOU SHALT THINK ABOUT THE SOCIAL CONSEQUENCES OF THE PROGRAM YOU ARE WRITING OR THE SYSTEM YOU ARE DESIGNING. 10. THOU SHALT ALWAYS USE A COMPUTER IN WAYS THAT INSURE CONSIDERATION AND RESPECT FOR YOUR FELLOW HUMANS.

INTERNET & WORLD WIDE WEB

“Galactic Network” Concept - J.C.R. Licklider August 1962 Brief History of Internet Globally Interconnected computers To transmit and transfer data Head of DARPA – Defense Advanced Research Projects Agencies ARPANET – Advanced Research Project Agency Network 1967

DANGERS OF THE INTERNET

STATIC – flat or stationary (as is) W E B P A G E

DYNAMIC - information that changes, depending on the viewer, the time of the day, the time zone, the viewers native language, and other factors. W E B P A G E

1. CONVERGENCE – two or more things come together to form a new one TRENDS IN ICT 2. SOCIAL MEDIA a. Social Network b. Bookmarking Sites c. Social News d. Media Sharing e. Microblogging f. Blogs & forum

3. MOBILE TECHNOLOGIES a. ios b.Android c. Blackberry OS d. Windows Phone e. Symbian f. WebOS g. Windows Mobile 4. ASSISTIVE MEDIA TRENDS IN ICT

STATIC vs DYNAMIC

Online Security Internet Threats Protecting reputations NETIQUETTE

FIRST NAME – chances are, a hacker may already know plenty of stuff about you ONLINE SAFE OR NOT? LAST NAME – you will be vulnerable to being search and used as modus to several cybercrimes ABOUT SCHOOLS – most people may steal your identity and will be used for information verification NUMBER – avoid or do not post your number in public pages and someone might bother you through calls or text.

PARENTS NAME – again can be used for verification of identity ONLINE SAFE OR NOT? SIBLINGS – for verification ADDRESS – hackers, criminals may find you if given this information to untrusted sites HOME PHONE AND BIRTH DAY – makes you more vulnerable

DEFINED AS “INFORMATION SUPERHIGHWAY” INTERNET IS

MALWARE – Malicious Software 1. Virus – a software designed to harm files 2. Worm – self duplicating virus ( eg . ILOVEYOU) 3. Trojan – mostly hidden and disguised as a useful program 4. Spyware – runs in the background without knowing and may record or log everything you do. 5. Adware – Advertisement software that always pops-up INTERNET THREATS

SPAM – unwanted e-mails mostly BOT. Used to send Malware PHISHING – acquire sensitive personal information like password, credit card etc. INTERNET THREATS

Once you post it on the net, you have no control of who sees your posts Talk to someone or parents before you do something on the net Set your post to PRIVATE Avoid using names. Avoid posting that can affect reputations. THINK BEFORE YOU CLICK

ICT AS FLATFORM FOR CHANGE

ROLE OF ICT IN RECENT HISTORY EDSA (People Power Revolution ) – Radio Broadcasting & Television EDSA Dos – it would not have been successful without the TEXT BRIGADES. Protests and March – the help of Social Media Yolanda People Finder – people finder DATABASE by Google ICT AS FLATFORM FOR CHANGE

SOCIAL CAMPAIGN 20 mins Form a group of 8 members. Conceptualize a social campaign What are the things that your group think that could be better in your school or community? List down atleast five things. Choose one of the five you think is of highest priority and demands immediate action of CHANGE. Create a write-up about this problem. ICT AS FLATFORM FOR CHANGE

ICT Project Process Overview

PLANNING a. Conceptualizing your project b. Researching on available data about your project c. Setting deadlines and meetings d. Assigning people to various task e. Create your Website ICT AS FLATFORM FOR CHANGE

DEVELOPMENT involves the actual creation of website and production of images RELEASE AND PROMOTION – presentation of website to the public MAINTENANCE – continuing improvements and monitoring with feedback ICT AS FLATFORM FOR CHANGE

TAKE THE CHALLENGE! * Social Campaign proposal * write-up * Website planning * presentation ICT AS FLATFORM FOR CHANGE
Tags