Write your Name, Address and Mobile number in a piece of paper and throw it in the trash bin/can TASK #1 TIME LIMIT: 30 SECONDS
Tell secret/s into someone TASK #2 TIME LIMIT: 30 SECONDS
NOW IMAGINE
GOODBYE CLASSMATES
FINAL TERM INFORMATION PRIVACY, CONTROL AND PROTECTION
Primer on the Data Privacy Act (DPA) of 2012
EVERYDAY YOUR ARE DEALING WITH A LOT OF INFORMATION SPECIALLY IN SOCIAL MEDIA
DO YOU COLLECT INFORMATIONS YOU SEE OR GATHER?
HOW WILL YOU HANDLE THE INFORMATIONS YOU HAVE?
Do not COLLECT if you cannot PROTECT
Who stores data about you?
SPEED OF INFORMATION
Which is more valuable?
“Data is more valuable than Money. If someone takes your money, that's all they have. If you let someone take your data, they may eventually take your money too !“ from: Deputy Privacy Commissioner Dondi Mapa
What is the Data Privacy Act of 2012? SECTION 1. Short Title. – This Act shall be known as the “Data Privacy Act of 2012”. Republic Act 10173, the Data Privacy Act of 2012 AN ACT PROTECTING INDIVIDUAL PERSONAL INFORMATION IN INFORMATION AND COMMUNICATIONS SYSTEMS IN THE GOVERNMENT AND THE PRIVATE SECTOR, CREATING FOR THIS PURPOSE A NATIONAL PRIVACY COMMISSION, AND FOR OTHER PURPOSES
KEY ROLES IN THE DATA PRIVACY ACT Data Subjects Refers to an individual whose, sensitive personal, or privileged information is processed personal Personal Information Controller (PIC) Controls the processing of personal data, or instructs another to process personal data on its behalf. Personal Information Processor (PIP) Organization or individual whom a personal information controller may outsource or instruct the processing of personal data pertaining to a data subject Data Protection Officer (DPO) Responsible for the overall management of compliance to DPA National Privacy Commission Independent body mandated to administer and implement the DPA of 2012, and to monitor and ensure compliance of the country with international standards set for personal data protection
Examples of Breaches and Live Cases COMELeak BPI – consent form Hospital – unsecure storage records Student transferred by her parent without her knowledge Clinical record of a student to disclose with her parents List of top students/passers Known Fastfood delivery – disclosing personal info of clients No Data sharing agreement (DSA) between and among Schools and Universities Security issues in buildings – logbook Profiling of customers from a mall 11. Personal laptop stolen 12. Lost a CD in transit 13. Use of re-cycled papers 14. Raffle stubs 16. Personal Records stolen from home of an employee Release of CCTV Footage Password hacked/revealed
DPA Section Punishable Act For Personal Information For Sensitive Personal Information Fine (Pesos) JAIL TERM 25 Unauthorized processing 1-3 years 3-6 years 500 k – 4 million 26 Access due to negligence 1-3 years 3-6 years 500 k – 4 million 27 Improper disposal 6 months – 2 years 3-6 years 100 k – 1 million 28 Unauthorized purposes 18 months – 5 years 2-7 years 500 k – 2 million 29 Intentional breach 1-3 years 500 k – 2 million 30 Concealment of breach 18 months – 5 years 500 k – 1 million 31 Malicious disclosure 18 month – 5 years 500 k – 1 million 32 Unauthorized disclosure 1-3 years 3-5 years 500 k – 2 million 33 Combination of acts 1-3 years 1 million – 5 million Potential Penalties listed in the Data Privacy Act
Rights of the Data Subject Right to be informed - IRR, Section 34.a Right to object - IRR, Section 34.b Right to access - IRR, Section 34.c Right to data portability - IRR, Section 36 Right to correct (rectification) - IRR, Section 34.d Right to erasure or blocking - IRR, Section 34.e Right to file a complaint - IRR, Section 34.a.2 Right to damages - IRR, Section 34.f Transmissibility of Rights - IRR, Section 35
CLASSIFICATION OF PERSONAL DATA Personal Information: Personal information refers to any information whether recorded in a material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual.
Sensitive Personal Information. Refers to personal information about an individual’s: race, ethnic origin, marital status, age, color, religious, philosophical or political affiliations, health, education, genetics, sexual life, any proceeding for any offense committed or alleged to have been committed, the disposal of such proceedings, the sentence of any court in such proceedings; Also includes information issued by government agencies peculiar to an individual which includes, but not limited to: social security numbers, previous or current health records, licenses or its denials, suspension or revocation, and tax returns; and specifically established by an executive order or an act of Congress to be kept classified.
TRANSPARENCY – “the CONSENT Regime” Principle of Transparency A data subject must be aware of the nature, purpose, and extent of the processing of his or her personal data, including the risks and safeguards involved, the identity of personal information controller, his or her rights as a data subject, and how these can be exercised. Any information and communication relating to the processing of personal data should be easy to access and understand, using clear and plain language.
LEGITIMATE PURPOSE Principle of Legitimate Purpose The processing of information shall be compatible with a declared and specified purpose, which must not be contrary to law, morals, or public policy.
The Data Privacy Principles Personal data shall be: processed fairly and lawfully processed only for specified, lawful and compatible purposes adequate , relevant and not excessive accurate and up to date kept for no longer than necessary processed in accordance with the rights of data subjects kept secure
“Compliance to Data Privacy Act is not a one-shot initiative. It is a discipline and culture that must be embedded on a continuous basis within the organization.” CULTURE OF PRIVACY in the PHILIPPINES
INFORMATION AS A RESOURCE EXPANDABLE Information can be expandable without compromising its integrity. (ex. Curriculum Vitae) COMPRESSIBLE Expanded information may not always needed. ( ex. News site “Headliners”) TRANSPORTABLE Send via E-mail Share via Facebook Copy onto flash drive Upload in YouTube DIFFUSIVE Spread easily to any kinds of information (whether gossip or rumor) SHARABLE It can be shared! You don’t have any control after that. (ex. Secret recipe)
INFORMATION AS A RESOURCE C OMPLETE Contains all important facts, missing could mean disaster (introduction of speaker) ECONOMICAL It should be economical to produce RELIABLE How data is collected Where it is collected RELEVANT SIMPLE AND TIMELY Not complex in its form and on time when its needed
INFORMATION AS A RESOURCE VERIFIABLE Can be checked its correctness ACCESSIBLE SECURE Free from access from an unauthorized persons
INFORMATION OVERLOAD INFORMATION IS NOW AVAILABLE QUICKLY Duplication and Transmission of information's is getting easier A picture posted in FB will also be posted in Instagram and Twitter – means same picture has been posted three times Communication methods are multiplying Mobile phones, Viber , Email, Text or SMS, PM, etc. Archives of historical information are exponentially growing
INTELLECTUAL PROPERTY Basically refers to any creation or product of the human mind and may be expressed in form of original ideas, expressions and processes.
INTELLECTUAL PROPERTY Copyright - r efers to the legal right of the owner of intellectual property Trademarks - is a recognizable insignia, phrase or symbol that denotes a specific product or service and legally differentiates it from all other products Patent - gives its owner the right to exclude others from making, using, selling, and importing an invention for a limited period of time, usually twenty years.
INFORMATION CONTROL IS ABOUT ALLOWING THOSE WHO HAVE APPROPRIATE AUTHORITY ACCESS TO AND USE OF INFORMATION ON THE BASIS OF THE AUTHORITY THAT THEY HOLD
COMPUTER SECURITY
THREATS AND COUNTERMEASURES THREAT – anything that can cause harm to our computer resources. threat against VIRUS and HACKER VIRUS VS ANTI VIRUS HACKER VS FIREWALL
THREATS AND COUNTERMEASURES IDENTITY THEFT – technology term used when someone impersonates you. using your name, ID, SSS number or other personal HOW ??? Shoulder surfing – watching someone who withdraws on the ATM and get his/her PIN Wire Tapping or Snagging – thru conversation over telephone line. Dumpster Diving Technique – digging your garbage or trash bins to get your cancelled or deleted checks, bank accounts or credit cards number. Social Engineering –the most predominant source of identity theft where the victim ticks unsuspectedly and provides vital information under pretext of something in authority
COMPUTER VIRUSES VIRUS - A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves . it is designed to destroy and make troubles to our computing task. Some type of viruses Trojans (Trojan horses) – it performs useful task however carries out destructive motive and cruel intentions. Usually a game name or utilities. Worms – it has the ability to reproduce on its own. It travels from computer to computer over a network and find files that are not affected and will occupy it. Logic Bombs – it will perform the task on the programmed date.
Some type of viruses Malware – Malicious software - is software used or programmed by attackers to disrupt computer operation , gather sensitive information, or gain access to private computer systems . Malicious BHO (Browsers Helper Objects) Browser Hijackers - transfer you to another web page (or the page is an error) Ransomware – a malware and usually ask for ransom from the creator to remove the restrictions. Rootkits – it will hide other virus like worms and Trojans. Technically it is not harmful but the hidden virus is. Dialers – unauthorized dialing a call Adware – same as malware but it uses Ads as a medium of infection COMPUTER VIRUSES
Anti virus programs is software used to prevent, detect and remove malware (of all descriptions), such as: Computer viruses, malicious, hijackers , ransomware , keyloggers , backdoors, rootkits, trojan horses, worms,malicious LSPs, dialers, fraudtools , adware and spyware. Computer security, including protection from social engineering techniques, is commonly offered in products and services of antivirus software companies.
ONLINE SPYING TOOLS Cookies – it stores pertinent details like log-in name, password, e-mail address, etc. Spy ware – it collects and record secretly your email, password, etc. Spam – just simple a junk mail (from someone who you doesn’t know and usually carries a virus. Cybercrime – stealing of hardware and software. Hacking – illegal accessing the computer resources of some people without their knowledge Cyberterrorism – attacking the information technology infrastructure and government network system. The goal is to gain control and monitor.
COMPUTER ETHICS Computer ethics deals with the procedures, values and practices that govern the process of consuming computing technology and its related disciplines without damaging or violating the moral values and beliefs of any individual, organization or entity.
TEN COMMANDMENTS OF COMPUTER ETHICS THOU SHALT NOT USE A COMPUTER TO HARM OTHER PEOPLE . THOU SHALT NOT INTERFERE WITH OTHER PEOPLE'S COMPUTER WORK. 3. THOU SHALT NOT SNOOP AROUND IN OTHER PEOPLE'S COMPUTER FILES. 4. THOU SHALT NOT USE A COMPUTER TO STEAL. 5. THOU SHALT NOT USE A COMPUTER TO BEAR FALSE WITNESS. 6 . THOU SHALT NOT COPY OR USE PROPRIETARY SOFTWARE FOR WHICH YOU HAVE NOT PAID. THOU SHALT NOT USE OTHER PEOPLE'S COMPUTER RESOURCES WITHOUT AUTHORIZATION OR PROPER COMPENSATION. 8 . THOU SHALT NOT APPROPRIATE OTHER PEOPLE'S INTELLECTUAL OUTPUT. THOU SHALT THINK ABOUT THE SOCIAL CONSEQUENCES OF THE PROGRAM YOU ARE WRITING OR THE SYSTEM YOU ARE DESIGNING. 10. THOU SHALT ALWAYS USE A COMPUTER IN WAYS THAT INSURE CONSIDERATION AND RESPECT FOR YOUR FELLOW HUMANS.
INTERNET & WORLD WIDE WEB
“Galactic Network” Concept - J.C.R. Licklider August 1962 Brief History of Internet Globally Interconnected computers To transmit and transfer data Head of DARPA – Defense Advanced Research Projects Agencies ARPANET – Advanced Research Project Agency Network 1967
DANGERS OF THE INTERNET
STATIC – flat or stationary (as is) W E B P A G E
DYNAMIC - information that changes, depending on the viewer, the time of the day, the time zone, the viewers native language, and other factors. W E B P A G E
1. CONVERGENCE – two or more things come together to form a new one TRENDS IN ICT 2. SOCIAL MEDIA a. Social Network b. Bookmarking Sites c. Social News d. Media Sharing e. Microblogging f. Blogs & forum
3. MOBILE TECHNOLOGIES a. ios b.Android c. Blackberry OS d. Windows Phone e. Symbian f. WebOS g. Windows Mobile 4. ASSISTIVE MEDIA TRENDS IN ICT
STATIC vs DYNAMIC
Online Security Internet Threats Protecting reputations NETIQUETTE
FIRST NAME – chances are, a hacker may already know plenty of stuff about you ONLINE SAFE OR NOT? LAST NAME – you will be vulnerable to being search and used as modus to several cybercrimes ABOUT SCHOOLS – most people may steal your identity and will be used for information verification NUMBER – avoid or do not post your number in public pages and someone might bother you through calls or text.
PARENTS NAME – again can be used for verification of identity ONLINE SAFE OR NOT? SIBLINGS – for verification ADDRESS – hackers, criminals may find you if given this information to untrusted sites HOME PHONE AND BIRTH DAY – makes you more vulnerable
DEFINED AS “INFORMATION SUPERHIGHWAY” INTERNET IS
MALWARE – Malicious Software 1. Virus – a software designed to harm files 2. Worm – self duplicating virus ( eg . ILOVEYOU) 3. Trojan – mostly hidden and disguised as a useful program 4. Spyware – runs in the background without knowing and may record or log everything you do. 5. Adware – Advertisement software that always pops-up INTERNET THREATS
SPAM – unwanted e-mails mostly BOT. Used to send Malware PHISHING – acquire sensitive personal information like password, credit card etc. INTERNET THREATS
Once you post it on the net, you have no control of who sees your posts Talk to someone or parents before you do something on the net Set your post to PRIVATE Avoid using names. Avoid posting that can affect reputations. THINK BEFORE YOU CLICK
ICT AS FLATFORM FOR CHANGE
ROLE OF ICT IN RECENT HISTORY EDSA (People Power Revolution ) – Radio Broadcasting & Television EDSA Dos – it would not have been successful without the TEXT BRIGADES. Protests and March – the help of Social Media Yolanda People Finder – people finder DATABASE by Google ICT AS FLATFORM FOR CHANGE
SOCIAL CAMPAIGN 20 mins Form a group of 8 members. Conceptualize a social campaign What are the things that your group think that could be better in your school or community? List down atleast five things. Choose one of the five you think is of highest priority and demands immediate action of CHANGE. Create a write-up about this problem. ICT AS FLATFORM FOR CHANGE
ICT Project Process Overview
PLANNING a. Conceptualizing your project b. Researching on available data about your project c. Setting deadlines and meetings d. Assigning people to various task e. Create your Website ICT AS FLATFORM FOR CHANGE
DEVELOPMENT involves the actual creation of website and production of images RELEASE AND PROMOTION – presentation of website to the public MAINTENANCE – continuing improvements and monitoring with feedback ICT AS FLATFORM FOR CHANGE
TAKE THE CHALLENGE! * Social Campaign proposal * write-up * Website planning * presentation ICT AS FLATFORM FOR CHANGE