SlideShare a Scribd company logo
1 of 14
Download to read offline
SOME ISSUES
ON ICT AND
INTERNET
POLICY AND
REGULATIONS
GLOBAL ISSUES
Access and Civil Liberties are two sets
of issues in ICT Policy which are
crucial to the modern society. The
other concern is civil liberties which
refer to human rights and freedom.
These include freedom of expression,
the right to privacy, the right to
communicate and intellectual
property rights.
2
Access to the Use of Internet and
ICT. Access means the possibility
for everyone to use the internet
and the other media. In richer
countries, basic access to internet
is almost available to all with
faster broadband connections.
There are still countries where
access to internet is still a
challenge.
3
Infringement to Civil
Liberties or human rights.
What are specific internet
issues on internet policy
that have relationship to
civil liberties or human
rights? Let’s sudy the
examples that follow.
4
Issue No.1: Freedom of
expression and Censorship
Under international human rights
conventions, all people are guaranteed
the rights for free expression. However,
with the shift from communication
through letter, newspaper and public
meetings to electronic communications
and on-line networking, a need to look
into how these new means modifies
the understanding of freedom of
expression and censorship. 5
6
The UN Universal Declaration of
Human Rights provides that
everyone has the right to
freedom of thought, conscience
and religion, likewise the right
to freedom of opinion and
expression. However, there are
practices that violate these
provisions in the use of
internet.
Some examples are the following:
▪ Individual
rights are
given up
in order to
have
access to
electronic
networks.
▪ Censorship restricts the
transmission of information by
blocking it or filtering the
information.
▪ Blocking is preventing access to
whole areas of internet based upon
the “blacklist” of certain internet
address, location or email address.
▪ Filtering is sifting the packets of
data or messages as they move
across computer networks and
eliminating those considered
“undesirable materials”.
▪ Defamation
actions
maybe used
to silence
critics. This
action deters
the freedom
of
expression.
7
Issue No.2: Privacy and Security
▪ Privacy policies are an issue
Most commercial sites have a
privacy policy. When someone
uses a site and click “I agree”
button, it is as if you have
turned over private information
to any authority that may
access it.
8
There are several types of privacy as shown by the following
examples.
9
1.Personal Privacy
The right of individuals
not to have their home,
private life or personal
life interfered.
2. Privacy of
Communication
The protection from
interference of
communications over the
phone
3. Information privacy
Related to the use of
computers and
communications system which
are able tto hold and process
information about large
numbers od people at a high
speed
Issue No.3: Surveillance and
Data Retention
▪ The use of electronic
communications has enhanced
the development of indirect
surveillance. In the indirect
surveillance, there is no direct
contact between the agent and
the subject of surveillance but
evidence of activities can be
traced.
10
There is very little that can be done to prevent
surveillance difficult. This is called “counter surveillance”
or “information security” if it refers to computers and
electric communication.
▪ Dataveillance
The use of
personal
information to
monitor a person’s
activities
▪ Data Retention
The storage and
use of information
from
communication
systems.
11
Issue No.4: E-pollutants fro
E-waste
▪ Large amount of e-waste is
generated by ICT. These are in
particular, terminal equipments
used for computing (PC’s laptops),
broadcasting (television and
radiosets), telephony (fixed and
mobile phones), and peripherals
(fax machines, printers and
scanners).
12
▪ The accumulated e-waste is due to rapid turnover of
equipment due to rapid improvement of software. While
material waste can be destroyed by crushing, toxic material
brought about by the different equipment requires utmost
management. The quantities of e-waste are increasing in
both developed and developing countries. A very dismissal
state is that there is a significant amount of electronic waste
that has been shipped from industrial countries to
developing countries, using less environmentally -
responsible procedure.
▪ Remedies include standardization and regularly measures to
increase the life cycle of equipment before they become
obsolete. Efficient extraction of toxic components and
13
Thank you!
Prepared by:
Ms. Josephine Pagunsan

More Related Content

Similar to PC213.L3.pdf

Chapter 6emerging technology - EMTE.pptx
Chapter 6emerging technology - EMTE.pptxChapter 6emerging technology - EMTE.pptx
Chapter 6emerging technology - EMTE.pptxTekle12
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 
What-is-Internet, all information about internet
What-is-Internet, all information about internetWhat-is-Internet, all information about internet
What-is-Internet, all information about internetArpitDalal8
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTLuckeylama
 
Security Regulatory Framework
Security Regulatory FrameworkSecurity Regulatory Framework
Security Regulatory Frameworkanthonywong
 
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...Stefano Maria De' Rossi
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problemijbuiiir1
 
Data privacy and security
Data privacy and securityData privacy and security
Data privacy and securitytoomz32
 
INFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdfINFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdfEarlvonDeiparine1
 
Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Yury Chemerkin
 
TSCM Overview for Stakeholders
TSCM Overview for StakeholdersTSCM Overview for Stakeholders
TSCM Overview for Stakeholderskevinwetzel
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communicationUc Man
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communicationUc Man
 
Draft data protection regn 2012
Draft data protection regn 2012Draft data protection regn 2012
Draft data protection regn 2012lilianedwards
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
 

Similar to PC213.L3.pdf (20)

Chapter 6 - EMTE.pptx
Chapter 6 - EMTE.pptxChapter 6 - EMTE.pptx
Chapter 6 - EMTE.pptx
 
Chapter 6emerging technology - EMTE.pptx
Chapter 6emerging technology - EMTE.pptxChapter 6emerging technology - EMTE.pptx
Chapter 6emerging technology - EMTE.pptx
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
What-is-Internet, all information about internet
What-is-Internet, all information about internetWhat-is-Internet, all information about internet
What-is-Internet, all information about internet
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
 
Security Regulatory Framework
Security Regulatory FrameworkSecurity Regulatory Framework
Security Regulatory Framework
 
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
 
Data privacy and security
Data privacy and securityData privacy and security
Data privacy and security
 
INFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdfINFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdf
 
Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207
 
It security & crimes
It security & crimesIt security & crimes
It security & crimes
 
TSCM Overview for Stakeholders
TSCM Overview for StakeholdersTSCM Overview for Stakeholders
TSCM Overview for Stakeholders
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communication
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communication
 
Draft data protection regn 2012
Draft data protection regn 2012Draft data protection regn 2012
Draft data protection regn 2012
 
9th
9th9th
9th
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Digital Divide.pptx
Digital Divide.pptxDigital Divide.pptx
Digital Divide.pptx
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 

Recently uploaded

Data Science Project: Advancements in Fetal Health Classification
Data Science Project: Advancements in Fetal Health ClassificationData Science Project: Advancements in Fetal Health Classification
Data Science Project: Advancements in Fetal Health ClassificationBoston Institute of Analytics
 
Call Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts Service
Call Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts Service
Call Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts Servicejennyeacort
 
Data Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptxData Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptxFurkanTasci3
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts ServiceSapana Sha
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 

Recently uploaded (20)

Data Science Project: Advancements in Fetal Health Classification
Data Science Project: Advancements in Fetal Health ClassificationData Science Project: Advancements in Fetal Health Classification
Data Science Project: Advancements in Fetal Health Classification
 
Russian Call Girls Dwarka Sector 15 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Dwarka Sector 15 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...Russian Call Girls Dwarka Sector 15 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Dwarka Sector 15 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
 
Call Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts Service
Call Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts Service
Call Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts Service
 
Data Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptxData Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptx
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts Service
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 

PC213.L3.pdf

  • 1. SOME ISSUES ON ICT AND INTERNET POLICY AND REGULATIONS
  • 2. GLOBAL ISSUES Access and Civil Liberties are two sets of issues in ICT Policy which are crucial to the modern society. The other concern is civil liberties which refer to human rights and freedom. These include freedom of expression, the right to privacy, the right to communicate and intellectual property rights. 2
  • 3. Access to the Use of Internet and ICT. Access means the possibility for everyone to use the internet and the other media. In richer countries, basic access to internet is almost available to all with faster broadband connections. There are still countries where access to internet is still a challenge. 3
  • 4. Infringement to Civil Liberties or human rights. What are specific internet issues on internet policy that have relationship to civil liberties or human rights? Let’s sudy the examples that follow. 4
  • 5. Issue No.1: Freedom of expression and Censorship Under international human rights conventions, all people are guaranteed the rights for free expression. However, with the shift from communication through letter, newspaper and public meetings to electronic communications and on-line networking, a need to look into how these new means modifies the understanding of freedom of expression and censorship. 5
  • 6. 6 The UN Universal Declaration of Human Rights provides that everyone has the right to freedom of thought, conscience and religion, likewise the right to freedom of opinion and expression. However, there are practices that violate these provisions in the use of internet.
  • 7. Some examples are the following: ▪ Individual rights are given up in order to have access to electronic networks. ▪ Censorship restricts the transmission of information by blocking it or filtering the information. ▪ Blocking is preventing access to whole areas of internet based upon the “blacklist” of certain internet address, location or email address. ▪ Filtering is sifting the packets of data or messages as they move across computer networks and eliminating those considered “undesirable materials”. ▪ Defamation actions maybe used to silence critics. This action deters the freedom of expression. 7
  • 8. Issue No.2: Privacy and Security ▪ Privacy policies are an issue Most commercial sites have a privacy policy. When someone uses a site and click “I agree” button, it is as if you have turned over private information to any authority that may access it. 8
  • 9. There are several types of privacy as shown by the following examples. 9 1.Personal Privacy The right of individuals not to have their home, private life or personal life interfered. 2. Privacy of Communication The protection from interference of communications over the phone 3. Information privacy Related to the use of computers and communications system which are able tto hold and process information about large numbers od people at a high speed
  • 10. Issue No.3: Surveillance and Data Retention ▪ The use of electronic communications has enhanced the development of indirect surveillance. In the indirect surveillance, there is no direct contact between the agent and the subject of surveillance but evidence of activities can be traced. 10
  • 11. There is very little that can be done to prevent surveillance difficult. This is called “counter surveillance” or “information security” if it refers to computers and electric communication. ▪ Dataveillance The use of personal information to monitor a person’s activities ▪ Data Retention The storage and use of information from communication systems. 11
  • 12. Issue No.4: E-pollutants fro E-waste ▪ Large amount of e-waste is generated by ICT. These are in particular, terminal equipments used for computing (PC’s laptops), broadcasting (television and radiosets), telephony (fixed and mobile phones), and peripherals (fax machines, printers and scanners). 12
  • 13. ▪ The accumulated e-waste is due to rapid turnover of equipment due to rapid improvement of software. While material waste can be destroyed by crushing, toxic material brought about by the different equipment requires utmost management. The quantities of e-waste are increasing in both developed and developing countries. A very dismissal state is that there is a significant amount of electronic waste that has been shipped from industrial countries to developing countries, using less environmentally - responsible procedure. ▪ Remedies include standardization and regularly measures to increase the life cycle of equipment before they become obsolete. Efficient extraction of toxic components and 13
  • 14. Thank you! Prepared by: Ms. Josephine Pagunsan