SlideShare a Scribd company logo
1 of 46
Privacy & Freedom
of Expression
Prepared by: Mark Jhon C. Oxillo
PRIVACY
THE RIGHT TO PRIVACY
• The right to be left alone – the
most comprehensive of rights,
and the right most valued by a
free people
INFORMATION PRIVACY
• First coined Roger Clarke,
director of Australian
Privacy Foundation
• Is the combination of
communications privacy and
data privacy
COMMUNICATIONS PRIVACY
• the ability to communicate with
others without those
communications being monitored
by other persons or organization
DATA PRIVACY
• the ability to limit access one’s
personal data by other individuals
and organizations in order to
exercise a substantial degree of
control over that data and its use
Republic Act 10173
• Or the Data Privacy Act of 2012 (PH)
• is a law that seeks to protect all forms of
information, be it private, personal, or
sensitive. It is meant to cover both
natural and juridical persons involved in
the processing of personal information.
Republic Act 10173
• This comprehensive privacy law
also established a National
Privacy Commission that
enforces and oversees it and is
endowed with rulemaking power.
Republic Act 10173
OPT OUT POLICY
• To refuse to give an
institution the right to
collect and share
personal data
OPT IN POLICY
• To give an institution
the right to collect and
share personal data
KEY PRIVACY AND
ANONYMITY ISSUES
IDENTITY THEFT
• Occurs when someone steals key
pieces of personal information to
impersonate a person. This
information may include data such
as name, address, date of birth, SSS
number, passport number, driver’s
license number, etc.
VISHING
• is the telephone equivalent of
phishing. It is described as the act of
using the telephone in an attempt
to scam the user into surrendering
private information that will be used
for identity theft.
ELECTRONIC DISCOVERY
• Is the collection, preparation,
review and production of
electronically stored information
for use in criminal and civil
actions and proceedings
• Includes any form of digital
information such as emails,
drawings, graphs, web pages,
photographs, word-processing
files, sound recording and
databases
CONSUMER PROFILING
• Collecting personal information
about internet users when they
register at websites, complete
survey, fill out forms or enter
contests online
CLICK-STREAM DATA
• Information gathered
by monitoring a
consumer’s online
activity
BEACONS
• Are small pieces of software
that run on a web page and are
able to track what a viewer is
doing on the page, such as
what is being typed or where
the mouse is moving
PERSONALIZATION
SOFTWARE
• Used to optimize the
number, frequency, and
mixture of their ad
placement and to evaluate
how visitors react to new ads
MEASURES TO IMPROVE
THE PROTECTION OF
CONSUMER PRIVACY:
• Implementing a “Do Not Track”
option for web browsing
software that would keep online
services from collecting surfing
or ad-targeting data
MEASURES TO IMPROVE
THE PROTECTION OF
CONSUMER PRIVACY:
• Requiring that companies collect
only the data they need and
then delete it after it has met its
purpose
MEASURES TO IMPROVE
THE PROTECTION OF
CONSUMER PRIVACY:
• Requiring that online companies
simplify their privacy policies so
that consumers can read and
understand them
CHIEF PRIVACY OFFICER
(CPO):
• a senior manager within an
organization whose role is to ensure
that the organization does not
violate government regulations
while reassuring customers that
their privacy will be protected
FREEDOM OF
EXPRESSION
FREEDOM OF EXPRESSION
• The right to freedom of
expression is one of the most
important rights for free
people everywhere.
FREEDOM OF EXPRESSION
• Right to express one's ideas and
opinions freely through speech,
writing, and other forms of
communication but without
deliberately causing harm to others'
character and/or reputation by false
or misleading statements.
TYPES OF SPEECHES
• OBSCENE SPEECH
• DEFAMATION
• PERJURY
• FRAUD
• INCITEMENT OF
PANIC
• INCITEMENT TO
CRIME
• “FIGHTING
WORDS”
• HATE SPEECH
• SEDITION
OBSCENE SPEECH
• Appeals to “prurient interest”
(causes lust)
• “Obviously offensive” description
of defined sexual conduct
• No serious literary, artistic,
political, or scientific value
DEFAMATION
• Oral or written statement of
alleged fact that is false and
harms another person
* Slander - oral defamatory
statement
* Libel - written defamatory
statement
PERJURY
• is the intentional act of
swearing a false oath or
falsifying an affirmation to tell
the truth, whether spoken or in
writing, concerning matters
material to an official
proceeding.
FRAUD
• is intentional deception
to secure unfair or
unlawful gain, or to
deprive a victim of a legal
right.
INCITEMENT OF PANIC
• is when a person causes
the evacuation of any
public place, or otherwise
cause serious public
inconvenience or alarm
INCITEMENT TO CRIME
• is the encouragement
of another person to
commit a crime
FIGHTING WORDS
• are written or spoken words
intended to incite hatred or
violence from their target
• are words indicating a
willingness to fight or
challenge someone
HATE SPEECH
• abusive or threatening
speech or writing that
expresses prejudice against a
particular group, especially
on the basis of race, religion,
or sexual orientation.
SEDITION
• a conduct or speech
inciting people to rebel
against the authority of
a state or monarch
Article III (Bill of Rights)
• Section 4. No law shall be passed
abridging the freedom of speech, of
expression, or of the press, or the right
of the people peaceably to assemble
and petition the government for redress
of grievances.
FOE: KEY ISSUES
• Controlling access to information on
the Internet
• Anonymity on the Internet
• Defamation and hate speech
• Corporate blogging
• Pornography
FOE: KEY ISSUES
Controlling access to information on
the Internet:
• Internet Filter – a software that can
be used to block access to certain
websites that contain material
deemed inappropriate or offensive
FOE: KEY ISSUES
Anonymity on the Internet
• Anonymous Expression – the
expression of opinions by people
who do not reveal their identity
FOE: KEY ISSUES
Defamation and Hate Speech
• Ex: A threatening private message
sent over the internet to a person,
and a libel directed at a particular
person can be punishable by law.
FOE: KEY ISSUES
Corporate Blogging
• is the practice of allowing
employees to create their own
personal blogs relating to their
employment
FOE: KEY ISSUES
Pornography
• often colloquially referred to as porn,
is any material — whether written,
visual, or others — that consists of
sexually explicit material and that is
intended to sexually arouse.
FOE: KEY ISSUES
Sexting
• sending sexual messages, nudes
or seminude photos or sexually
explicit videos over a cellphone
END

More Related Content

What's hot

Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internetmoldovaictsummit2016
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime AwarenessSibesh Singh
 
Digital law
Digital lawDigital law
Digital lawzrh48
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimesNilendra Kumar
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyThoughtworks
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxRambilashTudu
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Anirudhya Reevu
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crimeAbhinav Tyagi
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 

What's hot (20)

Identity theft
Identity theftIdentity theft
Identity theft
 
Cyberstalking
Cyberstalking Cyberstalking
Cyberstalking
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Digital law
Digital lawDigital law
Digital law
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimes
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny Leroy
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 

Similar to Privacy and Freedom of Expression

Mass Media and Society Chapter 15: Media and Government
Mass Media and Society Chapter 15: Media and GovernmentMass Media and Society Chapter 15: Media and Government
Mass Media and Society Chapter 15: Media and Governmentczavisca
 
Free Speech and Hate Speech: Regulatory Challenge of Internet Freedom in Nigeria
Free Speech and Hate Speech: Regulatory Challenge of Internet Freedom in NigeriaFree Speech and Hate Speech: Regulatory Challenge of Internet Freedom in Nigeria
Free Speech and Hate Speech: Regulatory Challenge of Internet Freedom in NigeriaNzeih Chukwuemeka
 
Using Social Media Ethically
Using Social Media EthicallyUsing Social Media Ethically
Using Social Media EthicallyJack Pringle
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchangeleejhayacosido
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchangeJhouBautista
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchangeorosalobarbio
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchangeorosalegaspi
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchangerommelaa
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchangeleejhayacosido
 
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfLEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfRegineManuel2
 
9-ictasplatformforchange-180206004734.pptx
9-ictasplatformforchange-180206004734.pptx9-ictasplatformforchange-180206004734.pptx
9-ictasplatformforchange-180206004734.pptxKenneth James Alamillo
 
9-ictasplatformforchange-180206004734(1).pptx
9-ictasplatformforchange-180206004734(1).pptx9-ictasplatformforchange-180206004734(1).pptx
9-ictasplatformforchange-180206004734(1).pptxBenjieBarlaan
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesMark Jhon Oxillo
 
9-ictasplatformforchange-180206004734.pdf
9-ictasplatformforchange-180206004734.pdf9-ictasplatformforchange-180206004734.pdf
9-ictasplatformforchange-180206004734.pdfRegineArellano2
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk Endcode_org
 

Similar to Privacy and Freedom of Expression (20)

Privacy
PrivacyPrivacy
Privacy
 
Privacy
PrivacyPrivacy
Privacy
 
Mass Media and Society Chapter 15: Media and Government
Mass Media and Society Chapter 15: Media and GovernmentMass Media and Society Chapter 15: Media and Government
Mass Media and Society Chapter 15: Media and Government
 
Free Speech and Hate Speech: Regulatory Challenge of Internet Freedom in Nigeria
Free Speech and Hate Speech: Regulatory Challenge of Internet Freedom in NigeriaFree Speech and Hate Speech: Regulatory Challenge of Internet Freedom in Nigeria
Free Speech and Hate Speech: Regulatory Challenge of Internet Freedom in Nigeria
 
Using Social Media Ethically
Using Social Media EthicallyUsing Social Media Ethically
Using Social Media Ethically
 
Cyber defamtion
Cyber defamtionCyber defamtion
Cyber defamtion
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfLEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
 
Chapter 5_dp-_pertemuan_7_8
 Chapter 5_dp-_pertemuan_7_8 Chapter 5_dp-_pertemuan_7_8
Chapter 5_dp-_pertemuan_7_8
 
9-ictasplatformforchange-180206004734.pptx
9-ictasplatformforchange-180206004734.pptx9-ictasplatformforchange-180206004734.pptx
9-ictasplatformforchange-180206004734.pptx
 
9-ictasplatformforchange-180206004734(1).pptx
9-ictasplatformforchange-180206004734(1).pptx9-ictasplatformforchange-180206004734(1).pptx
9-ictasplatformforchange-180206004734(1).pptx
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment Technologies
 
9-ictasplatformforchange-180206004734.pdf
9-ictasplatformforchange-180206004734.pdf9-ictasplatformforchange-180206004734.pdf
9-ictasplatformforchange-180206004734.pdf
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
 

More from Mark Jhon Oxillo

FIELD STUDY (FS) 6 - EPISODE 3 (2018)
FIELD STUDY (FS) 6 - EPISODE 3 (2018)FIELD STUDY (FS) 6 - EPISODE 3 (2018)
FIELD STUDY (FS) 6 - EPISODE 3 (2018)Mark Jhon Oxillo
 
FIELD STUDY (FS) 6 - EPISODE 1 (2018)
FIELD STUDY (FS) 6 - EPISODE 1 (2018)FIELD STUDY (FS) 6 - EPISODE 1 (2018)
FIELD STUDY (FS) 6 - EPISODE 1 (2018)Mark Jhon Oxillo
 
Field Study 2 (FS 2) - Episode 3 [2018]
Field Study 2 (FS 2) - Episode 3 [2018]Field Study 2 (FS 2) - Episode 3 [2018]
Field Study 2 (FS 2) - Episode 3 [2018]Mark Jhon Oxillo
 
Ethics for IT Workers and IT Users
Ethics for IT Workers and IT UsersEthics for IT Workers and IT Users
Ethics for IT Workers and IT UsersMark Jhon Oxillo
 
An Overview of Ethics for IT Professionals
An Overview of Ethics for IT ProfessionalsAn Overview of Ethics for IT Professionals
An Overview of Ethics for IT ProfessionalsMark Jhon Oxillo
 
Introduction to the Study of Government and Constitution
Introduction to the Study of Government and ConstitutionIntroduction to the Study of Government and Constitution
Introduction to the Study of Government and ConstitutionMark Jhon Oxillo
 
Readings in Philippine History - Introduction to Philippine History
Readings in Philippine History - Introduction to Philippine HistoryReadings in Philippine History - Introduction to Philippine History
Readings in Philippine History - Introduction to Philippine HistoryMark Jhon Oxillo
 
The Significant Relationship of Physics - Mechanics & Heat and Discrete Math...
 The Significant Relationship of Physics - Mechanics & Heat and Discrete Math... The Significant Relationship of Physics - Mechanics & Heat and Discrete Math...
The Significant Relationship of Physics - Mechanics & Heat and Discrete Math...Mark Jhon Oxillo
 
The Saber Tooth Curriculum
The Saber Tooth CurriculumThe Saber Tooth Curriculum
The Saber Tooth CurriculumMark Jhon Oxillo
 
Field Study 2 (FS 2) - Episode 2 [2018]
Field Study 2 (FS 2) - Episode 2 [2018]Field Study 2 (FS 2) - Episode 2 [2018]
Field Study 2 (FS 2) - Episode 2 [2018]Mark Jhon Oxillo
 
Civil Service (CS) Examination Reviewer
Civil Service (CS) Examination ReviewerCivil Service (CS) Examination Reviewer
Civil Service (CS) Examination ReviewerMark Jhon Oxillo
 
Reflecting on the ICT Learning Process
Reflecting on the ICT Learning ProcessReflecting on the ICT Learning Process
Reflecting on the ICT Learning ProcessMark Jhon Oxillo
 
Sustaining an ICT Project for Social Change
Sustaining an ICT Project for Social ChangeSustaining an ICT Project for Social Change
Sustaining an ICT Project for Social ChangeMark Jhon Oxillo
 
ICT Project Publication and Statistics
ICT Project Publication and StatisticsICT Project Publication and Statistics
ICT Project Publication and StatisticsMark Jhon Oxillo
 
ICT Project for Social Change - Empowerment Technologies
ICT Project for Social Change - Empowerment TechnologiesICT Project for Social Change - Empowerment Technologies
ICT Project for Social Change - Empowerment TechnologiesMark Jhon Oxillo
 
Interactive Multimedia - Empowerment Technologies
 Interactive Multimedia - Empowerment Technologies Interactive Multimedia - Empowerment Technologies
Interactive Multimedia - Empowerment TechnologiesMark Jhon Oxillo
 
Collaborative ICT Development - Empowerment Technologies
Collaborative ICT Development - Empowerment TechnologiesCollaborative ICT Development - Empowerment Technologies
Collaborative ICT Development - Empowerment TechnologiesMark Jhon Oxillo
 
Online Platforms for ICT Content Development - Empowerment Technologies
Online Platforms for ICT Content Development - Empowerment TechnologiesOnline Platforms for ICT Content Development - Empowerment Technologies
Online Platforms for ICT Content Development - Empowerment TechnologiesMark Jhon Oxillo
 

More from Mark Jhon Oxillo (20)

Social Networking
Social NetworkingSocial Networking
Social Networking
 
Software Development
Software DevelopmentSoftware Development
Software Development
 
FIELD STUDY (FS) 6 - EPISODE 3 (2018)
FIELD STUDY (FS) 6 - EPISODE 3 (2018)FIELD STUDY (FS) 6 - EPISODE 3 (2018)
FIELD STUDY (FS) 6 - EPISODE 3 (2018)
 
FIELD STUDY (FS) 6 - EPISODE 1 (2018)
FIELD STUDY (FS) 6 - EPISODE 1 (2018)FIELD STUDY (FS) 6 - EPISODE 1 (2018)
FIELD STUDY (FS) 6 - EPISODE 1 (2018)
 
Field Study 2 (FS 2) - Episode 3 [2018]
Field Study 2 (FS 2) - Episode 3 [2018]Field Study 2 (FS 2) - Episode 3 [2018]
Field Study 2 (FS 2) - Episode 3 [2018]
 
Ethics for IT Workers and IT Users
Ethics for IT Workers and IT UsersEthics for IT Workers and IT Users
Ethics for IT Workers and IT Users
 
An Overview of Ethics for IT Professionals
An Overview of Ethics for IT ProfessionalsAn Overview of Ethics for IT Professionals
An Overview of Ethics for IT Professionals
 
Introduction to the Study of Government and Constitution
Introduction to the Study of Government and ConstitutionIntroduction to the Study of Government and Constitution
Introduction to the Study of Government and Constitution
 
Readings in Philippine History - Introduction to Philippine History
Readings in Philippine History - Introduction to Philippine HistoryReadings in Philippine History - Introduction to Philippine History
Readings in Philippine History - Introduction to Philippine History
 
The Significant Relationship of Physics - Mechanics & Heat and Discrete Math...
 The Significant Relationship of Physics - Mechanics & Heat and Discrete Math... The Significant Relationship of Physics - Mechanics & Heat and Discrete Math...
The Significant Relationship of Physics - Mechanics & Heat and Discrete Math...
 
The Saber Tooth Curriculum
The Saber Tooth CurriculumThe Saber Tooth Curriculum
The Saber Tooth Curriculum
 
Field Study 2 (FS 2) - Episode 2 [2018]
Field Study 2 (FS 2) - Episode 2 [2018]Field Study 2 (FS 2) - Episode 2 [2018]
Field Study 2 (FS 2) - Episode 2 [2018]
 
Civil Service (CS) Examination Reviewer
Civil Service (CS) Examination ReviewerCivil Service (CS) Examination Reviewer
Civil Service (CS) Examination Reviewer
 
Reflecting on the ICT Learning Process
Reflecting on the ICT Learning ProcessReflecting on the ICT Learning Process
Reflecting on the ICT Learning Process
 
Sustaining an ICT Project for Social Change
Sustaining an ICT Project for Social ChangeSustaining an ICT Project for Social Change
Sustaining an ICT Project for Social Change
 
ICT Project Publication and Statistics
ICT Project Publication and StatisticsICT Project Publication and Statistics
ICT Project Publication and Statistics
 
ICT Project for Social Change - Empowerment Technologies
ICT Project for Social Change - Empowerment TechnologiesICT Project for Social Change - Empowerment Technologies
ICT Project for Social Change - Empowerment Technologies
 
Interactive Multimedia - Empowerment Technologies
 Interactive Multimedia - Empowerment Technologies Interactive Multimedia - Empowerment Technologies
Interactive Multimedia - Empowerment Technologies
 
Collaborative ICT Development - Empowerment Technologies
Collaborative ICT Development - Empowerment TechnologiesCollaborative ICT Development - Empowerment Technologies
Collaborative ICT Development - Empowerment Technologies
 
Online Platforms for ICT Content Development - Empowerment Technologies
Online Platforms for ICT Content Development - Empowerment TechnologiesOnline Platforms for ICT Content Development - Empowerment Technologies
Online Platforms for ICT Content Development - Empowerment Technologies
 

Recently uploaded

KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 

Recently uploaded (20)

KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 

Privacy and Freedom of Expression

  • 1. Privacy & Freedom of Expression Prepared by: Mark Jhon C. Oxillo
  • 3. THE RIGHT TO PRIVACY • The right to be left alone – the most comprehensive of rights, and the right most valued by a free people
  • 4. INFORMATION PRIVACY • First coined Roger Clarke, director of Australian Privacy Foundation • Is the combination of communications privacy and data privacy
  • 5. COMMUNICATIONS PRIVACY • the ability to communicate with others without those communications being monitored by other persons or organization
  • 6. DATA PRIVACY • the ability to limit access one’s personal data by other individuals and organizations in order to exercise a substantial degree of control over that data and its use
  • 7. Republic Act 10173 • Or the Data Privacy Act of 2012 (PH) • is a law that seeks to protect all forms of information, be it private, personal, or sensitive. It is meant to cover both natural and juridical persons involved in the processing of personal information.
  • 8. Republic Act 10173 • This comprehensive privacy law also established a National Privacy Commission that enforces and oversees it and is endowed with rulemaking power.
  • 10. OPT OUT POLICY • To refuse to give an institution the right to collect and share personal data
  • 11. OPT IN POLICY • To give an institution the right to collect and share personal data
  • 13. IDENTITY THEFT • Occurs when someone steals key pieces of personal information to impersonate a person. This information may include data such as name, address, date of birth, SSS number, passport number, driver’s license number, etc.
  • 14. VISHING • is the telephone equivalent of phishing. It is described as the act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
  • 15. ELECTRONIC DISCOVERY • Is the collection, preparation, review and production of electronically stored information for use in criminal and civil actions and proceedings
  • 16. • Includes any form of digital information such as emails, drawings, graphs, web pages, photographs, word-processing files, sound recording and databases
  • 17. CONSUMER PROFILING • Collecting personal information about internet users when they register at websites, complete survey, fill out forms or enter contests online
  • 18. CLICK-STREAM DATA • Information gathered by monitoring a consumer’s online activity
  • 19. BEACONS • Are small pieces of software that run on a web page and are able to track what a viewer is doing on the page, such as what is being typed or where the mouse is moving
  • 20. PERSONALIZATION SOFTWARE • Used to optimize the number, frequency, and mixture of their ad placement and to evaluate how visitors react to new ads
  • 21. MEASURES TO IMPROVE THE PROTECTION OF CONSUMER PRIVACY: • Implementing a “Do Not Track” option for web browsing software that would keep online services from collecting surfing or ad-targeting data
  • 22. MEASURES TO IMPROVE THE PROTECTION OF CONSUMER PRIVACY: • Requiring that companies collect only the data they need and then delete it after it has met its purpose
  • 23. MEASURES TO IMPROVE THE PROTECTION OF CONSUMER PRIVACY: • Requiring that online companies simplify their privacy policies so that consumers can read and understand them
  • 24. CHIEF PRIVACY OFFICER (CPO): • a senior manager within an organization whose role is to ensure that the organization does not violate government regulations while reassuring customers that their privacy will be protected
  • 26. FREEDOM OF EXPRESSION • The right to freedom of expression is one of the most important rights for free people everywhere.
  • 27. FREEDOM OF EXPRESSION • Right to express one's ideas and opinions freely through speech, writing, and other forms of communication but without deliberately causing harm to others' character and/or reputation by false or misleading statements.
  • 28. TYPES OF SPEECHES • OBSCENE SPEECH • DEFAMATION • PERJURY • FRAUD • INCITEMENT OF PANIC • INCITEMENT TO CRIME • “FIGHTING WORDS” • HATE SPEECH • SEDITION
  • 29. OBSCENE SPEECH • Appeals to “prurient interest” (causes lust) • “Obviously offensive” description of defined sexual conduct • No serious literary, artistic, political, or scientific value
  • 30. DEFAMATION • Oral or written statement of alleged fact that is false and harms another person * Slander - oral defamatory statement * Libel - written defamatory statement
  • 31. PERJURY • is the intentional act of swearing a false oath or falsifying an affirmation to tell the truth, whether spoken or in writing, concerning matters material to an official proceeding.
  • 32. FRAUD • is intentional deception to secure unfair or unlawful gain, or to deprive a victim of a legal right.
  • 33. INCITEMENT OF PANIC • is when a person causes the evacuation of any public place, or otherwise cause serious public inconvenience or alarm
  • 34. INCITEMENT TO CRIME • is the encouragement of another person to commit a crime
  • 35. FIGHTING WORDS • are written or spoken words intended to incite hatred or violence from their target • are words indicating a willingness to fight or challenge someone
  • 36. HATE SPEECH • abusive or threatening speech or writing that expresses prejudice against a particular group, especially on the basis of race, religion, or sexual orientation.
  • 37. SEDITION • a conduct or speech inciting people to rebel against the authority of a state or monarch
  • 38. Article III (Bill of Rights) • Section 4. No law shall be passed abridging the freedom of speech, of expression, or of the press, or the right of the people peaceably to assemble and petition the government for redress of grievances.
  • 39. FOE: KEY ISSUES • Controlling access to information on the Internet • Anonymity on the Internet • Defamation and hate speech • Corporate blogging • Pornography
  • 40. FOE: KEY ISSUES Controlling access to information on the Internet: • Internet Filter – a software that can be used to block access to certain websites that contain material deemed inappropriate or offensive
  • 41. FOE: KEY ISSUES Anonymity on the Internet • Anonymous Expression – the expression of opinions by people who do not reveal their identity
  • 42. FOE: KEY ISSUES Defamation and Hate Speech • Ex: A threatening private message sent over the internet to a person, and a libel directed at a particular person can be punishable by law.
  • 43. FOE: KEY ISSUES Corporate Blogging • is the practice of allowing employees to create their own personal blogs relating to their employment
  • 44. FOE: KEY ISSUES Pornography • often colloquially referred to as porn, is any material — whether written, visual, or others — that consists of sexually explicit material and that is intended to sexually arouse.
  • 45. FOE: KEY ISSUES Sexting • sending sexual messages, nudes or seminude photos or sexually explicit videos over a cellphone
  • 46. END