SlideShare a Scribd company logo
Social Media, Web 2.0 The end of Privacy ? Jacques Folon Partner Edge Consulting Lecturer ICHEC Visiting professor  Université de Liège & Université de Metz
Find the presentation on www.slideshare.net/folon
Table of Contents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chargé de cours Partner Auteur http://be.linkedin.com/in/folon [email_address] www.ichec.be [email_address] www.edge-conulting.biz Administrateur
Follow me on scoop it for the latest news  on data privacy and security http://www.scoop.it/t/management-2-entreprise-2-0
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
4 By giving people the power to share, we're making the world more transparent.  The question isn't, 'What do we want to know about people?', It's, 'What do people want to tell about themselves?' Data pricavy is outdated ! Mark Zuckerberg, CEO Facebook If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place.  Eric Schmidt, ex- CEO of Googe
 
 
 
 
So is it still a question? ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What your boss thinks...
Good question ? 10
Employees share (too) many information and also with third parties
Some news
Where the data are
 
Legal issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],5
Source :  https://www.britestream.com/difference.html .
Everything must be transparent
 
legal framework (s)
 
Some important legal definitions
Personal data Any information relating to an identified or identifiable person ('data subject') who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more specific factors (physical, physiological, mental, economic, cultural, social).
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],When is it «legal»? Source: http://ec.europa.eu/justice/data-protection/index_en.htm
Data subject An identified or identifiable person to whom specific personal data relates. It is someone who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more specific factors (physical, physiological, mental, economic, cultural, social).
Processing of personal data Processing of personal data means any operation or set of operations which is  performed upon personal data , whether or not by automatic means (for example: collection, recording, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, deleting or destruction, etc.). Source: http://ec.europa.eu/justice/data-protection/index_en.htm
Controller Natural or legal person, public authority, agency or any other body which,  alone or jointly with others , determines the purposes and means of the processing of personal data.
The data controller must respect certain rules: Source: http://ec.europa.eu/justice/data-protection/data-collection/obligations/index_en.htm ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source: http://ec.europa.eu/justice/data-protection/index_en.htm
the law prohibits the processing of personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, trade-union membership, and the processing of data concerning health or sex life unless one of the exception criteria is met.
exchange of data...
 
Coockies
international transfer
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Privacy statement confusion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source: TRUSTe survey
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How many information? 67
 
 
Could the employer control everything?
Control ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Are posting on social media private? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TELEWORKING
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
They know where you are ...
Source: http://www.slideshare.net/peterkaptein/post-privacy-era
Source: http://www.slideshare.net/peterkaptein/post-privacy-era
 
 
 
 
Making sure you can call GSM Cell GSM Cell GSM Cell Source: http://www.slideshare.net/peterkaptein/post-privacy-era You
Tool: Triangulation Database Data Data Data Data Source: http://www.slideshare.net/peterkaptein/post-privacy-era You
“You are here” Database Data Data Data Source: http://www.slideshare.net/peterkaptein/post-privacy-era You
 
 
 
 
Tracking: defining actions Friday, 12:45 12:47 12:52 13:30 13:50 13:25 13:45 Purchase Purchase Phone call Source: http://www.slideshare.net/peterkaptein/post-privacy-era Phone ID Payment Face recog.
Tracking: Matching GSM Cell data Payment data Biometric data - Identity - Action - Location - Time Source: http://www.slideshare.net/peterkaptein/post-privacy-era
Tracking: Data collection Friday, 12:45 Other people You Source: http://www.slideshare.net/peterkaptein/post-privacy-era Phone ID Payment Face recog. You
Filtering the data Sunday, 12:45 Dam Square Other people Maybe you Monday, 14:15 Abbey road You Tuesday, 09:45 Johns Bagels Matches now + past Source: http://www.slideshare.net/peterkaptein/post-privacy-era Phone ID Payment Face recog.
Result ,[object Object],[object Object],[object Object],[object Object],Source: http://www.slideshare.net/peterkaptein/post-privacy-era
 
 
DATA THEFT
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What do they know?
Building your profile Source: http://www.slideshare.net/peterkaptein/post-privacy-era You
Building your profile Medical data Financial data Family Friends Prefe-rences Private stuff Incrimina-ting stuff Where-abouts Photo’s Source: http://www.slideshare.net/peterkaptein/post-privacy-era You
Building your profile Medical data Financial data Family Friends Prefe-rences Private stuff Incrimina-ting stuff Expenses Budgets Where-abouts Connect-ions Photo’s Opinions Travels Commutes Photo’s Sexual Sexual Photo’s Literature Consumer People Diseases Current state Personal data Source: http://www.slideshare.net/peterkaptein/post-privacy-era You
How? GSM Cell data Phone calls Payment data Whereabouts via  biometric data Bonus card data Medical data Browsing data Profile database Travel data Google searches Source: http://www.slideshare.net/peterkaptein/post-privacy-era
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
48
45 Implication for HR
8.1 before recruiting
8.1.1. roles & responsibilities
52 ,[object Object],[object Object],[object Object],[object Object]
53 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
54 TESTS ASSESMENTS SOCIAL MEDIA CHECK CV Screening
55
[object Object],[object Object],[object Object],[object Object],57 8.1.3 employment conditions
58 8.2 during the contract
[object Object],[object Object],[object Object],[object Object],[object Object],59 8.2.1 Management responsibilities
8.2.2 Training and awareness
[object Object],[object Object],[object Object],61 8.2.3 Disciplinary process
62 8.3.1 End of contract ,[object Object],[object Object],[object Object]
63
8.3.3.Cancel access rights
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Is this your data security ?
Social media are there... +500 M users today reaching 1 billion by 2012 85 M users today 70 M users today 120 M users today 74 M users today 10 M users today
Géolocalisation
http://projectvirginia.com/infographic-emerging-media-in-2011/
It’s not only the so-called generation Y
 
 
Recrutement et media sociaux
Source: http://www.doppelganger.name
Your boss thinking of data privacy ?
Or ?
86 Remember that security of personnal data is a legal requirement...
87 “ It is not the strongest of the species that survives,  nor the most intelligent that survives.  It is the one that is the most adaptable to change.” C. Darwin
 
QUESTIONS ?
 

More Related Content

What's hot

Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
Hajarul Cikyen
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
Matthew Momney
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
canadianlawyer
 

What's hot (20)

Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media Privacy
 
Data breach
Data breachData breach
Data breach
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
 
Privacy and Data Protection
Privacy and Data ProtectionPrivacy and Data Protection
Privacy and Data Protection
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
Data protection
Data protectionData protection
Data protection
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Social Media and Law Enforcement - Presentation by Central Bureau of Investi...
Social Media and Law Enforcement  - Presentation by Central Bureau of Investi...Social Media and Law Enforcement  - Presentation by Central Bureau of Investi...
Social Media and Law Enforcement - Presentation by Central Bureau of Investi...
 
Social media-policy-presentation
Social media-policy-presentationSocial media-policy-presentation
Social media-policy-presentation
 
[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance
 

Viewers also liked

الخصوصية في الشبكات الإجتماعية
 الخصوصية في الشبكات الإجتماعية الخصوصية في الشبكات الإجتماعية
الخصوصية في الشبكات الإجتماعية
hatem1981
 
Is social media the end of privacy?
Is social media the end of privacy?Is social media the end of privacy?
Is social media the end of privacy?
Mathias Klang
 
Privacy in social media: so what?
Privacy in social media: so what?Privacy in social media: so what?
Privacy in social media: so what?
Mathias Klang
 

Viewers also liked (11)

الخصوصية في الشبكات الإجتماعية
 الخصوصية في الشبكات الإجتماعية الخصوصية في الشبكات الإجتماعية
الخصوصية في الشبكات الإجتماعية
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy Concerns
 
Is social media the end of privacy?
Is social media the end of privacy?Is social media the end of privacy?
Is social media the end of privacy?
 
Prof. Hendrik Speck - Privacy and Social Networks
Prof. Hendrik Speck - Privacy and Social NetworksProf. Hendrik Speck - Privacy and Social Networks
Prof. Hendrik Speck - Privacy and Social Networks
 
Privacy in social media: so what?
Privacy in social media: so what?Privacy in social media: so what?
Privacy in social media: so what?
 
Privacy and Security in Online Social : Privacy and Pictures on Online Social...
Privacy and Security in Online Social : Privacy and Pictures on Online Social...Privacy and Security in Online Social : Privacy and Pictures on Online Social...
Privacy and Security in Online Social : Privacy and Pictures on Online Social...
 
Privacy and Security in Online Social Media : Misinformation on Social Media
Privacy and Security in Online Social Media : Misinformation on Social MediaPrivacy and Security in Online Social Media : Misinformation on Social Media
Privacy and Security in Online Social Media : Misinformation on Social Media
 
Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112 Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112
 
Privacy and social media in the workplace
Privacy and social media in the workplacePrivacy and social media in the workplace
Privacy and social media in the workplace
 
Data protection and social networks
Data protection and social networksData protection and social networks
Data protection and social networks
 
Data protection and privacy in the social web en 17072010
Data protection and privacy in the social web en 17072010Data protection and privacy in the social web en 17072010
Data protection and privacy in the social web en 17072010
 

Similar to Data privacy & social media

Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptx
sadia456189
 
Data Privacy and consent management .. .
Data Privacy and consent management  ..  .Data Privacy and consent management  ..  .
Data Privacy and consent management .. .
ClinosolIndia
 

Similar to Data privacy & social media (20)

Ichec & ESC gdpr feb 2020
Ichec & ESC gdpr feb 2020Ichec & ESC gdpr feb 2020
Ichec & ESC gdpr feb 2020
 
Information Privacy?! (GDPR)
Information Privacy?! (GDPR)Information Privacy?! (GDPR)
Information Privacy?! (GDPR)
 
GDPR Benefits and a Technical Overview
GDPR  Benefits and a Technical OverviewGDPR  Benefits and a Technical Overview
GDPR Benefits and a Technical Overview
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMS
 
Esc gdpr oct 2018
Esc gdpr oct 2018Esc gdpr oct 2018
Esc gdpr oct 2018
 
GDPR & digital strategy
GDPR & digital strategyGDPR & digital strategy
GDPR & digital strategy
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
GDPR in the Healthcare Industry
GDPR in the Healthcare IndustryGDPR in the Healthcare Industry
GDPR in the Healthcare Industry
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptx
 
Data Privacy and consent management .. .
Data Privacy and consent management  ..  .Data Privacy and consent management  ..  .
Data Privacy and consent management .. .
 
Data privacy and consent management (K.sailaja).pptx
Data privacy and consent management (K.sailaja).pptxData privacy and consent management (K.sailaja).pptx
Data privacy and consent management (K.sailaja).pptx
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or Perish
 
GDPR for Dummies
GDPR for DummiesGDPR for Dummies
GDPR for Dummies
 
9 Practical Steps 2 GDPR Compliance
9 Practical Steps 2 GDPR Compliance9 Practical Steps 2 GDPR Compliance
9 Practical Steps 2 GDPR Compliance
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
 
My presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPRMy presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPR
 
GDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceGDPR: Your Journey to Compliance
GDPR: Your Journey to Compliance
 
DATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptxDATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptx
 

More from Prof. Jacques Folon (Ph.D)

More from Prof. Jacques Folon (Ph.D) (20)

Introduction to digital strategy
Introduction to digital strategy Introduction to digital strategy
Introduction to digital strategy
 
Ifc jour 1 dpo
Ifc jour 1 dpoIfc jour 1 dpo
Ifc jour 1 dpo
 
Cpas divers sujets
Cpas divers sujets Cpas divers sujets
Cpas divers sujets
 
Ferrer premier cours octobre 2021
Ferrer premier cours octobre  2021Ferrer premier cours octobre  2021
Ferrer premier cours octobre 2021
 
premier cours saint louis sept 2021
premier cours saint louis sept 2021premier cours saint louis sept 2021
premier cours saint louis sept 2021
 
Cmd premier cours sept 2021
Cmd premier cours sept 2021Cmd premier cours sept 2021
Cmd premier cours sept 2021
 
CPAS ET RGPD : direction et DPO
CPAS ET RGPD : direction et DPO CPAS ET RGPD : direction et DPO
CPAS ET RGPD : direction et DPO
 
le RGPD fossoyeur du marketing digital ?
le RGPD fossoyeur du marketing digital ?le RGPD fossoyeur du marketing digital ?
le RGPD fossoyeur du marketing digital ?
 
Ifc gdpr strat digit mai 2021
Ifc gdpr strat digit mai 2021Ifc gdpr strat digit mai 2021
Ifc gdpr strat digit mai 2021
 
Pandemie et vie privee
Pandemie et vie priveePandemie et vie privee
Pandemie et vie privee
 
Cmd de la stratégie au marketing digital
Cmd de la stratégie au marketing digitalCmd de la stratégie au marketing digital
Cmd de la stratégie au marketing digital
 
Ichec ipr feb 2021
Ichec ipr feb 2021Ichec ipr feb 2021
Ichec ipr feb 2021
 
Strategy for digital business class #1
Strategy for digital business class #1Strategy for digital business class #1
Strategy for digital business class #1
 
E comm et rgpd
E comm et rgpdE comm et rgpd
E comm et rgpd
 
Cmd premier cours
Cmd premier coursCmd premier cours
Cmd premier cours
 
Cmd cours 1
Cmd cours 1Cmd cours 1
Cmd cours 1
 
Le dossier RGPD
Le dossier RGPDLe dossier RGPD
Le dossier RGPD
 
Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENTRh et data DANS LE MONDE APRÈS LE CONFINEMENT
Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
 
RGPD et stratégie digitale
RGPD et stratégie digitaleRGPD et stratégie digitale
RGPD et stratégie digitale
 
Rgpd et rh formation en ligne mars 2020
Rgpd et rh formation en ligne mars 2020Rgpd et rh formation en ligne mars 2020
Rgpd et rh formation en ligne mars 2020
 

Recently uploaded

Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated crops
parmarsneha2
 

Recently uploaded (20)

The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...
Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...
Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated crops
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 

Data privacy & social media