“Data is morevaluable than Money. If
someone takes your money, that's all
they have. If you let someone take your
data, they may eventually take your
money too!“
from: Deputy Privacy Commissioner Dondi Mapa
18.
WHAT IS THEDATA PRIVACY ACT OF 2012?
• SECTION 1. Short Title. – This Act shall be known as the “Data Privacy Act of 2012”.
• Republic Act 10173, the Data Privacy Act of 2012
AN ACT PROTECTING INDIVIDUAL PERSONAL INFORMATION IN
INFORMATION AND COMMUNICATIONS SYSTEMS IN THE GOVERNMENT AND THE
PRIVATE SECTOR, CREATING FOR THIS PURPOSE A NATIONAL PRIVACY COMMISSION,
AND FOR OTHER PURPOSES
19.
KEY ROLES INTHE DATA PRIVACY ACT
• Data Subjects
• Refers to an individual whose, sensitive personal, or privileged information is processed personal
• Personal Information Controller (PIC)
• Controls the processing of personal data, or instructs another to process personal data on its behalf.
• Personal Information Processor (PIP)
• Organization or individual whom a personal information controller may outsource or instruct the processing of personal
data pertaining to a data subject
•Data Protection Officer (DPO)
• Responsible for the overall management of compliance to DPA
• National Privacy Commission
• Independent body mandated to administer and implement the DPA of 2012, and to monitor and
ensure compliance of the country with international standards set for personal data protection
20.
EXAMPLES OF BREACHESAND LIVE CASES
1. COMELeak
2. BPI – consent form
3. Hospital – unsecure storage records
4. Student transferred by her parent without her knowledge
5. Clinical record of a student to disclose with her parents
6. List of top students/passers
7. Known Fastfood delivery – disclosing personal info of clients
8. No Data sharing agreement (DSA) between and among
Schools and Universities
9. Security issues in buildings – logbook
10. Profiling of customers from a mall
11. Personal laptop stolen
12. Lost a CD in transit
13. Use of re-cycled papers
14. Raffle stubs
16. Personal Records stolen from
home of an employee
15. Release of CCTV Footage
16. Password hacked/revealed
21.
DPA
Section
Punishable Act ForPersonal Information For Sensitive Personal Information Fine (Pesos)
JAIL TERM
25 Unauthorized processing 1-3 years 3-6 years 500 k – 4 million
26 Access due to negligence 1-3 years 3-6 years 500 k – 4 million
27 Improper disposal 6 months – 2 years 3-6 years 100 k – 1 million
28 Unauthorized purposes 18 months – 5 years 2-7 years 500 k – 2 million
29 Intentional breach 1-3 years 500 k – 2 million
30 Concealment of breach 18 months – 5 years 500 k – 1 million
31 Malicious disclosure 18 month – 5 years 500 k – 1 million
32 Unauthorized disclosure 1-3 years 3-5 years 500 k – 2 million
33 Combination of acts 1-3 years 1 million – 5 million
Potential Penalties listed in the Data Privacy Act
22.
Top 20 Government-imposedData Privacy Fines
Worldwide, 1999-2014 **
Rank Fined entity
Amount of
fines
and penalties
Year Country
Privacy principles
violated
1 Apple $32.5M 2014 U.S. Choice and Consent
2 Google $22.5M 2012 U.S. Collection
3 Google $17M 2013 U.S. Collection and Notice
4 ChoicePoint $15M 2006 U.S. Security
5 Hewlitt-Packard $14,5M 2006 U.S. Collection
6 LifeLock $12M 2010 U.S. Accuracy, Security
7 TJ Maxx $9.8M 2009 U.S. Security
8 Dish Network $6M 2009 U.S. Choice and Consent
9 DirecTV $5.3M 2005 U.S. Choice and Consent
10 HSBC $5M 2009 UK Security
11 US Bancorp $5M
1999-
2000
U.S. Disclosure
12 Craftmatic $4.3 2007 U.S. Choice and Consent
13 Cignet Health $4.3M 2011 U.S. Access
14 Barclays Bank $3.8M 2013 U.S. Use and Retention
15 Certegy Check Services $3.5M 2013 U.S. Accuracy
16 Playdom $3M 2011 U.S. Collection and Notice
17 The Broadcast Team $2.8M 2007 U.S. Collection
18
Equifax, TransUnion and
Experian
$2.5M 2000 U.S. Access
19 CVS Caremark $2.3M 2009 U.S. Security and Disposal
20 Norwich Union Life $1.8M 2007 UK Disclosure
**SOURCE IAPP 17 FEB 2014
23.
RIGHTS OF THEDATA SUBJECT
• Right to be informed - IRR, Section 34.a
• Right to object - IRR, Section 34.b
• Right to access - IRR, Section 34.c
• Right to data portability - IRR, Section 36
• Right to correct (rectification) - IRR, Section 34.d
• Right to erasure or blocking - IRR, Section 34.e
• Right to file a complaint - IRR, Section 34.a.2
• Right to damages - IRR, Section 34.f
• Transmissibility of Rights - IRR, Section 35
24.
CLASSIFICATION OF PERSONALDATA
Personal Information:
Personal information refers to any
information whether recorded in a
material form or not, from which the
identity of an individual is apparent or
can be reasonably and directly
ascertained by the entity holding the
information, or when put together with
other information would directly and
certainly identify an individual.
25.
Sensitive Personal Information.
Refersto personal information about an individual’s:
race, ethnic origin, marital status, age, color, religious,
philosophical or political affiliations, health, education,
genetics, sexual life, any proceeding for any offense
committed or alleged to have been committed, the disposal
of such proceedings, the sentence of any court in such
proceedings;
Also includes information issued by government
agencies peculiar to an individual which includes, but
not limited to:
social security numbers, previous or current health
records, licenses or its denials, suspension or revocation,
and tax returns;
and specifically established by an executive order or
an act of Congress to be kept classified.
28.
TRANSPARENCY – “theCONSENT Regime”
Principle of Transparency
A data subject must be aware of the nature, purpose, and extent of the
processing of his or her personal data, including the risks and safeguards
involved, the identity of personal information controller, his or her rights as
a data subject, and how these can be exercised. Any information and
communication relating to the processing of personal data should be easy to
access and understand, using clear and plain language.
29.
LEGITIMATE PURPOSE
Principle ofLegitimate Purpose
The processing of information shall be compatible with a
declared and specified purpose, which must not be
contrary to law, morals, or public policy.
31.
THE DATA PRIVACYPRINCIPLES
• Personal data shall be:
1. processed fairly and lawfully
2. processed only for specified, lawful and compatible purposes
3. adequate, relevant and not excessive
4. accurate and up to date
5. kept for no longer than necessary
6. processed in accordance with the rights of data subjects
7. kept secure
32.
“Compliance to DataPrivacy Act is not a one-shot
initiative. It is a discipline and culture that must be
embedded on a continuous basis within the
organization.”
CULTURE OF PRIVACY in the PHILIPPINES
INFORMATION AS ARESOURCE
• EXPANDABLE
• Information can be expandable without compromising its integrity. (ex. Curriculum Vitae)
• COMPRESSIBLE
• Expanded information may not always needed. ( ex. News site “Headliners”)
• TRANSPORTABLE
• Send via E-mail
• Share via Facebook
• Copy onto flash drive
• Upload in YouTube
• DIFFUSIVE
• Spread easily to any kinds of information (whether gossip or rumor)
• SHARABLE
• It can be shared! You don’t have any control after that. (ex. Secret recipe)
35.
INFORMATION AS ARESOURCE
• COMPLETE
• Contains all important facts, missing could mean disaster (introduction of
speaker)
• ECONOMICAL
• It should be economical to produce
• RELIABLE
• How data is collected
• Where it is collected
• RELEVANT
• SIMPLE AND TIMELY
• Not complex in its form and on time when its needed
36.
INFORMATION AS ARESOURCE
• VERIFIABLE
• Can be checked its correctness
• ACCESSIBLE
• SECURE
• Free from access from an unauthorized persons
37.
INFORMATION OVERLOAD
• INFORMATIONIS NOW AVAILABLE QUICKLY
• Duplication and Transmission of
information's is getting easier
• A picture posted in FB will also be posted in
Instagram and Twitter – means same picture
has been posted three times
• Communication methods are
multiplying
• Mobile phones, Viber, Email, Text or SMS, PM,
etc.
• Archives of historical information are exponentially growing
38.
INTELLECTUAL PROPERTY
•Basically refersto any creation or product of
the human mind and may be expressed in
form of original ideas, expressions and
processes.
39.
INTELLECTUAL PROPERTY
•Copyright -refers to the legal right of the owner of intellectual
property
•Trademarks - is a recognizable insignia, phrase or symbol that
denotes a specific product or service and legally differentiates it from all
other products
•Patent - gives its owner the right to exclude others from making, using,
selling, and importing an invention for a limited period of time, usually twenty
years.
40.
INFORMATION CONTROL
IS ABOUTALLOWING THOSE WHO
HAVE APPROPRIATE AUTHORITY
ACCESS TO AND USE OF
INFORMATION ON THE BASIS
OF THE AUTHORITY THAT
THEY HOLD
THREATS AND COUNTERMEASURES
THREAT– anything that can cause harm to our computer resources.
threat against VIRUS and HACKER
VIRUS VS ANTI VIRUS
HACKER VS
FIREWALL
43.
THREATS AND COUNTERMEASURES
IDENTITYTHEFT – technology term used when someone impersonates you.
using your name, ID, SSS number or other personal
HOW ???
Shoulder surfing – watching someone who withdraws on the ATM and get his/her PIN
Wire Tapping or Snagging – thru conversation over telephone line.
Dumpster Diving Technique – digging your garbage or trash bins to get your cancelled or
deleted checks, bank accounts or credit cards number.
Social Engineering –the most predominant source of identity theft where the victim ticks
unsuspectedly and provides vital information under pretext of
something in authority
44.
COMPUTER VIRUSES
VIRUS -A computer virus is a program or piece of code that is loaded onto your computer
without your knowledge and runs against your wishes. Viruses can also replicate
themselves.
it is designed to destroy and make troubles to our computing task.
Some type of viruses
Trojans (Trojan horses) – it performs useful task however carries out destructive motive
and cruel intentions. Usually a game name or utilities.
Worms – it has the ability to reproduce on its own. It travels from computer to
computer over a network and find files that are not affected and will occupy
it.
Logic Bombs – it will perform the task on the programmed date.
45.
Some type ofviruses
Malware – Malicious software - is software used or programmed by attackers to
disrupt computer
operation, gather sensitive information, or gain access to private computer
systems.
Malicious BHO (Browsers Helper Objects)
Browser Hijackers - transfer you to another web page (or the page is an error)
Ransomware – a malware and usually ask for ransom from the creator to remove the
restrictions.
Rootkits – it will hide other virus like worms and Trojans. Technically it is not harmful
but the hidden virus is.
Dialers – unauthorized dialing a call
Adware – same as malware but it uses Ads as a medium of infection
COMPUTER VIRUSES
46.
ANTI VIRUS PROGRAMS
issoftware used to prevent, detect and remove malware (of all descriptions),
such as:
Computer viruses, malicious,
hijackers, ransomware, keyloggers, backdoors, rootkits, trojan
horses, worms,malicious LSPs, dialers, fraudtools, adware and spyware.
Computer security, including protection from social engineering techniques, is
commonly offered in products and services of antivirus software companies.
47.
ONLINE SPYING TOOLS
Cookies– it stores pertinent details like log-in name, password, e-mail address,
etc.
Spy ware – it collects and record secretly your email, password, etc.
Spam – just simple a junk mail (from someone who you doesn’t know and usually
carries a virus.
Cybercrime – stealing of hardware and software.
Hacking – illegal accessing the computer resources of some people without their
knowledge
Cyberterrorism – attacking the information technology infrastructure and
government
network system. The goal is to gain control and monitor.
48.
COMPUTER ETHICS
Computer ethicsdeals with the procedures,
values and practices that govern the process
of consuming computing technology and its
related disciplines without damaging or
violating the moral values and beliefs of any
individual, organization or entity.
49.
TEN COMMANDMENTS OFCOMPUTER ETHICS
1. THOU SHALT NOT USE A COMPUTER TO HARM OTHER PEOPLE.
2. THOU SHALT NOT INTERFERE WITH OTHER PEOPLE'S COMPUTER WORK.
3. THOU SHALT NOT SNOOP AROUND IN OTHER PEOPLE'S COMPUTER FILES.
4. THOU SHALT NOT USE A COMPUTER TO STEAL.
5. THOU SHALT NOT USE A COMPUTER TO BEAR FALSE WITNESS.
6. THOU SHALT NOT COPY OR USE PROPRIETARY SOFTWARE FOR WHICH YOU HAVE
NOT PAID.
7. THOU SHALT NOT USE OTHER PEOPLE'S COMPUTER RESOURCES WITHOUT
AUTHORIZATION
OR PROPER COMPENSATION.
8. THOU SHALT NOT APPROPRIATE OTHER PEOPLE'S INTELLECTUAL OUTPUT.
9. THOU SHALT THINK ABOUT THE SOCIAL CONSEQUENCES OF THE PROGRAM YOU
ARE WRITING OR THE SYSTEM YOU ARE DESIGNING.
10. THOU SHALT ALWAYS USE A COMPUTER IN WAYS THAT INSURE CONSIDERATION
AND RESPECT FOR YOUR FELLOW HUMANS.
“GALACTIC NETWORK” CONCEPT- J.C.R. LICKLIDER AUGUST 1962
BRIEF HISTORY OF
INTERNET
Globally Interconnected computers
To transmit and transfer data
Head of DARPA – Defense Advanced
Research Projects Agencies
ARPANET – Advanced Research Project Agency Network 1967
DYNAMIC - INFORMATIONTHAT CHANGES, DEPENDING ON THE
VIEWER, THE TIME OF THE DAY, THE TIME ZONE, THE VIEWERS NATIVE
LANGUAGE, AND OTHER FACTORS.
W E B P A G E
56.
1. CONVERGENCE –TWO OR MORE THINGS COME TOGETHER TO
FORM A NEW ONE
T R E N D S I N I C T
2. SOCIAL MEDIA
a. Social Network
b. Bookmarking Sites
c. Social News
d. Media Sharing
e. Microblogging
f. Blogs & forum
57.
3. MOBILE TECHNOLOGIES
a.ios
b.Android
c. Blackberry OS
d. Windows Phone
e. Symbian
f. WebOS
g. Windows Mobile
4. ASSISTIVE MEDIA
TRENDS IN ICT
FIRST NAME –CHANCES ARE, A HACKER MAY ALREADY KNOW
PLENTY OF STUFF ABOUT YOU
ONLINE SAFE OR NOT?
LAST NAME – you will be vulnerable to being search and used as
modus to several cybercrimes
ABOUT SCHOOLS – most people may steal your identity and will
be used for information verification
NUMBER – avoid or do not post your number in public pages and
someone might bother you through calls or text.
62.
PARENTS NAME –AGAIN CAN BE USED FOR VERIFICATION OF
IDENTITY
ONLINE SAFE OR NOT?
SIBLINGS – for verification
ADDRESS – hackers, criminals may find you if given this
information to untrusted sites
HOME PHONE AND BIRTH DAY – makes you more vulnerable
MALWARE – MALICIOUSSOFTWARE
1. VIRUS – A SOFTWARE DESIGNED TO HARM FILES
2. WORM – SELF DUPLICATING VIRUS (EG. ILOVEYOU)
3. TROJAN – MOSTLY HIDDEN AND DISGUISED AS A USEFUL PROGRAM
4. SPYWARE – RUNS IN THE BACKGROUND WITHOUT KNOWING AND MAY RECORD OR LOG
EVERYTHING YOU DO.
5. ADWARE – ADVERTISEMENT SOFTWARE THAT ALWAYS POPS-UP
INTERNET THREATS
65.
SPAM – UNWANTEDE-MAILS MOSTLY BOT. USED TO SEND MALWARE
PHISHING – ACQUIRE SENSITIVE PERSONAL INFORMATION LIKE PASSWORD, CREDIT CARD ETC.
INTERNET THREATS
66.
1. ONCE YOUPOST IT ON THE NET, YOU HAVE NO CONTROL OF WHO SEES YOUR POSTS
2. TALK TO SOMEONE OR PARENTS BEFORE YOU DO SOMETHING ON THE NET
3. SET YOUR POST TO PRIVATE
4. AVOID USING NAMES.
5. AVOID POSTING THAT CAN AFFECT REPUTATIONS.
THINK BEFORE YOU CLICK
ROLE OF ICTIN RECENT HISTORY
1. EDSA (PEOPLE POWER REVOLUTION ) – RADIO BROADCASTING & TELEVISION
2. EDSA DOS – IT WOULD NOT HAVE BEEN SUCCESSFUL WITHOUT THE TEXT BRIGADES.
3. PROTESTS AND MARCH – THE HELP OF SOCIAL MEDIA
4. YOLANDA PEOPLE FINDER – PEOPLE FINDER DATABASE BY GOOGLE
ICT AS FLATFORM FOR CHANGE
69.
SOCIAL CAMPAIGN
20 MINS
FORMA GROUP OF 8 MEMBERS. CONCEPTUALIZE A SOCIAL CAMPAIGN
1. WHAT ARE THE THINGS THAT YOUR GROUP THINK THAT COULD BE BETTER IN YOUR SCHOOL OR
COMMUNITY? LIST DOWN ATLEAST FIVE THINGS.
2. CHOOSE ONE OF THE FIVE YOU THINK IS OF HIGHEST PRIORITY AND DEMANDS IMMEDIATE ACTION OF
CHANGE.
3. CREATE A WRITE-UP ABOUT THIS PROBLEM.
ICT AS FLATFORM FOR CHANGE
70.
ICT PROJECT PROCESSOVERVIEW
PLANNING DEVELOPMENT
RELEASE AND
PROMOTION
MAINTENANCE
71.
PLANNING
A. CONCEPTUALIZING YOURPROJECT
B. RESEARCHING ON AVAILABLE DATA ABOUT YOUR PROJECT
C. SETTING DEADLINES AND MEETINGS
D. ASSIGNING PEOPLE TO VARIOUS TASK
E. CREATE YOUR WEBSITE
ICT AS FLATFORM FOR CHANGE
72.
DEVELOPMENT
INVOLVES THE ACTUALCREATION OF WEBSITE AND PRODUCTION OF IMAGES
RELEASE AND PROMOTION – PRESENTATION OF WEBSITE TO THE PUBLIC
MAINTENANCE – CONTINUING IMPROVEMENTS AND MONITORING WITH FEEDBACK
ICT AS FLATFORM FOR CHANGE
73.
TAKE THE CHALLENGE!
*SOCIAL CAMPAIGN PROPOSAL
* WRITE-UP
* WEBSITE PLANNING
* PRESENTATION
ICT AS FLATFORM FOR CHANGE
Editor's Notes
#16 In today’s data-driven economy, what is more valuable? Data or Money?
Sa pera, sino ang nakabantay? Bangko
Sino ang nagbabantay sa bango? BSP
Sa data, sinot ang nag-kokolekta? Sino and nagbabantay?
Maa-asahan nyo ba itong mga to? Ibibigay nyo ba ang data nyo sa hindi nyo kilala?
Sino ang nagbabantay, kagaya na BSP?
Kami – ang NPC.