SlideShare a Scribd company logo
Privacy & Freedom
of Expression
Prepared by: Mark Jhon C. Oxillo
PRIVACY
THE RIGHT TO PRIVACY
• The right to be left alone – the
most comprehensive of rights,
and the right most valued by a
free people
INFORMATION PRIVACY
• First coined Roger Clarke,
director of Australian
Privacy Foundation
• Is the combination of
communications privacy and
data privacy
COMMUNICATIONS PRIVACY
• the ability to communicate with
others without those
communications being monitored
by other persons or organization
DATA PRIVACY
• the ability to limit access one’s
personal data by other individuals
and organizations in order to
exercise a substantial degree of
control over that data and its use
Republic Act 10173
• Or the Data Privacy Act of 2012 (PH)
• is a law that seeks to protect all forms of
information, be it private, personal, or
sensitive. It is meant to cover both
natural and juridical persons involved in
the processing of personal information.
Republic Act 10173
• This comprehensive privacy law
also established a National
Privacy Commission that
enforces and oversees it and is
endowed with rulemaking power.
Republic Act 10173
OPT OUT POLICY
• To refuse to give an
institution the right to
collect and share
personal data
OPT IN POLICY
• To give an institution
the right to collect and
share personal data
KEY PRIVACY AND
ANONYMITY ISSUES
IDENTITY THEFT
• Occurs when someone steals key
pieces of personal information to
impersonate a person. This
information may include data such
as name, address, date of birth, SSS
number, passport number, driver’s
license number, etc.
VISHING
• is the telephone equivalent of
phishing. It is described as the act of
using the telephone in an attempt
to scam the user into surrendering
private information that will be used
for identity theft.
ELECTRONIC DISCOVERY
• Is the collection, preparation,
review and production of
electronically stored information
for use in criminal and civil
actions and proceedings
• Includes any form of digital
information such as emails,
drawings, graphs, web pages,
photographs, word-processing
files, sound recording and
databases
CONSUMER PROFILING
• Collecting personal information
about internet users when they
register at websites, complete
survey, fill out forms or enter
contests online
CLICK-STREAM DATA
• Information gathered
by monitoring a
consumer’s online
activity
BEACONS
• Are small pieces of software
that run on a web page and are
able to track what a viewer is
doing on the page, such as
what is being typed or where
the mouse is moving
PERSONALIZATION
SOFTWARE
• Used to optimize the
number, frequency, and
mixture of their ad
placement and to evaluate
how visitors react to new ads
MEASURES TO IMPROVE
THE PROTECTION OF
CONSUMER PRIVACY:
• Implementing a “Do Not Track”
option for web browsing
software that would keep online
services from collecting surfing
or ad-targeting data
MEASURES TO IMPROVE
THE PROTECTION OF
CONSUMER PRIVACY:
• Requiring that companies collect
only the data they need and
then delete it after it has met its
purpose
MEASURES TO IMPROVE
THE PROTECTION OF
CONSUMER PRIVACY:
• Requiring that online companies
simplify their privacy policies so
that consumers can read and
understand them
CHIEF PRIVACY OFFICER
(CPO):
• a senior manager within an
organization whose role is to ensure
that the organization does not
violate government regulations
while reassuring customers that
their privacy will be protected
FREEDOM OF
EXPRESSION
FREEDOM OF EXPRESSION
• The right to freedom of
expression is one of the most
important rights for free
people everywhere.
FREEDOM OF EXPRESSION
• Right to express one's ideas and
opinions freely through speech,
writing, and other forms of
communication but without
deliberately causing harm to others'
character and/or reputation by false
or misleading statements.
TYPES OF SPEECHES
• OBSCENE SPEECH
• DEFAMATION
• PERJURY
• FRAUD
• INCITEMENT OF
PANIC
• INCITEMENT TO
CRIME
• “FIGHTING
WORDS”
• HATE SPEECH
• SEDITION
OBSCENE SPEECH
• Appeals to “prurient interest”
(causes lust)
• “Obviously offensive” description
of defined sexual conduct
• No serious literary, artistic,
political, or scientific value
DEFAMATION
• Oral or written statement of
alleged fact that is false and
harms another person
* Slander - oral defamatory
statement
* Libel - written defamatory
statement
PERJURY
• is the intentional act of
swearing a false oath or
falsifying an affirmation to tell
the truth, whether spoken or in
writing, concerning matters
material to an official
proceeding.
FRAUD
• is intentional deception
to secure unfair or
unlawful gain, or to
deprive a victim of a legal
right.
INCITEMENT OF PANIC
• is when a person causes
the evacuation of any
public place, or otherwise
cause serious public
inconvenience or alarm
INCITEMENT TO CRIME
• is the encouragement
of another person to
commit a crime
FIGHTING WORDS
• are written or spoken words
intended to incite hatred or
violence from their target
• are words indicating a
willingness to fight or
challenge someone
HATE SPEECH
• abusive or threatening
speech or writing that
expresses prejudice against a
particular group, especially
on the basis of race, religion,
or sexual orientation.
SEDITION
• a conduct or speech
inciting people to rebel
against the authority of
a state or monarch
Article III (Bill of Rights)
• Section 4. No law shall be passed
abridging the freedom of speech, of
expression, or of the press, or the right
of the people peaceably to assemble
and petition the government for redress
of grievances.
FOE: KEY ISSUES
• Controlling access to information on
the Internet
• Anonymity on the Internet
• Defamation and hate speech
• Corporate blogging
• Pornography
FOE: KEY ISSUES
Controlling access to information on
the Internet:
• Internet Filter – a software that can
be used to block access to certain
websites that contain material
deemed inappropriate or offensive
FOE: KEY ISSUES
Anonymity on the Internet
• Anonymous Expression – the
expression of opinions by people
who do not reveal their identity
FOE: KEY ISSUES
Defamation and Hate Speech
• Ex: A threatening private message
sent over the internet to a person,
and a libel directed at a particular
person can be punishable by law.
FOE: KEY ISSUES
Corporate Blogging
• is the practice of allowing
employees to create their own
personal blogs relating to their
employment
FOE: KEY ISSUES
Pornography
• often colloquially referred to as porn,
is any material — whether written,
visual, or others — that consists of
sexually explicit material and that is
intended to sexually arouse.
FOE: KEY ISSUES
Sexting
• sending sexual messages, nudes
or seminude photos or sexually
explicit videos over a cellphone
END

More Related Content

What's hot

Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacyvinyas87
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet CrimeGerman Teran
 
Digital privacy
Digital privacyDigital privacy
Digital privacyAnna Adel
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security Arah Louise
 
Online Privacy
Online PrivacyOnline Privacy
Online PrivacyIWMW
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Digital privacy
Digital privacyDigital privacy
Digital privacy
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyberstalking
Cyberstalking Cyberstalking
Cyberstalking
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Hacking
HackingHacking
Hacking
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 

Similar to Privacy and Freedom of Expression

Mass Media and Society Chapter 15: Media and Government
Mass Media and Society Chapter 15: Media and GovernmentMass Media and Society Chapter 15: Media and Government
Mass Media and Society Chapter 15: Media and Governmentczavisca
 
Free Speech and Hate Speech: Regulatory Challenge of Internet Freedom in Nigeria
Free Speech and Hate Speech: Regulatory Challenge of Internet Freedom in NigeriaFree Speech and Hate Speech: Regulatory Challenge of Internet Freedom in Nigeria
Free Speech and Hate Speech: Regulatory Challenge of Internet Freedom in NigeriaNzeih Chukwuemeka
 
Using Social Media Ethically
Using Social Media EthicallyUsing Social Media Ethically
Using Social Media EthicallyJack Pringle
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchangeleejhayacosido
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchangeJhouBautista
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchangerommelaa
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchangeleejhayacosido
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchangeorosalobarbio
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchangeorosalegaspi
 
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfLEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfRegineManuel2
 
9-ictasplatformforchange-180206004734.pptx
9-ictasplatformforchange-180206004734.pptx9-ictasplatformforchange-180206004734.pptx
9-ictasplatformforchange-180206004734.pptxKenneth James Alamillo
 
9-ictasplatformforchange-180206004734(1).pptx
9-ictasplatformforchange-180206004734(1).pptx9-ictasplatformforchange-180206004734(1).pptx
9-ictasplatformforchange-180206004734(1).pptxBenjieBarlaan
 
9-ictasplatformforchange-180206004734.pdf
9-ictasplatformforchange-180206004734.pdf9-ictasplatformforchange-180206004734.pdf
9-ictasplatformforchange-180206004734.pdfRegineArellano2
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesMark Jhon Oxillo
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk Endcode_org
 

Similar to Privacy and Freedom of Expression (20)

Privacy
PrivacyPrivacy
Privacy
 
Privacy
PrivacyPrivacy
Privacy
 
Mass Media and Society Chapter 15: Media and Government
Mass Media and Society Chapter 15: Media and GovernmentMass Media and Society Chapter 15: Media and Government
Mass Media and Society Chapter 15: Media and Government
 
Free Speech and Hate Speech: Regulatory Challenge of Internet Freedom in Nigeria
Free Speech and Hate Speech: Regulatory Challenge of Internet Freedom in NigeriaFree Speech and Hate Speech: Regulatory Challenge of Internet Freedom in Nigeria
Free Speech and Hate Speech: Regulatory Challenge of Internet Freedom in Nigeria
 
Using Social Media Ethically
Using Social Media EthicallyUsing Social Media Ethically
Using Social Media Ethically
 
Cyber defamtion
Cyber defamtionCyber defamtion
Cyber defamtion
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfLEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
 
Chapter 5_dp-_pertemuan_7_8
 Chapter 5_dp-_pertemuan_7_8 Chapter 5_dp-_pertemuan_7_8
Chapter 5_dp-_pertemuan_7_8
 
9-ictasplatformforchange-180206004734.pptx
9-ictasplatformforchange-180206004734.pptx9-ictasplatformforchange-180206004734.pptx
9-ictasplatformforchange-180206004734.pptx
 
9-ictasplatformforchange-180206004734(1).pptx
9-ictasplatformforchange-180206004734(1).pptx9-ictasplatformforchange-180206004734(1).pptx
9-ictasplatformforchange-180206004734(1).pptx
 
9-ictasplatformforchange-180206004734.pdf
9-ictasplatformforchange-180206004734.pdf9-ictasplatformforchange-180206004734.pdf
9-ictasplatformforchange-180206004734.pdf
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment Technologies
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
 

More from Mark Jhon Oxillo

FIELD STUDY (FS) 6 - EPISODE 3 (2018)
FIELD STUDY (FS) 6 - EPISODE 3 (2018)FIELD STUDY (FS) 6 - EPISODE 3 (2018)
FIELD STUDY (FS) 6 - EPISODE 3 (2018)Mark Jhon Oxillo
 
FIELD STUDY (FS) 6 - EPISODE 1 (2018)
FIELD STUDY (FS) 6 - EPISODE 1 (2018)FIELD STUDY (FS) 6 - EPISODE 1 (2018)
FIELD STUDY (FS) 6 - EPISODE 1 (2018)Mark Jhon Oxillo
 
Field Study 2 (FS 2) - Episode 3 [2018]
Field Study 2 (FS 2) - Episode 3 [2018]Field Study 2 (FS 2) - Episode 3 [2018]
Field Study 2 (FS 2) - Episode 3 [2018]Mark Jhon Oxillo
 
Ethics for IT Workers and IT Users
Ethics for IT Workers and IT UsersEthics for IT Workers and IT Users
Ethics for IT Workers and IT UsersMark Jhon Oxillo
 
An Overview of Ethics for IT Professionals
An Overview of Ethics for IT ProfessionalsAn Overview of Ethics for IT Professionals
An Overview of Ethics for IT ProfessionalsMark Jhon Oxillo
 
Introduction to the Study of Government and Constitution
Introduction to the Study of Government and ConstitutionIntroduction to the Study of Government and Constitution
Introduction to the Study of Government and ConstitutionMark Jhon Oxillo
 
Readings in Philippine History - Introduction to Philippine History
Readings in Philippine History - Introduction to Philippine HistoryReadings in Philippine History - Introduction to Philippine History
Readings in Philippine History - Introduction to Philippine HistoryMark Jhon Oxillo
 
The Significant Relationship of Physics - Mechanics & Heat and Discrete Math...
 The Significant Relationship of Physics - Mechanics & Heat and Discrete Math... The Significant Relationship of Physics - Mechanics & Heat and Discrete Math...
The Significant Relationship of Physics - Mechanics & Heat and Discrete Math...Mark Jhon Oxillo
 
The Saber Tooth Curriculum
The Saber Tooth CurriculumThe Saber Tooth Curriculum
The Saber Tooth CurriculumMark Jhon Oxillo
 
Field Study 2 (FS 2) - Episode 2 [2018]
Field Study 2 (FS 2) - Episode 2 [2018]Field Study 2 (FS 2) - Episode 2 [2018]
Field Study 2 (FS 2) - Episode 2 [2018]Mark Jhon Oxillo
 
Civil Service (CS) Examination Reviewer
Civil Service (CS) Examination ReviewerCivil Service (CS) Examination Reviewer
Civil Service (CS) Examination ReviewerMark Jhon Oxillo
 
Reflecting on the ICT Learning Process
Reflecting on the ICT Learning ProcessReflecting on the ICT Learning Process
Reflecting on the ICT Learning ProcessMark Jhon Oxillo
 
Sustaining an ICT Project for Social Change
Sustaining an ICT Project for Social ChangeSustaining an ICT Project for Social Change
Sustaining an ICT Project for Social ChangeMark Jhon Oxillo
 
ICT Project Publication and Statistics
ICT Project Publication and StatisticsICT Project Publication and Statistics
ICT Project Publication and StatisticsMark Jhon Oxillo
 
ICT Project for Social Change - Empowerment Technologies
ICT Project for Social Change - Empowerment TechnologiesICT Project for Social Change - Empowerment Technologies
ICT Project for Social Change - Empowerment TechnologiesMark Jhon Oxillo
 
Interactive Multimedia - Empowerment Technologies
 Interactive Multimedia - Empowerment Technologies Interactive Multimedia - Empowerment Technologies
Interactive Multimedia - Empowerment TechnologiesMark Jhon Oxillo
 
Collaborative ICT Development - Empowerment Technologies
Collaborative ICT Development - Empowerment TechnologiesCollaborative ICT Development - Empowerment Technologies
Collaborative ICT Development - Empowerment TechnologiesMark Jhon Oxillo
 
Online Platforms for ICT Content Development - Empowerment Technologies
Online Platforms for ICT Content Development - Empowerment TechnologiesOnline Platforms for ICT Content Development - Empowerment Technologies
Online Platforms for ICT Content Development - Empowerment TechnologiesMark Jhon Oxillo
 

More from Mark Jhon Oxillo (20)

Social Networking
Social NetworkingSocial Networking
Social Networking
 
Software Development
Software DevelopmentSoftware Development
Software Development
 
FIELD STUDY (FS) 6 - EPISODE 3 (2018)
FIELD STUDY (FS) 6 - EPISODE 3 (2018)FIELD STUDY (FS) 6 - EPISODE 3 (2018)
FIELD STUDY (FS) 6 - EPISODE 3 (2018)
 
FIELD STUDY (FS) 6 - EPISODE 1 (2018)
FIELD STUDY (FS) 6 - EPISODE 1 (2018)FIELD STUDY (FS) 6 - EPISODE 1 (2018)
FIELD STUDY (FS) 6 - EPISODE 1 (2018)
 
Field Study 2 (FS 2) - Episode 3 [2018]
Field Study 2 (FS 2) - Episode 3 [2018]Field Study 2 (FS 2) - Episode 3 [2018]
Field Study 2 (FS 2) - Episode 3 [2018]
 
Ethics for IT Workers and IT Users
Ethics for IT Workers and IT UsersEthics for IT Workers and IT Users
Ethics for IT Workers and IT Users
 
An Overview of Ethics for IT Professionals
An Overview of Ethics for IT ProfessionalsAn Overview of Ethics for IT Professionals
An Overview of Ethics for IT Professionals
 
Introduction to the Study of Government and Constitution
Introduction to the Study of Government and ConstitutionIntroduction to the Study of Government and Constitution
Introduction to the Study of Government and Constitution
 
Readings in Philippine History - Introduction to Philippine History
Readings in Philippine History - Introduction to Philippine HistoryReadings in Philippine History - Introduction to Philippine History
Readings in Philippine History - Introduction to Philippine History
 
The Significant Relationship of Physics - Mechanics & Heat and Discrete Math...
 The Significant Relationship of Physics - Mechanics & Heat and Discrete Math... The Significant Relationship of Physics - Mechanics & Heat and Discrete Math...
The Significant Relationship of Physics - Mechanics & Heat and Discrete Math...
 
The Saber Tooth Curriculum
The Saber Tooth CurriculumThe Saber Tooth Curriculum
The Saber Tooth Curriculum
 
Field Study 2 (FS 2) - Episode 2 [2018]
Field Study 2 (FS 2) - Episode 2 [2018]Field Study 2 (FS 2) - Episode 2 [2018]
Field Study 2 (FS 2) - Episode 2 [2018]
 
Civil Service (CS) Examination Reviewer
Civil Service (CS) Examination ReviewerCivil Service (CS) Examination Reviewer
Civil Service (CS) Examination Reviewer
 
Reflecting on the ICT Learning Process
Reflecting on the ICT Learning ProcessReflecting on the ICT Learning Process
Reflecting on the ICT Learning Process
 
Sustaining an ICT Project for Social Change
Sustaining an ICT Project for Social ChangeSustaining an ICT Project for Social Change
Sustaining an ICT Project for Social Change
 
ICT Project Publication and Statistics
ICT Project Publication and StatisticsICT Project Publication and Statistics
ICT Project Publication and Statistics
 
ICT Project for Social Change - Empowerment Technologies
ICT Project for Social Change - Empowerment TechnologiesICT Project for Social Change - Empowerment Technologies
ICT Project for Social Change - Empowerment Technologies
 
Interactive Multimedia - Empowerment Technologies
 Interactive Multimedia - Empowerment Technologies Interactive Multimedia - Empowerment Technologies
Interactive Multimedia - Empowerment Technologies
 
Collaborative ICT Development - Empowerment Technologies
Collaborative ICT Development - Empowerment TechnologiesCollaborative ICT Development - Empowerment Technologies
Collaborative ICT Development - Empowerment Technologies
 
Online Platforms for ICT Content Development - Empowerment Technologies
Online Platforms for ICT Content Development - Empowerment TechnologiesOnline Platforms for ICT Content Development - Empowerment Technologies
Online Platforms for ICT Content Development - Empowerment Technologies
 

Recently uploaded

Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...Abhinav Gaur Kaptaan
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaasiemaillard
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsCol Mukteshwar Prasad
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxJenilouCasareno
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345beazzy04
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxCapitolTechU
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPCeline George
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online PresentationGDSCYCCE
 
How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17Celine George
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportAvinash Rai
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxricssacare
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...Sayali Powar
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptxmansk2
 
The impact of social media on mental health and well-being has been a topic o...
The impact of social media on mental health and well-being has been a topic o...The impact of social media on mental health and well-being has been a topic o...
The impact of social media on mental health and well-being has been a topic o...sanghavirahi2
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxakshayaramakrishnan21
 

Recently uploaded (20)

Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation
 
How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17
 
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
Operations Management - Book1.p  - Dr. Abdulfatah A. SalemOperations Management - Book1.p  - Dr. Abdulfatah A. Salem
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
 
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
The impact of social media on mental health and well-being has been a topic o...
The impact of social media on mental health and well-being has been a topic o...The impact of social media on mental health and well-being has been a topic o...
The impact of social media on mental health and well-being has been a topic o...
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 

Privacy and Freedom of Expression

  • 1. Privacy & Freedom of Expression Prepared by: Mark Jhon C. Oxillo
  • 3. THE RIGHT TO PRIVACY • The right to be left alone – the most comprehensive of rights, and the right most valued by a free people
  • 4. INFORMATION PRIVACY • First coined Roger Clarke, director of Australian Privacy Foundation • Is the combination of communications privacy and data privacy
  • 5. COMMUNICATIONS PRIVACY • the ability to communicate with others without those communications being monitored by other persons or organization
  • 6. DATA PRIVACY • the ability to limit access one’s personal data by other individuals and organizations in order to exercise a substantial degree of control over that data and its use
  • 7. Republic Act 10173 • Or the Data Privacy Act of 2012 (PH) • is a law that seeks to protect all forms of information, be it private, personal, or sensitive. It is meant to cover both natural and juridical persons involved in the processing of personal information.
  • 8. Republic Act 10173 • This comprehensive privacy law also established a National Privacy Commission that enforces and oversees it and is endowed with rulemaking power.
  • 10. OPT OUT POLICY • To refuse to give an institution the right to collect and share personal data
  • 11. OPT IN POLICY • To give an institution the right to collect and share personal data
  • 13. IDENTITY THEFT • Occurs when someone steals key pieces of personal information to impersonate a person. This information may include data such as name, address, date of birth, SSS number, passport number, driver’s license number, etc.
  • 14. VISHING • is the telephone equivalent of phishing. It is described as the act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
  • 15. ELECTRONIC DISCOVERY • Is the collection, preparation, review and production of electronically stored information for use in criminal and civil actions and proceedings
  • 16. • Includes any form of digital information such as emails, drawings, graphs, web pages, photographs, word-processing files, sound recording and databases
  • 17. CONSUMER PROFILING • Collecting personal information about internet users when they register at websites, complete survey, fill out forms or enter contests online
  • 18. CLICK-STREAM DATA • Information gathered by monitoring a consumer’s online activity
  • 19. BEACONS • Are small pieces of software that run on a web page and are able to track what a viewer is doing on the page, such as what is being typed or where the mouse is moving
  • 20. PERSONALIZATION SOFTWARE • Used to optimize the number, frequency, and mixture of their ad placement and to evaluate how visitors react to new ads
  • 21. MEASURES TO IMPROVE THE PROTECTION OF CONSUMER PRIVACY: • Implementing a “Do Not Track” option for web browsing software that would keep online services from collecting surfing or ad-targeting data
  • 22. MEASURES TO IMPROVE THE PROTECTION OF CONSUMER PRIVACY: • Requiring that companies collect only the data they need and then delete it after it has met its purpose
  • 23. MEASURES TO IMPROVE THE PROTECTION OF CONSUMER PRIVACY: • Requiring that online companies simplify their privacy policies so that consumers can read and understand them
  • 24. CHIEF PRIVACY OFFICER (CPO): • a senior manager within an organization whose role is to ensure that the organization does not violate government regulations while reassuring customers that their privacy will be protected
  • 26. FREEDOM OF EXPRESSION • The right to freedom of expression is one of the most important rights for free people everywhere.
  • 27. FREEDOM OF EXPRESSION • Right to express one's ideas and opinions freely through speech, writing, and other forms of communication but without deliberately causing harm to others' character and/or reputation by false or misleading statements.
  • 28. TYPES OF SPEECHES • OBSCENE SPEECH • DEFAMATION • PERJURY • FRAUD • INCITEMENT OF PANIC • INCITEMENT TO CRIME • “FIGHTING WORDS” • HATE SPEECH • SEDITION
  • 29. OBSCENE SPEECH • Appeals to “prurient interest” (causes lust) • “Obviously offensive” description of defined sexual conduct • No serious literary, artistic, political, or scientific value
  • 30. DEFAMATION • Oral or written statement of alleged fact that is false and harms another person * Slander - oral defamatory statement * Libel - written defamatory statement
  • 31. PERJURY • is the intentional act of swearing a false oath or falsifying an affirmation to tell the truth, whether spoken or in writing, concerning matters material to an official proceeding.
  • 32. FRAUD • is intentional deception to secure unfair or unlawful gain, or to deprive a victim of a legal right.
  • 33. INCITEMENT OF PANIC • is when a person causes the evacuation of any public place, or otherwise cause serious public inconvenience or alarm
  • 34. INCITEMENT TO CRIME • is the encouragement of another person to commit a crime
  • 35. FIGHTING WORDS • are written or spoken words intended to incite hatred or violence from their target • are words indicating a willingness to fight or challenge someone
  • 36. HATE SPEECH • abusive or threatening speech or writing that expresses prejudice against a particular group, especially on the basis of race, religion, or sexual orientation.
  • 37. SEDITION • a conduct or speech inciting people to rebel against the authority of a state or monarch
  • 38. Article III (Bill of Rights) • Section 4. No law shall be passed abridging the freedom of speech, of expression, or of the press, or the right of the people peaceably to assemble and petition the government for redress of grievances.
  • 39. FOE: KEY ISSUES • Controlling access to information on the Internet • Anonymity on the Internet • Defamation and hate speech • Corporate blogging • Pornography
  • 40. FOE: KEY ISSUES Controlling access to information on the Internet: • Internet Filter – a software that can be used to block access to certain websites that contain material deemed inappropriate or offensive
  • 41. FOE: KEY ISSUES Anonymity on the Internet • Anonymous Expression – the expression of opinions by people who do not reveal their identity
  • 42. FOE: KEY ISSUES Defamation and Hate Speech • Ex: A threatening private message sent over the internet to a person, and a libel directed at a particular person can be punishable by law.
  • 43. FOE: KEY ISSUES Corporate Blogging • is the practice of allowing employees to create their own personal blogs relating to their employment
  • 44. FOE: KEY ISSUES Pornography • often colloquially referred to as porn, is any material — whether written, visual, or others — that consists of sexually explicit material and that is intended to sexually arouse.
  • 45. FOE: KEY ISSUES Sexting • sending sexual messages, nudes or seminude photos or sexually explicit videos over a cellphone
  • 46. END