0% found this document useful (0 votes)
74 views8 pages

ITE 412 - Chapter 5

This document discusses privacy laws and issues related to information privacy. It provides definitions of privacy as the right to be left alone and to control information about oneself. It discusses the Data Privacy Act of 2012 in the Philippines, which aims to protect privacy and ensure secure protection of personal information. Key privacy issues discussed include data breaches, consumer profiling through tracking software, and the need for responsible treatment of consumer data.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views8 pages

ITE 412 - Chapter 5

This document discusses privacy laws and issues related to information privacy. It provides definitions of privacy as the right to be left alone and to control information about oneself. It discusses the Data Privacy Act of 2012 in the Philippines, which aims to protect privacy and ensure secure protection of personal information. Key privacy issues discussed include data breaches, consumer profiling through tracking software, and the need for responsible treatment of consumer data.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

ITE 412

Chapter 5 - Privacy
MJPF

PR IVACY
“ You already have zero privacy - get over it.”

- Sun Microsystems CEO Scott McNealy

PRIVACY
PROTECTION
AND THE
LAW
Information about people is gathered, stored,
analyzed, and reported because organizations
can use it to make better decisions.

➔ Organizations need basic info


They need basic information about
customers to serve them better.

➔ Combination of Approaches
new laws, technical solutions, and
privacy policies—is required to balance
the scales.

➔ This chapter
will help you understand the right to
privacy
INFORMATION PRIVACY
A broad definition of the right of privacy is “the right
to be left alone—the most comprehensive of rights, and
the right most valued by a free people.”
Tip
and its use).

Another definition - “the right of


individuals to control the collection
In Philippine law, the
and use of information about concept of privacy
themselves”
Information privacy is the
combination of
enshrined in the Constitution
communications privacy. and is regarded as the right
data privacy (the ability to limit
access to one’s personal data by
other individuals and organizations
to be free from
in order to exercise a substantial
degree of control over that data
unwarranted exploitation of
COMMUNICATIONS
one's person or from SYSTEMS IN THE
GOVERNMENT AND THE PRIVATE SECTOR, CREATING FOR THIS
intrusion into one's private PURPOSE A NATIONAL PRIVACY
COMMISSION, AND FOR OTHER PURPOSES

activities in such a way as to


cause humiliation to a
“Data Privacy Act
person's ordinary of 2012”
sensibilities.
Declaration Policy
It is the policy of the State to protect the
fundamental human right of privacy, of
communication while ensuring free flow of
information to promote innovation and growth.
The State recognizes the vital role of
information and communications technology in
nation-building and its inherent obligation to
ensure that personal information in information
Tip
AN ACT PROTECTING INDIVIDUAL and communications systems in the
PERSONAL INFORMATION IN government and in the private sector are
INFORMATION AND
secured and protected.

Source:
https://www.privacy.gov.ph/data-privacy-act/

Tip
current and important privacy issues, including data
breaches,
electronic discovery, consumer profiling, workplace
monitoring, and advanced
surveillance technology..

Tip Key Privacy and Anonymity Issues


Additional
reference for data privacy act An alarming number of identity theft
incidents can be traced back to data
breaches involving large databases of
personal information.

Data Breaches

Caused by hackers breaking into a


database, but more often than one might
suspect, they are caused by carelessness Tip
Cryptography was once a
or failure to follow proper security mysterious science employed
mainly during wartime to make it impossible for enemies
procedures. to understand each others’ communications.
Data Encryption

Encryption is the process of converting an


original electronic message into a form
that can be understood only by the
intended recipients.
Cryptography is the science of encoding The use of cookies and tracking software
messages so that only he sender and the is controversial because companies can
intended receiver can understand them. collect information about consumers

Consumer Profiling without their explicit permission.

Companies openly collect personal


information about users when they
register at Websites, complete surveys, fill
out forms, or enter contests online.

Companies also use tracking software to


allow their Web sites to analyze browsing
habits and deduce personal interests and Tip
preferences. After cookies have been stored on your computer,
they make it possible for a Web site to tailor the ads
and promotions presented to you.
Treating Consumer Data
Responsibly
When dealing with consumer data, strong
measures are required to avoid the development
of customer relationship 1980 Organization for Economic
problems. The most widely Cooperation and
accepted approach to treating Tip

consumer data responsibility is An effective Chief Privacy


officer can avoid violating
for company to adopt the Code of government regulations and
reassure customers that their
Fair Information Practices and the privacy will be protected.
Development (OECD) privacy guidelines.

Questions?

You might also like