GES
GES
WEEK 4-ACTIVITY 2
Definition Characteristics
Republic Act No.10173 or the Information Mandates Transparency in Data Processing
Security Act. This is a law pointed at defending all and Collection: Organizations must make the
sorts of information, be private, individual, or goals, parameters, and procedures of data
delicate. This law addresses the moral and ethical collection and processing transparent to persons
concerns in the innovative period since one of the (data subjects). This includes giving them full
moral challenges in our computerized period is details about the purposes for which, with whom it
how businesses and websites utilize our individual will be accessed, and how long it will be kept on
data. When we visit certain websites and do file. People are guaranteed to be fully informed
exchanges, such as online shopping, partaking in about the consequences of revealing personal
online exercises, and utilizing social media, we information when there is transparency.
yield our individual data to websites. As a result,
the site and certain programmers may misuse your Grants Individuals the Right to Access, Correct,
personal data for untrustworthy or illicit purposes, and Delete Their Personal Data: Data subjects
such as spreading wrong data, creating an untrue are legally entitled to request access to the
personality, or locks in in fraud. personal information that organizations have about
them. They might ask for updates if the data is
incorrect or out of current. Additionally, people have
the right to ask for the blocking or deletion of data
that was obtained illegally or is no longer needed
for its intended use. People now have more control
over their personal data thanks to this.
Examples Non-Example
In order to ensure transparency and voluntary Labor laws cover employment relations, including
involvement, companies are obligated to get wages, working conditions, and employee rights.
explicit consent from individuals prior to collecting Cybercrime laws are important for combating
their personal information. This ensures that illegal activities like hacking, fraud, and identity
individuals are fully informed about the aim and theft, but they do not focus on data protection or
scope of data collection. Organizations are privacy management. Intellectual property laws,
required to promptly notify the affected individuals which protect creative works like patents,
in the event of a data breach. This notification copyrights, and trademarks, are more concerned
should include details regarding the breach, its with ownership rights than with handling personal
impact, and the steps being taken to address and data.
minimize possible harm. Following this procedure
helps to ensure accountability. To further reinforce
the protection of privacy rights and discourage
prospective violations, businesses that access,
use, or distribute personal data without
authorization are subject to severe penalties,
including hefty fines and legal ramifications.
Process Questions
1. Why is there a need to create these laws, republic acts, policies, and
etcetera?
The protection of our individual rights—such as the prohibition on revealing personal
information to third parties or on social media and the right to know where our
information is kept—was greatly helped by laws and rules.