0% found this document useful (0 votes)
15 views2 pages

GES

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views2 pages

GES

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

GESTECH – SCIENCE TECHNOLOGY AND SOCIETY

WEEK 4-ACTIVITY 2

Name: EURICA SHANNE L. POLANCOS Class Time: 8-9 PM


Scores: ______/20

PHILIPPINE LAWS, R.A., POLICIES, etc.

Definition Characteristics
Republic Act No.10173 or the Information Mandates Transparency in Data Processing
Security Act. This is a law pointed at defending all and Collection: Organizations must make the
sorts of information, be private, individual, or goals, parameters, and procedures of data
delicate. This law addresses the moral and ethical collection and processing transparent to persons
concerns in the innovative period since one of the (data subjects). This includes giving them full
moral challenges in our computerized period is details about the purposes for which, with whom it
how businesses and websites utilize our individual will be accessed, and how long it will be kept on
data. When we visit certain websites and do file. People are guaranteed to be fully informed
exchanges, such as online shopping, partaking in about the consequences of revealing personal
online exercises, and utilizing social media, we information when there is transparency.
yield our individual data to websites. As a result,
the site and certain programmers may misuse your Grants Individuals the Right to Access, Correct,
personal data for untrustworthy or illicit purposes, and Delete Their Personal Data: Data subjects
such as spreading wrong data, creating an untrue are legally entitled to request access to the
personality, or locks in in fraud. personal information that organizations have about
them. They might ask for updates if the data is
incorrect or out of current. Additionally, people have
the right to ask for the blocking or deletion of data
that was obtained illegally or is no longer needed
for its intended use. People now have more control
over their personal data thanks to this.

Requires Organizations to Adopt Security


Measures to Safeguard Data: Companies are
required by law to put in place the proper
organizational, technical, and physical security
measures to guard against unauthorized access,
abuse, and breaches of personal data. This include
data protection training for staff members,
encryption, access limits, and regular security
assessments. Additionally, organizations have a
deadline for reporting affected persons and the
National Privacy Commission about data breaches.

Examples Non-Example
In order to ensure transparency and voluntary Labor laws cover employment relations, including
involvement, companies are obligated to get wages, working conditions, and employee rights.
explicit consent from individuals prior to collecting Cybercrime laws are important for combating
their personal information. This ensures that illegal activities like hacking, fraud, and identity
individuals are fully informed about the aim and theft, but they do not focus on data protection or
scope of data collection. Organizations are privacy management. Intellectual property laws,
required to promptly notify the affected individuals which protect creative works like patents,
in the event of a data breach. This notification copyrights, and trademarks, are more concerned
should include details regarding the breach, its with ownership rights than with handling personal
impact, and the steps being taken to address and data.
minimize possible harm. Following this procedure
helps to ensure accountability. To further reinforce
the protection of privacy rights and discourage
prospective violations, businesses that access,
use, or distribute personal data without
authorization are subject to severe penalties,
including hefty fines and legal ramifications.

Process Questions

1. Why is there a need to create these laws, republic acts, policies, and
etcetera?
The protection of our individual rights—such as the prohibition on revealing personal
information to third parties or on social media and the right to know where our
information is kept—was greatly helped by laws and rules.

2. Briefly discuss Bioethics and when can we say a particular medical


approach given is ethical or not?

Bioethics is the consider of moral issues in science and pharmaceutical, centering on


guaranteeing that therapeutic hones and advances regard human nobility and ethical
standards. A restorative approach is regarded moral if it includes educated assent,
points to advantage the quiet whereas minimizing hurt, is reasonable and evenhanded,
and regards quiet independence. If these standards are abused, the approach may be
considered unscrupulous.

You might also like