Lesson 3 Technologies' Impact On Privacy
Lesson 3 Technologies' Impact On Privacy
PROFESSIONAL
ISSUES
Lesson 2: Technologies’ impact on privacy
Intended Learning
Outcomes
At the end of this chapter, the student is expected to:
1. Be knowledgeable of his privacy rights and the rights to due process guaranteed
by the constitution;
2. To evaluate whether a particular scenario constitutes a violation of his rights to
privacy;
3. To defend and argue whether in a particular instance, a person may have a
reasonable expectations of privacy; and
4. Demonstrate the concept of identity theft and illustrate the ways from which such
may be avoided
Rule #1: Thou Shalt Not Use a Computer to Harm Other People
:
•Key Point
Rule #5: Thou shalt not use a computer to bear false witness.
THE TEN
COMMANDMENTS
OF COMPUTER
ETHICS IN RELATION
TO THE
APPROPRIATE
PHILIPPINE LAWS
Rule #1: Thou Shalt Not Use a Computer to Harm Other People
:
•Key Point
• Rule #7: Thou shalt not use other people’s computer resources without
authorization or proper compensation.
• Rule #8: Thou shalt not appropriate other people’s intellectual output.
• Rule #9: Thou shalt think about the social consequences of the program you
are writing or the system you are designing.
• Rule #10 : Thou shalt always use a computer in ways that ensure consideration
and respect for your fellow humans.
THE TEN
COMMANDMENTS
OF COMPUTER
ETHICS IN RELATION
TO THE
APPROPRIATE
PHILIPPINE LAWS
The only privacy that's
left is the inside of your
head.
by : – Brill (Gene Hackman)
LIFE UNDER THE
TECHNOLOGY
ENABLED NATIONAL
ID SYSTEM
IS IT POSSIBLE FOR IT
PROFESSIONALS TO HELP IN
PREVENTING TERRORIST
ATTACK?
National ID System
• A National ID System uses a single,
government-issued identification card
containing personal information.
• This system centralizes various public and
private services (e.g., healthcare, banking,
social services) into one identification
database.
• It’s often positioned as a tool for improving
governance, security, and access to
services.
The Role of Technology in
National ID System
• Biometric Data: National ID systems often collect
biometric data like fingerprints, iris scans, and
facial recognition to prevent identity fraud.
• Centralized Database: Information is stored in a
large, centralized databas
• e, which can be accessed by various government
agencies and private institutions.
• Smart ID Cards: These cards may contain chips
that store data and can be used for transactions,
identification, or accessing government services.
SCENARIO:
• Background:
A series of online messages were flagged by local intelligence
agencies indicating a potential terrorist attack in Metro
Manila. The messages were sent via encrypted social media
applications, making it difficult for authorities to track down
the individuals involved. As part of the investigation, law
enforcement agencies, led by the National Bureau of
Investigation (NBI) and the Anti-Terrorism Council (ATC), want
access to the private messages of a suspected terrorist group.
Legal Framework:
•Purpose of A.O. No. 308: Establish a National Computerized Identification Reference System to facilitate
government transactions and prevent fraud.
•Supreme Court Action: Issued a temporary restraining order on April 8, 1997, halting the implementation of
A.O. No. 308.
•Petitioner's Argument: A.O. No. 308 is an unconstitutional usurpation of legislative powers and violates the
right to privacy.
•Respondents' Argument: Petition is not justiciable, the order is within the President's executive powers, and it
protects individual privacy.
ISSUE:
Scenario:
If juan is convicted of the
crime rape , can he invoke his
right of privacy? NOTE: