ITEC finals notes
ITEC finals notes
examples:
=sum(B1,B2,B7) or =B1+B2+B7
AVERAGE()
MIN()
Principle of Transparency
DATA PRIVACY ACT OF 2012
A data subject must be aware of the nature,
The Data Privacy Act of 2012 is an act to
purpose, and extent of the processing of his
protect the fundamental human right of
or her personal data, including the risks and
privacy, of communication while ensuring
safeguards involved, the identity of personal
the free flow of information to promote
information controller, his or her rights as a
innovation and growth. The National
data subject, and how these can be
Privacy Commission (NPC) is a body that is
exercised. Any information and
mandated to administer and implement this
communication relating to the processing of
law. The functions of the NPC include: rule-
personal data should be easy to access and
making, advisory, public education,
understand, using clear and plain language.
compliance and monitoring, investigations
and complaints, and enforcement of the act.
Principle of Proportionality Turn off ‘Save Password’ Feature.
The processing of information shall be If you are using a public computer, do not
adequate, relevant, suitable, necessary, and save your password in the browser. The next
not excessive in relation to a declared and person who will use that computer may be
specified purpose. Personal data shall be able to log in using your account.
processed only if the purpose of the Purchasing or any financial transactions
processing could not reasonably be fulfilled must also be done carefully on a public
by other means. computer.
Disable any ‘Auto-Complete’ Settings.
IMPROVING SECURITY Some devices and applications have an
auto-complete feature which fills blank
Safeguard your passwords.
fields with appropriate information which
Do not use passwords, such as your name, you may have filled in or saved prior to a
address, phone number, or birthday, that transaction. This may be a problem since
relate to easily obtainable personal auto-complete may provide information
information, minimize using common without your consent.
words. At least eight alphanumeric
Keep devices under lock and key.
characters should be your passwords, mixed
with upper- and lowercase letters, numbers, Devices can now be locked which prevents
and symbols (“@”, “-“, “.”) and passwords unauthorized usage by other entities. This is
are case sensitive. especially convenient for portable devices
when not in use.
Protect online accounts.
Services or organizations that you provided
with your account information do not ask
for it again aside from during the account
registration process. Never give out your
account information to suspicious entities
otherwise, they may be able to use your
account for any malicious intent.
Don’t transact using public Wi-Fi.
These types of connections are usually free
and open (no password is needed to
connect). As such, a number of users may
be connected and are using the connection.
An identity thief, armed with special tools
and software might be monitoring your
actions on the same Wi-Fi network.