The document discusses the Philippines' 5-year national cybersecurity plan launched by the Department of Information and Communications Technology (DICT). The plan aims to protect individuals' privacy and data, secure critical information and communication technology infrastructure, and provide oversight of ICT sector regulations. The president recognized this plan would improve security for Filipino ICT users. Maintaining a flexible strategy is important given constant technology changes and growing cyber threats. The author believes the DICT's mandated plan will help secure national infrastructure and services. Simple steps individuals can take to protect themselves from cybercrime include using strong and unique passwords, staying aware of security breaches, and reporting any cybercrimes to authorities.
The document discusses the Philippines' 5-year national cybersecurity plan launched by the Department of Information and Communications Technology (DICT). The plan aims to protect individuals' privacy and data, secure critical information and communication technology infrastructure, and provide oversight of ICT sector regulations. The president recognized this plan would improve security for Filipino ICT users. Maintaining a flexible strategy is important given constant technology changes and growing cyber threats. The author believes the DICT's mandated plan will help secure national infrastructure and services. Simple steps individuals can take to protect themselves from cybercrime include using strong and unique passwords, staying aware of security breaches, and reporting any cybercrimes to authorities.
The document discusses the Philippines' 5-year national cybersecurity plan launched by the Department of Information and Communications Technology (DICT). The plan aims to protect individuals' privacy and data, secure critical information and communication technology infrastructure, and provide oversight of ICT sector regulations. The president recognized this plan would improve security for Filipino ICT users. Maintaining a flexible strategy is important given constant technology changes and growing cyber threats. The author believes the DICT's mandated plan will help secure national infrastructure and services. Simple steps individuals can take to protect themselves from cybercrime include using strong and unique passwords, staying aware of security breaches, and reporting any cybercrimes to authorities.
The document discusses the Philippines' 5-year national cybersecurity plan launched by the Department of Information and Communications Technology (DICT). The plan aims to protect individuals' privacy and data, secure critical information and communication technology infrastructure, and provide oversight of ICT sector regulations. The president recognized this plan would improve security for Filipino ICT users. Maintaining a flexible strategy is important given constant technology changes and growing cyber threats. The author believes the DICT's mandated plan will help secure national infrastructure and services. Simple steps individuals can take to protect themselves from cybercrime include using strong and unique passwords, staying aware of security breaches, and reporting any cybercrimes to authorities.
The article of Ed K. Usman entitled “DICT launches PH 5-year national cybersecurity
plan” talks about the mandate by the DICT that ensure the rights of individuals to privacy and confidentiality of their personal information; ensure the security of critical ICT infrastructures including information assets of the government, individuals and businesses; and provide oversight over agencies governing and regulating the ICT sector and ensure consumer protection and welfare, data privacy and security, foster competition and the growth of the ICT sector. The president itself recognized this plan by the DICT as useful one since its intention was to improve the Filipino users in the ICT sector. In a constantly changing information and communications technology (ICT), with the rapid growth in cyber threats environment, it is very crucial to have a flexible and dynamic cybersecurity strategy in order to meet new global threats. In view of this, I personally believe and confident with the mandated plan of the DICT, that it will help contribute to the improvement of the security and resiliency of national infrastructures and services. This strategy becomes a key policy feature that will help us to tackle risks which have the potential to undermine the achievement of economic and social benefits from cyberspace. By conducting its primary goals, which were to implement cyber resiliency measures to enhance our ability to respond to threats before, during, and after attacks; and with the effective coordination with law enforcement agencies and a cybersecurity educated society, I believe that this plan will really help our country. Cybercrime is considered as an on-going threat. Someone might think that the only form of cybercrime that we have to worry about is hackers stealing our financial information. But it may not be so simple. There are far more concerns than just basic financial ones. Cybercrime continues to evolve, with new threats surfacing every year. However, there are basic and simple ways that we need to practice in order to protect ourselves from against the range of cybercrimes out there. First is to use strong passwords. We must not repeat our passwords on different sites, and change our passwords regularly. We should make them complex by using a combination of at least 10 letters, numbers, and symbols. Second is keeping up to date on major security breaches. Making ourselves aware about the process in the cyber world will help us mitigate and keep us away from being a victim of cybercrime. Awareness is the key. And lastly, we must know what to do if we become a victim. If you believe that you’ve become a victim of a cybercrime, you need to alert the local police and, in some cases, the FBI. This is important even if the crime seems minor. Your report may assist authorities in their investigations or may help to thwart criminals from taking advantage of other people in the future. These are just naming a few of those helpful tips to secure our cybersecurity as an individual. We must just remember that our safety will rely on our actions, and when we do, we are now warriors that help to fight cybercrimes.
Indian Bank v. Maharashtra State Coop. Marketing Federation, AIR 1998 SC 1952 Trikamda Jethabhai v. Jivraj Kalianji AIR 1942 Bombay, 314 Code of Civil Procedure, 1908 S 10