Broñosa Matthew 29017
Broñosa Matthew 29017
Broñosa Matthew 29017
College of Science
Information Technology and Information Systems Department
Submitted by:
BROÑOSA, MATTHEW S.
Program Name : Bachelor of Science in Information Technology
Student Number : 201913431
Section: 29017
Submitted to:
Date Started:
June 20, 2022
Date of Submission:
July 21, 2022
1
TABLE OF CONTENTS
Cover Page……………………………………………………………………………………………………………………. 1
Table of Contents………………………………………………………………………………………………………………2
Rationale………………………………………………………………………………………………………………………..3
V. Online Courses…………………………………………………………………………………………………42-45
2
Rationale
Students will be even more inclined to learn about the use of information systems and technology in this field.
Furthermore, it will demonstrate IT and IS students the issues and trends that require urgency. Each of these activities
are developed to guide students in improving their capacity for rational thinking, refining their ability to think critically,
training coming up with original concepts, knowing further about their environment, and gearing up for opportunities
in information technology.
3
I. Technology Summit Documentation
I. Title:
II. Overview:
Three different topics relating to various tracks in the IT/IS course are covered in this two-day webinars. One of the objectives
of this event is to introduce incoming first-year IT & IS students to the tracks from which they can select in their third year of
study. The importance of enterprise user experience and how it is experienced was the first topic covered. Additionally, it
covered the various user experiences and offered information about working in a business. The discussion that followed focused
on the many kinds of animation and editing that game developers are capable of doing. The final topic covered was network
infrastructure and data security. Each topic has speakers and interactive activities. The Different Capstone Titles Presentation
is the final portion of the event, where judges will determine which capstone is the most stunning and well-kept.
4
IV. Certificate of Attendance:
5
Day 2 (July 13, 2022) Morning Session:
6
V. Evidence or Proof Involvement:
Picture of attendance
7
3 proof of involvement
Day 1
8
Day 2
9
VI. Selfie Picture:
Day 1
10
Day 2
VII. Evaluation:
• I learned that knowing the proper methods for gathering data can help you accomplish a lot, especially when you're
working.
• I learned that when designing a user interface it should fit the user’s preferences and make them easy to use and
understand.
• I learned that Robotics Submission System (RPA) is more reliable and the most commonly industries that use
Robotics Submission System moreover I also learned that white collar jobs are gradually being helped and improved
due to automation.
• I learned two classes of Robotics Submission System these are the Attended and Unattended RPA.
11
II. Case Study on Current Trends (IT Related)
Section/Schedule 302
______
Subject: IT Issues and Seminars_ Professor:_Mr. Archie G. Santiago_
100
Introduction
The Free Wi-Fi Internet Access in Public Places Project of the Philippine Department of Information and Communications
Technology (DICT) aims to speed up government initiatives to improve internet accessibility for Filipinos so that, in turn,
economic, social, and educational opportunities will be bolstered and the growing Digital Divide can be bridged throughout the
nation. The Project, the first initiative of its kind in Southeast Asia, aims to provide free Wi-Fi Internet access to a total of 1,634
localities across 1,489 municipalities from first to sixth class, and 145 cities with 13,024 sites covered by 18 Points of Presence
(PoP) throughout the Philippines. These localities span 1,634 localities spanning 1,489 PoP sites, which cover 1,634 localities
totaling 1,634 localities spanning 1,489 PoP sites.Plazas and parks, public libraries, public schools (elementary and secondary),
12
state colleges and universities, rural health units and government hospitals, train stations, airports and seaports, as well as
federal, state, and local government offices are some of the public locations that will have free Wi-Fi (NGAs and LGUs).
Pipol Konek Project deployment took place over the course of three stages. Phase 1 was subdivided into Phase 1A and
Phase 1B. Phase 1A centered on initial installation, while Phase 1B centered on expansion to municipalities with income classes
of 3 to 6 and major cities including Manila, Cebu, and Davao. Extension to new locations is part of phase 2. In phase three,
collaborations with NGCP and other electric cooperatives are emphasized for the use of infrastructure. In the first and follow-
up phases of the Pipol Connect project, DICT entered agreements with the following contractors:
• Speedcast
• (AZCOM), Omniprime Marketing Inc. (OMI), Nexlogic Telecommunications Network, Inc. and Neo-Tech
• UNDP
These contractors were tasked with bringing free wifi to the many locations the Pipol Konek project has chosen. Because
the contractors had already finished a project of a corresponding size and scope to the Pipol Konek free Wi-Fi project, they
were given the contracts. Before the project could be effectively implemented, permissions were also necessary for the
But the outcome did not come out as planned. According to the Department of Information and Communications
Technology (DICT), just 882 of the 6,000 public Wi-Fi connection points that the government intends to establish by the end
of 2022 have already been installed. The DICT itself and parliamentarians brought up the fact that the majority of Wi-Fi
13
equipment deployed during the project's first phase offered internet connections that were "too slow," with a top connection
speed of 2 megabits per second, during the hearing. Erlinda Bildner, president of Philcomsat, mentioned Speedcast and the
UNDP as reasons for the holdup. She said that Speedcast filed for bankruptcy six months into the project, which caused an 11-
month delay. She also brought up the undervaluation problem at Customs, which called for an internal investigation. As some
local government units (LGUs) desired to move the installation address to regions they considered would benefit more clients,
Bildner continued, they also ran into issues with other sites.
Problem
As of May 2021, the project is only in the first of three phases, according to DICT Undersecretary Emmanuel Caintic,
who testified during a hearing of the House committee on good administration and public accountability on the government's
Wi-Fi initiative. According to Bildner, Philcomsat was only to act as "installers," whilst the UNDP was intended to do site
surveys and work out these kinks with the LGUs. She added that the pandemic lockdowns in 2020 further slowed them
considerably.
In its December 2020 audit report, the Commission on Audit had warned the DICT about its poor project implementation.
The DICT decided to collaborate with UNDP due to its extensive experience, expertise, and ability to design for and implement
the most suitable technologies in remote and underdeveloped areas, establish citizen monitoring mechanisms, and support DICT
in developing its systems and capacity. UNDP also has high standards for quality assurance.
The DICT decided on the Australian company Speedcast to manage with the technical assistance of the UNDP. The free
Wi-Fi project's first and second phases. Later, Speedcast chose Philcomsat, which is partially owned by the government, to be
its subcontractor and consignee. The UNDP listed commercial difficulties and mobility limits as some of the pandemic
14
restrictions that the contractor and its subcontractor faced as delays, notably in site activation. Philcomsat and Speedcast,
however, were unable to resolve their disputes despite cooperative efforts to do so with a number of re-negotiated catch-up
plans presented for DICT clearance, the UNDP stated in the statement.
Describe how the problem affects the goals and objectives of the organization.
Although the DICT already has goals, the organization's goal to offer free broadband Internet access to public areas
across the nation is hampered by issues with contractors' slow service, the pandemic, slow internet access, the connection with
Analysis of Alternatives
The new plan's implementation will be the main focus of DICT in order to address the issues that have arisen. The new
contractors will go through extensive testing to see if they are truly capable of improving the public's access to Pipol Konek
Free Wi-Fi. All necessary materials are managed appropriately. The procedure for constructing the Pipol Konek includes
weekly inspections. Along with all the CEOs and other participants, there will also be a weekly meeting with the contractors.
The accounting team should review the breakdown of the cost of the equipment that the contractors must submit. Weekly on-
site inspections will be conducted to monitor the program's implementation progress. Priority is given to the parties involved
There will always be a gathering to discuss fresh concepts before developing a detailed strategy. The LGU's officials
are always involved and the location is always checked first. A Public Wi-Fi service's effectiveness is determined by how
15
successfully it accomplishes its goals, which typically refers to how consumers utilize the service. Take-up depends on both
the service's location and how easily it functions for the user. Less obstacles and hassles to using the service typically result in
higher levels of uptake. Free Wi-Fi access to the Internet can promote innovation by creating an environment conducive to it.
Recommended Solutions
• Seoul Public Wi-Fi 2.0 ("Seoul to provide free WiFi at all public places by 2017", 2016)
• Conducting Survey
• Alliances
• Community network
• Similar to Philippine’s DICT, South Korea has a National Information Society Agency (NIA). NIA operates
under the objective to oversee construction of high-speed networks, to oversee use of information technology in
government agencies, and to oversee programs to promote public access to broadband and digital literacy.
Back in 1994, NIA established the Korean Information Infrastructure initiative (KII). The KII is about
constructing the nationwide fiber optics network. The initiative envisions itself to exchange real-time video on
• Locations should be selected appropriately to help achieve the objectives for Public
Wi-Fi.
• Conducting Survey to know the feedback of the users on the things that need to be improved to be able to give a better
service. They will be asked online to answer the survey regarding with their experiences in connecting with the Pipol
Konek.
16
• Under an alliance arrangement, all parties agree to work together for a common objective without giving up their
independent status. Such an arrangement would mean that DICT, the service provider, the authorities involved would
work as one. A Public Private Partnership is characterised by a government service being delivered through a
partnership of government and private service providers. In this model, the service is funded and operated by this
• Community networks are typically organised as networks, where Access Points with backhaul make this backhaul
available for all other Access Points in range. This means that collective backhaul bandwidth can be shared across all
Implementation
Philippines must also narrow the digital gaps (Kim, 2018) by allocating budgets for network infrastructure construction,
improvements, and maintenance, participate in ICT-related summits for coming up with different policies and
methodologies and to target a higher quality. Private sector harmony is also one of the key success factors of South Korea’s
leading high speed Internet. With less cost for the government, the private sector partnership has helped to further bolster the
country’s network infrastructure. Unlike in the Philippines, telcos do not even comply to cooperate with the National
Broadband plan of peering policy in order to minimize network latency. South Korea Electronics and Telecommunications
Research Institute (ETRI) “has developed a core network technology that allows a 5G network to automatically steer users”
to Wi-Fi based. The Philippine government needs to beef up its R&D department to encourage healthy competition via
state-granted vertical technology transfers. One way is through institutionalizing a separate entity from the DICT for electronics
and telecommunications R&D. Utilize Philippine membership in ASEAN and in other regional organizations, like United
Nations Asian and Pacific Training Centre for Information and Communication Technology for Development
(UNAPCICT), to acquire technologies that will help boost the Internet bandwidth and further reach remote areas in the last
mile. Requirements for alliance contracting are embodied within the national guidelines. The implementation of Public Wi-Fi
is more of a journey than a destination, in that Public Wi-Fi services require ongoing resources, funding and commitment to
17
maintain. DICT must remain trustworthy with the funds and be strict with the implementation. Following all the rules and
regulations to improve Pipol Konek. Assuring the quality and the life long service of the Pipol Konek to the citizens. Having a
backup plan whenever there will be a problem. An everyday checkup with the system together with the infrastructures.
Results
Public Wi-Fi is a great opportunity for governments to connect entire cities: smart cities deploying free Wi-Fi are largely
increasing and as a result, can effectively empower their communities with better services. Equipping public transportation
with free Wi-Fi access is another example of how public Wi-Fi positively affects communities: residents and travelers can
enjoy a better travel experience and get real-time information about transports, so as to better plan their routes. By providing
free Wi-Fi to students and to the academic staff, educational institutions can leverage wireless education to improve their digital
studies’ curriculum. Examples of effective implementation of free Wi-Fi in schools are New Taipei City, Taiwan, which in
2015 introduced tablets and computers in 300 schools, and the LSD Lisbon School of Design, Portugal, which, thanks to the
Tanaza Wi-Fi, has been providing students and staff with a seamless and reliable Wi-Fi network since 2015. In this way, student
and teachers can effectively use wifi-enabled devices for educational purposes and, at the same time, the institution can develop
innovative teaching techniques based on collaborative and interactive learning. Wi-Fi technology applied to healthcare services
largely improves hospitals and clinics’ performances. For instance, thanks to wireless apps doctors can have instant access to
their patients’ clinical information and easily communicate with them. In addition, public Wi-Fi facilitates rural health care:
indeed, patients living in rural areas can use their Wi-Fi network to reach doctors remotely. At the same time, Wi-Fi allows
real-time location monitoring, meaning that it makes it possible to track the position of the medical staff within a healthcare
building and to better plan the use of resources: both patients and equipment can be directed to the right place at the right time.
18
Reference
https://www.researchgate.net/publication/341669242_DICT_Pipol_Konek_Case_Study
https://www.itu.int/net4/wsis/archive/stocktaking/Project/Details?projectId=1515567922
https://www.rappler.com/nation/sites-installed-public-wifi-project-may-2021/
probe-irregularities-in-p1-36-b-free-wi-fi-project/%3famp
UNDP PIPOL KONEK PRODOC. (2018, September 26). Info.Undp.Org. Retrieved July 1, 2022, from
https://www.google.com/url?sa=t&source=web&rct=j&url=https://info.undp.org/docs/pdc/Documents/PHL/DICT%2520-
%2520UNDP%2520PIPOL%2520KONEK%2520PRODOC%2520-%2520Signed.pdf&ved=2ahUKEwiQw-v2q9f4AhU-
qFYBHSesCGAQFnoECA4QBg&usg=AOvVaw13DLcJ2dX5Wt4iCdmTZLZy
2022, from
https://www.google.com/url?sa=t&source=web&rct=j&url=https://www.mav.asn.au/__data/assets/pdf_file/0017/7631/Public
19
-WiFi-implementation-
guidelines.pdf&ved=2ahUKEwiRos25vNf4AhV4plYBHVgeDWAQFnoECEoQAQ&usg=AOvVaw1LdwCsS-
N9xU34F7aegyZ5
20
CASE STUDY 2 – Professional Responsibility
Objectives:
• Discuss the different IT trends and issues both in local and international scenarios
The case relates to the most recent game being created for children between the ages of 7 and 15. Players can choose from
a wide range of characters, mostly macho men or alluring women, but it also features inferential reasoning based on societal
norms. The game's primary participants are boys. The masculine predominance of the team is the root of the problem. It was
made aware at the meeting that it needed to be altered in order to provide better results. The CEO of the company, its board of
directors, and its production crew are all parties to this dispute. Due of its exclusivity towards guys and bias against other
21
1. Should you refuse to work on your team? Should you ask for the team to be reviewed?
Yes, because both the game and its content are unsuitable for children of that age. A game should also appeal to a diverse
group of individuals; it shouldn't be reserved only for guys. The game should be open to players of other genders. I understand
why they decided to limit access to boys, but I won't allow myself to work on it because I have a different opinion, especially
if they don't change the way the game is played. The most significant aspect is that it imparts lessons and should be impartial.
It must be sensitive to gender. We must put ourselves in the game if we want to participate. It is our responsibility as adults to
aid in forming children into moral beings. To respond to the second inquiry, yes. There are simply too many changes in the
game, especially in terms of the content, so you need to be very aware of what needs to be altered and what else needs to be
better. A review is necessary because individuals involved should ensure that it is good, which is why it should be. They don't
all act in ways that are morally appropriate at once. It should be checked, looked over, and placed into a step-by-step process
before it is established.
2. Do you think that the game will sell as well if a different message was given?
Yes, I'm sure the game will sell since it has more content and appeals to both men and women; it's not only for boys. Many
individuals will use the message if it is accurate. If the message of the game is easy to understand, in addition to being
interesting, fun, and exciting, users will believe that it is worthwhile and that they will benefit from it.
22
3. What is your responsibility, if any, in the team and regarding the games’ topics?
My responsibility is to examine the game's content and any upcoming updates, as well as to keep an eye on the
programmers to make sure the game is being created properly. Being a team member, I wanted it to be successful. As long as
I'm a team member, I'm responsible even though it wasn't my idea. We used brainstorming to come up with the game concepts.
I have the opportunity to think about the subjects and all of the things we will do to make the game fantastic. Since the themes
are crucial to the game as a whole, it is my duty to follow the right guidelines. Letting them know my ideas for enhancing the
Yes, so that players are aware of the purpose behind the game's design, the nature of the game itself, and any additional
lessons that might be learned through game play. It's one of the considerations made when making a game. Games' messages,
in my opinion, are very important since it creates a connection between game developers and users. The message within the
game gives it direction so that players can always understand its goals and purposes.
Yes, it is possible to make a game that plays well and has appealing game content using a variety of concepts and resources.
Yes, it is justified because we need help in order to produce the game more quickly and with higher quality. Diversity leads to
diverse viewpoints. When team members come from different origins, cultures, and experiences, the team is more likely to
solve challenges and be creative. This can result in results that are examined more closely. Unquestionably, a diverse team will
spot a software or market gap earlier than a non-diverse group. This is because each team member will bring their own
23
knowledge, experience, and vision to the project, ensuring that it meets the diverse needs of the intended audience and surpasses
Yes, since a scarcity may have an effect on the staff members that work on games or projects for a corporation. For me,
that company is still protected because when there is a shortage or neglect, especially when there is a high workload. It is the
obligation of the profession since the profession demands it. A profession, according to the dictionary, is a paid occupation,
particularly one that calls for considerable training and a formal certificate. Since it is a vocation, it should be suitable,
exceptional, or extremely good. The profession is accountable if there is a shortage, if it isn't diversified, if it's immoral, and if
Conclusion
Developers cannot assume that their own position is unassailable, thus they must take the time during the development process
to actively seek out and examine other viewpoints, especially those that are buried in popular conversations. When seen from
an anti-oppressive angle, it is clear that academics and professionals are not the exclusive authorities on a subject. Game makers
must act with purpose and attention while promoting diversity and dispelling common misconceptions in gaming. The intended
audience, their unique experiences, and any potential oppressions they may experience must all be carefully taken into account
when creating anti-oppression video games. It necessitates giving up the idea that there is just one type of player or that all
players approach games similarly. It's important to carefully analyze the assumptions that game designers and developers make
24
Reference:
ways-diversity-and-inclusion-help-teams-perform-better. (2021, September 3). Www.Cio.Com. Retrieved July 14, 2022, from
https://www.cio.com/article/189194/5-ways-diversity-and-inclusion-help-teams-perform-better.html
White. (2020, January 8). diverse-development-team. Www.Bairesdev.Com. Retrieved July 14, 2022, from
https://www.bairesdev.com/blog/diverse-development-team/
https://www.researchgate.net/publication/262250136_Designing_Games_for_Ethics_Models_Techniques_and_Frameworks
25
CASE STUDY 3 – Data Privacy Act of 2012
Objectives:
• Discuss the different IT trends and issues both in local and international scenarios
Instructions:
A. Local https://www.rappler.com/technology/222192-subscribers-affected-globe-
telecom-sends-personal-data-wrong-recipients/
B. International https://www.reuters.com/article/us-usa-voters-breach-
idUSKBN0UB1E020151229
26
1. Use the following contents for this study:
A. LOCAL ISSUE
TITLE:
INTRODUCTION:
The article begins by stating that Globe sent the personal information of its 8,851 subscribers to the
incorrect recipients. This story claims that the emails contained the users' 4names, complete postal
addresses, and email addresses, resulting in a data leak. Data that wasn't intended for them was visible to
other people. Users of Globe who received incorrect texts with inaccurate information cautioned other
Globe users not to sign up for the On The List program in order to access concert tickets and other music
This is so that others cannot use their personal information to defraud them or create their accounts
without their consent. The information contains their personal information. The Globe is also responsible
for it because they were supposed to protect their users' sensitive in4formation but instead they let it slip.
Many people tweeted about the issue, which was picked up by Globe, who then notified the National
Privacy Commission in accordance with legal procedures. The National Privacy Commission is an
independent agency tasked with overseeing the administration and implementation of the Act as well as
27
monitoring and ensuring that the nation complies with global standards for the protection of personal
data.
SCENARIO:
Personal information from the 8,851 subscribers was made public by Globe when they sent these to the
incorrect recipients. These subscribers had already been subjected to scams, phishing, and other negative
effects. This problem, which violates the Data Privacy Act, must be fixed by Globe.
The following are the practices that violates the DPA of 2012 according to the Implementing Rules and
- The processing of personal information shall be permitted only if not otherwise prohibited by
(a) The data subject has given his or her consent, specific to the purpose prior to the processing, or in the
case of privileged information, all parties to the exchange have given their consent prior to processing;
(b) The processing of the same is provided for by existing laws and regulations: Provided, That such
regulatory enactments guarantee the protection of the sensitive personal information and the privileged
28
information: Provided, further, That the consent of the data subjects are not required by law or regulation
permitting the processing of the sensitive personal information or the privileged information;
• CHAPTER IV
4SEC. 16. Rights of the Data Subject. – The data subject is entitled to:
- (8) The existence of their rights, i.e., to access, correction, as well as the right to lodge a
• CHAPTER V
• SEC. 20. Security of Personal Information. – (a) The personal information controller must
implement reasonable and appropriate organizational, physical and technical measures intended
for the protection of personal information against any accidental or unlawful d4estruction,
imprisonment ranging from three (3) years to six (6) years and a fine of not less than Five
hundred thousand pesos (Php500,000.00) but not more than Four million pesos
personal information without being authorized under this Act or any existing law.
• SEC. 27. Improper Disposal of Personal Information and Sensitive Personal Information. – (a)
The improper disposal of personal information shall be penalized by imprisonment ranging from
six (6) months to two (2) years and a fine of not less than One hundred thousand pesos
(Php100,000.00) but not more than Five hundred thousand pesos (Php500,000.00) shall be
imposed on persons who knowingly or negligently dispose, discard or abandon the personal
29
information of an individual in an area accessible to the public or has otherwise placed the
• (b) The improper disposal of sensitive personal information shall be penalized by imprisonment
ranging from one (1) year to three (3) years and a fine of not less than One hundred thousand
pesos (Php100,000.00) but not more than One million pesos (Php1,000,000.00) shall be imposed
on persons who knowingly or negligently dispose, discard or abandon the personal information of
an individual in an area accessible to the public or has otherwise placed the personal information
• SEC. 32. Unauthorized Disclosure. – (a) Any personal information controller or personal
information processor or any of its officials, employees or agents, who discloses to a third party
personal information not covered by the immediately preceding section without the consent of the
data subject, shall he subject to imprisonment ranging from one (1) year to three (3) years and a
fine of not less than Five hundred thousand pesos (Php500,000.00) but not more than One million
pesos (Php1,000,000.00).
• SEC. 34. Extent of Liability. – If the offender is a corporation, partnership or any juridical person,
the penalty shall be imposed upon the responsible officers, as the case may be, who participated
in, or by their gross negligence, allowed the commission of the crime. If the offender is a juridical
person, the court may suspend or revoke any of its rights under this Act.
Recommendations:
The article stated that the NPC is currently “evaluating the incident and verifying the information given
Affected users are urged to keep watch over their offline and online accounts for anomalous behavior and
change passwords and verification information. They should also be wary of potential phishing scams
according to the NPC. Also, Globe Chief Information Security Officer A4nton Bonifacio said: ‘The On
30
The List registration site /was taken down immediately to remove access to potential registrants at the
time and we have notified all affected prepaid customers of the issue.’” on the basis of the article.
I advise the Globe to always evaluate their settings and safety precautions for the protection of their
users' data. Even though it is a large corporation, the NPC must also validate the problem, examine it, and
act fairly. Regarding the disclosure of the users' private information, they must both exercise strict
control.
Conclusion:
It serves as a warning to businesses that gather customer data. We must abide by the Data Privacy Act
in order to safeguard people from the many risks they will face. Even a large corporation can make
mistakes of this nature, so the offending organization must be held accountable for its actions. Users also
need to be very cautious when disclosing personal information to third parties. We must also be able to
Always verify that our accounts are secure, modify them if we believe they have been compromised,
verify our accounts, and, most importantly, never give your passwords or account information with
31
B. INTERNATIONAL ISSUE
TITLE:
INTRODUCTION:
The article previously stated that a database containing information on 191 million voters, including
their names, addresses, birth dates, party affiliations, phone numbers, and emails, was made public on the
internet. This database included voters from all 50 states as well as Washington, according to researcher
Chris Vickery in a phone interview. Austin, Texas-based computer support professional Vickery claimed
to have discovered the information while searching for material that had been made public online in an
Online, who also quoted the report, the disclosed data may have originated from NationBuilder, a
provider of campaign software, because the leak contained data codes that were similar to those the
company uses. They refuted the claim, however, and Executive Officer Jim Gillian claimed that since
each state government already makes the voter data included in the database available to the public,
SCENARIO:
According to Vickery, an Austin, Texas-based IT support professional, the database of 191 million
American voters was made public online. This article did not offer solutions, and it has no supporting
evidence. Nobody is willing to take responsibility for it, and the organization in question denied it.
32
Regulations on protecting voter data vary from state to state, with many states imposing no restrictions.
California, for example, requires that voter data be used for political purposes only and not be available to
The Privacy Act of 1974 is a major data privacy law that applies to how the federal government
and its agencies handle the data of U.S. citizens. The Privacy Act allows citizens to access and
view the government records containing their data, as well as request a change in the records in
case of inaccuracies.
• The California Consumer Privacy Act (CPA) was a major piece of legislation that passed in 2018,
protecting the data privacy of Californians and placing strict data security requirements on
companies.
• The Colorado Privacy Act (ColoPA) follows in the footsteps of its predecessors and adheres to
- This law will provide Nevada residents with a broader right to opt out of the sale of their
personal information. It also creates new requirements for “data brokers,” which are defined as
entities whose primary means of business is selling information about consumers from operators
or other data brokers. Data brokers must establish a designated address through which consumers
may request the data broker to stop selling their information. The data broker will have to respond
33
• California
The law gives companies 30 days to “cure” violations. Failure to address a violation leads to a
civil penalty of up to US$7,500 for each intentional violation and US$2,500 for each
unintentional violation.
• Colorado
There is no private right of action, so the Attorney General of Colorado and district attorneys will
enforce the CPA. They can seek monetary damages or injunctive relief. Before taking action,
however, the Attorney General and the district attorneys must issue a notice of violation and
allow companies or individuals 60 days to cure the alleged violation. After January 2025, this
“right to cure” will be replaced by the controller’s right to request guidance from the Attorney
General’s office.
Nevada’s Attorney General is tasked with enforcing this law. The court will issue a temporary or
Recommendations:
The article claims that there are no precise advice about how to resolve the problem. I would like to
suggest that the government's representatives take charge of the situation's resolution. They must
guarantee that the individuals who will be impacted won't suffer any harm. Utilizing their advanced
technologies, they must identify the root of the issue. The associated company must also take care to
Conclusion:
34
Whether it was settled or not is still in doubt. Simply stating that the company in question did not
release those details, they assure us. It's unclear whether anyone wants to fix the problem at all. However,
it varies by state, they do not also have the universal data privacy that operates for everyone's protection.
In order to protect their citizens, several nations have stepped up and created their own data privacy acts.
They made it clear that laws already exist so that those who break them will face punishment.
References:
protection/#:~:text=Penalties%20for%20violations%3A%20The%20Office,including%20reasonable%20attorneys’%20fees.
%E2%80%9D
35
III. Internal Webinar
Career Development
I. Title:
II. Overview:
This webinar is about IT & IS Career and Personality Development the primary objective of this webinar is to assist incoming
fourth-year students in selecting their future IT careers. The webinar's speaker also covered numerous IT careers and
tips on how to write a good résumé. The speaker also provided advice on how to effectively respond to interview questions.
Games and information about utilizing LinkedIn to generate a résumé are also included.
Topic 3 – Careers in IT
36
Selfie Picture:
37
VI. Evaluation
• I learned that we must first recognize our skills, talents, and interests.
• I learned how to answer the interview questions properly especially the questions Tell us about
yourself and What are your strengths and weaknesses and I also learned that the questions I mentioned are
• I learned the different IT careers that I can choose when I will apply for a job.
38
IV. External Webinar
Cybersecurity
I. Title:
II. Overview:
Cybersecurity and application security testing are the topics of this webinar. This webinar's goal is to educate participants about
application security testing and cybersecurity. The guest speaker also provided tips on various methods of protecting the
application. The guest speaker also offered advice on how to prevent data loss to the hackers. The prerequisites for application
and server scans are another topic covered in this webinar. Games and two guests speakers are also included in this webinar.
39
V. Evidence or Proof of Registration:
40
VII. Evaluation:
• I learned the security scanning requirements what to do before scans of the application or server.
• I learned the basic terms and technologies where it is used and how to use it.
41
V. Online Course
I. Title:
II. Overview:
Fortinet Product Awareness is the topic of this online course. The primary goal of this online course is to teach students about
Fortinet products and how to use them. This online course is divided into four lessons, each with six modules. This online
course covers four topics: adaptive cloud security, zero trust access, security operations, and security driven networking. It is
42
V. Evidence or Proof of Subscription:
43
44
VII. Evaluation:
• I learned the significance of an adaptive cloud security solution and its three core values.
• I learned about the various adaptive cloud security solution product solutions.
45