Group 1 Ict Policy and Safety Issues

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 17

ICT POLICIES AND SAFETY ISSUES

By Group 1
Republic Act 10173

Republic Act No. 10173, also known as the Data Privacy Act of
2012 (DPA), is a law in the Philippines that protects the
fundamental right to privacy of individuals in relation to their
personal information. It aims to ensure the security and
confidentiality of personal information in information and
communications systems, both in the government and the
private sector.
The DPA has the following salient features:

It establishes the National Privacy Commission (NPC), which


is responsible for implementing the law and ensuring
compliance by government agencies and private
organizations.

It requires government agencies and private organizations to


obtain the consent of individuals before collecting,
processing, or using their personal information.

It prohibits the processing of sensitive personal information


without the consent of the individual, except in certain
limited circumstances.
It requires government agencies and private organizations to
take reasonable security measures to protect personal
information from unauthorized access, use, disclosure, or
destruction.

It gives individuals the right to access, correct, and erase


their personal information.

It gives individuals the right to file complaints with the NPC if


their personal information is mishandled.
The DPA has several advantages, including:

It helps to protect individuals from identity theft, fraud, and


other privacy violations.

It promotes trust and confidence in the use of information


and communications technologies.

It encourages innovation and economic growth by creating a


more secure environment for the collection, processing, and
use of personal information.
The DPA has also faced some issues, such as:

Lack of awareness of the law among individuals and


organizations.

Limited resources of the NPC to enforce the law.

Inadequate penalties for violations of the law.

The DPA is still a relatively new law, and it is still being


implemented. However, it is an important step towards
protecting the privacy of individuals in the Philippines.
Here are some of the implementations of the DPA:

The NPC has issued a number of guidelines and regulations to


help organizations comply with the law.

The NPC has conducted training and awareness sessions on


the DPA for government agencies and private organizations.

The NPC has received and investigated a number of


complaints about violations of the DPA.
Here are some of the implementations of the DPA:

The NPC has issued a number of guidelines and regulations to


help organizations comply with the law.

The NPC has conducted training and awareness sessions on


the DPA for government agencies and private organizations.

The NPC has received and investigated a number of


complaints about violations of the DPA.
What is Cyber bullying?
-Is when someone uses technology like the internet or social
media to be mean, hurtful, or threatening to others.

There are two definition of cyberbullying

•One definition - cyberbullying is the process of using the


internet, cellphone or other devices

•Another definition - cyberbullying is when a child preteen or


teen is tormented , threatened, harassed, humiliated.
There are 7 common cyber bullying behavior these may
include the following:

1. Flaming
2. Harassment
3. Denigration
4. Outing and tricky
5. Posing
6. Exclusion
7. Cyber talking
There are 9 common direct attacks of Cyber bullying which
includes the following:

• Instant messaging
• Stealing password
• Blogs
• Web sites
• Sending pictures through E-mail
• Internet polling
• Interactive gaming
• Sending P**n and other Junk E-mail
• Sending malicious code
The Anti-bullying Act 2013 (RA 10622)
This law finds applicability in school related bullying, student
bullying in particular, which covers those authored in social
media.

RELEVANT LAWS
1. CyberCrime Prevention, Act of 2012 (Republic Act No. 10175)
2. Anti bullying Act of 2,013 (Republic Act No. 10627)
3. Data Privacy Act of 2,012 (Republic Act No. 10173)
Reporting Mechanism.
1. Local Authorities
2. Online Platforms.
3. School Authorities.
Legal procedures and consequences:

1.Filling a complaint: A victim van initiate a legal process by


filling a complaint with the appropriate authorities.

2.Investigation and charges: Once the complaint is filed, an


investigation will ensue.

3. Court Proceedings: If the case moves go court, both parties


will have the opportunities to present their case.
REMEDIES:

1. Cease and Desist Orders: Legal measures such as cease and


desist orders can be issued against the perpetrator.

2. Restraining order: in extreme case, restraining orders can be


put in place to protect the victim.

3. Damages: The victim may also be entitled to claim damages


for the emotional distress cause by the cyberbullying.
"TECHNOLOGY IS A USEFUL
SERVANT BUT A DANGEROUS
MASTER."
Christian Lous
Lange
THANK YOU

You might also like