You are on page 1of 11

TARLAC STATE UNIVERSITY

COLLEGE OF TEACHER EDUCATIONCENTER OF


DEVELOPMENT IN TEACHER EDUCATIONRe-accredited Level
IV by the Accrediting Agency of Chartered Colleges and Universities of the
Philippines (AACUP), Inc.

UNIT 6 – PRIVACY POLICIES AND SETTINGS

Name : Sam C. Tolentino


Section : BSEd Social Studies 3B
Course Code : SSE 101

Exercises.
1. Think about all the social media application/websites you belong to.   

a. If a company came along and bought your data from all of

those application/websites and put it all together, what would your

reaction be? 

In this generation technology is mostly used by the people and it is

continuously evolving, and I know for a fact that digital footprint is existed

for a purpose. Thus, all my personal information of those

application/websites that I have used it is their properties because I

agreed to the Terms and Conditions before gaining those benefits that

they offer. However, I would feel anxious and frightened because of too

many “What if’s”, What if they want to buy my data because I discovered

something new that might catch the interest of the people. What if they

will use my information to involve in any crime that they wanted to

commit. What if they will use my information to harm those people who

are close to me. But it is depending on how the company who will buy it,

state the logical reasons and terms and conditions of why do they want
my information, if they’re suspicious about their reason is not valid. I

would probably be frightened knowing that my personal information is in

their hands and they can easily use it as a tool to commit a crime

nowadays.

b. What if that company decided to sell your data to marketers?

  If that company decided to sell my data marketers, it will be a threat

to my privacy and security and also my family because the fact that they

have my personal data makes me helpless because identity theft,

phishing, and scandals on the online world is rampant nowadays. For that

reason, we need to secure all of our personal information and don’t share

it or post it online because you might get into trouble, and if you have to

use any means to secure your information you have to, still your

information will exist because of digital footprint. Therefore, we need to

educate the people to be digitally literate for them not to engage to any

problems that social media has to offer. Nonetheless, I agreed to the

Terms and Conditions of that company and whether I like it or not they

already have all my personal information and activities that I did using

their application.

c. Describe three threats you think people could face if their information

were shared publicly? 

The threats that I see that people could face if their information

were shared publicly are identity theft, phishing, and hacks.


Identity theft is the unaware use of someone else's identity,

usually as a method to gain a financial advantage or obtain credit and

other benefits in the other person's name, and perhaps to the other

person's disadvantage or loss. The person whose identity has been

assumed may suffer adverse consequences, especially if they are held

responsible for the perpetrator's actions. Identity theft occurs when

someone uses another's personal identifiable information (PII), like their

name, identifying number, or credit card number, without their permission,

to commit fraud or other crimes.

Online identity theft occurs when users fall for tactics like

Phishing and confidence scams, or download malware onto their

computers or smartphones that steals their information, use wireless

networks that are insecure, take out money from an ATM that has been

rigged with a skimming device that collections your information, share

their passwords with untrustworthy people, or by having their information

stolen when data records are breached on companies, government, and

educational sites.

There are many different types of schemes identity criminals’

use. This can range from non-technological to technological schemes.

The following is a listing of just some of the most common methods

identity criminals have been known to use to obtain your personal

identifiable information, the ways scammers obtain personal or banking

information are:
fake online quizzes and surveys

fake job advertisements

remote access scams in which the scammer has direct access to

everything on your computer sourcing information about you from social

media platforms direct requests for scans of your driver’s license or

passport, often in the course of a dating and romance scam.

Your identity has value, as much as your online partial

identities. When your partial identity is with your bank or a brokerage

house, for example, it may have clear monetary value. When it is with a

social networking site, such as Facebook, Instagram or Twitter account,

the value may be less tangible but equally important to you. Simply by

being an active Internet user, you may find that you accumulate tens or

even hundreds of online partial identities.

If you become the victim of identity theft, chances are it will

cause severe damage to your finances and your good name, especially if

you don't find out about it immediately. (PNP-

ANTICYBERCRIMEGROUP)

Recommendation of PNP for Identity theft and Phishing

The public are advised to follow these tips in order to understand

the risks and prevent Steal your Personal Identifiable Information to Steal

your Money:
Protect your computer and smartphonewith strong, up-to-date security

software.

 Learn to spot spam and scams.

 Use strong passwords.

 Be cautious with shortened links

 Always be careful in giving out personal information in a website,

email, instant messaging systems, chat rooms and message

boards.

 Don’t open up e-mails, files or website links from unknown sender.

 Consult with financial institution on any unusual activities on your

accounts

 Immediately close compromised credit card accounts.

Cyber Bullying, social media is a dangerous platform where people can

be easily criticized without even knowing the person behind that profile.

Nowadays, bullying in social media is timely and relevant which almost people

get easily attached to the application where every single things they do they

posted it on social media as a result they get bullied because of what they

posted or based on their physical appearance. Thus, in entering social media

you be fully aware of the consequences that they may offer.

2. Choose one social media application/websites. Pull up their privacy policies and

answer the following questions for each.

Data Policy
This policy describes the information we process to support Facebook,

Instagram, Messenger and other products and features offered by Facebook

(Facebook Products or Products). You can find additional tools and information in

the Facebook Settings and Instagram Settings.


a. What information will be collected about you?

Facebook collects all of the communication thread, contents and

the information I provided using the application, as well as the content I

shared over my news feed. In addition, it also includes the personal

information, location, and pictures that I uploaded when using the

application. Thus, it collects information of all the individuals, pages,

accounts, hashtags and groups that I am associated with. The most

interesting is that the application collects things that I am interested with

as well as the people who shared the same interests as me. For instance,

I watched videos and shared about Anime, Kdrama and Memes the

application helps the people to be more engage in their application.

Additionally, it collects the information about my usage, camera and

transactions made on the application, as well as the things that other

people do or say about me are collected. Best example of this is if a friend

leaves a comment on my photo, send a message to me, or uploaded a

photo with me. Moreover, the information of the other devices that you're

log in will also be collected by the application, as well as the information

you used to associate your account with the application with your other

social media accounts. Facebook combines this information across

different devices I use to better assist me with my preferences and


interest when using the application. Nonetheless, all of my personal

information has been collected by Facebook whether any devices I used

or social media accounts that I associated with the application

b. How much of that information is necessary for you to use the site? Are

they asking for more than they need?

Provide, personalize, and improved our Products. Promote safety,

security, and integrity.

Communicate with you.

Research and innovate for social good.

As for me, Facebook is not asking too much because it's just

helping us to be more engage with the people and to provide us the better

service that we deserve, along with the improvements and utilization of

the application. In addition, after reading their Data Policy they only want

is for the people to communicate and engage easily and I must say my

information is safe and secured. Nonetheless, Facebook aims to provide

a better service that the users deserve and for them to also improve their

services they provide by knowing the user’s preferences and interest.

c. Do you have access to all the information stored about you?

Yes, I can still access all of the information stored about me and I

am not having difficulties accessing those information, unless I forget

those information but the application allows the user to access it by using

their mobile number. Thus, Facebook offers a good privacy setting that

allows me to put some of my information to private and utilize it by


choosing the people who can see my shared post and information I

shared. The most interesting part about the application is they provide

their users with the ability to access and erase their data or information.

Thus, the application provides services where “store data until it is

no longer necessary to provide our services and Facebook Products, or

until your account is deleted - whichever comes first. This is a case-by-

case determination that depends on things like the nature of the data, why

it is collected and processed, and relevant legal or operational retention

needs.” even I don't know how this works or to do this process I am

thankful that they provide this kind of service where if you deleted

important information you can asked them how to retrieve that data of

yours.

d. How will your information be shared with third parties?

I am fully aware that they work with third-party partners who offer

assistance to them for the betterment of the application and progress of

their products or who use Facebook as a platform to develop their

businesses. Facebook give collected information and experiences that

help individuals and businesses get it how individuals are latches in with

their posts, group, and other content creator on and off the Facebook

application. Besides, it gives promoters with reports approximately the

sorts of individuals seeing their advertisements and how their

advertisements are performing, such as common interest information.

Nonetheless, Facebook permits the substance maker or dealer to get a


user’s open data and other data they share with them, as well as the data

required to total the exchange of information.

e. Can your data be sold?

No, upon checking on the Facebook’s Data Policy it is already included

that they do not sell any of its users personal information to anyone and

they never sell it, unless it is under the permission or guidance of the

account owner. In addition, they do even have strict restrictions when it

comes to their partners can use, share, and disclose the data they

provide to their 3rd party partners.

f. Are you allowed to permanently delete your data from the system?

Yes, they give the users the capacity to get to delete their data,

correct and eradicate their information and it will be erased if the users

wished to erased it or in case it is now not fundamental to supply the

administrations and Facebook application. Yet, there are a few conditions

to be considered as expressed on the Information Arrangement, for

illustration, I can get to and erase my previous pages that I visited history

rather at any time, but the log off search is deleted after 6 months. If I

submit a copy of my government-issued ID for account verification

purposes, they delete that copy 30 days after review unless otherwise

stated. Moreover, when I erased my account, all the things I posted will

be deleted and will not be recovered, and it will be forever erased.


s

You might also like