Professional Documents
Culture Documents
in the Philippines
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
A brief retrospective view
How it all started
2
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
The ILOVEYOU worm
3
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
The ILOVEYOU worm
4
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions
5
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
No
Onel De Guzman was caught but was released shortly
afterwards because there wasn’t any pre-existing laws in
the country for which he can be prosecuted.
6
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Want big impact?
Use big image.
7
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Beginnings of cybercrime in the philippines
9
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Philippine E-commerce Act of 2000
11
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Important provisions of R.A. 8792
12
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Philippine E-commerce Act of 2000
13
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Philippine E-commerce Act of 2000
14
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Prohibited acts: Hacking
▣ Hacking / Cracking
□ Unauthorized access into a computer system/server or
information and communication system;
□ Any access in order to corrupt, alter, steal, or destroy
using a computer, … , without the knowledge and
consent of the owner [of the computer system];
□ Introduction of computer viruses and the like, resulting
in the corruption, destruction, alteration, theft or loss of
electronic data messages or electronic document.
15
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Prohibited acts: Hacking
▣ Hacking / Cracking
▣ Piracy
□ Unauthorized copying, reproduction, storage, uploading,
downloading, communication, or broadcasting of
protected material, … , through the use of
telecommunication networks, such as, but not limited to,
the internet, in a manner that infringes intellectual
property rights.
17
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Philippine E-commerce Act of 2000
▣ Penalties
18
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions: R.A. 8792
19
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
No!
By merely accessing it, there was no clear intent to
“corrupt, alter, steal, or destroy”.
At least according to RA 8792, this is not illegal.
20
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
“
More recently, the following law is the
most comprehensive cybercrime law
enacted in the Philippines.
To date, this is the cornerstone of
cybercrime protection for citizens in the
Philippines.
21
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
Republict Act 10175
22
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
23
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
DEFINTION
▣ A cybercrime is a crime committed with or through
the use of information and communication
technologies such as radio, television, cellular phone,
computer and network, and other communication
device or application.
24
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
25
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
Jurisdiction of RA 10175
Who can be charged with violations of this law?
1. Any violation committed by a Filipino national regardless of the
place of commission.
2. Any of the elements was committed within the Philippines or
committed with the use of any computer system wholly or partly
situated in the country.
3. When by such commission any damage is caused to a natural or
juridical person who, at the time the offense was committed, was
in the Philippines.
26
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
Explanation
1. Pag isang Pilipino ang nagkasala, kahit nasaan pa siyang lupalop ng
mundo, ay pwedeng kasuhan ng paglabag sa RA 10175.
2. Kung may kahit na anong parte ng krimen na nangyari sa
Pilipinas, kasama na ang paggamit ng kahit na anong computer sa
Pilipinas para sa gawaing maaaring maparusahan ng paglabas sa
bata s na ito.
3. Kung ang biktima, sa panahon na nangyari ang isang krimen, ay
nasa loob ng Pilipinas, ang sinumang gumawa ng krimen ay
maaari din maparusahan.
27
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (a). CIA of Computer Data and Systems
1. Illegal Access
□ The access to the whole or any part of a computer
system without right.
▪ Without right means having no consent from the owner of
the computer system.
▪ Access is the instruction, communication with, storing /
retrieving data from, or [making] use of any resources of a
computer system or communication network.
28
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions: R.A. 10175
29
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
YES!
Illegal access is to “make use of any resources” without right (consent).
Even if this is not punishable under RA 8792, it is under RA 10175.
30
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (a). CIA of Computer Data and Systems
2. Illegal Interception
□ The interception made by technical means without right
of any non-public transmission of computer data.
□ Interception is listening to, recording, monitoring or
surveillance of the content of communications, (…),
through the use of electronic eavesdropping or tapping
devices, at the same time that the communication is
occurring.
31
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (a). CIA of Computer Data and Systems
32
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Example:
□ Have you experienced receiving coming from
“bpionline.com.ph” with a subject line of “Update your
security details now”?
□ These e-mails ask the recipients to go to a site to login by
placing their credentials.
□ Unknown to many, the purpose of those websites is to
intercept or to just get your user credentials so they can
access your real online banking accounts.
33
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (a). CIA of Computer Data and Systems
3. Data Interference
□ The intentional or reckless alteration, damaging,
deletion or deterioration of computer data, electronic
document, or electronic data message, without right,
including the introduction or transmission of viruses.
34
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions: R.A. 10175
▣ Consider this situation:
□ You have a friend who will send a file to you through a
flash drive.
□ Unknown to both of you, the flash drive has a virus in it.
□ After you copied the file you need from the flash drive
of your friend, you noticed that your files and folders
suddenly disappeared and only a shortcut icon appeared
on your personal folder.
▣ Is your friend liable for any violation of RA 10175?
35
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
YES!
Data interference includes “the intentional or reckless alteration, damaging,
deletion or deterioration of computer data.” In the situation, even if you friend
lent you his/her flash drive in good faith (has no intentions to infect your
computer with a virus), it is still considered as recklessness in his/her part and it
also caused an “alteration”, or “deletion”, or even “deterioration” of data.
36
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (a). CIA of Computer Data and Systems
4. System Interference
□ The intentional alteration or reckless hindering or
interference with the functioning of a computer or
computer network by inputting, transmitting, damaging,
deleting, deteriorating, altering or suppressing
computer data or program, electronic document, or
electronic data message, without right or authority,
including the introduction or transmission of viruses
37
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Explanation
▣ This is more or less an extension of the previous offense,
whereby the affected entity is not just data but the whole
system.
▣ The previous situation can also apply here if, instead of just
having the files “damaged” or “altered”, the whole computer
system went into error.
38
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Data / System Interference
39
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Data / System Interference
40
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Data / System Interference
▣ Website defacing
41
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (a). CIA of Computer Data and Systems
5. Misuse of Devices
□ The use, production, sale, procurement, distribution, or
otherwise making available, without right, of a device or
computer password designed primarily for the purpose
of committing any of the offenses under this Act;
□ The possession of an item referred to above.
42
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Misuse of Devices
43
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Misuse of Devices
45
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Data / System Interference
▣ MikeRoweSoft
□ In January 2004, Mike Rowe was a grade 12 student who
operated a profitable web design business as a part time
job. He registered the website with the domain name
MikeRoweSoft.com.
□ Lawyers from Microsoft asked him to stop using the
website. Mike Rowe asked for $10,000 in return.
□ Microsoft said no and proceeded to filing a case against
him.
46
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Data / System Interference
▣ MikeRoweSoft
□ Perhaps due to the stress that the whole process would
entail, not withstanding the fact that this legal process
would cost a lot of money, Mike Rowe decided to give
away the website.
□ News outlets reported that what he got in return was an
XBOX console.
□ But after some research, the following reddit thread
appears apparently from Mike Rowe himself.
47
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Data / System Interference
48
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (b). Computer-Related Offense
7. Computer-Related Forgery
□ The input, alteration, or deletion of any computer data without
right resulting in inauthentic data with the intent that it be
considered or acted upon for legal purposes as if it were
authentic.
49
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Computer-Related Forgery
50
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (b). Computer-Related Offense
8. Computer-Related Fraud
□ The unauthorized input, alteration, or deletion of computer data
or program or interference in the functioning of a computer
system, causing damage thereby with fraudulent intent.
51
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Computer-Related Fraud
53
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Computer-Related Identity Theft
▣ Fake profiles in Facebook, Instagram, and other websites.
□ There must be a use of “identifying information” which
includes pictures of another person and his/her other personal
details but not someone’s NAME.
□ This is because it is completely possible for anyone to have the
same name as another person, as well as for fan pages bearing
the name of another person.
□ If the intentions in the use of such profiles are for malicious
purposes, such as pretending to be the actual person even if
not, is already a violation of this law.
54
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (c). Content-Related Offense
10. Cybersex
□ The willful engagement, maintenance, control, or
operation, directly or indirectly, of any lascivious
exhibition of sexual organs or sexual activity, with the aid
of a computer system, for favor or consideration.
55
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions on RA 10175
56
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
NO!
Even if both partied consented, and even if these acts are publicly denounced,
they do not constitute to cybersex since the act is not done for “any favour or
consideration”. For the purposes of this law, there must be an element of
“engagement in business” for the act to be considered as prohibited.
57
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (c). Content-Related Offense
11. Child Pornography
□ The unlawful or prohibited acts defined and punishable
by Republic Act No. 9775 or the Anti-Child Pornography
Act of 2009, committed through a computer system.
□ Any representation, whether visual, audio thereof, by
electronic, … , or any other means, of a child engaged or
involved in real or simulated explicit sexual activities.
58
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions on RA 10175
59
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
NO!
UNLESS: the hentai clip itself contains a character which is explicitly identified
as a minor. If so, the said material is prohibited and the creator / distributor of
the said material are liable for violations of this law.
60
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (c). Content-Related Offense
12. Online Libel
□ Libel is the public and malicious imputation of a crime,
real or imaginary, or any act, omission, condition, status,
or circumstance tending to cause the dishonor, discredit,
or contempt of a natural or juridical person, or to blacken
the memory of one who is dead.
61
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (c). Content-Related Offense
12. Online Libel
□ Elements of Libel:
1. Allegation of a discreditable act or condition
concerning another;
2. Publication of the charge;
3. Identity of the person defamed; and
4. Existence of malice.
62
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions on RA 10175
63
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions on RA 10175
64
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
YES!
The statements in the post contains: 1. An allegation against Maria David; 2.
Publicized since it was posted in a social media site; 3. The identity of Maria
David was clear; 4. There was no doubt that the intentions were to defame
Maria David, including her mother.
All elements of libel are existent in this post.
65
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions on RA 10175
66
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
NO!
Liking or reacting may be a sign of approval to the said post, but no statement
was mentioned in anyway that makes any allegation towards Maria David.
Hence, the first element of libel is not present.
67
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions on RA 10175
68
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
NO!
The shared post might contain a message that is already established as libelous,
BUT the statements were not made by the person who shared it. Thus, the
person who shared the same post cannot be held liable.
69
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions on RA 10175
70
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
NO!
Similar to liking or reacting, commenting “oo” is a sign of approval but is not a
statement that discredits or alleges Maria David. Thus, the person is not liable.
71
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions on RA 10175
72
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
YES!
This statement is not merely an approval but also states an allegation towards
Maria David herself. Thus making the person liable for libel since the comment
can be seen publicly as well.
73
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
The concept of PRIVACY
Privacy under the civil code
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
The Right to Privacy
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Question
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
No!
The State recognizes the right of the people to be secure in their houses. No
one, not even the State, except "in case of overriding […] and only under the
stringent procedural safeguards," can disturb them in the privacy of their
homes.
77
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Privacy in the Civil Code
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Prohibited Acts under the Civil Code
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Question
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
No!
A man’s house is his castle, where his right to privacy cannot be
denied or even restricted by others.
It includes any act of intrusion into, peeping or peering inquisitively
into the residence of another without the consent of the latter.
81
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Privacy in the Civil Code
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Question
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Questions and Cases
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example Case
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Question
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Yes!
In the decision of the court: “A person, by contracting marriage, does
not shed his/her integrity or his right to privacy as an individual and
the constitutional protection is ever available to him or to her.”
87
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example Case
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Reasonable Expectation of Privacy
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Question
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Yes!
A person would normally expect to change his or her clothes without
worrying about anyone who could see him / her.
In addition, a fitting room is properly secluded to ensure that no one
else can see what a person inside is doing. Thus, a person has a
reasonable expectation of privacy inside a fitting room
91
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Photo and Video
Voyeurism Act of 2009
Republic Act 9995
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Punishable Acts: R.A. 9995
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Punishable Acts
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Question
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Yes!
The mere copying or reproduction of said material will make one
liable under the law regardless of the reason or whether one profits or
not from such act. In fact, the mere showing of the material on one’s
cellphone would violate the law.
98
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
No!
The person merely consented to the taking of the photo or the video
recording and did not give written consent for its reproduction,
distribution, and broadcasting.
100
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Penalty
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Data Privacy Act
Republic Act 10173
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Data Privacy Act of 2012
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Important Definitions
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Important Definitions
3. Consent
▣ Where the data subject agrees to the collection and
processing of his personal data. The agreement must
inform:
□ purpose, nature, and extent of processing;
□ period of consent/instruction;
□ rights as a data subject
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Definitions
4. Breach
▣ A security incident that:
□ Leads to unlawful or unauthorized processing of
personal, sensitive, or privileged information;
□ Compromises the availability, integrity, or
confidentiality of personal data.
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
What is Personal Information?
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Processing Personal Information
□ Principles of transparency;
□ Legitimate purpose; and
□ Proportionality
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
PRINCIPLE OF TRANSPARENCY
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Legitimate Purpose Principle
▣ Data that is not compatible with the purpose for which the
data was collected shall not be processed.
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
PRINCIPLE OF PROPORTIONALITY
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
PROCESSING SENSITIVE PERSONAL INFO.
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
PROCESSING SENSITIVE PERSONAL INFO.
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Rights of the Data Subject
1. Right to be informed.
2. Right to object.
3. Right to access.
4. Right to rectification.
5. Right to erasure or blocking.
6. Right to damages.
7. Right to data portability.
8. Right to file a complaint.
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
1. Right to be Informed
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
2. Right to Object
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
2. Right to Object
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
3. Right to Access
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
4. RIGHT TO RECTIFICATION
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
5. RIGHT TO ERASURE OR BLOCKING
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
5. RIGHT TO ERASURE OR BLOCKING
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
7. RIGHT TO DATA PORTABILITY
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
8. RIGHT TO FILE A COMPLAINT
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Questions and Cases
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
No!
Any search through a student’s cellular phone without justification
under a law or regulation is UNLAWFUL, and may be considered as
unauthorized processing of data.
126
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Questions and Cases
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Questions and Cases
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
No!
Consent under the Data Privacy Act has three requirements, none of which are
seen in an implied consent:
Consent must be freely given;
Details about what consent is being asked must be specific.
And there must be an informed indication of will.
129
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
No!
It is possible that one may share a similar signature as another person.
Moreover, some signatures do not, in any way, show signs of identity
of a person. Nonetheless, these may be considered personal
information when used to identify an individual such as a signature
affixed on the name of a person.
131
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Yes*!
*Only when they are combined with other pieces of information that
may allow an individual to be distinguished from others.
Remember that a username, say “iloveyou3000”, does not identify
any particular person unless it is combined with other information.
133
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions
In addition:
▣ There are a lot of people who share the same birthday as
others. This makes it impossible to use birthdays to identify
any person.
▣ IP addresses alone cannot identify who a person is because it
is possible that two or more people make use of a single
computer / server.
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Prohibited Acts: R.A. 10173
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Prohibited Acts: R.A. 10173
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era