Professional Documents
Culture Documents
Contemporary
Issues
David, Joshua
Oliveros, Brian
Kenneth
Oserio, Rochelle
CPE LAWS AND PROFESSIONAL PRACTICE
Contemporary
Issues
Are you ready?
CPE LAWS AND PROFESSIONAL PRACTICE
Contemporary Privacy
Issues
Privacy
What's is rght of privacy?
of Right of 3
of one’s personality,
the publicizing of one’s
private affairs with which
Privacy the public has no legitimate
concern, or
4 the wrongful intrusion into one’s
private activities in such manner as
to outrage or cause mental
suffering, shame or humiliation to a
person of ordinary sensibilities
Key Privacy and
Anonymity Issues
Government
2 4 Identity theft 6 Need to treat 8 Advanced
electronic customer data surveillance
surveillance responsibly techniques
CPE LAWS AND PROFESSIONAL PRACTICE
Communication
Surveillance
Universal Declaration of
Human Rights
According to the Article 12 of Universal Declaration of Electronics Engineering
Human Rights, “No one shall be subjected to arbitrary Law of 2004 (RA 9292)
interference with his privacy, family, home or
correspondence, nor to attacks upon his honor and
reputation. Everyone has the right to the protection of In Electronics Engineering Law of 2004, it is stated in
the law against such interference or attacks. Section 35 (h) that “Any person holding a Certificate of
Registration and Professional Identification Card as
Professional Electronics Engineer, Electronics
Engineer or Electronics Technician who shall be
involved in illegal wire-tapping, cloning, hacking,
International Covenant cracking, piracy and/or other forms of unauthorized
on1 Civil and Political and malicious electronic eavesdropping and/or the use
of any electronic devices in violation of the privacy of
Rights another or in disregard of the privilege of private
According to the International Covenant on Civil and communications and/or safety to life, physical and/or
Political Rights, Article 1, “All people have the right of intellectual property of others, or who shall maintain an
self-determination. By virtue of that right they freely unlicensed and/or unregistered communications
determine their political status and freely pursue their system or device.”
economic, social and cultural development.”
Civil Code of the Philippines
(RA 386 (1949))
Stated in the Article 32 of RA 386, “Any public officer Anti-Wiretapping Act of
or employee, or any private individual, who directly or
indirectly obstructs, defeats, violates or in any manner 1965 (RA 4200)
impedes or impairs any of the following rights and
liberties of another person shall be liable to the latter RA 4200 is an act on preventing any Wire-tapping
for damages.” activities, and any of its various procedures.
In Section 1, it stated that “It shall be unlawful for
any person, not being authorized by all the parties
to any private communication or spoken word, to
tap any wire or cable, or by using any other device
Revised Penal Code (Act or arrangement, to secretly overhear, intercept, or
1 3815 (1930))
No. record such communication or spoken word by
Stated in Article 290 of the Act No, 3815, entitled using a device commonly known as a dictaphone
Discovering Secrets Through Seizure of Correspondence. or dictagraph or dictaphone or walkie-talkie or
“The penalty of prisión correccional in its minimum and tape recorder, or however otherwise described.”
medium periods and a fine not exceeding 500 pesos shall
be imposed upon any private individual who in order to
discover secrets of another, shall seize his papers or letters
and reveal the contents thereof.”
CPE LAWS AND PROFESSIONAL PRACTICE
Governmental Electronic
Surveillance
Communications
Executive Assistance for Law
Enforcement Act
Order 12333 (CALEA)
A U.S. wiretapping law passed by Congress in 1994.
A U.S. wiretapping law passed by Congress in 1994.
Requires telecommunications providers and
Requires telecommunications providers and
equipment manufacturers to allow law
equipment manufacturers to allow law
enforcement agencies to intercept
enforcement agencies to intercept
communications with a warrant.
communications with a warrant.
The law originally applied only to telephone
The law originally applied only to telephone
conversations, but has been expanded to cover
conversations, but has been expanded to cover
Voice over internet protocol (VoIP) and internet
Voice over internet protocol (VoIP) and internet
traffic.
traffic.
Data Encryption
Data Encryption is the method that translates data into another form, or
code, so that only people with access to a secret key or password can
read it.
The science of encrypting and decrypting information is called
cryptography.
Encrypted data is commonly referred to as ciphertext, while unencrypted
data is called plaintext.
An encryption key is a random string of bits created explicitly for
scrambling and unscrambling data, it is also used to encrypt and decrypt
multiple types of data.
Public Key Encryption is a method of encrypting data with two different
keys, the public key which is available for anyone to use, and the private
key for the main user.
Data Encryption
Data encrypted with the public key can only be decrypted with the
private key, and data encrypted with the private key can only be
decrypted with the public key.
Example of Public Key Encryption - Bob wants to send Alice an encrypted
email. To do this, Bob takes Alice’s public key and encrypts his message to
her. Then, when Alice receives the message, she takes the private key that
is known only to her in order to decrypt the message from Bob.
Private Key Encryption is a method that only uses a single key to encrypt
and decrypt data.
RSA is a public-key cryptosystem or algorithm, widely used for securing
data transmissions.
Identity Theft
Identity theft is the crime of obtaining the personal or financial information of another person to use
their identity to commit fraud.
Identity Theft
Spear-
Phishing
Phishing &
Phishing is a type of identity theft Spyware
method in which a target is contacted
through email, telephone or text
message by someone posing as a Spear-Phishing is a variation of phishing that
happens in an organization where the targets are
legitimate institution to lure individuals
employees, and the perpetrators pose as high-level
into providing sensitive data such as executives.
personal information, banking and credit Spyware is a malicious software designed to enter
card details, and passwords. your computer device, gather data about you, and
forward it to a third-party without your consent.
Consumer Profiling
Consumer profiling is about Data stored in a cookie is created by the server
defining, segmenting and profiling upon your connection. This data is labeled with an
your target consumers to guide ID unique to you and your computer.
every element of your marketing Cookies can be exploited and used to steal
and brand strategy. personal information, there are four ways to limit or
Cookies are files created by even stop the deposit of cookies on hard drives
websites you visit. They make your Setting the browser to limit or stop the use of
online experience easier by saving cookies
browsing information. With Manually delete cookies from the hard drive
cookies, sites can keep you signed Download and install a cookie-management
in, remember your site preferences, program
and give you locally relevant Use anonymous browsing programs that don’t
content. accept cookies
CPE LAWS AND PROFESSIONAL PRACTICE
Treating Consumer
Data Responsibly
Workplace Monitoring
Workplace Monitoring
Workplace monitoring is a growing practice in which companies use digital tools to track
work, employee performance, and work in progress.
Businesses use different monitoring methods to measure productivity, track attendance,
assess behavior, ensure security, and collect proof of hours worked.
Employers monitor workers and ensures that corporate IT usage policy is followed
The Fourth Amendment cannot be used to limit how a private employer treats its employees,
while public-sector employees have far greater privacy rights than in the private industry
Spamming STOP START
KEEP
GOING
Spamming is the use of electronic messaging systems like e-mails and other digital
delivery systems and broadcast media to send unwanted bulk messages
indiscriminately.
Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM Act of
2003) states that it is legal to spam but there must be rules, where:
Spammers cannot disguise their identity.
There must be a label in the message specifying that the e-mail is an ad or solicitation.
They must include a way for recipients to indicate they do not want future mass
mailings
Advanced Advanced Surveillance technology, which encompasses a large
array of technologies used to observe individuals’ activities and
Surveillance communications, advanced at a rapid pace and is becoming more
Technology widely available in the general marketplace. Listed below are some
applications of the advanced surveillance technology.
SECURITY
IT Security Incidents: A
Worsening Problem
Security of Information technology is one of the top priorities to be implemented, and is given the
highest importance
Protection of confidential data; securing sensitive data of customers, employees, and of the
company.
Protection against a variety of cyber-attacks, malicious acts of theft and disruption.
Maintenance and implementation should be balanced with other needs and issues in business.
Computer Emergency Response Team Coordination Center (CERT/CC)
A response team containing groups of information security experts responsible for an organization’s
cybersecurity protection, detection and response to attacks and incidents.
Established in 1988 at the Software Engineering Institute (SEI), whose headquarters are located at
Pittsburgh, Pennsylvania.
Increasing Complexity
Increases Vulnerability
Network Era
Personal computers are connected to networks along with millions of other computers, and are all
capable of sharing information.
Information Technology
It is the use of any computers, storage and physical devices, networking systems and infrastructure
to create, process, store, secure, and share different forms of electronic data.
It is ubiquitous, and is used by an individual or an organization to achieve goals.
Difficulty increases in keeping up with the pace of technological development.
Increased Reliance on Commercial
Software with Known Vulnerabilities
Exploit
Patch
An attack on information
A “Fix” to resolve issues with functionality,
system
especially addressing system’s security stability
Takes advantage of a specific
and vulnerabilities.
system’s entry point or
Users are responsible to obtain the said patches
vulnerability for benefits.
and install them manually, or the system would
Usually happens when the
undergo an automatic update.
system is still in its early stages,
Delays in installing patches may expose users
and/or due to poor design and
to security breaches.
implementation.
CPE LAWS AND PROFESSIONAL PRACTICE June 1, 2021
HEALTH &
SAFETY
CPE LAWS AND PROFESSIONAL PRACTICE
Why Workplace
Safety Ethics
important ?
Every employee values workplace safety because workers should
work in a secure and protected setting. Employees and employers
both benefit from working in a healthy and safe workplace.
Health Mental Health
It is important at every stage of life. Our
Concerns emotional, psychological, and social well-
being are all part of our mental health. It
has an impact on our thoughts, feelings,
and behaviors
Physical Health
ITaking care of one's physical health has
1 Mental Health been shown to boost one's emotional well-
being and can have an impact on others if
one's condition worsens.
2 Physical Health
Repetitive Strain Injury
(RSI)
you!