You are on page 1of 41

CPE LAWS AND PROFESSIONAL PRACTICE May 12, 2022

Contemporary
Issues
David, Joshua
Oliveros, Brian
Kenneth
Oserio, Rochelle
CPE LAWS AND PROFESSIONAL PRACTICE

Contemporary
Issues
Are you ready?
CPE LAWS AND PROFESSIONAL PRACTICE

Contemporary Privacy
Issues

A CONTEMPORARY ISSUE CAN IN THE INTERNET, PRIVACY IS ONE OF


BE DEFINED AS ANY MODERN- THE MOST CONCERN OF THE INTERNET
DAY TREND, EVENT, IDEA, USERS AND NON-USERS. IT IS A
OPINION OR TOPIC IN A GIVEN PLATFORM WHERE MULTIPLE TYPES OF
SUBJECT THAT IS RELEVANT TO SYSTEMS COLLECT DATA FROM
MANY PEOPLE IN THE PRESENT CUSTOMERS FOR EVERY INTERACTION
DAY THEY DO.
The Right of Right Privacy

Privacy
What's is rght of privacy?

Privacy is a fundamental human right, it is one of


the main aspects for the protection of human
dignity and it forms the basis of any democratic
society, along with the rights of having the
freedom of expression, information and Coffee before
anything else
association. - Paige
CPE LAWS AND PROFESSIONAL PRACTICE

the right of a person to be


1 free from unwarranted
publicity,

Aspects 2 the unwarranted


appropriation or exploitation

of Right of 3
of one’s personality,
the publicizing of one’s
private affairs with which
Privacy the public has no legitimate
concern, or
4 the wrongful intrusion into one’s
private activities in such manner as
to outrage or cause mental
suffering, shame or humiliation to a
person of ordinary sensibilities
Key Privacy and
Anonymity Issues

Action 1 Action 2 Action 3 Action 4

1 Communication 3 Data encryption 5 Customer 7 Spamming


Surveillance profiling

Government
2 4 Identity theft 6 Need to treat 8 Advanced
electronic customer data surveillance
surveillance responsibly techniques
CPE LAWS AND PROFESSIONAL PRACTICE

Communication
Surveillance
Universal Declaration of
Human Rights
According to the Article 12 of Universal Declaration of Electronics Engineering
Human Rights, “No one shall be subjected to arbitrary Law of 2004 (RA 9292)
interference with his privacy, family, home or
correspondence, nor to attacks upon his honor and
reputation. Everyone has the right to the protection of In Electronics Engineering Law of 2004, it is stated in
the law against such interference or attacks. Section 35 (h) that “Any person holding a Certificate of
Registration and Professional Identification Card as
Professional Electronics Engineer, Electronics
Engineer or Electronics Technician who shall be
involved in illegal wire-tapping, cloning, hacking,
International Covenant cracking, piracy and/or other forms of unauthorized
on1 Civil and Political and malicious electronic eavesdropping and/or the use
of any electronic devices in violation of the privacy of
Rights another or in disregard of the privilege of private
According to the International Covenant on Civil and communications and/or safety to life, physical and/or
Political Rights, Article 1, “All people have the right of intellectual property of others, or who shall maintain an
self-determination. By virtue of that right they freely unlicensed and/or unregistered communications
determine their political status and freely pursue their system or device.”
economic, social and cultural development.”
Civil Code of the Philippines
(RA 386 (1949))
Stated in the Article 32 of RA 386, “Any public officer Anti-Wiretapping Act of
or employee, or any private individual, who directly or
indirectly obstructs, defeats, violates or in any manner 1965 (RA 4200)
impedes or impairs any of the following rights and
liberties of another person shall be liable to the latter RA 4200 is an act on preventing any Wire-tapping
for damages.” activities, and any of its various procedures.
In Section 1, it stated that “It shall be unlawful for
any person, not being authorized by all the parties
to any private communication or spoken word, to
tap any wire or cable, or by using any other device
Revised Penal Code (Act or arrangement, to secretly overhear, intercept, or
1 3815 (1930))
No. record such communication or spoken word by
Stated in Article 290 of the Act No, 3815, entitled using a device commonly known as a dictaphone
Discovering Secrets Through Seizure of Correspondence. or dictagraph or dictaphone or walkie-talkie or
“The penalty of prisión correccional in its minimum and tape recorder, or however otherwise described.”
medium periods and a fine not exceeding 500 pesos shall
be imposed upon any private individual who in order to
discover secrets of another, shall seize his papers or letters
and reveal the contents thereof.”
CPE LAWS AND PROFESSIONAL PRACTICE

Governmental Electronic
Surveillance

Electronic Communications Privacy Act


Foreign Intelligence Surveillance Act of
of 1986 (ECPA)
1978 (FISA)
TECPA protects wire, oral, and electronic
FISA establishes procedures for the authorization of
communications, while being made, transferred, and
electronic surveillance, use of pen registers and trap
when they are stored on computers.
and trace devices, physical searches, and business
The ECPA protection applies to email, telephone
records for the purpose of gathering foreign
conversations, and electronically stored data.
intelligence.
CPE LAWS AND PROFESSIONAL PRACTICE

Communications
Executive Assistance for Law
Enforcement Act
Order 12333 (CALEA)
A U.S. wiretapping law passed by Congress in 1994.
A U.S. wiretapping law passed by Congress in 1994.
Requires telecommunications providers and
Requires telecommunications providers and
equipment manufacturers to allow law
equipment manufacturers to allow law
enforcement agencies to intercept
enforcement agencies to intercept
communications with a warrant.
communications with a warrant.
The law originally applied only to telephone
The law originally applied only to telephone
conversations, but has been expanded to cover
conversations, but has been expanded to cover
Voice over internet protocol (VoIP) and internet
Voice over internet protocol (VoIP) and internet
traffic.
traffic.
Data Encryption

Data Encryption is the method that translates data into another form, or
code, so that only people with access to a secret key or password can
read it.
The science of encrypting and decrypting information is called
cryptography.
Encrypted data is commonly referred to as ciphertext, while unencrypted
data is called plaintext.
An encryption key is a random string of bits created explicitly for
scrambling and unscrambling data, it is also used to encrypt and decrypt
multiple types of data.
Public Key Encryption is a method of encrypting data with two different
keys, the public key which is available for anyone to use, and the private
key for the main user.
Data Encryption

Data encrypted with the public key can only be decrypted with the
private key, and data encrypted with the private key can only be
decrypted with the public key.
Example of Public Key Encryption - Bob wants to send Alice an encrypted
email. To do this, Bob takes Alice’s public key and encrypts his message to
her. Then, when Alice receives the message, she takes the private key that
is known only to her in order to decrypt the message from Bob.
Private Key Encryption is a method that only uses a single key to encrypt
and decrypt data.
RSA is a public-key cryptosystem or algorithm, widely used for securing
data transmissions.
Identity Theft
Identity theft is the crime of obtaining the personal or financial information of another person to use
their identity to commit fraud.

Identity Theft

The usual data and information stolen are the


The usual data and information stolen are the
following:
following:
Name
Name
Address
Address
Date of birth
Date of birth
Social Security number
Social Security number
Passport number
Passport number
Driver’s license number
Driver’s license number
Mother’s maiden name
Mother’s maiden name
CPE LAWS AND PROFESSIONAL PRACTICE

Spear-
Phishing
Phishing &
Phishing is a type of identity theft Spyware
method in which a target is contacted
through email, telephone or text
message by someone posing as a Spear-Phishing is a variation of phishing that
happens in an organization where the targets are
legitimate institution to lure individuals
employees, and the perpetrators pose as high-level
into providing sensitive data such as executives.
personal information, banking and credit Spyware is a malicious software designed to enter
card details, and passwords. your computer device, gather data about you, and
forward it to a third-party without your consent.
Consumer Profiling
Consumer profiling is about Data stored in a cookie is created by the server
defining, segmenting and profiling upon your connection. This data is labeled with an
your target consumers to guide ID unique to you and your computer.
every element of your marketing Cookies can be exploited and used to steal
and brand strategy. personal information, there are four ways to limit or
Cookies are files created by even stop the deposit of cookies on hard drives
websites you visit. They make your Setting the browser to limit or stop the use of
online experience easier by saving cookies
browsing information. With Manually delete cookies from the hard drive
cookies, sites can keep you signed Download and install a cookie-management
in, remember your site preferences, program
and give you locally relevant Use anonymous browsing programs that don’t
content. accept cookies
CPE LAWS AND PROFESSIONAL PRACTICE

Treating Consumer
Data Responsibly

CPE LAWS AND PROFESSIONAL PRACTICE

There are multiple responsible ways of treating


consumer data, some are stated below:

Minimize data collection

Conducting a Privacy Audit Minimize data collection


A privacy audit is a process of finding out what data is
Every data collected must all be necessary for usage, by
currently collected, how it’s stored and what it's used
minimizing the data collection, any unnecessary data
for.
shall be ignored or passed.
CPE LAWS AND PROFESSIONAL PRACTICE

Provide a transparent track record


By providing a non-intrusive
transparent track record of the data
collected, used, and stored, consumers
are assured that their data is
responsibly protected.
The 1980 Guidelines are well known for their
principles for the collection and handling of
personal data, but they also call for co-
operation in enforcement-related matters

Workplace Monitoring

What's is workplace monitoring?

Workplace Monitoring
Workplace monitoring is a growing practice in which companies use digital tools to track
work, employee performance, and work in progress.
Businesses use different monitoring methods to measure productivity, track attendance,
assess behavior, ensure security, and collect proof of hours worked.
Employers monitor workers and ensures that corporate IT usage policy is followed
The Fourth Amendment cannot be used to limit how a private employer treats its employees,
while public-sector employees have far greater privacy rights than in the private industry
Spamming STOP START
KEEP
GOING

Spamming is the use of electronic messaging systems like e-mails and other digital
delivery systems and broadcast media to send unwanted bulk messages
indiscriminately.
Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM Act of
2003) states that it is legal to spam but there must be rules, where:
Spammers cannot disguise their identity.
There must be a label in the message specifying that the e-mail is an ad or solicitation.
They must include a way for recipients to indicate they do not want future mass
mailings
Advanced Advanced Surveillance technology, which encompasses a large
array of technologies used to observe individuals’ activities and
Surveillance communications, advanced at a rapid pace and is becoming more
Technology widely available in the general marketplace. Listed below are some
applications of the advanced surveillance technology.

Action 1 Action 3 Action 4

Camera surveillance Facial recognition Global Positioning


Advance CCTV software System (GPS)
systems in Identifies criminal chips
infrastructures suspects and Placed in many
Smart other undesirable devices
Surveillance characters Precisely
System Yields mixed locate users
results
CPE LAWS AND PROFESSIONAL PRACTICE

SECURITY

IT Security Incidents: A
Worsening Problem

Security of Information technology is one of the top priorities to be implemented, and is given the
highest importance
Protection of confidential data; securing sensitive data of customers, employees, and of the
company.
Protection against a variety of cyber-attacks, malicious acts of theft and disruption.
Maintenance and implementation should be balanced with other needs and issues in business.
Computer Emergency Response Team Coordination Center (CERT/CC)
A response team containing groups of information security experts responsible for an organization’s
cybersecurity protection, detection and response to attacks and incidents.
Established in 1988 at the Software Engineering Institute (SEI), whose headquarters are located at
Pittsburgh, Pennsylvania.
Increasing Complexity
Increases Vulnerability

Increasing Complexity Increases Vulnerability


- Computing environment, especially in very big companies and organizations, can be
extensively complex.
As the complexity of the security or the network itself increases, the number of possible
entry points to penetrate expands as well.
Higher Computer User Expectations

Computer Helpdesks / Customer Service


Required to provide fast responses and assistance to users’ concerns and
questions.
Have to make sure to:
Verify User Identity
Check for Authorization
Validity of Reason and Concern
Expanding and Changing Systems
Introduce New Risks

Network Era
Personal computers are connected to networks along with millions of other computers, and are all
capable of sharing information.
Information Technology
It is the use of any computers, storage and physical devices, networking systems and infrastructure
to create, process, store, secure, and share different forms of electronic data.
It is ubiquitous, and is used by an individual or an organization to achieve goals.
Difficulty increases in keeping up with the pace of technological development.
Increased Reliance on Commercial
Software with Known Vulnerabilities

Exploit
Patch
An attack on information
A “Fix” to resolve issues with functionality,
system
especially addressing system’s security stability
Takes advantage of a specific
and vulnerabilities.
system’s entry point or
Users are responsible to obtain the said patches
vulnerability for benefits.
and install them manually, or the system would
Usually happens when the
undergo an automatic update.
system is still in its early stages,
Delays in installing patches may expose users
and/or due to poor design and
to security breaches.
implementation.
CPE LAWS AND PROFESSIONAL PRACTICE June 1, 2021

Types of Types of Attacks can be of


Attacks the following:
Virus
Worm
Trojan Horse
Frequent attacks are mostly done
on a networked device or computer Denial of Service (DoS)
from an outside source.
Perpetrators

Similar motives as other criminals, doing illegal


activities even in the cyber world.

Have different objectives and access to varying


resources taking to account the levels of risk
involved to accomplish such
Hackers
Test the limitations of systems out of intellectual
curiosity. Malicious Insiders
- Unauthorized users who breach computer network
systems in order to steal, alter, or even destroy any
One of the top concerns in security for
information present. companies.
- Often, they install malware without the user’s - Estimated 85% of all fraud is committed by
knowledge or consent. employees who left, and/or are still employed.
- Usually, the reason is due to the weaknesses
in internal control procedures.
- Also called a “Turncloak” in which they abuse
legitimate credentials to steal sensitive
1 information for profit and personal satisfaction,
Crackers maliciously and intentionally.
Outdated term used as a description for someone who - Can also be consultants, contractors, or
breaks into a computer system, bypassing passwords
anyone who has access and works in the
and codes, and any other ways to breach cybersecurity
through illegal means. company.
Motivated by self-satisfaction, malicious intent, and - Can be very difficult to stop once out of
solely to face the challenge. control
Industrial
Spies Cybercriminals Smart Cyberterrorists
Can be a user or a group that
They obtain private data
conducts illegal activities using Cards
and trade secrets illegally computers and other devices, - A group who engages in
- Contains a memory
from other competitors. or by the use of the internet. cyberterrorism, which is the
- Also known as a “Cyber Engages in all forms of chip that are updated convergence of cyberspace
Espionage” or the user as a computer fraud which can with encrypted data and terrorism.
cause a loss of customer trust
“Mole”. whenever it is used. - Launches illegal attacks
towards the company.
- The valuable trade Chargebacks are given after a - Commonly used in and threats against
secrets are protected by the user successfully disputed a Europe, not much in the computer systems and
Economic Espionage Act of transaction from their account.
U.S. networks, which often
1996. To reduce the potential threat
for online fraud sites.
targets the government for
- Competitive Intelligence
Implementation of intimidation in order to push
Gather information
Encryption Technology their objectives.
shown to the public Verification of address - Causing harm rather than
using legal techniques. submitted online against
obtaining information.
- Industrial Espionage the issuing bank
Request a Card Verification - Many experts believe
- Obtaining sensitive and
private information through Value (CVV) terrorist groups pose only a
Usage of Transaction-Risk limited threat to information
illegal means.
Scoring Software
systems.
Reducing
Vulnerabilities Establishing a Educating Employees,
Risk Assessment
Security Policy Contractors, and
- Better Security An organization should review
- A security policy defines:
PartTime Workers
- Proper and Secure the following: - A group who engages in
- Requirements for an organization’s
- Potential threats to
combination of security cyberterrorism, which is the
computer systems and - Providing controls and sanctions
technology, policy, and network convergence of cyberspace
- Rules and guidelines that users need to
people. - Probability of the threats comply to and terrorism.
- Requires a variety of occurring - Specify responsibilities and - Launches illegal attacks
actions to be effective. - How frequent the appropriate behavior
and threats against
security detects a threat - Outlines what needs to be done, and
- Assessment of threats computer systems and
- Identify and invest on not how to do it
towards an organization’s
what’s best that can protect an - Automated system policies should networks, which often
computers and network organization from the threats reflect written policies
targets the government for
- Identify which actions to that are most likely serious - Trade-off between convenience and
security intimidation in order to push
implement that address the - Reasonable assurance
- Improvement of security in
- Areas of Concern: their objectives.
most serious vulnerabilities. - E-mail Attachments
areas with: - Causing harm rather than
- Educate and assist the - Wireless Devices
- Very high estimated cost obtaining information.
users - External Storage Devices
- Poorest level of
- VPN can be used to relay - Many experts believe
- Constant monitoring to protection
communications on the internet while terrorist groups pose only a
detect possible intrusions - Large number of maintaining privacy through security
- Create and implement a employees limited threat to information
features.
clear response plan - Encryption of originating and receiving systems.
network addresses for additional security.
Educating Employees,
Contractors, and
PartTime Workers
Prevention Detection
- Educate the users about
the importance of security - Implement a Layered Departing Employees; secure Detection systems can
- Through seminars, Security Solution the network by promptly deleting catch intruders red-handed
- To make computer respective user accounts, Log-In - Intrusion Detection
virtual presentations, and
security breaches harder
other means IDs, caches, and passwords. System
- Encourage them to Firewall - Carefully define employee - Regularly monitors and
understand and follow the roles before authorization checks the system and
Limits network access by
security policy - Create and assign roles and network activities and
allowing and blocking certain
- Discuss recent security user accounts resources
apps and websites
incidents that have affected - Keep track of specific and - Sends out alert and
the organization Antivirus Software well-known vulnerabilities notifications to the proper
- Give awareness on - SANS (System Administration, authority
Scans for a specific sequence
Networking, and Security) - Intrusion and breach
possible threats of bytes also known as virus
Institute from the outside
- Help protect information signature.
- CERT/CC - Misuse and threat within
systems by:
- Norton’s Antivirus, McAfee - Provide back-ups on critical the organization
- Securing Passwords
- Regularly updated with applications and data regularly - Knowledge-based
- Keep passwords to self
the latest virus detection - Perform a security audit and Approach
- Applying strict access
and adaptation information, report. - Behavior-based
controls to protect data
which is also called as Approach
- Report of all unusual
activities Definitions.
- Intrusion Prevention Systems
(IPSs)
- A cybersecurity tool that
Response - Check and verify if all
regularly monitors a network for
backups are up to date and
unusual and malicious activities, Threat and incident complete
and takes action to prevent it by notification defines; - Create new backups and
reporting, blocking, or dropping it - Those whom you can notify properly store them
when the threat occurs - Those to avoid and never - Follow-up
- Viruses notify
- Determine how the security
- Malware - Cybersecurity experts
was compromised in order to
- Malformed Packets recommend not to release
prevent the incident from
- Other threats detailed information about a
- Placed directly behind the happening again.
security breach in public
Firewall - Review
forums
- Honeypot - Determine exactly what
- Document all the necessary
- Provides possible hackers happened
details of a security incident
with fake information about the - Evaluate the precautions and
- All system events
network, baiting and trapping response done by the
- Date and Time of incident
them if possible. organization
- Specific actions done
- E-mail Traps - Capture the perpetrator
- All external conversations
- Decoy Server - Respond immediately to
- Consider the potential for
- Malware Honeypot contain an attack negative publicity and loss of
- Spider Honeypot - Eradication Effort trust
- Well-isolated from the rest of - Gather and log all possible - Legal precedent
the network criminal evidence and traces - Hold organizations
- Can be used to extensively log from the system responsible for their own IT
activities of the threats security weaknesses.
CPE LAWS AND PROFESSIONAL PRACTICE

HEALTH &
SAFETY
CPE LAWS AND PROFESSIONAL PRACTICE

Why Workplace
Safety Ethics
important ?
Every employee values workplace safety because workers should
work in a secure and protected setting. Employees and employers
both benefit from working in a healthy and safe workplace.
Health Mental Health
It is important at every stage of life. Our
Concerns emotional, psychological, and social well-
being are all part of our mental health. It
has an impact on our thoughts, feelings,
and behaviors

Physical Health
ITaking care of one's physical health has
1 Mental Health been shown to boost one's emotional well-
being and can have an impact on others if
one's condition worsens.
2 Physical Health
Repetitive Strain Injury
(RSI)

Health Iit is a condition that causes pain in the


muscles, nerves, and tendons as a result of
overuse.

Concerns Carpal Tunnel Disorder


ICarpal tunnel syndrome is a condition in
which the hand and wrist experience pain,
numbness, tingling, and weakness. It occurs
when the median nerve, which runs through
the wrist, is under increasing strain. The
3 Repetitive Strain Injury (RSI) thumb, index, and middle fingers, as well as
half of the ring finger, are all supplied with
sensation by this nerve.
4 Carpal Tunnel Disorder
Moreale
Employee morale refers to how employees feel
5 Moreale when they arrive at work, how they perform at
work, and how they approach their work tasks.
In a nutshell, moreale is the sum total of
employee contentment, outlook, and attitude.
How to include Workplace Safety
Ethics?

Encourage active employee participation and decision


making.
Clearly define employees' duties and responsibilities.
Promote work-life balance.
Encourage respectful and non-derogatory behaviors.
Manage workloads.
Allow continuous learning.
CPE LAWS AND PROFESSIONAL PRACTICE

Thank Have a great


day ahead.

you!

You might also like