You are on page 1of 45

ADAMSON UNIVERSITY

College of Science
Information Technology and Information Systems Department

IT Issues and Seminars


Mid-Year Term 2020-2021
In partial fulfillment of the requirements for the course
IT337 IT Issues and Seminars

Submitted by:

BROÑOSA, MATTHEW S.
Program Name : Bachelor of Science in Information Technology
Student Number : 201913431
Section: 29017

Submitted to:

Mr. Archie G. Santiago

Date Started:
June 20, 2022

Date of Submission:
July 21, 2022

1
TABLE OF CONTENTS

Cover Page……………………………………………………………………………………………………………………. 1

Table of Contents………………………………………………………………………………………………………………2

Rationale………………………………………………………………………………………………………………………..3

I. Technology Summit Documentation……………………………………………………………………………4-11

II. Case Study on Current Trends (IT Related)…………………………………………………………………...12-35

III. Internal Webinar……………………………………………………………………………………………….36-38

IV. External Webinar………………………………………………………………………………………………39-41

V. Online Courses…………………………………………………………………………………………………42-45

2
Rationale

Students will be even more inclined to learn about the use of information systems and technology in this field.

Furthermore, it will demonstrate IT and IS students the issues and trends that require urgency. Each of these activities

are developed to guide students in improving their capacity for rational thinking, refining their ability to think critically,

training coming up with original concepts, knowing further about their environment, and gearing up for opportunities

in information technology.

3
I. Technology Summit Documentation

Technology Summit 2022

I. Title:

IT IS your choice! 2.0 The Adamson University IT & IS Technology Summit

II. Overview:

Three different topics relating to various tracks in the IT/IS course are covered in this two-day webinars. One of the objectives

of this event is to introduce incoming first-year IT & IS students to the tracks from which they can select in their third year of

study. The importance of enterprise user experience and how it is experienced was the first topic covered. Additionally, it

covered the various user experiences and offered information about working in a business. The discussion that followed focused

on the many kinds of animation and editing that game developers are capable of doing. The final topic covered was network

infrastructure and data security. Each topic has speakers and interactive activities. The Different Capstone Titles Presentation

is the final portion of the event, where judges will determine which capstone is the most stunning and well-kept.

III. Topic Outline:

Topic 1 – Consumer Enterprise and Application Development

Topic 2 – Game Development

Topic 3 - Network Infrastructure & Data Security

Topic 4 – Best Capstone Presentation

4
IV. Certificate of Attendance:

Day 1 (July 12, 2022) Morning Session:

Day 1 (July 12, 2022) Afternoon Session:

5
Day 2 (July 13, 2022) Morning Session:

Day 2 (July 13, 2022) Afternoon Session:

6
V. Evidence or Proof Involvement:

Picture of attendance

- 3 pictures they are attending

7
3 proof of involvement

Day 1

8
Day 2

9
VI. Selfie Picture:

Day 1

10
Day 2

VII. Evaluation:

• I learned that knowing the proper methods for gathering data can help you accomplish a lot, especially when you're

working.

• I learned that when designing a user interface it should fit the user’s preferences and make them easy to use and

understand.

• I learned that Robotics Submission System (RPA) is more reliable and the most commonly industries that use

Robotics Submission System moreover I also learned that white collar jobs are gradually being helped and improved

due to automation.

• I learned the Best IT jobs that can be taken in the future.

• I learned two classes of Robotics Submission System these are the Attended and Unattended RPA.

11
II. Case Study on Current Trends (IT Related)

CASE STUDY 1 – DICT Secretary

Name: Matthew Broñosa Score:

Student Number:201913431 Date: 01/07/2022

Section/Schedule 302
______
Subject: IT Issues and Seminars_ Professor:_Mr. Archie G. Santiago_
100

Improving "Pipol Konek" Free Wi-Fi Internet Access Program

Introduction

The Free Wi-Fi Internet Access in Public Places Project of the Philippine Department of Information and Communications

Technology (DICT) aims to speed up government initiatives to improve internet accessibility for Filipinos so that, in turn,

economic, social, and educational opportunities will be bolstered and the growing Digital Divide can be bridged throughout the

nation. The Project, the first initiative of its kind in Southeast Asia, aims to provide free Wi-Fi Internet access to a total of 1,634

localities across 1,489 municipalities from first to sixth class, and 145 cities with 13,024 sites covered by 18 Points of Presence

(PoP) throughout the Philippines. These localities span 1,634 localities spanning 1,489 PoP sites, which cover 1,634 localities

totaling 1,634 localities spanning 1,489 PoP sites.Plazas and parks, public libraries, public schools (elementary and secondary),
12
state colleges and universities, rural health units and government hospitals, train stations, airports and seaports, as well as

federal, state, and local government offices are some of the public locations that will have free Wi-Fi (NGAs and LGUs).

Pipol Konek Project deployment took place over the course of three stages. Phase 1 was subdivided into Phase 1A and

Phase 1B. Phase 1A centered on initial installation, while Phase 1B centered on expansion to municipalities with income classes

of 3 to 6 and major cities including Manila, Cebu, and Davao. Extension to new locations is part of phase 2. In phase three,

collaborations with NGCP and other electric cooperatives are emphasized for the use of infrastructure. In the first and follow-

up phases of the Pipol Connect project, DICT entered agreements with the following contractors:

• Abratique & Associates Philippines, Inc

• Joint Venture of Innove Communications, Inc., and Yondu Inc.

• Philippine Long Distance Telephone (PLDT)

• Joint Venture of AZ Communications, Network Inc.

• Speedcast

• (AZCOM), Omniprime Marketing Inc. (OMI), Nexlogic Telecommunications Network, Inc. and Neo-Tech

Asia Distribution, Inc.

• UNDP

• We Are IT Philippines, Inc.

These contractors were tasked with bringing free wifi to the many locations the Pipol Konek project has chosen. Because

the contractors had already finished a project of a corresponding size and scope to the Pipol Konek free Wi-Fi project, they

were given the contracts. Before the project could be effectively implemented, permissions were also necessary for the

deployment of the infrastructure and internet connection.

But the outcome did not come out as planned. According to the Department of Information and Communications

Technology (DICT), just 882 of the 6,000 public Wi-Fi connection points that the government intends to establish by the end

of 2022 have already been installed. The DICT itself and parliamentarians brought up the fact that the majority of Wi-Fi

13
equipment deployed during the project's first phase offered internet connections that were "too slow," with a top connection

speed of 2 megabits per second, during the hearing. Erlinda Bildner, president of Philcomsat, mentioned Speedcast and the

UNDP as reasons for the holdup. She said that Speedcast filed for bankruptcy six months into the project, which caused an 11-

month delay. She also brought up the undervaluation problem at Customs, which called for an internal investigation. As some

local government units (LGUs) desired to move the installation address to regions they considered would benefit more clients,

Bildner continued, they also ran into issues with other sites.

Problem

As of May 2021, the project is only in the first of three phases, according to DICT Undersecretary Emmanuel Caintic,

who testified during a hearing of the House committee on good administration and public accountability on the government's

Wi-Fi initiative. According to Bildner, Philcomsat was only to act as "installers," whilst the UNDP was intended to do site

surveys and work out these kinks with the LGUs. She added that the pandemic lockdowns in 2020 further slowed them

considerably.

Discuss the symptoms of the problem and its root causes

In its December 2020 audit report, the Commission on Audit had warned the DICT about its poor project implementation.

The DICT decided to collaborate with UNDP due to its extensive experience, expertise, and ability to design for and implement

the most suitable technologies in remote and underdeveloped areas, establish citizen monitoring mechanisms, and support DICT

in developing its systems and capacity. UNDP also has high standards for quality assurance.

The DICT decided on the Australian company Speedcast to manage with the technical assistance of the UNDP. The free

Wi-Fi project's first and second phases. Later, Speedcast chose Philcomsat, which is partially owned by the government, to be

its subcontractor and consignee. The UNDP listed commercial difficulties and mobility limits as some of the pandemic
14
restrictions that the contractor and its subcontractor faced as delays, notably in site activation. Philcomsat and Speedcast,

however, were unable to resolve their disputes despite cooperative efforts to do so with a number of re-negotiated catch-up

plans presented for DICT clearance, the UNDP stated in the statement.

Describe how the problem affects the goals and objectives of the organization.

Although the DICT already has goals, the organization's goal to offer free broadband Internet access to public areas

across the nation is hampered by issues with contractors' slow service, the pandemic, slow internet access, the connection with

LGUs, the anomaly, and corruption.

Analysis of Alternatives

The new plan's implementation will be the main focus of DICT in order to address the issues that have arisen. The new

contractors will go through extensive testing to see if they are truly capable of improving the public's access to Pipol Konek

Free Wi-Fi. All necessary materials are managed appropriately. The procedure for constructing the Pipol Konek includes

weekly inspections. Along with all the CEOs and other participants, there will also be a weekly meeting with the contractors.

The accounting team should review the breakdown of the cost of the equipment that the contractors must submit. Weekly on-

site inspections will be conducted to monitor the program's implementation progress. Priority is given to the parties involved

and the collaboration with the LGU'S.

Discuss the approach involved in evaluating each potential solution.

There will always be a gathering to discuss fresh concepts before developing a detailed strategy. The LGU's officials

are always involved and the location is always checked first. A Public Wi-Fi service's effectiveness is determined by how

15
successfully it accomplishes its goals, which typically refers to how consumers utilize the service. Take-up depends on both

the service's location and how easily it functions for the user. Less obstacles and hassles to using the service typically result in

higher levels of uptake. Free Wi-Fi access to the Internet can promote innovation by creating an environment conducive to it.

Recommended Solutions

• Seoul Public Wi-Fi 2.0 ("Seoul to provide free WiFi at all public places by 2017", 2016)

• Locations should be selected

• Conducting Survey

• Alliances

• Community network

Discuss different solutions

• Similar to Philippine’s DICT, South Korea has a National Information Society Agency (NIA). NIA operates

under the objective to oversee construction of high-speed networks, to oversee use of information technology in

government agencies, and to oversee programs to promote public access to broadband and digital literacy.

Back in 1994, NIA established the Korean Information Infrastructure initiative (KII). The KII is about

constructing the nationwide fiber optics network. The initiative envisions itself to exchange real-time video on

demand (Kim, 2001).

• Locations should be selected appropriately to help achieve the objectives for Public

Wi-Fi.

• Conducting Survey to know the feedback of the users on the things that need to be improved to be able to give a better

service. They will be asked online to answer the survey regarding with their experiences in connecting with the Pipol

Konek.

16
• Under an alliance arrangement, all parties agree to work together for a common objective without giving up their

independent status. Such an arrangement would mean that DICT, the service provider, the authorities involved would

work as one. A Public Private Partnership is characterised by a government service being delivered through a

partnership of government and private service providers. In this model, the service is funded and operated by this

partnership of government and the private sector.

• Community networks are typically organised as networks, where Access Points with backhaul make this backhaul

available for all other Access Points in range. This means that collective backhaul bandwidth can be shared across all

users that are connected to any Access Point in the mesh.

Implementation

Philippines must also narrow the digital gaps (Kim, 2018) by allocating budgets for network infrastructure construction,

improvements, and maintenance, participate in ICT-related summits for coming up with different policies and

methodologies and to target a higher quality. Private sector harmony is also one of the key success factors of South Korea’s

leading high speed Internet. With less cost for the government, the private sector partnership has helped to further bolster the

country’s network infrastructure. Unlike in the Philippines, telcos do not even comply to cooperate with the National

Broadband plan of peering policy in order to minimize network latency. South Korea Electronics and Telecommunications

Research Institute (ETRI) “has developed a core network technology that allows a 5G network to automatically steer users”

to Wi-Fi based. The Philippine government needs to beef up its R&D department to encourage healthy competition via

state-granted vertical technology transfers. One way is through institutionalizing a separate entity from the DICT for electronics

and telecommunications R&D. Utilize Philippine membership in ASEAN and in other regional organizations, like United

Nations Asian and Pacific Training Centre for Information and Communication Technology for Development

(UNAPCICT), to acquire technologies that will help boost the Internet bandwidth and further reach remote areas in the last

mile. Requirements for alliance contracting are embodied within the national guidelines. The implementation of Public Wi-Fi

is more of a journey than a destination, in that Public Wi-Fi services require ongoing resources, funding and commitment to

17
maintain. DICT must remain trustworthy with the funds and be strict with the implementation. Following all the rules and

regulations to improve Pipol Konek. Assuring the quality and the life long service of the Pipol Konek to the citizens. Having a

backup plan whenever there will be a problem. An everyday checkup with the system together with the infrastructures.

Results

Public Wi-Fi is a great opportunity for governments to connect entire cities: smart cities deploying free Wi-Fi are largely

increasing and as a result, can effectively empower their communities with better services. Equipping public transportation

with free Wi-Fi access is another example of how public Wi-Fi positively affects communities: residents and travelers can

enjoy a better travel experience and get real-time information about transports, so as to better plan their routes. By providing

free Wi-Fi to students and to the academic staff, educational institutions can leverage wireless education to improve their digital

studies’ curriculum. Examples of effective implementation of free Wi-Fi in schools are New Taipei City, Taiwan, which in

2015 introduced tablets and computers in 300 schools, and the LSD Lisbon School of Design, Portugal, which, thanks to the

Tanaza Wi-Fi, has been providing students and staff with a seamless and reliable Wi-Fi network since 2015. In this way, student

and teachers can effectively use wifi-enabled devices for educational purposes and, at the same time, the institution can develop

innovative teaching techniques based on collaborative and interactive learning. Wi-Fi technology applied to healthcare services

largely improves hospitals and clinics’ performances. For instance, thanks to wireless apps doctors can have instant access to

their patients’ clinical information and easily communicate with them. In addition, public Wi-Fi facilitates rural health care:

indeed, patients living in rural areas can use their Wi-Fi network to reach doctors remotely. At the same time, Wi-Fi allows

real-time location monitoring, meaning that it makes it possible to track the position of the medical staff within a healthcare

building and to better plan the use of resources: both patients and equipment can be directed to the right place at the right time.

18
Reference

DICT_Pipol_Konek_Case_Study. (2018, December). /Www.Researchgate.Net. Retrieved July 1, 2022, from

https://www.researchgate.net/publication/341669242_DICT_Pipol_Konek_Case_Study

stocktaking. (2016, June 9). Http://Www.Dict.Gov.Ph. Retrieved July 1, 2022, from

https://www.itu.int/net4/wsis/archive/stocktaking/Project/Details?projectId=1515567922

sites-installed-public-wifi-project-may-2021. (2014, May 25). Www.Rappler.Com. Retrieved July 1, 2022, from

https://www.rappler.com/nation/sites-installed-public-wifi-project-may-2021/

Mabasa. (2021, June 1). undp-welcomes-house-resolution-to-probe-irregularities-in-p1-36-b-free-wi-fi-project. Mb.Com.Ph.

Retrieved July 1, 2022, from https://www.google.com/amp/s/mb.com.ph/2021/06/01/undp-welcomes-house-resolution-to-

probe-irregularities-in-p1-36-b-free-wi-fi-project/%3famp

UNDP PIPOL KONEK PRODOC. (2018, September 26). Info.Undp.Org. Retrieved July 1, 2022, from

https://www.google.com/url?sa=t&source=web&rct=j&url=https://info.undp.org/docs/pdc/Documents/PHL/DICT%2520-

%2520UNDP%2520PIPOL%2520KONEK%2520PRODOC%2520-%2520Signed.pdf&ved=2ahUKEwiQw-v2q9f4AhU-

qFYBHSesCGAQFnoECA4QBg&usg=AOvVaw13DLcJ2dX5Wt4iCdmTZLZy

MAV TECHNOLOGY. (2014, March 4). Public-WiFi-implementation-guidelines. /Www.Mav.Asn.Au. Retrieved July 1,

2022, from

https://www.google.com/url?sa=t&source=web&rct=j&url=https://www.mav.asn.au/__data/assets/pdf_file/0017/7631/Public
19
-WiFi-implementation-

guidelines.pdf&ved=2ahUKEwiRos25vNf4AhV4plYBHVgeDWAQFnoECEoQAQ&usg=AOvVaw1LdwCsS-

N9xU34F7aegyZ5

20
CASE STUDY 2 – Professional Responsibility

Name: Matthew S Broñosa Score:

Student Number: 201913431 Date: 14/07/2022

Section/Schedule 29020/3:30 pm – 5:30


______
Subject: IT Issues and Seminars_ Professor:_Mr. Archie G. Santiago_
100

Objectives:

• Discuss the different IT trends and issues both in local and international scenarios

Scenario: Professional Responsibility

The case relates to the most recent game being created for children between the ages of 7 and 15. Players can choose from

a wide range of characters, mostly macho men or alluring women, but it also features inferential reasoning based on societal

norms. The game's primary participants are boys. The masculine predominance of the team is the root of the problem. It was

made aware at the meeting that it needed to be altered in order to provide better results. The CEO of the company, its board of

directors, and its production crew are all parties to this dispute. Due of its exclusivity towards guys and bias against other

genders, this game has issues.

21
1. Should you refuse to work on your team? Should you ask for the team to be reviewed?

Yes, because both the game and its content are unsuitable for children of that age. A game should also appeal to a diverse

group of individuals; it shouldn't be reserved only for guys. The game should be open to players of other genders. I understand

why they decided to limit access to boys, but I won't allow myself to work on it because I have a different opinion, especially

if they don't change the way the game is played. The most significant aspect is that it imparts lessons and should be impartial.

It must be sensitive to gender. We must put ourselves in the game if we want to participate. It is our responsibility as adults to

aid in forming children into moral beings. To respond to the second inquiry, yes. There are simply too many changes in the

game, especially in terms of the content, so you need to be very aware of what needs to be altered and what else needs to be

better. A review is necessary because individuals involved should ensure that it is good, which is why it should be. They don't

all act in ways that are morally appropriate at once. It should be checked, looked over, and placed into a step-by-step process

before it is established.

2. Do you think that the game will sell as well if a different message was given?

Yes, I'm sure the game will sell since it has more content and appeals to both men and women; it's not only for boys. Many

individuals will use the message if it is accurate. If the message of the game is easy to understand, in addition to being

interesting, fun, and exciting, users will believe that it is worthwhile and that they will benefit from it.

22
3. What is your responsibility, if any, in the team and regarding the games’ topics?

My responsibility is to examine the game's content and any upcoming updates, as well as to keep an eye on the

programmers to make sure the game is being created properly. Being a team member, I wanted it to be successful. As long as

I'm a team member, I'm responsible even though it wasn't my idea. We used brainstorming to come up with the game concepts.

I have the opportunity to think about the subjects and all of the things we will do to make the game fantastic. Since the themes

are crucial to the game as a whole, it is my duty to follow the right guidelines. Letting them know my ideas for enhancing the

kid-friendly elements of the software.

4. Should the message in games be taken into account?

Yes, so that players are aware of the purpose behind the game's design, the nature of the game itself, and any additional

lessons that might be learned through game play. It's one of the considerations made when making a game. Games' messages,

in my opinion, are very important since it creates a connection between game developers and users. The message within the

game gives it direction so that players can always understand its goals and purposes.

5. Should software development teams be diverse? Is it justifiable to refuse to work in a

team that is not diverse?

Yes, it is possible to make a game that plays well and has appealing game content using a variety of concepts and resources.

Yes, it is justified because we need help in order to produce the game more quickly and with higher quality. Diversity leads to

diverse viewpoints. When team members come from different origins, cultures, and experiences, the team is more likely to

solve challenges and be creative. This can result in results that are examined more closely. Unquestionably, a diverse team will

spot a software or market gap earlier than a non-diverse group. This is because each team member will bring their own

23
knowledge, experience, and vision to the project, ensuring that it meets the diverse needs of the intended audience and surpasses

the client's expectations.

6. Is diversity, or a lack thereof, a responsibility of the profession?

Yes, since a scarcity may have an effect on the staff members that work on games or projects for a corporation. For me,

that company is still protected because when there is a shortage or neglect, especially when there is a high workload. It is the

obligation of the profession since the profession demands it. A profession, according to the dictionary, is a paid occupation,

particularly one that calls for considerable training and a formal certificate. Since it is a vocation, it should be suitable,

exceptional, or extremely good. The profession is accountable if there is a shortage, if it isn't diversified, if it's immoral, and if

it doesn't follow the rules.

Conclusion

Developers cannot assume that their own position is unassailable, thus they must take the time during the development process

to actively seek out and examine other viewpoints, especially those that are buried in popular conversations. When seen from

an anti-oppressive angle, it is clear that academics and professionals are not the exclusive authorities on a subject. Game makers

must act with purpose and attention while promoting diversity and dispelling common misconceptions in gaming. The intended

audience, their unique experiences, and any potential oppressions they may experience must all be carefully taken into account

when creating anti-oppression video games. It necessitates giving up the idea that there is just one type of player or that all

players approach games similarly. It's important to carefully analyze the assumptions that game designers and developers make

about the preferences, viewpoints, and needs of their intended audience.

24
Reference:

ways-diversity-and-inclusion-help-teams-perform-better. (2021, September 3). Www.Cio.Com. Retrieved July 14, 2022, from

https://www.cio.com/article/189194/5-ways-diversity-and-inclusion-help-teams-perform-better.html

White. (2020, January 8). diverse-development-team. Www.Bairesdev.Com. Retrieved July 14, 2022, from

https://www.bairesdev.com/blog/diverse-development-team/

Gibson, Schrier. (2021, January). Designing_Games_for_Ethics_Models_Techniques_and_Frameworks.

Www.Researchgate.Net. Retrieved July 14, 2022, from

https://www.researchgate.net/publication/262250136_Designing_Games_for_Ethics_Models_Techniques_and_Frameworks

25
CASE STUDY 3 – Data Privacy Act of 2012

Name: Matthew S Broñosa Score:

Student Number: 201913431 Date: 20/07/2022

Section/Schedule: 29020/3:30 pm – 5:30


______
Subject: IT Issues and Seminars_ Professor:_Mr. Archie G. Santiago_
100

Objectives:

• Discuss the different IT trends and issues both in local and international scenarios

Instructions:

Given the following links, please read its containing article:

A. Local https://www.rappler.com/technology/222192-subscribers-affected-globe-

telecom-sends-personal-data-wrong-recipients/

B. International https://www.reuters.com/article/us-usa-voters-breach-

idUSKBN0UB1E020151229

26
1. Use the following contents for this study:

A. LOCAL ISSUE

TITLE:

8,851 subscribers affected as Globe sends personal data to wrong recipients

INTRODUCTION:

The article begins by stating that Globe sent the personal information of its 8,851 subscribers to the

incorrect recipients. This story claims that the emails contained the users' 4names, complete postal

addresses, and email addresses, resulting in a data leak. Data that wasn't intended for them was visible to

other people. Users of Globe who received incorrect texts with inaccurate information cautioned other

Globe users not to sign up for the On The List program in order to access concert tickets and other music

venues for Globe events, particularly the K-pop group Blackpink.

This is so that others cannot use their personal information to defraud them or create their accounts

without their consent. The information contains their personal information. The Globe is also responsible

for it because they were supposed to protect their users' sensitive in4formation but instead they let it slip.

Many people tweeted about the issue, which was picked up by Globe, who then notified the National

Privacy Commission in accordance with legal procedures. The National Privacy Commission is an

independent agency tasked with overseeing the administration and implementation of the Act as well as

27
monitoring and ensuring that the nation complies with global standards for the protection of personal

data.

SCENARIO:

Personal information from the 8,851 subscribers was made public by Globe when they sent these to the

incorrect recipients. These subscribers had already been subjected to scams, phishing, and other negative

effects. This problem, which violates the Data Privacy Act, must be fixed by Globe.

Practices that violates the DPA of 2012:

The following are the practices that violates the DPA of 2012 according to the Implementing Rules and

Regulations of the Data Privacy Act of 2012:

• SEC. 12. Criteria for Lawful Processing of Personal Information.

- The processing of personal information shall be permitted only if not otherwise prohibited by

law, and when at least one of the conditions exists.

• SEC. 13. Sensitive Personal Information and Privileged Information

• . – The processing of sensitive personal information and privileged information shall be

prohibited, except in the given cases:

(a) The data subject has given his or her consent, specific to the purpose prior to the processing, or in the

case of privileged information, all parties to the exchange have given their consent prior to processing;

(b) The processing of the same is provided for by existing laws and regulations: Provided, That such

regulatory enactments guarantee the protection of the sensitive personal information and the privileged

28
information: Provided, further, That the consent of the data subjects are not required by law or regulation

permitting the processing of the sensitive personal information or the privileged information;

• CHAPTER IV

RIGHTS OF THE DATA SUBJECT

4SEC. 16. Rights of the Data Subject. – The data subject is entitled to:

- (8) The existence of their rights, i.e., to access, correction, as well as the right to lodge a

complaint before the Commission.

• CHAPTER V

SECURITY OF PERSONAL INFORMATION

• SEC. 20. Security of Personal Information. – (a) The personal information controller must

implement reasonable and appropriate organizational, physical and technical measures intended

for the protection of personal information against any accidental or unlawful d4estruction,

alteration and disclosure, as well as against any other unlawful processing.

• Penalties for the Violation:

• (b) Accessing sensitive personal information due to negligence shall be penalized by

imprisonment ranging from three (3) years to six (6) years and a fine of not less than Five

hundred thousand pesos (Php500,000.00) but not more than Four million pesos

(Php4,000,000.00) shall be imposed on persons who, due to negligence, provided access to

personal information without being authorized under this Act or any existing law.

• SEC. 27. Improper Disposal of Personal Information and Sensitive Personal Information. – (a)

The improper disposal of personal information shall be penalized by imprisonment ranging from

six (6) months to two (2) years and a fine of not less than One hundred thousand pesos

(Php100,000.00) but not more than Five hundred thousand pesos (Php500,000.00) shall be

imposed on persons who knowingly or negligently dispose, discard or abandon the personal

29
information of an individual in an area accessible to the public or has otherwise placed the

personal information of an individual in its container for trash collection.

• (b) The improper disposal of sensitive personal information shall be penalized by imprisonment

ranging from one (1) year to three (3) years and a fine of not less than One hundred thousand

pesos (Php100,000.00) but not more than One million pesos (Php1,000,000.00) shall be imposed

on persons who knowingly or negligently dispose, discard or abandon the personal information of

an individual in an area accessible to the public or has otherwise placed the personal information

of an individual in its container for trash collection.

• SEC. 32. Unauthorized Disclosure. – (a) Any personal information controller or personal

information processor or any of its officials, employees or agents, who discloses to a third party

personal information not covered by the immediately preceding section without the consent of the

data subject, shall he subject to imprisonment ranging from one (1) year to three (3) years and a

fine of not less than Five hundred thousand pesos (Php500,000.00) but not more than One million

pesos (Php1,000,000.00).

• SEC. 34. Extent of Liability. – If the offender is a corporation, partnership or any juridical person,

the penalty shall be imposed upon the responsible officers, as the case may be, who participated

in, or by their gross negligence, allowed the commission of the crime. If the offender is a juridical

person, the court may suspend or revoke any of its rights under this Act.

Recommendations:

The article stated that the NPC is currently “evaluating the incident and verifying the information given

to us, following our standard procedure.”

Affected users are urged to keep watch over their offline and online accounts for anomalous behavior and

change passwords and verification information. They should also be wary of potential phishing scams

according to the NPC. Also, Globe Chief Information Security Officer A4nton Bonifacio said: ‘The On

30
The List registration site /was taken down immediately to remove access to potential registrants at the

time and we have notified all affected prepaid customers of the issue.’” on the basis of the article.

I advise the Globe to always evaluate their settings and safety precautions for the protection of their

users' data. Even though it is a large corporation, the NPC must also validate the problem, examine it, and

act fairly. Regarding the disclosure of the users' private information, they must both exercise strict

control.

Conclusion:

It serves as a warning to businesses that gather customer data. We must abide by the Data Privacy Act

in order to safeguard people from the many risks they will face. Even a large corporation can make

mistakes of this nature, so the offending organization must be held accountable for its actions. Users also

need to be very cautious when disclosing personal information to third parties. We must also be able to

spot attempts by others to con us, engage in phishing, etc.

Always verify that our accounts are secure, modify them if we believe they have been compromised,

verify our accounts, and, most importantly, never give your passwords or account information with

anyone you don't trust.

31
B. INTERNATIONAL ISSUE

TITLE:

Database of 191 million U.S. voters exposed on Internet: researcher

INTRODUCTION:

The article previously stated that a database containing information on 191 million voters, including

their names, addresses, birth dates, party affiliations, phone numbers, and emails, was made public on the

internet. This database included voters from all 50 states as well as Washington, according to researcher

Chris Vickery in a phone interview. Austin, Texas-based computer support professional Vickery claimed

to have discovered the information while searching for material that had been made public online in an

effort to increase public awareness of data leaks.

No comments were made by a Federal Bureau of Investigation representative. According to CSO

Online, who also quoted the report, the disclosed data may have originated from NationBuilder, a

provider of campaign software, because the leak contained data codes that were similar to those the

company uses. They refuted the claim, however, and Executive Officer Jim Gillian claimed that since

each state government already makes the voter data included in the database available to the public,

neither fresh nor private information was disclosed.

SCENARIO:

According to Vickery, an Austin, Texas-based IT support professional, the database of 191 million

American voters was made public online. This article did not offer solutions, and it has no supporting

evidence. Nobody is willing to take responsibility for it, and the organization in question denied it.

Practices that violates the DPA in the USA:

32
Regulations on protecting voter data vary from state to state, with many states imposing no restrictions.

California, for example, requires that voter data be used for political purposes only and not be available to

persons outside of the United States according to the article.

• Privacy Act of 1974

The Privacy Act of 1974 is a major data privacy law that applies to how the federal government

and its agencies handle the data of U.S. citizens. The Privacy Act allows citizens to access and

view the government records containing their data, as well as request a change in the records in

case of inaccuracies.

• US Data Privacy Laws by State

• The California Consumer Privacy Act (CPA) was a major piece of legislation that passed in 2018,

protecting the data privacy of Californians and placing strict data security requirements on

companies.

• The Colorado Privacy Act (ColoPA) follows in the footsteps of its predecessors and adheres to

the same principles of personal information protection.

- It also adds a sensitive data requirement to consent requests.

• Nevada Internet Privacy Bill (SB260)

- This law will provide Nevada residents with a broader right to opt out of the sale of their

personal information. It also creates new requirements for “data brokers,” which are defined as

entities whose primary means of business is selling information about consumers from operators

or other data brokers. Data brokers must establish a designated address through which consumers

may request the data broker to stop selling their information. The data broker will have to respond

within 60 days of receipt.

Penalties for the Violation:

33
• California

The law gives companies 30 days to “cure” violations. Failure to address a violation leads to a

civil penalty of up to US$7,500 for each intentional violation and US$2,500 for each

unintentional violation.

• Colorado

There is no private right of action, so the Attorney General of Colorado and district attorneys will

enforce the CPA. They can seek monetary damages or injunctive relief. Before taking action,

however, the Attorney General and the district attorneys must issue a notice of violation and

allow companies or individuals 60 days to cure the alleged violation. After January 2025, this

“right to cure” will be replaced by the controller’s right to request guidance from the Attorney

General’s office.

• Nevada Internet Privacy Bill (SB260)

Nevada’s Attorney General is tasked with enforcing this law. The court will issue a temporary or

permanent injunction or a civil penalty of up to $5,000 per violation.

Recommendations:

The article claims that there are no precise advice about how to resolve the problem. I would like to

suggest that the government's representatives take charge of the situation's resolution. They must

guarantee that the individuals who will be impacted won't suffer any harm. Utilizing their advanced

technologies, they must identify the root of the issue. The associated company must also take care to

avoid disclosing any of the individuals' private information to the public.

Conclusion:

34
Whether it was settled or not is still in doubt. Simply stating that the company in question did not

release those details, they assure us. It's unclear whether anyone wants to fix the problem at all. However,

it varies by state, they do not also have the universal data privacy that operates for everyone's protection.

In order to protect their citizens, several nations have stepped up and created their own data privacy acts.

They made it clear that laws already exist so that those who break them will face punishment.

References:

data-privacy-act. (n.d.). Www.Privacy.Gov.Ph. Retrieved July 20, 2022, from https://www.privacy.gov.ph/data-privacy-act/

Tierney. (2022, August 13). data-privacy-laws-by-state-the-u-s-approach-to-privacy-protection. Https://Blog.Netwrix.Com/.

Retrieved July 20, 2022, from https://blog.netwrix.com/2019/08/27/data-privacy-laws-by-state-the-u-s-approach-to-privacy-

protection/#:~:text=Penalties%20for%20violations%3A%20The%20Office,including%20reasonable%20attorneys’%20fees.

%E2%80%9D

35
III. Internal Webinar

Career Development

I. Title:

IT & IS Career and Personality Development

II. Overview:

This webinar is about IT & IS Career and Personality Development the primary objective of this webinar is to assist incoming

fourth-year students in selecting their future IT careers. The webinar's speaker also covered numerous IT careers and

tips on how to write a good résumé. The speaker also provided advice on how to effectively respond to interview questions.

Games and information about utilizing LinkedIn to generate a résumé are also included.

III. Topic Outline:

Topic 1 – Planning VS Development

Topic 2 – Career Management Model

Topic 3 – Careers in IT

Topic 4 – Create a Cover Letter

Topic 5 – Build Your Resume

Topic 6 – Tips When In An Interview

IV. Certificate of Attendance:

36
Selfie Picture:

V. Evidence or Proof of Registration:

37
VI. Evaluation

• I learned that we must first recognize our skills, talents, and interests.

• I learned how to do a resume properly.

• I learned that we need to improve our knowledge and talents.

• I learned how to answer the interview questions properly especially the questions Tell us about

yourself and What are your strengths and weaknesses and I also learned that the questions I mentioned are

often asked in the job interview.

• I learned the different IT careers that I can choose when I will apply for a job.

38
IV. External Webinar

Cybersecurity

I. Title:

Taking a Huge Leap Towards Great Success

II. Overview:

Cybersecurity and application security testing are the topics of this webinar. This webinar's goal is to educate participants about

application security testing and cybersecurity. The guest speaker also provided tips on various methods of protecting the

application. The guest speaker also offered advice on how to prevent data loss to the hackers. The prerequisites for application

and server scans are another topic covered in this webinar. Games and two guests speakers are also included in this webinar.

III. Topic Outline:

Topic 1 – Application Security Testing

Topic 2 – Basic Terms and Technologies

Topic 3 – IT Security Scanning Tools

Topic 4 – Security Testing

IV. Certificate of Attendance:

39
V. Evidence or Proof of Registration:

VI. Selfie Picture:

40
VII. Evaluation:

• I learned the security scanning requirements what to do before scans of the application or server.

• I learned the different types of security scanning tools.

• I learned how to do security scanning testing.

• I learned the importance of application security testing.

• I learned the basic terms and technologies where it is used and how to use it.

41
V. Online Course

Fortinet NSE Certification Program

I. Title:

Fortinet product Awareness

II. Overview:

Fortinet Product Awareness is the topic of this online course. The primary goal of this online course is to teach students about

Fortinet products and how to use them. This online course is divided into four lessons, each with six modules. This online

course covers four topics: adaptive cloud security, zero trust access, security operations, and security driven networking. It is

estimated to last 4 hours.

III. Topic Outline:

Topic 1 – Zero Trust Access

Topic 2 – Adaptive Cloud Security

Topic 3 – Security Operation

IV. Certificate of Attendance:

42
V. Evidence or Proof of Subscription:

VI. Selfie Picture:

43
44
VII. Evaluation:

• I learned the significance of an adaptive cloud security solution and its three core values.

• I learned about the various adaptive cloud security solution product solutions.

• I learned about the features and the purpose of FortiWeb.

• I learned the significance of FotiAuthenticator.

• I learned how to use Fortinet solutions to broaden my networking knowledge.

45

You might also like