You are on page 1of 32

UNIT 2

 DEFINE COMPUTER ETHICS


 CODE OF ETHICS AND NETIQUETTES
 INTELLECTUAL PROPERTY RIGHTS
 DATA PRIVACY ACT OF 2012
WHAT IS COMPUTER
ETHICS?
is a new branch of ethics that is concerned with
standards of conduct in the use of computers. It
deals with computing professionals should make
decisions regarding professional and social
conduct.
The ten commandments of computer ethics were
introduced by Ramon C. Barquin in 1992

This means to create a “set of standards to guide and


instruct people in the use of computers”.
TEN COMMANDMENTS OF
COMPUTER ETHICS
 Thou shalt not use a computer to harm other people in any way
 Thou shalt not interfere with other people's computer work.
 Thou shalt not sneak around in other people's computer files.
 Thou shalt not use a computer to steal.
 Thou shalt not use a computer to bear false witness.
 Thou shalt not copy or use proprietary software for which you have not
paid (without permission).
 Thou shalt not use other people's computer resources without
authorization or proper compensation.
 Thou shalt not appropriate other people's intellectual output.
 Thou shalt think about the social consequences of the program you are
writing or the system you are designing.
 Thou shalt always use a computer in ways that ensure consideration and
respect for other humans.
What is Netiquette?
 There are several activities that you can do using online services:
• Search topic
• Read articles
• Log in to your online accounts
• Write comments, post pictures, chat with a friend via social networking sites
• E-banking

But the information you put or use online the higher the risk placed on your online safety.
You can be a victim of identity theft, phishing, malware infections, etc. It is your
responsibility to secure your information online as well as maintain good etiquette when
using these services.
 Netiquette means rules of behavior on the Internet. The etiquette
guidelines that govern behavior when communicating on the
Internet have become known as netiquette. Netiquette covers not
only rules of behavior during discussions but also guidelines that
reflect the unique electronic nature of the medium.
DIGITAL DO’S AND DON’TS
DO’S DON’TS
Be careful of what you share  Don’t say anything online you
wouldn’t say to someone’s face
 Treat others the way you want  Don’t share anything you don’t
to be treated own, without permission
 Be safe
 Don’t post anything that you don’t
want to last forever
 Know the rules  Don’t spend all of your free time
 Be vigilant online
INTELLECTUAL PROPERTY RIGHTS
(IPR)
refers to any product of human intellect that is unique and has value
in the market place. This covers ideas, inventions, unique name,
computer program codes and many more.

 Thebiggest issue surrounding ICT concerns the violation of intellectual


property rights (IPR), which is the act of stealing other people’s works and
ideas, whether unknowingly.
 Intellectual Property Laws (IPL) –
 protect the rights of the people to maintain legal ownership of
their works and ideas.
 Itcovers their right to control how their work can be consumed
by the general public, including whether their work can be
acquired or used for a cost.
The term “intellectual property rights”
consists of:
 a) Copyright and Related Rights;
 b) Trademarks and Service Marks;
 c) Geographic Indications;
 d) Industrial/Registered Designs;
 e) Patents;
 f) Layout-Designs (Topographies) of Integrated Circuits; and
 g) Protection of Undisclosed Information (n, TRIPS).

https://www.officialgazette.gov.ph/1997/06/06/republic-act-no-8293/
What is copyright?
 Copyright (or author’s right) is a legal term used to describe the
rights that creators have over their literary and artistic works. Works
covered by copyright range from books, music, paintings, sculpture,
and films, to computer programs, databases, advertisements, maps,
and technical drawings.

What is a trademark?
 A trademark is a sign capable of distinguishing the goods or services
of one enterprise from those of other enterprises. Trademarks are
protected by intellectual property rights.
What is a geographical indication?

 A geographical indication (GI) is a sign used on products that have a specific


geographical origin and possess qualities or a reputation that are due to that origin. In
order to function as a GI, a sign must identify a product as originating in a given
place. In addition, the qualities, characteristics or reputation of the product should be
essentially due to the place of origin. Since the qualities depend on the geographical
place of production, there is a clear link between the product and its original place of
production.
What is Industrial Design?
 is any composition of lines or colors or any three-dimensional form,
whether or not associated with lines or colors:

What is a patent?
 A patent is an exclusive right granted for an invention, which is a
product or a process that provides, in general, a new way of doing
something, or offers a new technical solution to a problem. To get a
patent, technical information about the invention must be disclosed
to the public in a patent application.
What is Data Privacy Act of 2012?
The Beginner’s Guide to RA 10173 (Data Privacy Act of
2012)
In 2012, the Congress of the Philippines passed Republic Act No. 10173, also known
as the Data Privacy Act (DPA) of 2012.

 Five years later, the DPA’s Implementing Rules and Regulations was put in effect on
September 9, 2016, thus mandating all companies to comply.
 The act is a necessary and important precaution in a world economy that’s
swiftly going digital. In 2014, it was estimated that 2.5 quintillion — or 2.5
billion billion — bytes of data were created everyday. This includes
unprecedented knowledge about what real individuals are doing, watching,
thinking, and feeling.
 Companies must be held accountable not only for what they do with customer
data — but how they protect that data from third parties. The past few years of
security breaches, system errors, and ethical scandals within some of the
country’s major banks have reminded us that there is much work to be done.
 So, where to begin for institutions who want to comply with RA 10173 and be
proactive about their consumers’ digital privacy?
What is RA 10173?
 RA 10173, or the Data Privacy Act, protects individuals from
unauthorized processing of personal information that is

 (1) private, not publicly available; and


 (2) identifiable, where the identity of the individual is apparent
either through direct attribution or when put together with
other available information.
What does this entail?
 First, all personal information must be collected for reasons that are specified,
legitimate, and reasonable. In other words, customers must opt in for their data to be
used for specific reasons that are transparent and legal.
 Second, personal information must be handled properly. Information must be kept
accurate and relevant, used only for the stated purposes, and retained only for as long
as reasonably needed. Customers must be active in ensuring that other, unauthorized
parties do not have access to their customers’ information.
 Third, personal information must be discarded in a way that does not make it visible
and accessible to unauthorized third parties.
 Unauthorized processing, negligent handling, or improper disposal
of personal information is punishable with up to six (6) years in
prison or up to five million pesos (PHP 5,000,000) depending on the
nature and degree of the violation.
Who needs to register?
 Companies with at least 250 employees or access to the personal and identifiable
information of of at least 1,000 people are required to register with the National
Privacy Commission and comply with the Data Privacy Act of 2012. Some of
these companies are already on their way to compliance — but many more are
unaware that they are even affected by the law.
How do I remain in compliance of the
Data Privacy Act?
 The National Privacy Commission, which was created to enforce RA 10173, will
check whether companies are compliant based on a company having 5 elements:

 Appointing a Data Protection Officer


 Conducting a privacy impact assessment
 Creating a privacy knowledge management program
 Implementing a privacy and data protection policy
 Exercising a breach reporting procedure
Know Your Data Privacy Rights
Under RA10173, people whose personal information
is collected, stored, and processed are called data
subjects. Organizations who deal with your personal
details, whereabouts, and preferences are duty bound
to observe and respect your data privacy rights.
If you feel that your personal data has been misused,
maliciously disclosed, or improperly disposed, or if
any of the rights discussed here have been violated,
the data subject has a right to file a complaint.
The right to be informed
 Under R.A. 10173, your personal data is treated almost literally in the same way as your
own personal property. Thus, it should never be collected, processed and stored by any
organization without your explicit consent, unless otherwise provided by law.
Information controllers usually solicit your consent through a consent form. Aside from
protecting you against unfair means of personal data collection, this right also requires
personal information controllers (PICs) to notify you if your data have been
compromised, in a timely manner.
 As a data subject, you have the right to be informed that your personal data will be, are
being, or were, collected and processed.
 The Right to be Informed is a most basic right as it empowers you as a data subject to
consider other actions to protect your data privacy and assert your other privacy rights.
The right to access
 This is your right to find out whether an organization holds any personal data
about you and if so, gain “reasonable access” to them. Through this right, you
may also ask them to provide you with a written description of the kind of
information they have about you as well as their purpose/s for holding them.
 Under the Data Privacy Act of 2012, you have a right to obtain from an
organization a copy of any information relating to you that they have on their
computer database and/or manual filing system. It should be provided in an easy-
to-access format, accompanied with a full explanation executed in plain
language.
The right to object

 You can exercise your right to object if the personal data processing involved is
based on consent or on legitimate interest. When you object or withhold your
consent, the PIC should no longer process the personal data, unless the
processing is pursuant to a subpoena, for obvious purposes (contract, employer-
employee relationship, etc.) or a result of a legal obligation.
 In case there is any change or amendment to the information previously given
to you, you should be notified and given an opportunity to withhold consent.
The right to erasure or blocking
 Under the law, you have the right to suspend, withdraw or order the blocking, removal or
destruction of your personal data. You can exercise this right upon discovery and substantial
proof of the following:
 Your personal data is incomplete, outdated, false, or unlawfully obtained.
 It is being used for purposes you did not authorize.
 The data is no longer necessary for the purposes for which they were collected.
 You decided to withdraw consent, or you object to its processing and there is no overriding
legal ground for its processing.
 The data concerns information prejudicial to the data subject —
unless justified by freedom of speech, of expression, or of the press;
or otherwise authorized (by court of law)
 The processing is unlawful.
 The personal information controller, or the personal information
processor, violated your rights as data subject.
The right to damages

 You may claim compensation if you suffered damages due


to inaccurate, incomplete, outdated, false, unlawfully
obtained or unauthorized use of personal data, considering
any violation of your rights and freedoms as data subject.
The right to rectify

 You have the right to dispute and have corrected any inaccuracy or
error in the data a personal information controller (PIC) hold about
you. The PIC should act on it immediately and accordingly, unless
the request is vexatious or unreasonable. Once corrected, the PIC
should ensure that your access and receipt of both new and retracted
information. PICs should also furnish third parties with said
information, should you request it.
The right to data portability
 This right assures that YOU remain in full control of YOUR data. Data portability
allows you to obtain and electronically move, copy or transfer your data in a secure
manner, for further use. It enables the free flow of your personal information across the
internet and organizations, according to your preference. This is important especially
now that several organizations and services can reuse the same data.
 Data portability allows you to manage your personal data in your private device, and to
transmit your data from one personal information controller to another. As such, it
promotes competition that fosters better services for the public.
Transmissibility of Data Subject Rights

 Just like any physical property, such as real estate, you can assign your rights as a data
subject to your legal assignee or lawful heir. Similarly, you may assert another person’s
rights as a data subject, provided he or she authorized you as a “legal assignee”.
 You may also invoke another person’s data privacy rights after his or her death if you
are his or her legal heir. This same principle applies to parents of minors, or their legal
guardian, who are responsible for asserting their rights on their behalf.
 This right, however, is not applicable in case the processed personal data being
contested are used only for scientific and statistical research.
Limitations on Rights
 The provisions of the law regarding transmissibility of rights and the right to data
portability will not apply if the processed personal data are used only for the needs of
scientific and statistical research and, based on such, no activities are carried out and no
decisions are taken regarding the data subject. There should also be an assurance that the
personal data will be held under strict confidentiality and used only for the declared
purpose.
 They will not also apply to the processing of personal data gathered for investigations in
relation to any criminal, administrative or tax liabilities of a data subject. Any limitations
on the rights of the data subject should only be to the minimum extent necessary to
achieve the purpose of said research or investigation.

https://www.privacy.gov.ph/know-your-rights/#topic7_part3

You might also like