You are on page 1of 51

IT GROUP 2

GROUP MEMBERS:
DESOLOC, KRISTINE JOY
FRANCISCO, FRANCIS ANGELO
DUTERTE, PIA KRIZZLE
EGPIT, HARVEEL KIM
CAMBAYA, RHEA
CUBERO, ALLAN TROY L-REO
COGOLLODO, SHARIA BARBOSA
ESTORPE, FRANCELYN
CHAPTER
4
INFORMATION
CONTROL, AND
PRIVACY
Information, Control and Privacy
At the end of this chapter, the students should be able to:
1. Distinguish a physical resource from a conceptual resource.
2. Recall the characteristics of valuable information.
3. Identify the characteristics of information as a resource.
4. Explain the phenomena of mobile commerce and mobile
social media using concepts related to e-commerce and social
media.
5. Discuss information control and intellectual property.
6. Recognize the major points of the Intellectual Property Code
of the Philippines (Republic Act No. 8293).
7. Analyze the concept of information privacy and assess how it
affects daily online activities.
INTRODUCTION OF RESOURCES

• Organization treat company assets such as buildings, equipment, and their


man power as important resources.

• Resources are the total means available to a company for increasing


production or profit, including land, labor , capital and raw materials.
• Without these resources, these organization would cease to exist. Imagine a
bank without money, a manufacturing plant without forklifts, or a school
without teachers.
INTRODUCTION OF RESOURCES

• Physical Resources
• They are tangible and easily identified
• Physical resources such as buildings, usually start from acquisition and are then
assembled to be available for use when needed.
• Very often the assembly process entails converting an essentially raw material into
refined form.
INTRODUCTION OF RESOURCES

• -Conceptual resources are non tangible and are considered


valuable for what they represent rather than their physical
counterparts. Example: Money is considered a conceptual resource
as each paper bill represents different monetary value as opposed
to the paper where it is printed.

• -Human resource where everyone can be considered employees


in a company their given skills set, knowledge, and job experience
se them apart from one another, thus identifying the staff,
managers, executives and laborers.
INFORMATION AS RESOURCE
• When defining information, it can be simply stated as “facts provided or learned about
something or someone”. Facts are considered relevant truths which have been validated and
identified. Data are considered facts; therefore, processed data are considered as
information as they are organized in such a way that they have additional value beyond the
value of the facts themselves. Unlike other organizational resources, information is
considered:

• 1.) Expandable- Information can be expanded without compromising its integrity.


• 2.) Compressible-
• 3.)Transportable- Information, especially digital information, is easily transportable. With
the use of internet and various technologies, information can be sent through any following:
1. Send via email;
2. share via Facebook;
3. Copy onto a flash drive;
4. Upload on YouTube
4.) Diffusive- Gossip or rumors tend to spread easily. Unfortunately,
the same applies to any kind of information- be it true or not.
5.) Sharable- Since information can be spread easily, its is
considered sharable as well. Information can be kept calling a secret.
However, once a person decides to tell it to someone, then he or she
will no longer have control over it. Example: The secret recipe of KFC.
It is known that there are 11 secret herbs and spices, but as to what
these herbs and spices are only people can guess.
INFORMATION AS RESOURCE
 Information has no difference if compared to other resources.
Similar to how physical resources are managed, information is
considered valuable and also has a life cycle. It begins with
transforming raw materials into a finished products- processing data
to come up with valuable information.

 Just like physical resources, managing information is just as


important as managing any other resource in the
organization, such as people, money and equipment. Information,
information related activities, technologies, and personnel are also
important organizational resources.
VALUABLE INFORMATION

• How will you able to tell if the information you were able to get is useful or in
this case, valuable for your research?
• Information is said to be valuable if it has the following characteristics (Stair &
Reynolds, 2016):

• 1.) Accurate- Accurate information is error-free. However, how do you


determine which are accurate and which are formal in nature rather than
informal one such as blogs or forums.
FORMAL INFORMATION INFORMAL INFORMATION

It is official and authoritative. It is more casual, less authoritative.

It is meant to be taken seriously and is It is presented in a less formal manner.


presented in a formal manner

It is usually more carefully prepared It is possibly less reliable.


and verified than informal information,
and its accuracy and reliability should
be higher.
 Formal information for your research work could come from
technical websites as well as academic websites.
 Informal information can still be considered accurate, provided they
provide enough reference and information can later be verified from
said reference. Informal information would include those from blogs,
wikis, social sites and public forums. Nowadays use of wikis have
become a norm when it comes to information research, the most
popular is Wikipedia.org- how accurate is the Wikipedia org?
 2.) Complete
 Complete information contains all the important facts. Missing
information could mean possible disaster, or worse, lead to death.
3.) Economical
Information should relatively economical to produce. Decision makers
must always balance the value of information with the cost of producing it.
4.) Reliable- Reliable information can be depended on. In many cases, the
reliability of information depends on the reliability of the data collection
method. In other cases, reliability depends on the source of information.
Which brings us back to valuable information being economical.
E.g. Torrent sites offer pirated software, music and movies for free and its
downside the file you downloaded most likely will contain viruses and
malwares in your computer system.
VALUABLE INFORMATION
• 5.) Flexible
• Flexible information can be used for a variety of purposes. Depending on the situation, your
personal information can be used for a variety of ways.
• E.g. You can use your school ID to enter your school gates. You can also use the
same ID to transact business with the registrar’s office during your enrolment.
You can also use it to open a bank account or apply for a student driver’s permit.
• 6.) Relevant
• Relevant information is important to the decision maker.

• 7.) Simple Information should also be simple, not overly complex.

.
VALUABLE INFORMATION
• 8.) Timely
• Timely information is delivered when it is needed. This is true in the case of weather predictions, stock
market forecasts, and traffic management.
• 9.) Verifiable
• This means that information can be checked for correctness. This would be useful to check for authenticity,
especially for informal information. Most use references, bibliography, or citations for readers to verify the
content.
• 10.) Accessible
• Information should be easily accessible by authorized users to be obtained in the right format at the right
time to meet their needs.
• In Korea, US, UK and China, you can use your mobile phone to pay for day-to day transactions
instead of paying in cash or credit card. A mobile pay app can be downloaded on your
smartphone which can be used to enroll user’s card of debit card as a means for payment
11.) Secure- Information should be secure form access by unauthorized users.

 VALUE OF INFORMATION
-Information is considered valuable
-for business purposes: business depend on it to produce quality products
and services.
-Valuable or useful information is called knowledge.
-Some information has different source of value
FOUR CHARACTERISTICS OF INFORMATION
 1.) Zero marginal cost- age in which we can obtain many goods and services free of charge without
going through markets.
 -a way of doing business where ownership of a core process is surrendered to community
collaboration.
 -According to worldstopmost.com, the most expensive movie made last 2016 was Avengers: Age of
Ultron with total budget of USD 279,000,000. However, buying a DVD copy of the said movie today
would cost only USD 15 in Amazon.com
 2.) Non-Rivalrous
 -public goods
 -Everyone has access to use them
 -consuming information does not exclude someone else from also consuming it making easy to sell
over and over.
3.) Non-Exclusive
-Exclusion is not natural property of information goods, though it is
possible to construct exclusion artificially.
-It is difficult to exclude others from its use.

4.) No transparency
-To evaluate the information, the information must be known, soon has to
in learning it to evaluate.
-A programmer undergoing boot camp training to learn a new
programming language needs to invest time, money, and effort to learn.
INFORMATION ECONOMICS
• In economics, a good is considered an experience good if consumers must
experience it to value it.
• Information, on the other hand, may be treated differently, since it isn’t the
asset that provides value in today’s economy: what has value is the information
about the asset.
• organizations use various strategies to get wary customers to overcome their
reluctance to purchase information before they know what they are getting.
Browsing previews
• As with the movies example above, instead of the entire film being shown,
movie trailers that normally run from 1 to 3 minutes give viewers a
glimpse of what the film is all about. Trailers normally include highlights
from the film which can the audience excited to watch the entire film later
on.
Branding
• Big name products such as Microsoft and Apple have no issues when it
comes to launching new products as people have already established their
trust on these brands. According to US Telco provider, sprint, when Apple
introduced their iPhone7 in September 2016, pre-order sales shot up by
375% compared to the launch of iPhone6.
Reputation
• When a movie is announced, people would often be skeptical if it
would be good enough. However, reputations of directors and its
cast of actors and actresses normally remove this skepticism.
INFORMATION OVERLOAD
• Information is now available so quickly, ubiquitously, and inexpensively. Last March 2016, Cisco
conducted a study that by the end of 2016, global Internet traffic will reach 1.1 Zettabytes per
year, and by 2019, global traffic is expected to hit 2 Zettabytes per year (Cisco, 2017). This is
because information is produced at rapidly-increasing rates due to following reasons:

• Duplication and Transmission of Information is getting easier


A picture that you post on Facebook which is also posted in Instagram
and Twitter means that the same picture has been posted three times
in three different sites.
• Communication methods are multiplying
Nowadays, you can have smartphone that can do both SMS and emails.
Also, a simple text message is no longer restricted to SMS via Telco
providers.
• Archives of Historical Information are exponentially growing
A lot of information which were previously on print or hand copies are
now being replaced by digital copies. These digital copies are being
stored in cloud servers that offer maximum storage capacity for end
users.

According to a study conducted by wearesocial.com, as of January 2017, the


following milestones have occurred:
• More than half the world now uses a smartphones;
• Almost two-thirds of the world’s population now has a mobile phone;
• More than half of the world’s web traffic now comes from mobile phones;
• More than half of all mobile connections around the world are now
‘broadband’;
• More than one in five of the world’s population shopped online in the past
30 days.
According to a study conducted by wearesocial.com, as of January
2017, the following milestones have occurred:

• Compared to the year 2015, 2016 has seen an exponential growth in


terms of digital information.
• The study also highlighted how social media has created a big impact in
Internet usage as social media users for both desktop and mobile
versions have more than doubled compared to 2015.
MOBILE COMMERCE AND MOBILE SOCIAL MEDIA
The abundance of mobile devices has greatly change the way people
manage their day-today activities. Business, for example, used to simply
think that having a shop where customers can easily go to was enough.
This connectivity paved the way to two new scenarios in communication:

• It is the accessing of social media sites, such


Mobile Social Media as Facebook and Snapchat using your mobile
devices.

• M-commerce or mobile commerce was a


M-commerce term used during the 1997 Global Mobile
Commerce Forum by Kevin Duffey.
INDUSTRIAL THAT ARE NEW EMBRACING M-COMMERCE
INCLUDE (LINSKER, 2013):

Financial Services Mobile Ticketing

Banks have introduced online As payment can be done


banking a few years back, online, receipts of
however, nowadays, transactions can also be sent
majority of bank transactions on mobile devices.
such as money transfer, bills
payment and even stock
portfolios and stock
transactions can now be
done using the bank’s mobile
app.
Service/Retail Information Services
• As consumers are given the • This includes the delivery of
ability to place and pay for news, stock quotes, sports
orders using their mobile figures, emergency reports,
devices, the e-commerce weather and traffic updates
trend has shifted from to a single mobile devices.
desktop computers to
mobile devices.
INFORMATION CONTROL

• With so much information going around, how do we make sure they are safe from
illegal activities? A large requirement for information control comes from commerce,
industry and copyright owners in general. Some of it is about keeping secrets inside
a business, and some of it is about selling IPR(Intellectual Property Rights) to
those prepared to purchase it.

• Information control is about allowing those who have appropriate authority


access to and used of information on the basis of the authority that they hold.
SOFTWARE PIRACY
Let’s say you wanted to watch the movie showing in the cinemas.
However, you decided to save the money instead, so you bought a
pirated DVD copy of the film in one of the market places you
passed by on your way home.

Examples of software piracy as stated by www.bsa.org include (Internet


Software Piracy, 2017):
• Disturbing software or mobile apps from the Internet in a manner that
violates the license terms.
• Buying single copy of a software program and installing it without
authorization on multiple devices.
• Making and/or sharing copies of installation.
• Sharing the Login credentials (without authorization) used to access a
web-based software application (“Software as a Service”)
• This type scenario boils down to the fact that information is hard to control. While
measures are in place, such as DVD region codes and such, Adam Thierer in 2011,
identified four issues which further complicates the problem on information control:
(1) Convergence, (2) Scale, (3) Volume, and (4) Unprecedented individual
empowerment/user-generator of content. (Thiere, 2011)

1.) Convergence
• It is the integration of two or more different technologies in a single device or system.
Technology advancements and social media have paved the way for media content such as
music and movies to be distributed from its “traditional distribution platforms.”
2.) Scale
• For those who like to watch Japanese anime and Korean dramas, English subtitles are
must. Before, fans would days or weeks before the subtitles would be available for viewing.
This is because are actually translated, edited and embedded by fans of the show, most of
whom are not professionals. Majority of them are compromised by student and young
adults who simply like watching the series.
3.) Volume
• Nowadays, news and media outlets abound in print and outline.
News agencies such as Manila Bulletin or the Philippine Star not only
have prints copies of their news (i.e. newspaper but also have digital
copies which can be accessed through their websites mb.com.ph
and www.philstar.com, respectively.
4.) Unprecedented individual empowerment
• The popularity of social media such as Facebook, Twitter, and
Instagram has made it possible for individuals to post anything they
want. This also includes creation of blogs which have become a
mainstream media for individuals to showcase their talents, skills
and hobbies. This create issues when comes to content restriction as
most are doing this using their private accounts. Unless reported,
said content will be difficult to control.
INTELLECTUAL PROPERTY
• Intellectual property (IP) is a number of distinct types of intangible assets for
which a set of exclusive right are recognized.
• It can also include words, phrases, symbols, and design.
INTELLECTUAL PROPERTY
• IP refers to any creation or product of the human mind and may expressed in the form of the
original ideas, expression and process.
• INTELELCTUAL PROPERTY RIGHTS – are the rights given to persons over their
creations for a certain period of time. IPR consists of the following:
1. COPYRIGHT AND RELATED RIGHTS
2. TRADEMARK AND SERVICE MARKS
3. GEOGRAPHIC INDICATOR
4. INDUSTRIAL DESIGN
5. PATENTS
6. LAYOUT DESIGNS OF INTEGRATED CIRCUITS
7. PROTECTION OF UNDISCLOSED INFORMATION
INTELLECTUAL PROPERTY
• The intellectual Property Office of the Philippines (IP PHILIPPINES) is the
government agency in charge with the implementation of the law protecting
intellectual property rights in Property Code of the Philippines as provided
for under RA 8293, or the intellectual Property Code of the Philippines and
the revised intellectual Property Code of the Philippines known as RA 10372.
COPYRIGHT AND RELATED RIGHTS

• Copyright is a set of exclusive rights granted by a state to the creator of an


original work of their assignee for a limited period of time in exchange for
public disclosure of the work and includes the right to copy, distribute and
adapt the work.
• Digital right- is the permission of the individual legitimately to perform
actions involving the use of a computer or any electronic device, or a
communication network.
COPYRIGHT AND RELATED RIGHTS

• Copy right provides protection for original expression which includes


literary, artistic, scholarly and scientific creations such as books, articles,
newspaper, lectures, letters, music, compositions, and paintings. It is also
extends to derivative works such as illustration, maps photographic works,
advertisement, computer programs, etc.
DIGITAL RIGHTS MANAGEMENT

• Digital rights management (DRM) is used to describe the ocesses by which


the author or publisher of a work exerts his rights. Control what the
purchaser of his work is entitled to do.
• This represents the controls by which you can prevent someone from copying
or printing or editing or otherwise making available privileged information to
other people. With the introduction of technology and the Internet, the print
age is slowly becoming obsolote with publishers shifting to the digital age.
TECHNIQUES DESIGNED TO CONTROL
ACCESS AND REPRODUCTION OF ONLINE
FORMATION
• ENCRYPTION
• is the process of converting data or information in such a way that only authorized
parties can understand it. its primary purposes to protect the confidentiality of digital
data stored on computer system or transmitted via Internet or other computer networks.
• Encryption occurs every time someone uses an ATM or buys something online with a
smartphone, makes a mobile phone call or presses a key fob to unlock a car.
• This is done so that information being sent is kept safe and secure.
TECHNIQUES DESIGNED TO CONTROL
ACCESS AND REPRODUCTION OF ONLINE
FORMATION
• SERIAL KEYS
• Also known as a product key or a software key, is a series of alphanumeric characters
which acts a key to denote that the product or software is original. In some cases,
product keys are need for product activation.
• One such exampie is Microsoft Windows OS. A product key is used to activate the
operating system online. Online activation helps maintaigaltware authenticity by
making sure no one else has used the same product key
TECHNIQUES DESIGNED TO CONTROL
ACCESS AND REPRODUCTION OF ONLINE
FORMATION
• SCRAMBLING
• Data scrambling is done to hide sensitive information from unauthorized users.
Scrambling is accomplished by the addiction of components to the originals signal or
the changing of some important component of the original signal in order to make
extraction of the original signal difficult . It often is done with the aid of encryption.
TECHNIQUES DESIGNED TO CONTROL
ACCESS AND REPRODUCTION OF ONLINE
FORMATION
• TAG EMBEDDING
• Similar to how pictures can include watermarks to denote information on the owner of
the picture, tag embedding does The same to information content.
• Watermarks are not complete DRM mechanisms in their own right, but are used as gparr
of - system for copyright enforcement, such as helping provide Prosecution evidence for
legal purposes, rather than direct technological restriction.
PATENT

• A patent is a set of exclusive rights granted by a state inventor for a limited


period of time in exchange for the public disclosure of an invention. The
exclusive right granted to a pate in most countries is the right o prevent
others from many using, selling, or distribution the patented inversion
without permission.
• ONE EXAMPLE OF PATENTED DESIGN IS THAT OF APPLE’S iPod
TRADEMARK

• Is a distinctive sign used by an individual, business, organization, or other


entity to identify that the products or services to consumers with which the
mark appears comes from a (service mark) from the others.
PROTECTION OF UNDISCLOSED
INFORMATION

• Industries and companies need to have information control specially dealing


with sensitive industry secrets. To protect these industry secrets, also called
trade secrets, companies usually pure employees to sign contracts with non-
disclosure agreements (NDAS).
• Trade secret is the term used for any method, formula, devices, process, or
any information that gives the business a unique competitive advantage over
its competition.
Terms of protection Penalty
Copyright Generally life of author plus 50 1st offense: PHP 50,000 to
years after his death. 150,000 and/or 1-3 years
imprisonment
2nd offense: PHP 150,000 to
500,000 and/or 3-6 years
imprisonment
3rd and subsequent offense: PHP
500,000 to 1.5M and/ or 6.9 years
imprisonment
Patent 20 years (time bound) Not less than PHP 100.000 to no
more than 300,000 and/or not
less than 6 months to not more
than 3 years imprisonment
Trademark 10 years from the date of filing of PHP 50,000 to 200,000 and 2 to 5
application years imprisonment
INFORMATION PRIVACY
• The natural state of data is to be copied, logged, transmitted stored, and stored again. Which is
why it takes constant lighting g vigilance to prevent that breach. So what is information
privacy an how private is private.
• We learned from the previous chapter what an IP address Knowing a person's IP address can
help identify that person's physical location anywhere in the world. A cookie is a small file that
is stored in your computer's directory, often a temporary folder. The cookie would contain
addresses of web sites you have visited login credentials, and even credit card account
numbers. This is some so that the next time you visit the website, the computer system would
not be reloading the same content or data, saving processing power for the computer. But
obviously dangerous, especially if you would be using public computers, such as those in
Internet shops, as the next person will be able to access your account without you knowing.
INFORMATION PRIVACY

• This is the reason why it is important to transact only will trusted sites and to
avoid doing private transactions, such as online payments, on public
computers. It is also important to e logout of your online accounts, such as
emails, after using is, be on a private computer or otherwise Also avoid
unknown sites and applications which require you to enter personal
credentials like Facebook accounts or passwords. This could be means for
acquiring your personal information for marketing use, or worse, identity
phishing.
WHAT IS DATA PRIVACY ACT 10173?

• RA 10173, or the Data Privacy Act, protects individuals from unauthorized


processing of personal information that is (1) private, not publicly available;
and (2) identifiable, where the identity of the individual is apparent either
through direct attribution or when put together with other available
information.
WHAT DOES THIS ENTAIL?
• First, all personal information must be collected for reasons that are specified, legitimate, and reasonable.
In other words, customers must opt in for their data to be used for specific reasons that are transparent
and legal.
• Second, personal information must be handled properly. Information must be kept accurate and relevant,
used only for the stated purposes, and retained only for as long as reasonably needed. Customers must be
active in ensuring that other, unauthorized parties do not have access to their customers’ information.
• Third, personal information must be discarded in a way that does not make it visible and accessible to
unauthorized third parties.
• Unauthorized processing, negligent handling, or improper disposal of personal information is punishable
with up to six (6) years in prison or up to five million pesos (PHP 5,000,000) depending on the nature
and degree of the violation.
DATA PRIVACY ACT 10173
• Otherwise known as the Data Privacy Act is a law that seeks to protect all
forms of information, be it private, personal, or sensitive. It is meant to cover
both natural and juridical persons involved in the processing of personal
information.
• In 2012, the Philippines passed Republic Act No. 10173 or the Data Privacy Act
of 2012 (DPA) “to protect the fundamental human right to privacy of
communication while ensuring free flow of information to promote innovation
and growth [and] the [State’s] inherent obligation to ensure that personal
information in information and communications systems in government and in
the private sector are secured and protected”. 
DATA PRIVACY ACT 10173
• The DPA and its Implementing Rules and Regulations (IRR) apply to all acts
done or practices engaged in and outside of the Philippines if:
• If the person, either an individual or an institution, involved in the processing of personal
data is located in the Philippines;
• The act or practice involves personal data of a Philippine citizen or Philippine resident;
• The processing of personal data is done in the Philippines; or
• The act, practice or processing of personal data is done by an entity with links to the
Philippines, subject to international law and comity.
• “Personal data” refers to all types of personal information.
DATA PRIVACY ACT 10173

• “Processing” is any operation/s performed upon personal data. These


operations include, but are not limited to the collection, recording,
organization, storage, updating or modification, retrieval, consultation,
use, consolidation, blocking, erasure, or destruction of data.

You might also like