You are on page 1of 21

"From Paper to Pixels:

Embracing the Information


Age Revolution"
Science Technology and the Society
Ervill N. Villegas RN
The Evolution of
Information
• Information has been a vital part of human existence since
the beginning of time. From cave paintings to
hieroglyphics, we have always found ways to communicate
and share knowledge with one another.
• As civilizations advanced, so did our methods of storing
and sharing information. The invention of the printing
press in the 15th century revolutionized the way we
disseminated ideas and knowledge. Books became more
widely available, leading to increased literacy rates and
the spread of new ideas.
• With the advent of the digital age, the evolution of
information has accelerated at an unprecedented rate.
The internet has made it possible for people around the
world to connect and share information instantaneously.
Social media platforms have given individuals the power
to broadcast their ideas and opinions to a global audience.
• As we continue to embrace the information age, it is
important to reflect on how far we have come and the
potential impact that future advancements may have on
our society.
From Paper to Pixels
• The transition from paper to pixels has
revolutionized the way we access and share
information. In the past, we relied on
physical books, newspapers, and magazines
for our information needs. However, with the
advent of digital technology, we can now
access a wealth of information at our
fingertips through various devices such as
computers, smartphones, and tablets.
• This shift has also changed the way we
consume information. We no longer have to
wait for a weekly or monthly magazine to
arrive in our mailbox or go to a library to
borrow a book. Instead, we can instantly
download an e-book or read an online
article. This has made it easier for us to stay
informed and up-to-date on current events
and trends.
The Benefits of Embracing
the Information Age
Revolution
• Embracing the information age revolution can lead to
increased efficiency in all aspects of life. With the
ability to store and access vast amounts of data, tasks
that once took hours or even days can now be
completed in a matter of minutes. For example,
businesses can use data analytics to quickly identify
patterns and make informed decisions, while
individuals can easily search for and find information
on any topic.
• Accessibility is another major advantage of the
information age. With the rise of mobile devices and
cloud computing, people can now access information
from anywhere at any time. This has led to a more
connected world where communication and
collaboration are easier than ever before. In fact,
remote work has become increasingly popular,
allowing individuals to work from anywhere in the
world as long as they have an internet connection.
The Challenges of
Embracing the Information
Age Revolution
• As we transition into a digital world, there are
potential challenges that we must address.
One of the biggest concerns is security. With
more information being stored and shared
online, there is a higher risk of cyber attacks
and data breaches. It is important to invest in
strong cybersecurity measures to protect
sensitive information.
• Another challenge is the digital divide, which
refers to the gap between those who have
access to technology and those who do not.
This can lead to unequal opportunities and
hinder progress. To combat this issue, we must
work towards providing equal access to
technology and digital resources.
15th century:

• 1440: Johannes Gutenberg invents the


printing press, enabling mass production
of books and the dissemination of
information.
• The Gutenberg Bible was the earliest
major book printed using mass-
produced movable metal type in
Europe.
16th century:

• 1501: The first printer's guild is


established in Venice, Italy. 1557: The
first newspaper, "Relation," is published
in Strasbourg, Germany.
• 1588: The British navy's efficient use of
semaphore signaling during the Spanish
Armada sets the stage for future
developments in long-distance
communication.
17th century:
• 1653: The first regular
postal service, known as
the Penny Post, is
established in London,
England.
18th century:

• 1792: Claude Chappe invents the


optical telegraph, a system of
visual signals using a series of
towers with movable arms. It
becomes the precursor to long-
distance communication methods.
19th century:
• 1837: Samuel Morse and Alfred Vail develop the
electric telegraph, revolutionizing long-distance
communication by transmitting messages over
wires using Morse code.
• 1844: The first public telegram is sent in the United
States, containing the message "What hath God
wrought?" from Washington, D.C. to Baltimore.
• 1866: The first successful transatlantic telegraph
cable is completed, enabling near-instant
communication between Europe and North
America.
• 1876: Alexander Graham Bell invents the
telephone, allowing for voice communication over
long distances.
• 1895: Guglielmo Marconi develops wireless
telegraphy, leading to the invention of radio and the
transmission of signals without the need for wires.
20th century
• 1920s: Radio broadcasting gains popularity, bringing news, entertainment, and information to a wide
audience.
• 1936: The BBC launches the world's first regular high-definition television service in the United Kingdom.
• 1947: The transistor is invented, marking a significant advancement in electronic communications and
paving the way for smaller and more efficient devices.
• 1962: The first commercial communications satellite, Telstar, is launched, enabling global television and
telephone transmissions.
• 1971: The first email is sent by Ray Tomlinson, establishing a new era of digital communication.
• 1973: The first mobile phone call is made by Martin Cooper of Motorola.
• 1983: The Internet Protocol Suite (TCP/IP) is introduced, forming the foundation of the modern internet.
• 1989: Tim Berners-Lee develops the World Wide Web, making it easier to navigate and share information
online.
• 1992: The first text message (SMS) is sent over a cellular network.
21st century
• 2004: Mark Zuckerberg launches Facebook,
which becomes one of the most influential social
networking platforms.
• 2007: Apple releases the iPhone, revolutionizing
mobile communication and paving the way for
smartphones.
• 2010: Instagram and WhatsApp are launched,
expanding social media and messaging
capabilities.
• 2013: Snapchat introduces ephemeral messaging,
popularizing the concept of disappearing content.
• 2016: The first 5G network is deployed, offering
faster and more reliable wireless communication.
• 2020: The COVID-19 pandemic accelerates the
adoption of remote communication technologies
such as video conferencing and online
collaboration tools.
Republic Act No. 4200, also known as the
Anti-Wiretapping Act
• Key points and provisions of Republic Act No. 4200:
1. Prohibition: The law prohibits any person, not being authorized by all the parties to any private
communication, from secretly intercepting, recording, or disclosing the contents of such
communication through the use of a device, instrument, or equipment.
2. Consent: It is essential to obtain the consent of all parties involved in the communication for it to
be lawful to intercept, record, or disclose the contents of the conversation. All parties must be
aware and agree to the interception or recording.
3. Exceptions: There are certain exceptions where wiretapping is allowed under specific
circumstances. These exceptions include obtaining a court order from a judge authorizing the
interception, recording, or disclosure of communications for lawful purposes such as national
security, investigation of certain crimes, or protection of public safety.
4. Penalties: Violators of the Anti-Wiretapping Act may face imprisonment and/or fines. The severity
of the penalties varies depending on the nature and extent of the offense.
Republic Act No. 9995, also known as the
Anti-Photo and Video Voyeurism Act of 2009
• Key provisions of Republic Act No. 9995:
1. Prohibition: The law prohibits the capturing or recording, by any means, of any form of photo,
video, or similar visual recording of a person or persons who are engaged in a private act or
intimate activity without their consent, even if the act is done in a private place.
2. Distribution and Publishing: It is also unlawful to show, exhibit, or publish through any medium,
without the consent of the individuals involved, the photo, video, or similar visual recording
obtained in violation of the law.
3. Punishments and Penalties: Violators of the Anti-Photo and Video Voyeurism Act may face
imprisonment and/or fines. The severity of the penalties varies depending on the circumstances of
the offense.
4. Consent and Safeguards: The law emphasizes the importance of obtaining the explicit consent of
the individuals involved in any recording or dissemination of intimate visual materials. It also
highlights the need to protect the rights and privacy of individuals.
Republic Act No. 10173, also known as the
Data Privacy Act of 2012
• key provisions of Republic Act No. 10173:
1. Scope and Definitions: The law covers personal data processing by both government and private entities. It defines
various terms related to data privacy, including personal information, sensitive personal information, data subject,
and data processing.
2. Data Privacy Principles: The law establishes the principles of transparency, legitimate purpose, and proportionality
in the collection and processing of personal data. It emphasizes the need for data subjects to be informed about the
purpose, extent, and duration of data processing and their rights in relation to their personal information.
3. Data Subject Rights: The law grants various rights to data subjects, including the right to be informed, right to
access, right to object, right to erasure or blocking, right to damages, and right to data portability. Data subjects
have the right to exercise control over their personal data and to be protected from unauthorized or unlawful
processing.
4. Data Protection Officers: Organizations that process personal data are required to designate a Data Protection
Officer (DPO) responsible for ensuring compliance with the law. The DPO serves as a point of contact for data
subjects and the National Privacy Commission (NPC), the governing body responsible for enforcing the Data
Privacy Act.
Republic Act No. 10173, also known as the
Data Privacy Act of 2012
1.Security Measures and Breach Notification: Organizations are required to
implement reasonable and appropriate security measures to protect personal data
against unauthorized access, alteration, disclosure, or destruction. In case of a data
breach that poses a risk to data subjects, organizations must notify the NPC and
affected individuals.
2.Cross-Border Data Transfers: The law imposes restrictions on the transfer of
personal data outside the Philippines, requiring organizations to ensure that the
receiving country has adequate data protection standards or obtain the consent of
data subjects.
3.Penalties: Violations of the Data Privacy Act may result in administrative
sanctions, fines, and imprisonment, depending on the nature and severity of the
offense.
Republic Act No. 10175, also known as
the Cybercrime Prevention Act of 2012
Key provisions of Republic Act No. 10175:
1. Cybercrime Offenses: The law identifies several cybercrime offenses, including illegal access, illegal
interception, data interference, system interference, misuse of devices, cyber-squatting, computer-
related forgery, cybersex, child pornography, and other offenses related to the misuse of computer
systems and the internet.
2. Investigation and Enforcement: The law authorizes law enforcement agencies to investigate
cybercrime offenses and provides them with powers to conduct searches, seizures, and monitoring
of computer data. It also establishes the Cybercrime Investigation and Coordinating Center (CICC)
to coordinate and assist in the investigation and prosecution of cybercrimes.
3. Cybersecurity Measures: The law encourages the development and implementation of
cybersecurity measures to protect computer systems, networks, and data from cyber threats. It
promotes cooperation between government agencies, private entities, and the international
community to strengthen cybersecurity efforts.
4. Penalties: Republic Act No. 10175 prescribes penalties for various cybercrime offenses. The
severity of the penalties depends on the specific offense committed. Penalties may include
imprisonment, fines, or both, with higher penalties for offenses involving national security or
critical infrastructure.
5. Cyber Libel Provision: One notable provision of the law is the inclusion of online libel as a criminal
offense. It considers the malicious publication of defamatory statements through computer
systems or the internet as a form of libel, subject to existing libel laws in the Philippines.
6. Cooperation with International Authorities: The law allows for cooperation and coordination with
foreign governments and international organizations in the investigation and prosecution of
cybercrime offenses.
Republic Act No. 9472,
also known as the Anti-
Bullying Act of 2013
Key provisions of Republic Act No. 9472:
1. Definition of Bullying: The law defines bullying as any severe or
repeated use by one or more students of a written, verbal, or
electronic expression or a physical act or gesture, or any
combination thereof, directed at another student. It includes acts
that cause physical, emotional, or psychological harm, create a
hostile environment, or infringe upon the rights of the other
student.
2. Responsibilities of Schools: The law mandates educational
institutions, both public and private, to adopt policies and
procedures to prevent and address bullying. Schools are required
to establish mechanisms for reporting, investigating, and
resolving bullying incidents. They must also conduct awareness
programs, training, and interventions to promote a safe and
inclusive learning environment.
3. Role of the Department of Education (DepEd): The Department of
Education is tasked with developing and implementing policies,
programs, and guidelines on preventing and addressing bullying
in schools. The DepEd is responsible for monitoring compliance
with the law and providing assistance to schools in dealing with
bullying cases.
Republic Act No. 9472,
also known as the Anti-
Bullying Act of 2013
1. Confidentiality and Privacy: The law emphasizes
the importance of protecting the privacy and
confidentiality of individuals involved in bullying
incidents. Reports, investigations, and interventions
should be conducted with due regard to the privacy
rights of both the victim and the perpetrator.
2. Reporting and Investigation: The law requires
schools to establish channels for reporting bullying
incidents, including anonymous reporting
mechanisms. It also mandates prompt and thorough
investigations of reported incidents, ensuring the
involvement of all parties concerned.
3. Disciplinary Actions and Support Services: Schools
are required to impose appropriate disciplinary
measures on students who commit bullying acts.
The law also emphasizes the provision of support
services, counseling, and interventions to both the
victim and the perpetrator.
Executive Order No. 2, s. 2016
Operationalizing in the Executive Branch the People's Constitutional Right to Information
and the State Policies of Full Public Disclosure and Transparency in the Public Service and
Providing Guidelines Therefor.
• key provisions of Executive Order No. 2, s. 2016 include:
1.Scope and Coverage: The order applies to all government offices and agencies within the
executive branch of the Philippine government. It emphasizes that the right to information
is a constitutional right of the people.
2.Operationalizing the Right to Information: The order directs government offices and
agencies to ensure the people's right to information by adopting and implementing
procedures and practices that promote transparency and accountability. It encourages the
use of electronic platforms and technology to facilitate access to information.
Executive Order No. 2, s. 2016
3. Disclosure of Information: The order mandates the proactive disclosure of information by government
offices and agencies. It requires the posting of certain categories of information on official websites, such
as budget and financial transactions, bids and contracts, statement of assets, liabilities, and net worth of
public officials, among others.
4. Access to Information: The order establishes procedures for accessing information upon request. It
provides guidelines for processing and responding to requests for information, including the timeline for
response and the grounds for denial of access.
5. People's Freedom of Information Manual: The order requires each government office and agency to
prepare and publish a People's Freedom of Information Manual. This manual serves as a guide for both
government officials and the public in exercising and implementing the right to information.
6. Training and Capacity Building: The order emphasizes the need for training and capacity building
programs to enhance the understanding and implementation of the right to information. It encourages
government offices and agencies to conduct training activities and provide necessary resources for their
personnel.

You might also like