You are on page 1of 24

VIRTUAL ETHICS:

THE DATA PRIVACY ACT


It is an act protecting individual personal
information in information and
communications systems in the government
and the private sector, creating for this purpose
a national privacy commission, and for other
purposes
A. RA 10172
B. RA 10173
C. RA 10175
D. RA 10174
A trail of data you create while
using the Internet.
A. Digital Footprint
B. Digital Fingerprint
C. Cyber footprint
D. Digital Print
In DPA, it is an individual whose
personal information are collected,
stored and processed

A. PIC
B. PIP
C. Citizen
D. Data Subject
BIRTHDATE is a sensitive personal
information.

A. True
B. False
AGE is a sensitive personal
information.

A. True
B. False
It is the illegal use of someone else's
personal information, especially in
order to obtain money or credit
A. Phishing
B. Identity Theft
C. Libel
D. None of the above
The processing of information
shall be adequate, relevant,
suitable, necessary, and not
excessive.
A. Proportionality
B. Quality data
C. Transparency
D. Legitimate Purpose
Any information and communication relating
to the processing of personal data should be
easy to access and understand, using clear and
plain language.

A. Proportionality
B. Quality data
C. Transparency
D. Legitimate Purpose
The processing of information shall be compatible
with a declared and specified purpose which must
not be contrary to law, morals, or public policy.

A. Proportionality
B. Quality data
C. Transparency
D. Legitimate Purpose
It is a form of phishing that uses
mobile phones as the attack
platform.
A. Whaling
B. Smishing
C. Pharming
A cyber attack wherein cybercriminals
disguise themselves as members of a senior
management team.

A. Whaling
B. Smishing
C. Pharming
D. Ransomware
SSS and PhilHealth Numbers are
examples of sensitive personal
information

A. TRUE
B. FALSE
It is when a hacker locks your computer
down and threatens to wipe out your
data if you don’t pay up.
A. Whaling
B. Smishing
C. Pharming
D. Ransomware
It is a cyberattack intended to
redirect a website's traffic to
another, fake site.
A. Whaling
B. Smishing
C. Pharming
D. Ransomware
It is the process of protecting
data and preventing data loss
through unauthorized access.
A. Data Privacy
B. Data Quality
C. Data Security
D. None of the above
It is a malware tactic that manipulates users
into believing they need to download or buy
malicious, sometimes useless, software.

A. Scareware
B. Virus
C. Hardware
D. Ransomware
It is the government agency tasked to
implement and enforce data privacy
protection in the Philippines.

A. CHED
B. PNP
C. NPC
D. DICT
It refers to a person or organization who
controls the collection, holding, processing
or use of personal information.
A. Personal information controller
B. Data protection Officer
C. Data Subject
D. NPC
How many rights of the data subject under
the data privacy act of 2012?

A. 10
B. 9
C. 8
D. 7
It impossible to have privacy
without security

A.TRUE
B. FALSE
It refers to any and all forms of data which
under the Rules of Court and other
pertinent laws constitute privileged
communication.
A. Personal Information
B. Sensitive Personal Information
C. Privileged Information
D. none of the above
GIVE 5 EXAMPLES OF
SENSITIVE PERSONAL
INFORMATION
GIVE ATLEAST 3 RIGHTS
OF THE DATA SUBJECT
UNDER THE DPA OF 2012

You might also like