SlideShare ist ein Scribd-Unternehmen logo
1 von 46
Privacy & Freedom
of Expression
Prepared by: Mark Jhon C. Oxillo
PRIVACY
THE RIGHT TO PRIVACY
• The right to be left alone – the
most comprehensive of rights,
and the right most valued by a
free people
INFORMATION PRIVACY
• First coined Roger Clarke,
director of Australian
Privacy Foundation
• Is the combination of
communications privacy and
data privacy
COMMUNICATIONS PRIVACY
• the ability to communicate with
others without those
communications being monitored
by other persons or organization
DATA PRIVACY
• the ability to limit access one’s
personal data by other individuals
and organizations in order to
exercise a substantial degree of
control over that data and its use
Republic Act 10173
• Or the Data Privacy Act of 2012 (PH)
• is a law that seeks to protect all forms of
information, be it private, personal, or
sensitive. It is meant to cover both
natural and juridical persons involved in
the processing of personal information.
Republic Act 10173
• This comprehensive privacy law
also established a National
Privacy Commission that
enforces and oversees it and is
endowed with rulemaking power.
Republic Act 10173
OPT OUT POLICY
• To refuse to give an
institution the right to
collect and share
personal data
OPT IN POLICY
• To give an institution
the right to collect and
share personal data
KEY PRIVACY AND
ANONYMITY ISSUES
IDENTITY THEFT
• Occurs when someone steals key
pieces of personal information to
impersonate a person. This
information may include data such
as name, address, date of birth, SSS
number, passport number, driver’s
license number, etc.
VISHING
• is the telephone equivalent of
phishing. It is described as the act of
using the telephone in an attempt
to scam the user into surrendering
private information that will be used
for identity theft.
ELECTRONIC DISCOVERY
• Is the collection, preparation,
review and production of
electronically stored information
for use in criminal and civil
actions and proceedings
• Includes any form of digital
information such as emails,
drawings, graphs, web pages,
photographs, word-processing
files, sound recording and
databases
CONSUMER PROFILING
• Collecting personal information
about internet users when they
register at websites, complete
survey, fill out forms or enter
contests online
CLICK-STREAM DATA
• Information gathered
by monitoring a
consumer’s online
activity
BEACONS
• Are small pieces of software
that run on a web page and are
able to track what a viewer is
doing on the page, such as
what is being typed or where
the mouse is moving
PERSONALIZATION
SOFTWARE
• Used to optimize the
number, frequency, and
mixture of their ad
placement and to evaluate
how visitors react to new ads
MEASURES TO IMPROVE
THE PROTECTION OF
CONSUMER PRIVACY:
• Implementing a “Do Not Track”
option for web browsing
software that would keep online
services from collecting surfing
or ad-targeting data
MEASURES TO IMPROVE
THE PROTECTION OF
CONSUMER PRIVACY:
• Requiring that companies collect
only the data they need and
then delete it after it has met its
purpose
MEASURES TO IMPROVE
THE PROTECTION OF
CONSUMER PRIVACY:
• Requiring that online companies
simplify their privacy policies so
that consumers can read and
understand them
CHIEF PRIVACY OFFICER
(CPO):
• a senior manager within an
organization whose role is to ensure
that the organization does not
violate government regulations
while reassuring customers that
their privacy will be protected
FREEDOM OF
EXPRESSION
FREEDOM OF EXPRESSION
• The right to freedom of
expression is one of the most
important rights for free
people everywhere.
FREEDOM OF EXPRESSION
• Right to express one's ideas and
opinions freely through speech,
writing, and other forms of
communication but without
deliberately causing harm to others'
character and/or reputation by false
or misleading statements.
TYPES OF SPEECHES
• OBSCENE SPEECH
• DEFAMATION
• PERJURY
• FRAUD
• INCITEMENT OF
PANIC
• INCITEMENT TO
CRIME
• “FIGHTING
WORDS”
• HATE SPEECH
• SEDITION
OBSCENE SPEECH
• Appeals to “prurient interest”
(causes lust)
• “Obviously offensive” description
of defined sexual conduct
• No serious literary, artistic,
political, or scientific value
DEFAMATION
• Oral or written statement of
alleged fact that is false and
harms another person
* Slander - oral defamatory
statement
* Libel - written defamatory
statement
PERJURY
• is the intentional act of
swearing a false oath or
falsifying an affirmation to tell
the truth, whether spoken or in
writing, concerning matters
material to an official
proceeding.
FRAUD
• is intentional deception
to secure unfair or
unlawful gain, or to
deprive a victim of a legal
right.
INCITEMENT OF PANIC
• is when a person causes
the evacuation of any
public place, or otherwise
cause serious public
inconvenience or alarm
INCITEMENT TO CRIME
• is the encouragement
of another person to
commit a crime
FIGHTING WORDS
• are written or spoken words
intended to incite hatred or
violence from their target
• are words indicating a
willingness to fight or
challenge someone
HATE SPEECH
• abusive or threatening
speech or writing that
expresses prejudice against a
particular group, especially
on the basis of race, religion,
or sexual orientation.
SEDITION
• a conduct or speech
inciting people to rebel
against the authority of
a state or monarch
Article III (Bill of Rights)
• Section 4. No law shall be passed
abridging the freedom of speech, of
expression, or of the press, or the right
of the people peaceably to assemble
and petition the government for redress
of grievances.
FOE: KEY ISSUES
• Controlling access to information on
the Internet
• Anonymity on the Internet
• Defamation and hate speech
• Corporate blogging
• Pornography
FOE: KEY ISSUES
Controlling access to information on
the Internet:
• Internet Filter – a software that can
be used to block access to certain
websites that contain material
deemed inappropriate or offensive
FOE: KEY ISSUES
Anonymity on the Internet
• Anonymous Expression – the
expression of opinions by people
who do not reveal their identity
FOE: KEY ISSUES
Defamation and Hate Speech
• Ex: A threatening private message
sent over the internet to a person,
and a libel directed at a particular
person can be punishable by law.
FOE: KEY ISSUES
Corporate Blogging
• is the practice of allowing
employees to create their own
personal blogs relating to their
employment
FOE: KEY ISSUES
Pornography
• often colloquially referred to as porn,
is any material — whether written,
visual, or others — that consists of
sexually explicit material and that is
intended to sexually arouse.
FOE: KEY ISSUES
Sexting
• sending sexual messages, nudes
or seminude photos or sexually
explicit videos over a cellphone
END

Weitere ähnliche Inhalte

Was ist angesagt?

Internet and World Wide Web
Internet and World Wide WebInternet and World Wide Web
Internet and World Wide WebSamudin Kassan
 
The History Of The Internet Presentation
The  History Of The  Internet  PresentationThe  History Of The  Internet  Presentation
The History Of The Internet Presentationdgieseler1
 
History of the internet
History of the internetHistory of the internet
History of the internetAmal Jith
 
Digital Divide Introduction
Digital Divide IntroductionDigital Divide Introduction
Digital Divide IntroductionJulie Lindsay
 
Basics of Networks ,Advantages and Disadvantages
Basics of  Networks ,Advantages and DisadvantagesBasics of  Networks ,Advantages and Disadvantages
Basics of Networks ,Advantages and Disadvantagessabari Giri
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speechUc Man
 
The Internet: All about the Internet
The Internet: All about the InternetThe Internet: All about the Internet
The Internet: All about the InternetSweetLynStockwell
 
Chapter 2 The Internet & World Wide Web
Chapter 2 The Internet & World Wide WebChapter 2 The Internet & World Wide Web
Chapter 2 The Internet & World Wide WebPatty Ramsey
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on societyAMOSOGAGAH
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal informationUc Man
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamationTuhin Batra
 
Impact Of Ict In Society
Impact Of Ict In SocietyImpact Of Ict In Society
Impact Of Ict In Societykerjait
 
Copyright issues in cyberspace
Copyright issues in cyberspaceCopyright issues in cyberspace
Copyright issues in cyberspaceatuljaybhaye
 
SERVICES ON THE INTERNET
SERVICES ON THE INTERNETSERVICES ON THE INTERNET
SERVICES ON THE INTERNETRiya Gupta
 
History of the internet
History of the internetHistory of the internet
History of the internetpptsaresilly
 

Was ist angesagt? (20)

Internet and World Wide Web
Internet and World Wide WebInternet and World Wide Web
Internet and World Wide Web
 
The History Of The Internet Presentation
The  History Of The  Internet  PresentationThe  History Of The  Internet  Presentation
The History Of The Internet Presentation
 
History of the internet
History of the internetHistory of the internet
History of the internet
 
Online defamation
Online defamationOnline defamation
Online defamation
 
Digital Divide Introduction
Digital Divide IntroductionDigital Divide Introduction
Digital Divide Introduction
 
Basics of Networks ,Advantages and Disadvantages
Basics of  Networks ,Advantages and DisadvantagesBasics of  Networks ,Advantages and Disadvantages
Basics of Networks ,Advantages and Disadvantages
 
Internet
InternetInternet
Internet
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
The Internet: All about the Internet
The Internet: All about the InternetThe Internet: All about the Internet
The Internet: All about the Internet
 
Chapter 2 The Internet & World Wide Web
Chapter 2 The Internet & World Wide WebChapter 2 The Internet & World Wide Web
Chapter 2 The Internet & World Wide Web
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
The Digital Divide
The Digital DivideThe Digital Divide
The Digital Divide
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
Impact Of Ict In Society
Impact Of Ict In SocietyImpact Of Ict In Society
Impact Of Ict In Society
 
Copyright issues in cyberspace
Copyright issues in cyberspaceCopyright issues in cyberspace
Copyright issues in cyberspace
 
Internet Presentation
Internet PresentationInternet Presentation
Internet Presentation
 
SERVICES ON THE INTERNET
SERVICES ON THE INTERNETSERVICES ON THE INTERNET
SERVICES ON THE INTERNET
 
History of the internet
History of the internetHistory of the internet
History of the internet
 

Ähnlich wie Privacy and Freedom of Expression

Mass Media and Society Chapter 15: Media and Government
Mass Media and Society Chapter 15: Media and GovernmentMass Media and Society Chapter 15: Media and Government
Mass Media and Society Chapter 15: Media and Governmentczavisca
 
Free Speech and Hate Speech: Regulatory Challenge of Internet Freedom in Nigeria
Free Speech and Hate Speech: Regulatory Challenge of Internet Freedom in NigeriaFree Speech and Hate Speech: Regulatory Challenge of Internet Freedom in Nigeria
Free Speech and Hate Speech: Regulatory Challenge of Internet Freedom in NigeriaNzeih Chukwuemeka
 
Using Social Media Ethically
Using Social Media EthicallyUsing Social Media Ethically
Using Social Media EthicallyJack Pringle
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchangeleejhayacosido
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchangeJhouBautista
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchangeorosalobarbio
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchangeorosalegaspi
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchangerommelaa
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchangeleejhayacosido
 
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfLEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfRegineManuel2
 
9-ictasplatformforchange-180206004734.pptx
9-ictasplatformforchange-180206004734.pptx9-ictasplatformforchange-180206004734.pptx
9-ictasplatformforchange-180206004734.pptxKenneth James Alamillo
 
9-ictasplatformforchange-180206004734(1).pptx
9-ictasplatformforchange-180206004734(1).pptx9-ictasplatformforchange-180206004734(1).pptx
9-ictasplatformforchange-180206004734(1).pptxBenjieBarlaan
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesMark Jhon Oxillo
 
9-ictasplatformforchange-180206004734.pdf
9-ictasplatformforchange-180206004734.pdf9-ictasplatformforchange-180206004734.pdf
9-ictasplatformforchange-180206004734.pdfRegineArellano2
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk Endcode_org
 

Ähnlich wie Privacy and Freedom of Expression (20)

Privacy
PrivacyPrivacy
Privacy
 
Privacy
PrivacyPrivacy
Privacy
 
Mass Media and Society Chapter 15: Media and Government
Mass Media and Society Chapter 15: Media and GovernmentMass Media and Society Chapter 15: Media and Government
Mass Media and Society Chapter 15: Media and Government
 
Free Speech and Hate Speech: Regulatory Challenge of Internet Freedom in Nigeria
Free Speech and Hate Speech: Regulatory Challenge of Internet Freedom in NigeriaFree Speech and Hate Speech: Regulatory Challenge of Internet Freedom in Nigeria
Free Speech and Hate Speech: Regulatory Challenge of Internet Freedom in Nigeria
 
Using Social Media Ethically
Using Social Media EthicallyUsing Social Media Ethically
Using Social Media Ethically
 
Cyber defamtion
Cyber defamtionCyber defamtion
Cyber defamtion
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfLEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
 
Chapter 5_dp-_pertemuan_7_8
 Chapter 5_dp-_pertemuan_7_8 Chapter 5_dp-_pertemuan_7_8
Chapter 5_dp-_pertemuan_7_8
 
9-ictasplatformforchange-180206004734.pptx
9-ictasplatformforchange-180206004734.pptx9-ictasplatformforchange-180206004734.pptx
9-ictasplatformforchange-180206004734.pptx
 
9-ictasplatformforchange-180206004734(1).pptx
9-ictasplatformforchange-180206004734(1).pptx9-ictasplatformforchange-180206004734(1).pptx
9-ictasplatformforchange-180206004734(1).pptx
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment Technologies
 
9-ictasplatformforchange-180206004734.pdf
9-ictasplatformforchange-180206004734.pdf9-ictasplatformforchange-180206004734.pdf
9-ictasplatformforchange-180206004734.pdf
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
 

Mehr von Mark Jhon Oxillo

FIELD STUDY (FS) 6 - EPISODE 3 (2018)
FIELD STUDY (FS) 6 - EPISODE 3 (2018)FIELD STUDY (FS) 6 - EPISODE 3 (2018)
FIELD STUDY (FS) 6 - EPISODE 3 (2018)Mark Jhon Oxillo
 
FIELD STUDY (FS) 6 - EPISODE 1 (2018)
FIELD STUDY (FS) 6 - EPISODE 1 (2018)FIELD STUDY (FS) 6 - EPISODE 1 (2018)
FIELD STUDY (FS) 6 - EPISODE 1 (2018)Mark Jhon Oxillo
 
Field Study 2 (FS 2) - Episode 3 [2018]
Field Study 2 (FS 2) - Episode 3 [2018]Field Study 2 (FS 2) - Episode 3 [2018]
Field Study 2 (FS 2) - Episode 3 [2018]Mark Jhon Oxillo
 
Ethics for IT Workers and IT Users
Ethics for IT Workers and IT UsersEthics for IT Workers and IT Users
Ethics for IT Workers and IT UsersMark Jhon Oxillo
 
An Overview of Ethics for IT Professionals
An Overview of Ethics for IT ProfessionalsAn Overview of Ethics for IT Professionals
An Overview of Ethics for IT ProfessionalsMark Jhon Oxillo
 
Introduction to the Study of Government and Constitution
Introduction to the Study of Government and ConstitutionIntroduction to the Study of Government and Constitution
Introduction to the Study of Government and ConstitutionMark Jhon Oxillo
 
Readings in Philippine History - Introduction to Philippine History
Readings in Philippine History - Introduction to Philippine HistoryReadings in Philippine History - Introduction to Philippine History
Readings in Philippine History - Introduction to Philippine HistoryMark Jhon Oxillo
 
The Significant Relationship of Physics - Mechanics & Heat and Discrete Math...
 The Significant Relationship of Physics - Mechanics & Heat and Discrete Math... The Significant Relationship of Physics - Mechanics & Heat and Discrete Math...
The Significant Relationship of Physics - Mechanics & Heat and Discrete Math...Mark Jhon Oxillo
 
The Saber Tooth Curriculum
The Saber Tooth CurriculumThe Saber Tooth Curriculum
The Saber Tooth CurriculumMark Jhon Oxillo
 
Field Study 2 (FS 2) - Episode 2 [2018]
Field Study 2 (FS 2) - Episode 2 [2018]Field Study 2 (FS 2) - Episode 2 [2018]
Field Study 2 (FS 2) - Episode 2 [2018]Mark Jhon Oxillo
 
Civil Service (CS) Examination Reviewer
Civil Service (CS) Examination ReviewerCivil Service (CS) Examination Reviewer
Civil Service (CS) Examination ReviewerMark Jhon Oxillo
 
Reflecting on the ICT Learning Process
Reflecting on the ICT Learning ProcessReflecting on the ICT Learning Process
Reflecting on the ICT Learning ProcessMark Jhon Oxillo
 
Sustaining an ICT Project for Social Change
Sustaining an ICT Project for Social ChangeSustaining an ICT Project for Social Change
Sustaining an ICT Project for Social ChangeMark Jhon Oxillo
 
ICT Project Publication and Statistics
ICT Project Publication and StatisticsICT Project Publication and Statistics
ICT Project Publication and StatisticsMark Jhon Oxillo
 
ICT Project for Social Change - Empowerment Technologies
ICT Project for Social Change - Empowerment TechnologiesICT Project for Social Change - Empowerment Technologies
ICT Project for Social Change - Empowerment TechnologiesMark Jhon Oxillo
 
Interactive Multimedia - Empowerment Technologies
 Interactive Multimedia - Empowerment Technologies Interactive Multimedia - Empowerment Technologies
Interactive Multimedia - Empowerment TechnologiesMark Jhon Oxillo
 
Collaborative ICT Development - Empowerment Technologies
Collaborative ICT Development - Empowerment TechnologiesCollaborative ICT Development - Empowerment Technologies
Collaborative ICT Development - Empowerment TechnologiesMark Jhon Oxillo
 
Online Platforms for ICT Content Development - Empowerment Technologies
Online Platforms for ICT Content Development - Empowerment TechnologiesOnline Platforms for ICT Content Development - Empowerment Technologies
Online Platforms for ICT Content Development - Empowerment TechnologiesMark Jhon Oxillo
 

Mehr von Mark Jhon Oxillo (20)

Social Networking
Social NetworkingSocial Networking
Social Networking
 
Software Development
Software DevelopmentSoftware Development
Software Development
 
FIELD STUDY (FS) 6 - EPISODE 3 (2018)
FIELD STUDY (FS) 6 - EPISODE 3 (2018)FIELD STUDY (FS) 6 - EPISODE 3 (2018)
FIELD STUDY (FS) 6 - EPISODE 3 (2018)
 
FIELD STUDY (FS) 6 - EPISODE 1 (2018)
FIELD STUDY (FS) 6 - EPISODE 1 (2018)FIELD STUDY (FS) 6 - EPISODE 1 (2018)
FIELD STUDY (FS) 6 - EPISODE 1 (2018)
 
Field Study 2 (FS 2) - Episode 3 [2018]
Field Study 2 (FS 2) - Episode 3 [2018]Field Study 2 (FS 2) - Episode 3 [2018]
Field Study 2 (FS 2) - Episode 3 [2018]
 
Ethics for IT Workers and IT Users
Ethics for IT Workers and IT UsersEthics for IT Workers and IT Users
Ethics for IT Workers and IT Users
 
An Overview of Ethics for IT Professionals
An Overview of Ethics for IT ProfessionalsAn Overview of Ethics for IT Professionals
An Overview of Ethics for IT Professionals
 
Introduction to the Study of Government and Constitution
Introduction to the Study of Government and ConstitutionIntroduction to the Study of Government and Constitution
Introduction to the Study of Government and Constitution
 
Readings in Philippine History - Introduction to Philippine History
Readings in Philippine History - Introduction to Philippine HistoryReadings in Philippine History - Introduction to Philippine History
Readings in Philippine History - Introduction to Philippine History
 
The Significant Relationship of Physics - Mechanics & Heat and Discrete Math...
 The Significant Relationship of Physics - Mechanics & Heat and Discrete Math... The Significant Relationship of Physics - Mechanics & Heat and Discrete Math...
The Significant Relationship of Physics - Mechanics & Heat and Discrete Math...
 
The Saber Tooth Curriculum
The Saber Tooth CurriculumThe Saber Tooth Curriculum
The Saber Tooth Curriculum
 
Field Study 2 (FS 2) - Episode 2 [2018]
Field Study 2 (FS 2) - Episode 2 [2018]Field Study 2 (FS 2) - Episode 2 [2018]
Field Study 2 (FS 2) - Episode 2 [2018]
 
Civil Service (CS) Examination Reviewer
Civil Service (CS) Examination ReviewerCivil Service (CS) Examination Reviewer
Civil Service (CS) Examination Reviewer
 
Reflecting on the ICT Learning Process
Reflecting on the ICT Learning ProcessReflecting on the ICT Learning Process
Reflecting on the ICT Learning Process
 
Sustaining an ICT Project for Social Change
Sustaining an ICT Project for Social ChangeSustaining an ICT Project for Social Change
Sustaining an ICT Project for Social Change
 
ICT Project Publication and Statistics
ICT Project Publication and StatisticsICT Project Publication and Statistics
ICT Project Publication and Statistics
 
ICT Project for Social Change - Empowerment Technologies
ICT Project for Social Change - Empowerment TechnologiesICT Project for Social Change - Empowerment Technologies
ICT Project for Social Change - Empowerment Technologies
 
Interactive Multimedia - Empowerment Technologies
 Interactive Multimedia - Empowerment Technologies Interactive Multimedia - Empowerment Technologies
Interactive Multimedia - Empowerment Technologies
 
Collaborative ICT Development - Empowerment Technologies
Collaborative ICT Development - Empowerment TechnologiesCollaborative ICT Development - Empowerment Technologies
Collaborative ICT Development - Empowerment Technologies
 
Online Platforms for ICT Content Development - Empowerment Technologies
Online Platforms for ICT Content Development - Empowerment TechnologiesOnline Platforms for ICT Content Development - Empowerment Technologies
Online Platforms for ICT Content Development - Empowerment Technologies
 

Kürzlich hochgeladen

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Kürzlich hochgeladen (20)

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 

Privacy and Freedom of Expression

  • 1. Privacy & Freedom of Expression Prepared by: Mark Jhon C. Oxillo
  • 3. THE RIGHT TO PRIVACY • The right to be left alone – the most comprehensive of rights, and the right most valued by a free people
  • 4. INFORMATION PRIVACY • First coined Roger Clarke, director of Australian Privacy Foundation • Is the combination of communications privacy and data privacy
  • 5. COMMUNICATIONS PRIVACY • the ability to communicate with others without those communications being monitored by other persons or organization
  • 6. DATA PRIVACY • the ability to limit access one’s personal data by other individuals and organizations in order to exercise a substantial degree of control over that data and its use
  • 7. Republic Act 10173 • Or the Data Privacy Act of 2012 (PH) • is a law that seeks to protect all forms of information, be it private, personal, or sensitive. It is meant to cover both natural and juridical persons involved in the processing of personal information.
  • 8. Republic Act 10173 • This comprehensive privacy law also established a National Privacy Commission that enforces and oversees it and is endowed with rulemaking power.
  • 10. OPT OUT POLICY • To refuse to give an institution the right to collect and share personal data
  • 11. OPT IN POLICY • To give an institution the right to collect and share personal data
  • 13. IDENTITY THEFT • Occurs when someone steals key pieces of personal information to impersonate a person. This information may include data such as name, address, date of birth, SSS number, passport number, driver’s license number, etc.
  • 14. VISHING • is the telephone equivalent of phishing. It is described as the act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
  • 15. ELECTRONIC DISCOVERY • Is the collection, preparation, review and production of electronically stored information for use in criminal and civil actions and proceedings
  • 16. • Includes any form of digital information such as emails, drawings, graphs, web pages, photographs, word-processing files, sound recording and databases
  • 17. CONSUMER PROFILING • Collecting personal information about internet users when they register at websites, complete survey, fill out forms or enter contests online
  • 18. CLICK-STREAM DATA • Information gathered by monitoring a consumer’s online activity
  • 19. BEACONS • Are small pieces of software that run on a web page and are able to track what a viewer is doing on the page, such as what is being typed or where the mouse is moving
  • 20. PERSONALIZATION SOFTWARE • Used to optimize the number, frequency, and mixture of their ad placement and to evaluate how visitors react to new ads
  • 21. MEASURES TO IMPROVE THE PROTECTION OF CONSUMER PRIVACY: • Implementing a “Do Not Track” option for web browsing software that would keep online services from collecting surfing or ad-targeting data
  • 22. MEASURES TO IMPROVE THE PROTECTION OF CONSUMER PRIVACY: • Requiring that companies collect only the data they need and then delete it after it has met its purpose
  • 23. MEASURES TO IMPROVE THE PROTECTION OF CONSUMER PRIVACY: • Requiring that online companies simplify their privacy policies so that consumers can read and understand them
  • 24. CHIEF PRIVACY OFFICER (CPO): • a senior manager within an organization whose role is to ensure that the organization does not violate government regulations while reassuring customers that their privacy will be protected
  • 26. FREEDOM OF EXPRESSION • The right to freedom of expression is one of the most important rights for free people everywhere.
  • 27. FREEDOM OF EXPRESSION • Right to express one's ideas and opinions freely through speech, writing, and other forms of communication but without deliberately causing harm to others' character and/or reputation by false or misleading statements.
  • 28. TYPES OF SPEECHES • OBSCENE SPEECH • DEFAMATION • PERJURY • FRAUD • INCITEMENT OF PANIC • INCITEMENT TO CRIME • “FIGHTING WORDS” • HATE SPEECH • SEDITION
  • 29. OBSCENE SPEECH • Appeals to “prurient interest” (causes lust) • “Obviously offensive” description of defined sexual conduct • No serious literary, artistic, political, or scientific value
  • 30. DEFAMATION • Oral or written statement of alleged fact that is false and harms another person * Slander - oral defamatory statement * Libel - written defamatory statement
  • 31. PERJURY • is the intentional act of swearing a false oath or falsifying an affirmation to tell the truth, whether spoken or in writing, concerning matters material to an official proceeding.
  • 32. FRAUD • is intentional deception to secure unfair or unlawful gain, or to deprive a victim of a legal right.
  • 33. INCITEMENT OF PANIC • is when a person causes the evacuation of any public place, or otherwise cause serious public inconvenience or alarm
  • 34. INCITEMENT TO CRIME • is the encouragement of another person to commit a crime
  • 35. FIGHTING WORDS • are written or spoken words intended to incite hatred or violence from their target • are words indicating a willingness to fight or challenge someone
  • 36. HATE SPEECH • abusive or threatening speech or writing that expresses prejudice against a particular group, especially on the basis of race, religion, or sexual orientation.
  • 37. SEDITION • a conduct or speech inciting people to rebel against the authority of a state or monarch
  • 38. Article III (Bill of Rights) • Section 4. No law shall be passed abridging the freedom of speech, of expression, or of the press, or the right of the people peaceably to assemble and petition the government for redress of grievances.
  • 39. FOE: KEY ISSUES • Controlling access to information on the Internet • Anonymity on the Internet • Defamation and hate speech • Corporate blogging • Pornography
  • 40. FOE: KEY ISSUES Controlling access to information on the Internet: • Internet Filter – a software that can be used to block access to certain websites that contain material deemed inappropriate or offensive
  • 41. FOE: KEY ISSUES Anonymity on the Internet • Anonymous Expression – the expression of opinions by people who do not reveal their identity
  • 42. FOE: KEY ISSUES Defamation and Hate Speech • Ex: A threatening private message sent over the internet to a person, and a libel directed at a particular person can be punishable by law.
  • 43. FOE: KEY ISSUES Corporate Blogging • is the practice of allowing employees to create their own personal blogs relating to their employment
  • 44. FOE: KEY ISSUES Pornography • often colloquially referred to as porn, is any material — whether written, visual, or others — that consists of sexually explicit material and that is intended to sexually arouse.
  • 45. FOE: KEY ISSUES Sexting • sending sexual messages, nudes or seminude photos or sexually explicit videos over a cellphone
  • 46. END